id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 3
62.8k
| title
stringlengths 1
382
| comments
stringlengths 1
1.15k
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 7
153
⌀ | report-no
stringlengths 1
509
⌀ | categories
stringlengths 5
125
| license
stringclasses 9
values | abstract
stringlengths 6
6.09k
| versions
listlengths 1
187
| update_date
timestamp[s]date 2007-05-23 00:00:00
2025-04-25 00:00:00
| authors_parsed
sequencelengths 1
2.83k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0606070 | Shane Legg Mr | Shane Legg | Is there an Elegant Universal Theory of Prediction? | null | null | null | IDSIA - 12 - 06 | cs.AI cs.CC | null | Solomonoff's inductive learning model is a powerful, universal and highly
elegant theory of sequence prediction. Its critical flaw is that it is
incomputable and thus cannot be used in practice. It is sometimes suggested
that it may still be useful to help guide the development of very general and
powerful theories of prediction which are computable. In this paper it is shown
that although powerful algorithms exist, they are necessarily highly complex.
This alone makes their theoretical analysis problematic, however it is further
shown that beyond a moderate level of complexity the analysis runs into the
deeper problem of Goedel incompleteness. This limits the power of mathematics
to analyse and study prediction algorithms, and indeed intelligent systems in
general.
| [
{
"version": "v1",
"created": "Wed, 14 Jun 2006 15:22:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Legg",
"Shane",
""
]
] |
cs/0606079 | Stevan Harnad | C. Hajjem, S. Harnad, Y. Gingras | Ten-Year Cross-Disciplinary Comparison of the Growth of Open Access and
How it Increases Research Citation Impact | 10 pages, 5 figures, 3 tables | IEEE Data Engineering Bulletin 28(4): 39-47; 2005 | null | null | cs.DL | null | Lawrence (2001)found computer science articles that were openly accessible
(OA) on the Web were cited more. We replicated this in physics. We tested
1,307,038 articles published across 12 years (1992-2003) in 10 disciplines
(Biology, Psychology, Sociology, Health, Political Science, Economics,
Education, Law, Business, Management). A robot trawls the Web for full-texts
using reference metadata ISI citation data (signal detectability d'=2.45; bias
= 0.52). Percentage OA (relative to total OA + NOA) articles varies from 5%-16%
(depending on discipline, year and country) and is slowly climbing annually
(correlation r=.76, sample size N=12, probability p < 0.005). Comparing OA and
NOA articles in the same journal/year, OA articles have consistently more
citations, the advantage varying from 36%-172% by discipline and year.
Comparing articles within six citation ranges (0, 1, 2-3, 4-7, 8-15, 16+
citations), the annual percentage of OA articles is growing significantly
faster than NOA within every citation range (r > .90, N=12, p < .0005) and the
effect is greater with the more highly cited articles (r = .98, N=6, p < .005).
Causality cannot be determined from these data, but our prior finding of a
similar pattern in physics, where percent OA is much higher (and even
approaches 100% in some subfields), makes it unlikely that the OA citation
advantage is merely or mostly a self-selection bias (for making only one's
better articles OA). Further research will analyze the effect's timing, causal
components and relation to other variables.
| [
{
"version": "v1",
"created": "Sun, 18 Jun 2006 19:51:18 GMT"
},
{
"version": "v2",
"created": "Tue, 15 Aug 2006 17:35:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hajjem",
"C.",
""
],
[
"Harnad",
"S.",
""
],
[
"Gingras",
"Y.",
""
]
] |
cs/0606080 | Philippe Chapdelaine | Philippe Chapdelaine | On the structure of linear-time reducibility | 10 pages | null | null | null | cs.CC | null | In 1975, Ladner showed that under the hypothesis that P is not equal to NP,
there exists a language which is neither in P, nor NP-complete. This result was
latter generalized by Schoning and several authors to various polynomial-time
complexity classes. We show here that such results also apply to linear-time
reductions on RAMs (resp. Turing machines), and hence allow for separation
results in linear-time classes similar to Ladner's ones for polynomial time.
| [
{
"version": "v1",
"created": "Mon, 19 Jun 2006 08:48:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chapdelaine",
"Philippe",
""
]
] |
cs/0606081 | Juergen Schmidhuber | Juergen Schmidhuber | New Millennium AI and the Convergence of History | Speed Prior: clarification / 15 pages, to appear in "Challenges to
Computational Intelligence" | null | null | IDSIA-14-06 | cs.AI | null | Artificial Intelligence (AI) has recently become a real formal science: the
new millennium brought the first mathematically sound, asymptotically optimal,
universal problem solvers, providing a new, rigorous foundation for the
previously largely heuristic field of General AI and embedded agents. At the
same time there has been rapid progress in practical methods for learning true
sequence-processing programs, as opposed to traditional methods limited to
stationary pattern association. Here we will briefly review some of the new
results, and speculate about future developments, pointing out that the time
intervals between the most notable events in over 40,000 years or 2^9 lifetimes
of human history have sped up exponentially, apparently converging to zero
within the next few decades. Or is this impression just a by-product of the way
humans allocate memory space to past events?
| [
{
"version": "v1",
"created": "Mon, 19 Jun 2006 09:13:43 GMT"
},
{
"version": "v2",
"created": "Fri, 23 Jun 2006 14:35:37 GMT"
},
{
"version": "v3",
"created": "Thu, 29 Jun 2006 10:05:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Schmidhuber",
"Juergen",
""
]
] |
cs/0606082 | Jonathan Ben-Naim | Jonathan Ben-Naim (LIF) | Lack of Finite Characterizations for the Distance-based Revision | null | Tenth International Conference on Principles of Knowledge
Representation and Reasoning (KR'06) (2006) 239-248 | null | null | cs.LO | null | Lehmann, Magidor, and Schlechta developed an approach to belief revision
based on distances between any two valuations. Suppose we are given such a
distance D. This defines an operator |D, called a distance operator, which
transforms any two sets of valuations V and W into the set V |D W of all
elements of W that are closest to V. This operator |D defines naturally the
revision of K by A as the set of all formulas satisfied in M(K) |D M(A) (i.e.
those models of A that are closest to the models of K). This constitutes a
distance-based revision operator. Lehmann et al. characterized families of them
using a loop condition of arbitrarily big size. An interesting question is
whether this loop condition can be replaced by a finite one. Extending the
results of Schlechta, we will provide elements of negative answer. In fact, we
will show that for families of distance operators, there is no "normal"
characterization. Approximatively, a normal characterization contains only
finite and universally quantified conditions. These results have an interest of
their own for they help to understand the limits of what is possible in this
area. Now, we are quite confident that this work can be continued to show
similar impossibility results for distance-based revision operators, which
suggests that the big loop condition cannot be simplified.
| [
{
"version": "v1",
"created": "Mon, 19 Jun 2006 09:34:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ben-Naim",
"Jonathan",
"",
"LIF"
]
] |
cs/0606085 | Daniil Ryabko | Boris Ryabko, Daniil Ryabko | Provably Secure Universal Steganographic Systems | 11 pages | null | null | Cryptology ePrint Archive, Report 2006/063 | cs.CR | null | We propose a simple universal (that is, distribution--free) steganographic
system in which covertexts with and without hidden texts are statistically
indistinguishable. The stegosystem can be applied to any source generating
i.i.d. covertexts with unknown distribution, and the hidden text is transmitted
exactly, with zero probability of error. Moreover, the proposed steganographic
system has two important properties. First, the rate of transmission of hidden
information approaches the Shannon entropy of the covertext source as the size
of blocks used for hidden text encoding tends to infinity. Second, if the size
of the alphabet of the covertext source and its minentropy tend to infinity
then the number of bits of hidden text per letter of covertext tends to
$\log(n!)/n$ where $n$ is the (fixed) size of blocks used for hidden text
encoding. The proposed stegosystem uses randomization.
| [
{
"version": "v1",
"created": "Tue, 20 Jun 2006 08:41:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ryabko",
"Boris",
""
],
[
"Ryabko",
"Daniil",
""
]
] |
cs/0606086 | Marie-Claude Gaudel | Alain Denise (LRI), Marie-Claude Gaudel (LRI), Sandrine-Dominique
Gouraud (LRI), Richard Lasseigne (ELM), Sylvain Peyronnet (ELM), the RaST
Collaboration | Uniform Random Sampling of Traces in Very Large Models | null | First International Workshop on Random Testing, \'{E}tats-Unis
d'Am\'{e}rique (2006) 10-19 | null | null | cs.LO | null | This paper presents some first results on how to perform uniform random walks
(where every trace has the same probability to occur) in very large models. The
models considered here are described in a succinct way as a set of
communicating reactive modules. The method relies upon techniques for counting
and drawing uniformly at random words in regular languages. Each module is
considered as an automaton defining such a language. It is shown how it is
possible to combine local uniform drawings of traces, and to obtain some global
uniform random sampling, without construction of the global model.
| [
{
"version": "v1",
"created": "Tue, 20 Jun 2006 09:53:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Denise",
"Alain",
"",
"LRI"
],
[
"Gaudel",
"Marie-Claude",
"",
"LRI"
],
[
"Gouraud",
"Sandrine-Dominique",
"",
"LRI"
],
[
"Lasseigne",
"Richard",
"",
"ELM"
],
[
"Peyronnet",
"Sylvain",
"",
"ELM"
],
[
"Collaboration",
"the RaST",
""
]
] |
cs/0606088 | Paulo Condado | Paulo A. Condado, Fernando G. Lobo | Breaking barriers for people with voice disabilities: Combining virtual
keyboards with speech synthesizers, and VoIP applications | null | null | null | Also UAlg-ILAB Report No. 200604 | cs.CY | null | Text-to-speech technology has been broadly used to help people with voice
disabilities to overcome their difficulties. With text-to-speech, a person
types at a keyboard, the text is synthesized, and the sound comes out through
the computer speakers.
In recent years, Voice over IP (VoIP) applications have become very popular
and have been used by people worldwide. These applications allow people to talk
for free over the Internet and also to make traditional calls through the
Public-Switched Telephone Network (PSTN) at a small fraction of the cost
offered by traditional phone companies.
We have created a system, called EasyVoice, which integrates speech
synthesizers with VoIP applications. The result allows a person with motor
impairments and voice disabilities to talk with another person located anywhere
in the world. The benefits in this case are much stronger than the ones
obtained by non-disabled people using VoIP applications. People with motor
impairments sometimes can hardly use a regular or mobile phone. Thus, the
advantage is not only the reduction in cost, but more important, the ability to
talk at all.
| [
{
"version": "v1",
"created": "Tue, 20 Jun 2006 12:22:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Condado",
"Paulo A.",
""
],
[
"Lobo",
"Fernando G.",
""
]
] |
cs/0606089 | William Yurcik | Charis Ermopoulos and William Yurcik | NVision-PA: A Tool for Visual Analysis of Command Behavior Based on
Process Accounting Logs (with a Case Study in HPC Cluster Security) | 25 pages, 13 Figures | null | null | null | cs.CR cs.DC | null | In the UNIX/Linux environment the kernel can log every command process
created by every user with process accounting. Thus process accounting logs
have many potential uses, particularly the monitoring and forensic
investigation of security events. Previous work successfully leveraged the use
of process accounting logs to identify a difficult to detect and damaging
intrusion against high performance computing (HPC) clusters, masquerade
attacks, where intruders masquerade as legitimate users with purloined
authentication credentials. While masqueraders on HPC clusters were found to be
identifiable with a high accuracy (greater than 90%), this accuracy is still
not high enough for HPC production environments where greater than 99% accuracy
is needed.
This paper incrementally advances the goal of more accurately identifying
masqueraders on HPC clusters by seeking to identify features within command
sets that distinguish masqueraders. To accomplish this goal, we created
NVision-PA, a software tool that produces text and graphic statistical
summaries describing input processing accounting logs. We report NVision-PA
results describing two different process accounting logs; one from Internet
usage and one from HPC cluster usage. These results identify the distinguishing
features of Internet users (as proxies for masqueraders) posing as clusters
users. This research is both a promising next step toward creating a real-time
masquerade detection sensor for production HPC clusters as well as providing
another tool for system administrators to use for statistically monitoring and
managing legitimate workloads (as indicated by command usage) in HPC
environments.
| [
{
"version": "v1",
"created": "Tue, 20 Jun 2006 16:53:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ermopoulos",
"Charis",
""
],
[
"Yurcik",
"William",
""
]
] |
cs/0606093 | Vladimir Vovk | Vladimir Vovk | Predictions as statements and decisions | 48 pages | null | null | null | cs.LG | null | Prediction is a complex notion, and different predictors (such as people,
computer programs, and probabilistic theories) can pursue very different goals.
In this paper I will review some popular kinds of prediction and argue that the
theory of competitive on-line learning can benefit from the kinds of prediction
that are now foreign to it.
| [
{
"version": "v1",
"created": "Thu, 22 Jun 2006 04:31:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vovk",
"Vladimir",
""
]
] |
cs/0606094 | Frank Neven | Wim Martens, Frank Neven, and Marc Gyssens | On Typechecking Top-Down XML Tranformations: Fixed Input or Output
Schemas | null | null | null | null | cs.DB cs.PL | null | Typechecking consists of statically verifying whether the output of an XML
transformation always conforms to an output type for documents satisfying a
given input type. In this general setting, both the input and output schema as
well as the transformation are part of the input for the problem. However,
scenarios where the input or output schema can be considered to be fixed, are
quite common in practice. In the present work, we investigate the computational
complexity of the typechecking problem in the latter setting.
| [
{
"version": "v1",
"created": "Thu, 22 Jun 2006 09:46:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Martens",
"Wim",
""
],
[
"Neven",
"Frank",
""
],
[
"Gyssens",
"Marc",
""
]
] |
cs/0606095 | Jean Krivine | Jean Krivine (INRIA Rocquencourt) | A verification algorithm for Declarative Concurrent Programming | null | null | null | null | cs.DC | null | A verification method for distributed systems based on decoupling forward and
backward behaviour is proposed. This method uses an event structure based
algorithm that, given a CCS process, constructs its causal compression relative
to a choice of observable actions. Verifying the original process equipped with
distributed backtracking on non-observable actions, is equivalent to verifying
its relative compression which in general is much smaller. We call this method
Declarative Concurrent Programming (DCP). DCP technique compares well with
direct bisimulation based methods. Benchmarks for the classic dining
philosophers problem show that causal compression is rather efficient both
time- and space-wise. State of the art verification tools can successfully
handle more than 15 agents, whereas they can handle no more than 5 following
the traditional direct method; an altogether spectacular improvement, since in
this example the specification size is exponential in the number of agents.
| [
{
"version": "v1",
"created": "Thu, 22 Jun 2006 13:23:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Krivine",
"Jean",
"",
"INRIA Rocquencourt"
]
] |
cs/0606096 | Hendrik Feddes | Lea Cyrus | Building a resource for studying translation shifts | 6 pages, 1 figure | Proc. LREC 2006, Genoa, May 24-26, 2006; pp. 1240-1245 | null | null | cs.CL | null | This paper describes an interdisciplinary approach which brings together the
fields of corpus linguistics and translation studies. It presents ongoing work
on the creation of a corpus resource in which translation shifts are explicitly
annotated. Translation shifts denote departures from formal correspondence
between source and target text, i.e. deviations that have occurred during the
translation process. A resource in which such shifts are annotated in a
systematic way will make it possible to study those phenomena that need to be
addressed if machine translation output is to resemble human translation. The
resource described in this paper contains English source texts (parliamentary
proceedings) and their German translations. The shift annotation is based on
predicate-argument structures and proceeds in two steps: first, predicates and
their arguments are annotated monolingually in a straightforward manner. Then,
the corresponding English and German predicates and arguments are aligned with
each other. Whenever a shift - mainly grammatical or semantic -has occurred,
the alignment is tagged accordingly.
| [
{
"version": "v1",
"created": "Thu, 22 Jun 2006 13:26:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cyrus",
"Lea",
""
]
] |
cs/0606097 | Andrew Krizhanovsky A | A. Krizhanovsky | Synonym search in Wikipedia: Synarcher | 4 pages, 2 figures, Synarcher program is available at
http://synarcher.sourceforge.net | null | null | null | cs.IR cs.DM | null | The program Synarcher for synonym (and related terms) search in the text
corpus of special structure (Wikipedia) was developed. The results of the
search are presented in the form of graph. It is possible to explore the graph
and search for graph elements interactively. Adapted HITS algorithm for synonym
search, program architecture, and program work evaluation with test examples
are presented in the paper. The proposed algorithm can be applied to a query
expansion by synonyms (in a search engine) and a synonym dictionary forming.
| [
{
"version": "v1",
"created": "Thu, 22 Jun 2006 14:17:26 GMT"
},
{
"version": "v2",
"created": "Fri, 23 Jun 2006 05:10:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Krizhanovsky",
"A.",
""
]
] |
cs/0606101 | Marc Daumas | Marc Daumas (LIRMM, Lp2a), David Lester (LP2A, University of
Manchester) | Stochastic Formal Methods: An application to accuracy of numeric
software | null | null | null | null | cs.MS | null | This paper provides a bound on the number of numeric operations (fixed or
floating point) that can safely be performed before accuracy is lost. This work
has important implications for control systems with safety-critical software,
as these systems are now running fast enough and long enough for their errors
to impact on their functionality. Furthermore, worst-case analysis would
blindly advise the replacement of existing systems that have been successfully
running for years. We present here a set of formal theorems validated by the
PVS proof assistant. These theorems will allow code analyzing tools to produce
formal certificates of accurate behavior. For example, FAA regulations for
aircraft require that the probability of an error be below $10^{-9}$ for a 10
hour flight.
| [
{
"version": "v1",
"created": "Fri, 23 Jun 2006 08:26:56 GMT"
},
{
"version": "v2",
"created": "Thu, 14 Sep 2006 11:51:28 GMT"
},
{
"version": "v3",
"created": "Wed, 18 Oct 2006 19:41:07 GMT"
},
{
"version": "v4",
"created": "Tue, 19 Dec 2006 17:10:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Daumas",
"Marc",
"",
"LIRMM, Lp2a"
],
[
"Lester",
"David",
"",
"LP2A, University of\n Manchester"
]
] |
cs/0606107 | Uma Murthy | Ingrid Burbey, Gyuhyun Kwon, Uma Murthy, Nicholas Polys and Prince
Vincent | Human Information Processing with the Personal Memex | null | null | null | null | cs.HC | null | In this report, we describe the work done in a project that explored the
human information processing aspects of a personal memex (a memex to organize
personal information). In the project, we considered the use of the personal
memex, focusing on information recall, by three populations: people with Mild
Cognitive Impairment, those diagnosed with Macular Degeneration, and a
high-functioning population. The outcomes of the project included human
information processing-centered design guidelines for the memex interface, a
low-fidelity prototype, and an annotated bibliography for human information
processing, usability and design literature relating to the memex and the
populations we explored.
| [
{
"version": "v1",
"created": "Mon, 26 Jun 2006 15:58:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Burbey",
"Ingrid",
""
],
[
"Kwon",
"Gyuhyun",
""
],
[
"Murthy",
"Uma",
""
],
[
"Polys",
"Nicholas",
""
],
[
"Vincent",
"Prince",
""
]
] |
cs/0606110 | Richard Weber | Jochen Mundinger, Richard R. Weber and Gideon Weiss | Optimal Scheduling of Peer-to-Peer File Dissemination | 27 pages, 3 figures. (v2) added a note about possible strengthening
of Theorem 5 at end of proof; updated some references | null | null | null | cs.NI cs.DS math.OC | null | Peer-to-peer (P2P) overlay networks such as BitTorrent and Avalanche are
increasingly used for disseminating potentially large files from a server to
many end users via the Internet. The key idea is to divide the file into many
equally-sized parts and then let users download each part (or, for network
coding based systems such as Avalanche, linear combinations of the parts)
either from the server or from another user who has already downloaded it.
However, their performance evaluation has typically been limited to comparing
one system relative to another and typically been realized by means of
simulation and measurements. In contrast, we provide an analytic performance
analysis that is based on a new uplink-sharing version of the well-known
broadcasting problem. Assuming equal upload capacities, we show that the
minimal time to disseminate the file is the same as for the simultaneous
send/receive version of the broadcasting problem. For general upload
capacities, we provide a mixed integer linear program (MILP) solution and a
complementary fluid limit solution. We thus provide a lower bound which can be
used as a performance benchmark for any P2P file dissemination system. We also
investigate the performance of a decentralized strategy, providing evidence
that the performance of necessarily decentralized P2P file dissemination
systems should be close to this bound and therefore that it is useful in
practice.
| [
{
"version": "v1",
"created": "Tue, 27 Jun 2006 08:11:57 GMT"
},
{
"version": "v2",
"created": "Fri, 30 Jun 2006 07:17:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mundinger",
"Jochen",
""
],
[
"Weber",
"Richard R.",
""
],
[
"Weiss",
"Gideon",
""
]
] |
cs/0606111 | Hind El Haouzi | Hind El Haouzi (CRAN) | Models simulation and interoperability using MDA and HLA | 8 pages | Doctoral Symposium, IFAC/IFIP International conference on
Interoperability for Enterprise Applications and Software (I-ESA'2006), March
22-24, 2006,, France (2006) | null | null | cs.OH | null | In the manufacturing context, there have been numerous efforts to use
modeling and simulation tools and techniques to improve manufacturing
efficiency over the last four decades. While an increasing number of
manufacturing system decisions are being made based on the use of models, their
use is still sporadic in many manufacturing environments. Our paper advocates
for an approach combining MDA (model driven architecture) and HLA (High Level
Architecture), the IEEE standard for modeling and simulation, in order to
overcome the deficiencies of current simulation methods at the level of
interoperability and reuse.
| [
{
"version": "v1",
"created": "Tue, 27 Jun 2006 14:55:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Haouzi",
"Hind El",
"",
"CRAN"
]
] |
cs/0606115 | Jos\'e Borges | Jose Borges and Mark Levene | Evaluating Variable Length Markov Chain Models for Analysis of User Web
Navigation Sessions | null | null | null | null | cs.AI cs.IR | null | Markov models have been widely used to represent and analyse user web
navigation data. In previous work we have proposed a method to dynamically
extend the order of a Markov chain model and a complimentary method for
assessing the predictive power of such a variable length Markov chain. Herein,
we review these two methods and propose a novel method for measuring the
ability of a variable length Markov model to summarise user web navigation
sessions up to a given length. While the summarisation ability of a model is
important to enable the identification of user navigation patterns, the ability
to make predictions is important in order to foresee the next link choice of a
user after following a given trail so as, for example, to personalise a web
site. We present an extensive experimental evaluation providing strong evidence
that prediction accuracy increases linearly with summarisation ability.
| [
{
"version": "v1",
"created": "Wed, 28 Jun 2006 08:26:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Borges",
"Jose",
""
],
[
"Levene",
"Mark",
""
]
] |
cs/0606116 | Philip Bille | Philip Bille | New Algorithms for Regular Expression Matching | null | null | null | null | cs.DS | null | In this paper we revisit the classical regular expression matching problem,
namely, given a regular expression $R$ and a string $Q$, decide if $Q$ matches
one of the strings specified by $R$. Let $m$ and $n$ be the length of $R$ and
$Q$, respectively. On a standard unit-cost RAM with word length $w \geq \log
n$, we show that the problem can be solved in $O(m)$ space with the following
running times: \begin{equation*} \begin{cases}
O(n\frac{m \log w}{w} + m \log w) & \text{if $m > w$} \\
O(n\log m + m\log m) & \text{if $\sqrt{w} < m \leq w$} \\
O(\min(n+ m^2, n\log m + m\log m)) & \text{if $m \leq \sqrt{w}$.} \end{cases}
\end{equation*} This improves the best known time bound among algorithms using
$O(m)$ space. Whenever $w \geq \log^2 n$ it improves all known time bounds
regardless of how much space is used.
| [
{
"version": "v1",
"created": "Wed, 28 Jun 2006 10:51:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bille",
"Philip",
""
]
] |
cs/0606119 | Sophie Aubin | Sampo Pyysalo, Tapio Salakoski, Sophie Aubin (LIPN), Adeline Nazarenko
(LIPN) | Lexical Adaptation of Link Grammar to the Biomedical Sublanguage: a
Comparative Evaluation of Three Approaches | null | Proceedings of the Second International Symposium on Semantic
Mining in Biomedicine (SMBM 2006) (2006) 60-67 | null | null | cs.CL cs.IR | null | We study the adaptation of Link Grammar Parser to the biomedical sublanguage
with a focus on domain terms not found in a general parser lexicon. Using two
biomedical corpora, we implement and evaluate three approaches to addressing
unknown words: automatic lexicon expansion, the use of morphological clues, and
disambiguation using a part-of-speech tagger. We evaluate each approach
separately for its effect on parsing performance and consider combinations of
these approaches. In addition to a 45% increase in parsing efficiency, we find
that the best approach, incorporating information from a domain part-of-speech
tagger, offers a statistically signicant 10% relative decrease in error. The
adapted parser is available under an open-source license at
http://www.it.utu.fi/biolg.
| [
{
"version": "v1",
"created": "Wed, 28 Jun 2006 14:44:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pyysalo",
"Sampo",
"",
"LIPN"
],
[
"Salakoski",
"Tapio",
"",
"LIPN"
],
[
"Aubin",
"Sophie",
"",
"LIPN"
],
[
"Nazarenko",
"Adeline",
"",
"LIPN"
]
] |
cs/0606122 | P. Oscar Boykin | Wolfgang Mueller, P. Oscar Boykin, Nima Sarshar, Vwani P. Roychowdhury | Comparison of Image Similarity Queries in P2P Systems | To appear in IEEE P2P2006 | null | null | null | cs.DC cs.NI | null | Given some of the recent advances in Distributed Hash Table (DHT) based
Peer-To-Peer (P2P) systems we ask the following questions: Are there
applications where unstructured queries are still necessary (i.e., the
underlying queries do not efficiently map onto any structured framework), and
are there unstructured P2P systems that can deliver the high bandwidth and
computing performance necessary to support such applications. Toward this end,
we consider an image search application which supports queries based on image
similarity metrics, such as color histogram intersection, and discuss why in
this setting, standard DHT approaches are not directly applicable. We then
study the feasibility of implementing such an image search system on two
different unstructured P2P systems: power-law topology with percolation search,
and an optimized super-node topology using structured broadcasts. We examine
the average and maximum values for node bandwidth, storage and processing
requirements in the percolation and super-node models, and show that current
high-end computers and high-speed links have sufficient resources to enable
deployments of large-scale complex image search systems.
| [
{
"version": "v1",
"created": "Thu, 29 Jun 2006 14:28:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mueller",
"Wolfgang",
""
],
[
"Boykin",
"P. Oscar",
""
],
[
"Sarshar",
"Nima",
""
],
[
"Roychowdhury",
"Vwani P.",
""
]
] |
cs/0606123 | Atos Alves | Atos Ramos Alves | Use MPLS in Lan's | 9 pages, 0 figures tests in laboratory | null | null | null | cs.NI cs.CR | null | To demonstrate the result of researches in laboratory with the focus in
exhibiting the real impact of the use of the technology MPLS in LAN. Through
these researches we will verify that the investment in this technology is
shown, of the point of view cost/benefit, very interesting, being necessary,
however, the adoption of another measured, in order to settle down a
satisfactory level in the items Quality and safety in the sending of packages
in VPN but assisting to the requirement latency of the net very well being
shown in the tests that it consumes on average one Tuesday leaves of the time
spend for the same function in routing IP.
| [
{
"version": "v1",
"created": "Thu, 29 Jun 2006 14:44:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Alves",
"Atos Ramos",
""
]
] |
cs/0606125 | Leon Moonen | Marius Marin | Formalizing typical crosscutting concerns | 24 pages | null | null | TUD-SERG-2006-010 | cs.SE cs.PL | null | We present a consistent system for referring crosscutting functionality,
relating crosscutting concerns to specific implementation idioms, and
formalizing their underlying relations through queries. The system is based on
generic crosscutting concerns that we organize and describe in a catalog.
We have designed and implemented a tool support for querying source code for
instances of the proposed generic concerns and organizing them in composite
concern models. The composite concern model adds a new dimension to the
dominant decomposition of the system for describing and making explicit source
code relations specific to crosscutting concerns implementations.
We use the proposed approach to describe crosscutting concerns in design
patterns and apply the tool to an opensource system (JHotDraw).
| [
{
"version": "v1",
"created": "Thu, 29 Jun 2006 20:04:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Marin",
"Marius",
""
]
] |
cs/0606126 | Eldan Goldenberg | Eldan Goldenberg, Jacob R. Garcowski, Randall D. Beer | May We Have Your Attention: Analysis of a Selective Attention Task | In S. Schaal, A. Ijspeert, A. Billard, S. Vijayakumar, J. Hallam &
J-A. Meyer (Eds.), From Animals to Animats 8: Proceedings of the Eighth
International Conference on the Simulation of Adaptive Behavior (pp 49-56).
MIT Press | null | null | null | cs.NE cs.AI | null | In this paper we present a deeper analysis than has previously been carried
out of a selective attention problem, and the evolution of continuous-time
recurrent neural networks to solve it. We show that the task has a rich
structure, and agents must solve a variety of subproblems to perform well. We
consider the relationship between the complexity of an agent and the ease with
which it can evolve behavior that generalizes well across subproblems, and
demonstrate a shaping protocol that improves generalization.
| [
{
"version": "v1",
"created": "Thu, 29 Jun 2006 22:33:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Goldenberg",
"Eldan",
""
],
[
"Garcowski",
"Jacob R.",
""
],
[
"Beer",
"Randall D.",
""
]
] |
cs/0606127 | Mukund Sundararajan | Tim Roughgarden (Stanford University) and Mukund Sundararajan
(Stanford University) | Approximately Efficient Cost-Sharing Mechanisms | latex source, 22 pages, 1 figure | null | null | null | cs.GT | null | We make three different types of contributions to cost-sharing: First, we
identify several new classes of combinatorial cost functions that admit
incentive-compatible mechanisms achieving both a constant-factor approximation
of budget-balance and a polylogarithmic approximation of the social cost
formulation of efficiency. Second, we prove a new, optimal lower bound on the
approximate efficiency of every budget-balanced Moulin mechanism for Steiner
tree or SSRoB cost functions. This lower bound exposes a latent approximation
hierarchy among different cost-sharing problems. Third, we show that weakening
the definition of incentive-compatibility to strategyproofness can permit
exponentially more efficient approximately budget-balanced mechanisms, in
particular for set cover cost-sharing problems.
| [
{
"version": "v1",
"created": "Fri, 30 Jun 2006 02:24:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Roughgarden",
"Tim",
"",
"Stanford University"
],
[
"Sundararajan",
"Mukund",
"",
"Stanford University"
]
] |
cs/0606128 | Andrew Krizhanovsky A | A. Krizhanovsky | Automatic forming lists of semantically related terms based on texts
rating in the corpus with hyperlinks and categories (In Russian) | 6 pages, 1 figure, in Russian, PDF, for other formats see
http://whinger.narod.ru/paper/index.html | null | null | null | cs.IR cs.DM | null | HITS adapted algorithm for synonym search, the program architecture, and the
program work evaluation with test examples are presented in the paper.
Synarcher program for synonym (and related terms) search in the text corpus of
special structure (Wikipedia) was developed. The results of search are
presented in the form of a graph. It is possible to explore the graph and
search graph elements interactively. The proposed algorithm could be applied to
the search request extending and for synonym dictionary forming.
| [
{
"version": "v1",
"created": "Fri, 30 Jun 2006 15:17:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Krizhanovsky",
"A.",
""
]
] |
cs/0607001 | Chinmoy Bhattacharya | Chinmoy Bhattacharya and P.R.Mahapatra | A Novel Application of Lifting Scheme for Multiresolution Correlation of
Complex Radar Signals | null | null | null | null | cs.DC cs.CC | null | The lifting scheme of discrete wavelet transform (DWT) is now quite well
established as an efficient technique for image compression, and has been
incorporated into the JPEG2000 standards. However, the potential of the lifting
scheme has not been exploited in the context of correlationbased processing,
such as encountered in radar applications. This paper presents a complete and
consistent framework for the application of DWT for correlation of complex
signals. In particular, lifting scheme factorization of biorthogonal
filterbanks is carried out in dual analysis basis spaces for multiresolution
correlation of complex radar signals in the DWT domain only. A causal
formulation of lifting for orthogonal filterbank is also developed. The
resulting parallel algorithms and consequent saving of computational effort are
briefly dealt with.
| [
{
"version": "v1",
"created": "Sat, 1 Jul 2006 16:58:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bhattacharya",
"Chinmoy",
""
],
[
"Mahapatra",
"P. R.",
""
]
] |
cs/0607005 | Florentin Smarandache | Florentin Smarandache, Jean Dezert | Belief Conditioning Rules (BCRs) | 26 pages | null | null | null | cs.AI | null | In this paper we propose a new family of Belief Conditioning Rules (BCRs) for
belief revision. These rules are not directly related with the fusion of
several sources of evidence but with the revision of a belief assignment
available at a given time according to the new truth (i.e. conditioning
constraint) one has about the space of solutions of the problem.
| [
{
"version": "v1",
"created": "Sun, 2 Jul 2006 14:54:54 GMT"
},
{
"version": "v2",
"created": "Wed, 29 Nov 2006 19:14:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Smarandache",
"Florentin",
""
],
[
"Dezert",
"Jean",
""
]
] |
cs/0607006 | Leon Moonen | Mariano Ceccato, Marius Marin, Kim Mens, Leon Moonen, Paolo Tonella,
and Tom Tourwe | Applying and Combining Three Different Aspect Mining Techniques | 28 pages | null | null | TUD-SERG-2006-002 | cs.SE cs.PL | null | Understanding a software system at source-code level requires understanding
the different concerns that it addresses, which in turn requires a way to
identify these concerns in the source code. Whereas some concerns are
explicitly represented by program entities (like classes, methods and
variables) and thus are easy to identify, crosscutting concerns are not
captured by a single program entity but are scattered over many program
entities and are tangled with the other concerns. Because of their crosscutting
nature, such crosscutting concerns are difficult to identify, and reduce the
understandability of the system as a whole.
In this paper, we report on a combined experiment in which we try to identify
crosscutting concerns in the JHotDraw framework automatically. We first apply
three independently developed aspect mining techniques to JHotDraw and evaluate
and compare their results. Based on this analysis, we present three interesting
combinations of these three techniques, and show how these combinations provide
a more complete coverage of the detected concerns as compared to the original
techniques individually. Our results are a first step towards improving the
understandability of a system that contains crosscutting concerns, and can be
used as a basis for refactoring the identified crosscutting concerns into
aspects.
| [
{
"version": "v1",
"created": "Sun, 2 Jul 2006 17:16:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ceccato",
"Mariano",
""
],
[
"Marin",
"Marius",
""
],
[
"Mens",
"Kim",
""
],
[
"Moonen",
"Leon",
""
],
[
"Tonella",
"Paolo",
""
],
[
"Tourwe",
"Tom",
""
]
] |
cs/0607009 | Yuri Pritykin | Yuri Pritykin | Almost Periodicity, Finite Automata Mappings and Related Effectiveness
Issues | 12 pages. Continuation of the results from the paper "Strongly Almost
Periodic Sequences under Finite Automata Mappings" on cs.DM/0605026 Enhanced
version of the talk on Workshop on Words and Automata, St Petersburg, Russia,
June 7th, 2006 (satellite to CSR'06) | null | null | null | cs.DM | null | The paper studies different variants of almost periodicity notion. We
introduce the class of eventually strongly almost periodic sequences where some
suffix is strongly almost periodic (=uniformly recurrent). The class of almost
periodic sequences includes the class of eventually strongly almost periodic
sequences, and we prove this inclusion to be strict. We prove that the class of
eventually strongly almost periodic sequences is closed under finite automata
mappings and finite transducers. Moreover, an effective form of this result is
presented. Finally we consider some algorithmic questions concerning almost
periodicity.
| [
{
"version": "v1",
"created": "Mon, 3 Jul 2006 08:27:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pritykin",
"Yuri",
""
]
] |
cs/0607011 | Ayan Mahalanobis | Ayan Mahalanobis | A simple generalization of El-Gamal cryptosystem to non-abelian groups | null | null | null | null | cs.CR math.GR | null | In this paper we study the MOR cryptosystem. We use the group of
unitriangular matrices over a finite field as the non-abelian group in the MOR
cryptosystem. We show that a cryptosystem similar to the El-Gamal cryptosystem
over finite fields can be built using the proposed groups and a set of
automorphisms of these groups. We also show that the security of this proposed
MOR cryptosystem is equivalent to the El-Gamal cryptosystem over finite fields.
| [
{
"version": "v1",
"created": "Tue, 4 Jul 2006 11:28:38 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Jul 2006 11:32:31 GMT"
},
{
"version": "v3",
"created": "Tue, 11 Jul 2006 12:56:43 GMT"
},
{
"version": "v4",
"created": "Thu, 20 Jul 2006 06:07:39 GMT"
},
{
"version": "v5",
"created": "Mon, 7 May 2007 14:56:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mahalanobis",
"Ayan",
""
]
] |
cs/0607012 | Anne-Marie Vercoustre | Anne-Marie Vercoustre (INRIA Rocquencourt / INRIA Sophia Antipolis),
Mounir Fegas (INRIA Rocquencourt / INRIA Sophia Antipolis), Saba Gul (INRIA
Rocquencourt / INRIA Sophia Antipolis), Yves Lechevallier (INRIA Rocquencourt
/ INRIA Sophia Antipolis) | A Flexible Structured-based Representation for XML Document Mining | This is the authors' version. To access the final version go to the
editor's site through the DOI | Dans The Fourth International Workshop of the Initiative for the
Evaluation of XML Retrieval (INEX 2005) | 10.1007/11766278\_34 | null | cs.IR | null | This paper reports on the INRIA group's approach to XML mining while
participating in the INEX XML Mining track 2005. We use a flexible
representation of XML documents that allows taking into account the structure
only or both the structure and content. Our approach consists of representing
XML documents by a set of their sub-paths, defined according to some criteria
(length, root beginning, leaf ending). By considering those sub-paths as words,
we can use standard methods for vocabulary reduction, and simple clustering
methods such as K-means that scale well. We actually use an implementation of
the clustering algorithm known as "dynamic clouds" that can work with distinct
groups of independent variables put in separate variables. This is useful in
our model since embedded sub-paths are not independent: we split potentially
dependant paths into separate variables, resulting in each of them containing
independant paths. Experiments with the INEX collections show good results for
the structure-only collections, but our approach could not scale well for large
structure-and-content collections.
| [
{
"version": "v1",
"created": "Wed, 5 Jul 2006 12:07:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vercoustre",
"Anne-Marie",
"",
"INRIA Rocquencourt / INRIA Sophia Antipolis"
],
[
"Fegas",
"Mounir",
"",
"INRIA Rocquencourt / INRIA Sophia Antipolis"
],
[
"Gul",
"Saba",
"",
"INRIA\n Rocquencourt / INRIA Sophia Antipolis"
],
[
"Lechevallier",
"Yves",
"",
"INRIA Rocquencourt\n / INRIA Sophia Antipolis"
]
] |
cs/0607013 | Jan Chomicki | Jan Chomicki | Database Querying under Changing Preferences | Submitted to a journal | null | null | null | cs.DB cs.AI | null | We present here a formal foundation for an iterative and incremental approach
to constructing and evaluating preference queries. Our main focus is on query
modification: a query transformation approach which works by revising the
preference relation in the query. We provide a detailed analysis of the cases
where the order-theoretic properties of the preference relation are preserved
by the revision. We consider a number of different revision operators: union,
prioritized and Pareto composition. We also formulate algebraic laws that
enable incremental evaluation of preference queries. Finally, we consider two
variations of the basic framework: finite restrictions of preference relations
and weak-order extensions of strict partial order preference relations.
| [
{
"version": "v1",
"created": "Wed, 5 Jul 2006 18:37:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chomicki",
"Jan",
""
]
] |
cs/0607015 | Juan Valle-Lisboa C | Juan C. Valle-Lisboa (1), Eduardo Mizraji (1) ((1) Seccion Biofisica,
Facultad de Ciencias, Universidad de la Republica) | The uncovering of hidden structures by Latent Semantic Analysis | 51 pages, 7 figures, pdf | null | null | null | cs.IR | null | Latent Semantic Analysis (LSA) is a well known method for information
retrieval. It has also been applied as a model of cognitive processing and
word-meaning acquisition. This dual importance of LSA derives from its capacity
to modulate the meaning of words by contexts, dealing successfully with
polysemy and synonymy. The underlying reasons that make the method work are not
clear enough. We propose that the method works because it detects an underlying
block structure (the blocks corresponding to topics) in the term by document
matrix. In real cases this block structure is hidden because of perturbations.
We propose that the correct explanation for LSA must be searched in the
structure of singular vectors rather than in the profile of singular values.
Using Perron-Frobenius theory we show that the presence of disjoint blocks of
documents is marked by sign-homogeneous entries in the vectors corresponding to
the documents of one block and zeros elsewhere. In the case of nearly disjoint
blocks, perturbation theory shows that if the perturbations are small the zeros
in the leading vectors are replaced by small numbers (pseudo-zeros). Since the
singular values of each block might be very different in magnitude, their order
does not mirror the order of blocks. When the norms of the blocks are similar,
LSA works fine, but we propose that when the topics have different sizes, the
usual procedure of selecting the first k singular triplets (k being the number
of blocks) should be replaced by a method that selects the perturbed Perron
vectors for each block.
| [
{
"version": "v1",
"created": "Wed, 5 Jul 2006 22:56:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Valle-Lisboa",
"Juan C.",
""
],
[
"Mizraji",
"Eduardo",
""
]
] |
cs/0607016 | Krzysztof R. Apt | Krzysztof R. Apt and Peter Zoeteweij | An Analysis of Arithmetic Constraints on Integer Intervals | 44 pages, to appear in 'Constraints' journal | null | null | null | cs.AI cs.PL | null | Arithmetic constraints on integer intervals are supported in many constraint
programming systems. We study here a number of approaches to implement
constraint propagation for these constraints. To describe them we introduce
integer interval arithmetic. Each approach is explained using appropriate proof
rules that reduce the variable domains. We compare these approaches using a set
of benchmarks. For the most promising approach we provide results that
characterize the effect of constraint propagation. This is a full version of
our earlier paper, cs.PL/0403016.
| [
{
"version": "v1",
"created": "Thu, 6 Jul 2006 10:09:43 GMT"
},
{
"version": "v2",
"created": "Wed, 21 Mar 2007 13:51:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Apt",
"Krzysztof R.",
""
],
[
"Zoeteweij",
"Peter",
""
]
] |
cs/0607018 | Edward Hanna | Edward Hanna | Feynman Checkerboard as a Model of Discrete Space-Time | 10 pages, 14 figures - changed section 6 title | null | null | null | cs.CE | null | In 1965, Feynman wrote of using a lattice containing one dimension of space
and one dimension of time to derive aspects of quantum mechanics. Instead of
summing the behavior of all possible paths as he did, this paper will consider
the motion of single particles within this discrete Space-Time lattice,
sometimes called Feynman's Checkerboard. This empirical approach yielded
several predicted emergent properties for a discrete Space-Time lattice, one of
which is novel and testable.
| [
{
"version": "v1",
"created": "Thu, 6 Jul 2006 16:35:38 GMT"
},
{
"version": "v2",
"created": "Sat, 12 Aug 2006 19:10:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hanna",
"Edward",
""
]
] |
cs/0607019 | Stephen Luttrell | Stephen Luttrell | Modelling the Probability Density of Markov Sources | 26 pages | null | null | null | cs.NE | null | This paper introduces an objective function that seeks to minimise the
average total number of bits required to encode the joint state of all of the
layers of a Markov source. This type of encoder may be applied to the problem
of optimising the bottom-up (recognition model) and top-down (generative model)
connections in a multilayer neural network, and it unifies several previous
results on the optimisation of multilayer neural networks.
| [
{
"version": "v1",
"created": "Thu, 6 Jul 2006 18:49:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Luttrell",
"Stephen",
""
]
] |
cs/0607022 | George Maney Mr. | G. A. Maney | Ten Incredibly Dangerous Software Ideas | 14 page software industry interest book synopsis | null | null | null | cs.GL | null | This is a rough draft synopsis of a book presently in preparation. This book
provides a systematic critique of the software industry. This critique is
accomplished using classical methods in practical design science.
| [
{
"version": "v1",
"created": "Fri, 7 Jul 2006 01:17:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Maney",
"G. A.",
""
]
] |
cs/0607023 | Josep Diaz Prof | J. Diaz, D. Mitsche, X. Perez | Sharp threshold for hamiltonicity of random geometric graphs | 10 pages, 2 figures | null | null | null | cs.DM | null | We show for an arbitrary $\ell_p$ norm that the property that a random
geometric graph $\mathcal G(n,r)$ contains a Hamiltonian cycle exhibits a sharp
threshold at $r=r(n)=\sqrt{\frac{\log n}{\alpha_p n}}$, where $\alpha_p$ is the
area of the unit disk in the $\ell_p$ norm. The proof is constructive and
yields a linear time algorithm for finding a Hamiltonian cycle of $\RG$ a.a.s.,
provided $r=r(n)\ge\sqrt{\frac{\log n}{(\alpha_p -\epsilon)n}}$ for some fixed
$\epsilon > 0$.
| [
{
"version": "v1",
"created": "Fri, 7 Jul 2006 18:16:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Diaz",
"J.",
""
],
[
"Mitsche",
"D.",
""
],
[
"Perez",
"X.",
""
]
] |
cs/0607025 | Oskar Sandberg | Oskar Sandberg and Ian Clarke | The evolution of navigable small-world networks | null | null | null | null | cs.DS cs.DC | null | Small-world networks, which combine randomized and structured elements, are
seen as prevalent in nature. Several random graph models have been given for
small-world networks, with one of the most fruitful, introduced by Jon
Kleinberg, showing in which type of graphs it is possible to route, or
navigate, between vertices with very little knowledge of the graph itself.
Kleinberg's model is static, with random edges added to a fixed grid. In this
paper we introduce, analyze and test a randomized algorithm which successively
rewires a graph with every application. The resulting process gives a model for
the evolution of small-world networks with properties similar to those studied
by Kleinberg.
| [
{
"version": "v1",
"created": "Fri, 7 Jul 2006 13:21:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sandberg",
"Oskar",
""
],
[
"Clarke",
"Ian",
""
]
] |
cs/0607026 | James Aspnes | James Aspnes and Yang Richard Yang and Yitong Yin | Path-independent load balancing with unreliable machines | Full version of paper submitted to SODA 2007 | null | null | null | cs.DS cs.NI | null | We consider algorithms for load balancing on unreliable machines. The
objective is to optimize the two criteria of minimizing the makespan and
minimizing job reassignments in response to machine failures. We assume that
the set of jobs is known in advance but that the pattern of machine failures is
unpredictable. Motivated by the requirements of BGP routing, we consider
path-independent algorithms, with the property that the job assignment is
completely determined by the subset of available machines and not the previous
history of the assignments. We examine first the question of performance
measurement of path-independent load-balancing algorithms, giving the measure
of makespan and the normalized measure of reassignments cost. We then describe
two classes of algorithms for optimizing these measures against an oblivious
adversary for identical machines. The first, based on independent random
assignments, gives expected reassignment costs within a factor of 2 of optimal
and gives a makespan within a factor of O(log m/log log m) of optimal with high
probability, for unknown job sizes. The second, in which jobs are first grouped
into bins and at most one bin is assigned to each machine, gives
constant-factor ratios on both reassignment cost and makespan, for known job
sizes. Several open problems are discussed.
| [
{
"version": "v1",
"created": "Fri, 7 Jul 2006 14:01:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Aspnes",
"James",
""
],
[
"Yang",
"Yang Richard",
""
],
[
"Yin",
"Yitong",
""
]
] |
cs/0607028 | Christian Lavault | Christian Lavault (LIPN), Jean-Fran\c{c}ois Marckert (LaBRI), Vlady
Ravelomanana (LIPN) | A Quasi-Optimal Leader Election Algorithm in Radio Networks with
Log-Logarithmic Awake Time Slots | null | null | null | null | cs.DC cs.NI | null | Radio networks (RN) are distributed systems (\textit{ad hoc networks})
consisting in $n \ge 2$ radio stations. Assuming the number $n$ unknown, two
distinct models of RN without collision detection (\textit{no-CD}) are
addressed: the model with \textit{weak no-CD} RN and the one with
\textit{strong no-CD} RN. We design and analyze two distributed leader election
protocols, each one running in each of the above two (no-CD RN) models,
respectively. Both randomized protocols are shown to elect a leader within
$\BO(\log{(n)})$ expected time, with no station being awake for more than
$\BO(\log{\log{(n)}})$ time slots (such algorithms are said to be
\textit{energy-efficient}). Therefore, a new class of efficient algorithms is
set up that matchthe $\Omega(\log{(n)})$ time lower-bound established by
Kushilevitz and Mansour.
| [
{
"version": "v1",
"created": "Fri, 7 Jul 2006 17:42:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lavault",
"Christian",
"",
"LIPN"
],
[
"Marckert",
"Jean-François",
"",
"LaBRI"
],
[
"Ravelomanana",
"Vlady",
"",
"LIPN"
]
] |
cs/0607031 | Christian Lavault | Christian Lavault (LIPN), Mario Valencia-Pabon (LIPN) | A distributed approximation algorithm for the minimum degree minimum
weight spanning trees | null | null | null | null | cs.DC cs.DM | null | Fischer has shown how to compute a minimum weight spanning tree of degree at
most $b \Delta^* + \lceil \log\_b n\rceil$ in time $O(n^{4 + 1/\ln b})$ for any
constant $b > 1$, where $\Delta^*$ is the value of an optimal solution and $n$
is the number of nodes in the network. In this paper, we propose a distributed
version of Fischer's algorithm that requires messages and time complexity
$O(n^{2 + 1/\ln b})$, and O(n) space per node.
| [
{
"version": "v1",
"created": "Sat, 8 Jul 2006 08:42:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lavault",
"Christian",
"",
"LIPN"
],
[
"Valencia-Pabon",
"Mario",
"",
"LIPN"
]
] |
cs/0607032 | Christian Lavault | Christian Lavault (LIPN), Guy Louchard (ULB) | Asymptotic Analysis of a Leader Election Algorithm | null | null | null | null | cs.DC cs.NA | null | Itai and Rodeh showed that, on the average, the communication of a leader
election algorithm takes no more than $LN$ bits, where $L \simeq 2.441716$ and
$N$ denotes the size of the ring. We give a precise asymptotic analysis of the
average number of rounds M(n) required by the algorithm, proving for example
that $\dis M(\infty) := \lim\_{n\to \infty} M(n) = 2.441715879...$, where $n$
is the number of starting candidates in the election. Accurate asymptotic
expressions of the second moment $M^{(2)}(n)$ of the discrete random variable
at hand, its probability distribution, and the generalization to all moments
are given. Corresponding asymptotic expansions $(n\to \infty)$ are provided for
sufficiently large $j$, where $j$ counts the number of rounds. Our numerical
results show that all computations perfectly fit the observed values. Finally,
we investigate the generalization to probability $t/n$, where $t$ is a non
negative real parameter. The real function $\dis M(\infty,t) := \lim\_{n\to
\infty} M(n,t)$ is shown to admit \textit{one unique minimum} $M(\infty,t^{*})$
on the real segment $(0,2)$. Furthermore, the variations of $M(\infty,t)$ on
thewhole real line are also studied in detail.
| [
{
"version": "v1",
"created": "Sat, 8 Jul 2006 08:46:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lavault",
"Christian",
"",
"LIPN"
],
[
"Louchard",
"Guy",
"",
"ULB"
]
] |
cs/0607033 | Oleg Verbitsky | Oleg Verbitsky | Planar Graphs: Logical Complexity and Parallel Isomorphism Tests | 36 pages | null | null | null | cs.CC cs.LO | null | We prove that every triconnected planar graph is definable by a first order
sentence that uses at most 15 variables and has quantifier depth at most
$11\log_2 n+43$. As a consequence, a canonic form of such graphs is computable
in $AC^1$ by the 14-dimensional Weisfeiler-Lehman algorithm. This provides
another way to show that the planar graph isomorphism is solvable in $AC^1$.
| [
{
"version": "v1",
"created": "Sat, 8 Jul 2006 10:37:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Verbitsky",
"Oleg",
""
]
] |
cs/0607034 | Christian Lavault | Christian Lavault (LIPN), Jean-Fran\c{c}ois Marckert (LaBRI), Vlady
Ravelomanana (LIPN) | Quasi-Optimal Leader Election Algorithms in Radio Networks with
Loglogarithmic Awake Time Slots | null | 10th IEEE International Conference on Telecommunications (2003)
1113-1119 | null | null | cs.DC cs.NI | null | A radio network (RN) is a distributed system consisting of $n$ radio
stations. We design and analyze two distributed leader election protocols in RN
where the number $n$ of radio stations is unknown. The first algorithm runs
under the assumption of {\it limited collision detection}, while the second
assumes that {\it no collision detection} is available. By ``limited collision
detection'', we mean that if exactly one station sends (broadcasts) a message,
then all stations (including the transmitter) that are listening at this moment
receive the sent message. By contrast, the second no-collision-detection
algorithm assumes that a station cannot simultaneously send and listen signals.
Moreover, both protocols allow the stations to keep asleep as long as possible,
thus minimizing their awake time slots (such algorithms are called {\it
energy-efficient}). Both randomized protocols in RN areshown to elect a leader
in $O(\log{(n)})$ expected time, with no station being awake for more than
$O(\log{\log{(n)}})$ time slots. Therefore, a new class of efficient algorithms
is set up that match the $\Omega(\log{(n)})$ time lower-bound established by
Kushilevitz and Mansour.
| [
{
"version": "v1",
"created": "Sat, 8 Jul 2006 12:04:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lavault",
"Christian",
"",
"LIPN"
],
[
"Marckert",
"Jean-François",
"",
"LaBRI"
],
[
"Ravelomanana",
"Vlady",
"",
"LIPN"
]
] |
cs/0607037 | Daowen Qiu | Zhujun Fan | The Minimal Cost Algorithm for Off-Line Diagnosability of Discrete Event
Systems | 12 pages, 7 figures, critical comments and suggestions are welcomed
and appreciated | null | null | null | cs.AI cs.CC | null | The failure diagnosis for {\it discrete event systems} (DESs) has been given
considerable attention in recent years. Both on-line and off-line diagnostics
in the framework of DESs was first considered by Lin Feng in 1994, and
particularly an algorithm for diagnosability of DESs was presented. Motivated
by some existing problems to be overcome in previous work, in this paper, we
investigate the minimal cost algorithm for diagnosability of DESs.
More specifically: (i) we give a generic method for judging a system's
off-line diagnosability, and the complexity of this algorithm is
polynomial-time; (ii) and in particular, we present an algorithm of how to
search for the minimal set in all observable event sets, whereas the previous
algorithm may find {\it non-minimal} one.
| [
{
"version": "v1",
"created": "Sun, 9 Jul 2006 04:55:03 GMT"
},
{
"version": "v2",
"created": "Wed, 11 Apr 2007 16:27:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fan",
"Zhujun",
""
]
] |
cs/0607038 | Benoit Donnet | Benoit Donnet, Bruno Baynat, Timur Friedman | Retouched Bloom Filters: Allowing Networked Applications to Flexibly
Trade Off False Positives Against False Negatives | This is a new version of the technical reports with improved
algorithms and theorical analysis of algorithms | null | null | null | cs.NI | null | Where distributed agents must share voluminous set membership information,
Bloom filters provide a compact, though lossy, way for them to do so. Numerous
recent networking papers have examined the trade-offs between the bandwidth
consumed by the transmission of Bloom filters, and the error rate, which takes
the form of false positives, and which rises the more the filters are
compressed. In this paper, we introduce the retouched Bloom filter (RBF), an
extension that makes the Bloom filter more flexible by permitting the removal
of selected false positives at the expense of generating random false
negatives. We analytically show that RBFs created through a random process
maintain an overall error rate, expressed as a combination of the false
positive rate and the false negative rate, that is equal to the false positive
rate of the corresponding Bloom filters. We further provide some simple
heuristics and improved algorithms that decrease the false positive rate more
than than the corresponding increase in the false negative rate, when creating
RBFs. Finally, we demonstrate the advantages of an RBF over a Bloom filter in a
distributed network topology measurement application, where information about
large stop sets must be shared among route tracing monitors.
| [
{
"version": "v1",
"created": "Sun, 9 Jul 2006 10:40:26 GMT"
},
{
"version": "v2",
"created": "Fri, 1 Dec 2006 13:52:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Donnet",
"Benoit",
""
],
[
"Baynat",
"Bruno",
""
],
[
"Friedman",
"Timur",
""
]
] |
cs/0607039 | M. H. van Emden | M.H. van Emden | Set-Theoretic Preliminaries for Computer Scientists | 36 pages, 5 figures | null | null | DCS-304-IR | cs.DM cs.DB | null | The basics of set theory are usually copied, directly or indirectly, by
computer scientists from introductions to mathematical texts. Often
mathematicians are content with special cases when the general case is of no
mathematical interest. But sometimes what is of no mathematical interest is of
great practical interest in computer science. For example, non-binary relations
in mathematics tend to have numerical indexes and tend to be unsorted. In the
theory and practice of relational databases both these simplifications are
unwarranted. In response to this situation we present here an alternative to
the ``set-theoretic preliminaries'' usually found in computer science texts.
This paper separates binary relations from the kind of relations that are
needed in relational databases. Its treatment of functions supports both
computer science in general and the kind of relations needed in databases. As a
sample application this paper shows how the mathematical theory of relations
naturally leads to the relational data model and how the operations on
relations are by themselves already a powerful vehicle for queries.
| [
{
"version": "v1",
"created": "Sun, 9 Jul 2006 14:27:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"van Emden",
"M. H.",
""
]
] |
cs/0607040 | Gopal Gupta | Enrico Pontelli (1), Karen Villaverde (1), Hai-Feng Guo (2), Gopal
Gupta (3) ((1) New Mexico State University, (2) University of Nebraska at
Omaha, (3) University of Texas at Dallas) | PALS: Efficient Or-Parallelism on Beowulf Clusters | 63 pages, 32 figures, 5 tabels. Theory and Practice of Logic
Programming (to appear) | null | null | null | cs.DC cs.PL | null | This paper describes the development of the PALS system, an implementation of
Prolog capable of efficiently exploiting or-parallelism on distributed-memory
platforms--specifically Beowulf clusters. PALS makes use of a novel technique,
called incremental stack-splitting. The technique proposed builds on the
stack-splitting approach, previously described by the authors and
experimentally validated on shared-memory systems, which in turn is an
evolution of the stack-copying method used in a variety of parallel logic and
constraint systems--e.g., MUSE, YAP, and Penny. The PALS system is the first
distributed or-parallel implementation of Prolog based on the stack-splitting
method ever realized. The results presented confirm the superiority of this
method as a simple yet effective technique to transition from shared-memory to
distributed-memory systems. PALS extends stack-splitting by combining it with
incremental copying; the paper provides a description of the implementation of
PALS, including details of how distributed scheduling is handled. We also
investigate methodologies to effectively support order-sensitive predicates
(e.g., side-effects) in the context of the stack-splitting scheme. Experimental
results obtained from running PALS on both Shared Memory and Beowulf systems
are presented and analyzed.
| [
{
"version": "v1",
"created": "Sun, 9 Jul 2006 19:56:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pontelli",
"Enrico",
""
],
[
"Villaverde",
"Karen",
""
],
[
"Guo",
"Hai-Feng",
""
],
[
"Gupta",
"Gopal",
""
]
] |
cs/0607044 | Valdis Vitolins | Audris Kalnins, Valdis Vitolins | Use of UML and Model Transformations for Workflow Process Definitions | 12 pages, 7 figures, communications of the conference "Baltic DB&IS
2006", July 3-6, Vilnius, Lithuania | Audris Kalnins, Valdis Vitolins, Databases and Information
Systems, BalticDB&IS'2006, edited by Olegas Vasilecas, Johann Eder, Albertas
Caplinskas, Vilnius, Technika, 2006, pp. 3.-15 | null | null | cs.SE | null | Currently many different modeling languages are used for workflow definitions
in BPM systems. Authors of this paper analyze the two most popular graphical
languages, with highest possibility of wide practical usage - UML Activity
diagrams (AD) and Business Process Modeling Notation (BPMN). The necessary in
practice workflow aspects are briefly discussed, and on this basis a natural AD
profile is proposed, which covers all of them. A functionally equivalent BPMN
subset is also selected. The semantics of both languages in the context of
process execution (namely, mapping to BPEL) is also analyzed in the paper. By
analyzing AD and BPMN metamodels, authors conclude that an exact transformation
from AD to BPMN is not trivial even for the selected subset, though these
languages are considered to be similar. Authors show how this transformation
could be defined in the MOLA transformation language.
| [
{
"version": "v1",
"created": "Tue, 11 Jul 2006 09:23:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kalnins",
"Audris",
""
],
[
"Vitolins",
"Valdis",
""
]
] |
cs/0607046 | Xin Han | Xin Han, Kazuo Iwama, Deshi Ye, Guochuan Zhang | Strip Packing vs. Bin Packing | 12 pages, 3 figures | null | null | null | cs.DS | null | In this paper we establish a general algorithmic framework between bin
packing and strip packing, with which we achieve the same asymptotic bounds by
applying bin packing algorithms to strip packing. More precisely we obtain the
following results: (1) Any offline bin packing algorithm can be applied to
strip packing maintaining the same asymptotic worst-case ratio. Thus using FFD
(MFFD) as a subroutine, we get a practical (simple and fast) algorithm for
strip packing with an upper bound 11/9 (71/60). A simple AFPTAS for strip
packing immediately follows. (2) A class of Harmonic-based algorithms for bin
packing can be applied to online strip packing maintaining the same asymptotic
competitive ratio. It implies online strip packing admits an upper bound of
1.58889 on the asymptotic competitive ratio, which is very close to the lower
bound 1.5401 and significantly improves the previously best bound of 1.6910 and
affirmatively answers an open question posed by Csirik et. al.
| [
{
"version": "v1",
"created": "Tue, 11 Jul 2006 09:58:34 GMT"
},
{
"version": "v2",
"created": "Wed, 23 Aug 2006 00:33:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Han",
"Xin",
""
],
[
"Iwama",
"Kazuo",
""
],
[
"Ye",
"Deshi",
""
],
[
"Zhang",
"Guochuan",
""
]
] |
cs/0607047 | Paul Goldberg | Nick Palmer and Paul W. Goldberg | PAC Classification based on PAC Estimates of Label Class Distributions | 14 pages | null | null | null | cs.LG | null | A standard approach in pattern classification is to estimate the
distributions of the label classes, and then to apply the Bayes classifier to
the estimates of the distributions in order to classify unlabeled examples. As
one might expect, the better our estimates of the label class distributions,
the better the resulting classifier will be. In this paper we make this
observation precise by identifying risk bounds of a classifier in terms of the
quality of the estimates of the label class distributions. We show how PAC
learnability relates to estimates of the distributions that have a PAC
guarantee on their $L_1$ distance from the true distribution, and we bound the
increase in negative log likelihood risk in terms of PAC bounds on the
KL-divergence. We give an inefficient but general-purpose smoothing method for
converting an estimated distribution that is good under the $L_1$ metric into a
distribution that is good under the KL-divergence.
| [
{
"version": "v1",
"created": "Tue, 11 Jul 2006 13:52:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Palmer",
"Nick",
""
],
[
"Goldberg",
"Paul W.",
""
]
] |
cs/0607051 | Catherine Recanati | Catherine Recanati (LIPN) | Raisonner avec des diagrammes : perspectives cognitives et
computationnelles | paru initialement comme Rapport LIPN en 2004 | Intellectica 40 (2005) 9-42 | null | null | cs.CL | null | Diagrammatic, analogical or iconic representations are often contrasted with
linguistic or logical representations, in which the shape of the symbols is
arbitrary. The aim of this paper is to make a case for the usefulness of
diagrams in inferential knowledge representation systems. Although commonly
used, diagrams have for a long time suffered from the reputation of being only
a heuristic tool or a mere support for intuition. The first part of this paper
is an historical background paying tribute to the logicians, psychologists and
computer scientists who put an end to this formal prejudice against diagrams.
The second part is a discussion of their characteristics as opposed to those of
linguistic forms. The last part is aimed at reviving the interest for
heterogeneous representation systems including both linguistic and diagrammatic
representations.
| [
{
"version": "v1",
"created": "Tue, 11 Jul 2006 19:13:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Recanati",
"Catherine",
"",
"LIPN"
]
] |
cs/0607053 | Thierry Poibeau | Thierry Poibeau (LIPN) | Linguistically Grounded Models of Language Change | null | The 28th Annual Conference of the Cognitive Science Society
(CogSci 2006), Canada (2006) | null | null | cs.AI cs.CL | null | Questions related to the evolution of language have recently known an
impressive increase of interest (Briscoe, 2002). This short paper aims at
questioning the scientific status of these models and their relations to
attested data. We show that one cannot directly model non-linguistic factors
(exogenous factors) even if they play a crucial role in language evolution. We
then examine the relation between linguistic models and attested language data,
as well as their contribution to cognitive linguistics.
| [
{
"version": "v1",
"created": "Tue, 11 Jul 2006 19:17:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Poibeau",
"Thierry",
"",
"LIPN"
]
] |
cs/0607054 | Elliott H. Lieb | Elliott H. Lieb, Daniel Osherson and Scott Weinstein | Elementary Proof of a Theorem of Jean Ville | 12 pages latex | null | null | null | cs.CC | null | Considerable thought has been devoted to an adequate definition of the class
of infinite, random binary sequences (the sort of sequence that almost
certainly arises from flipping a fair coin indefinitely). The first
mathematical exploration of this problem was due to R. Von Mises, and based on
his concept of a "selection function." A decisive objection to Von Mises' idea
was formulated in a theorem offered by Jean Ville in 1939. It shows that some
sequences admitted by Von Mises as "random" in fact manifest a certain kind of
systematicity. Ville's proof is challenging, and an alternative approach has
appeared only in condensed form. We attempt to provide an expanded version of
the latter, alternative argument.
| [
{
"version": "v1",
"created": "Tue, 11 Jul 2006 19:52:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lieb",
"Elliott H.",
""
],
[
"Osherson",
"Daniel",
""
],
[
"Weinstein",
"Scott",
""
]
] |
cs/0607055 | Akimichi Takemura | Hisayuki Hara and Akimichi Takemura | Boundary cliques, clique trees and perfect sequences of maximal cliques
of a chordal graph | null | null | null | null | cs.DM | null | We characterize clique trees of a chordal graph in their relation to
simplicial vertices and perfect sequences of maximal cliques. We investigate
boundary cliques defined by Shibata and clarify their relation to endpoints of
clique trees. Next we define a symmetric binary relation between the set of
clique trees and the set of perfect sequences of maximal cliques. We describe
the relation as a bipartite graph and prove that the bipartite graph is always
connected. Lastly we consider to characterize chordal graphs from the aspect of
non-uniqueness of clique trees.
| [
{
"version": "v1",
"created": "Tue, 11 Jul 2006 23:14:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hara",
"Hisayuki",
""
],
[
"Takemura",
"Akimichi",
""
]
] |
cs/0607056 | Sylviane Schwer | Sylviane Schwer (LIPN) | Reasoning with Intervals on Granules | null | Journal of Universal Computer Science 8 (8) (2002) 793-808 | null | null | cs.AI cs.DM | null | The formalizations of periods of time inside a linear model of Time are
usually based on the notion of intervals, that may contain or may not their
endpoints. This is not enought when the periods are written in terms of coarse
granularities with respect to the event taken into account. For instance, how
to express the inter-war period in terms of a {\em years} interval? This paper
presents a new type of intervals, neither open, nor closed or open-closed and
the extension of operations on intervals of this new type, in order to reduce
the gap between the discourse related to temporal relationship and its
translation into a discretized model of Time.
| [
{
"version": "v1",
"created": "Wed, 12 Jul 2006 09:16:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Schwer",
"Sylviane",
"",
"LIPN"
]
] |
cs/0607057 | Vlady Ravelomanana | Vlady Ravelomanana (LIPN), the Projet PAI Amadeus Collaboration | The Average Size of Giant Components Between the Double-Jump | A para\^{i}tre dans Algorithmica | Algorithmica Issue sp\'{e}ciale "Analysis of Algorithms" (2006) A
para\^{i}tre | null | null | cs.DM math.CO math.PR | null | We study the sizes of connected components according to their excesses during
a random graph process built with $n$ vertices. The considered model is the
continuous one defined in Janson 2000. An ${\ell}$-component is a connected
component with ${\ell}$ edges more than vertices. $\ell$ is also called the
\textit{excess} of such component. As our main result, we show that when $\ell$
and ${n \over \ell}$ are both large, the expected number of vertices that ever
belong to an $\ell$-component is about ${12}^{1/3} {\ell}^{1/3} n^{2/3}$. We
also obtain limit theorems for the number of creations of $\ell$-components.
| [
{
"version": "v1",
"created": "Wed, 12 Jul 2006 09:23:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ravelomanana",
"Vlady",
"",
"LIPN"
],
[
"Collaboration",
"the Projet PAI Amadeus",
""
]
] |
cs/0607058 | Tom Ridge | Tom Ridge | Craig's Interpolation Theorem formalised and mechanised in Isabelle/HOL | null | null | null | null | cs.LO | null | We formalise and mechanise a construtive, proof theoretic proof of Craig's
Interpolation Theorem in Isabelle/HOL. We give all the definitions and lemma
statements both formally and informally. We also transcribe informally the
formal proofs. We detail the main features of our mechanisation, such as the
formalisation of binding for first order formulae. We also give some
applications of Craig's Interpolation Theorem.
| [
{
"version": "v1",
"created": "Wed, 12 Jul 2006 17:26:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ridge",
"Tom",
""
]
] |
cs/0607059 | Vlady Ravelomanana | Vlady Ravelomanana (LIPN), Alphonse Laza Rijamame (D.M.I) | Creation and Growth of Components in a Random Hypergraph Process | R\'{e}sum\'{e} \'{e}tendu | Proceedings of The Twelfth Annual International Computing and
Combinatorics Conference (COCOON'06) -- Lecture Notes in Computer Science
(2006) \`{a} para\^{i}tre | null | null | cs.DM math.CO math.PR | null | Denote by an $\ell$-component a connected $b$-uniform hypergraph with $k$
edges and $k(b-1) - \ell$ vertices. We prove that the expected number of
creations of $\ell$-component during a random hypergraph process tends to 1 as
$\ell$ and $b$ tend to $\infty$ with the total number of vertices $n$ such that
$\ell = o(\sqrt[3]{\frac{n}{b}})$. Under the same conditions, we also show that
the expected number of vertices that ever belong to an $\ell$-component is
approximately $12^{1/3} (b-1)^{1/3} \ell^{1/3} n^{2/3}$. As an immediate
consequence, it follows that with high probability the largest $\ell$-component
during the process is of size $O((b-1)^{1/3} \ell^{1/3} n^{2/3})$. Our results
give insight about the size of giant components inside the phase transition of
random hypergraphs.
| [
{
"version": "v1",
"created": "Wed, 12 Jul 2006 09:45:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ravelomanana",
"Vlady",
"",
"LIPN"
],
[
"Rijamame",
"Alphonse Laza",
"",
"D.M.I"
]
] |
cs/0607060 | Gary Hardy | Yoann Dieudonne (LaRIA), Ouiddad Labbani-Igbida (CREA), Franck Petit
(LaRIA) | Circle Formation of Weak Mobile Robots | null | null | null | null | cs.RO | null | In this paper we prove the conjecture of D\'{e}fago & Konagaya. Furthermore,
we describe a deterministic protocol for forming a regular n-gon in finite
time.
| [
{
"version": "v1",
"created": "Wed, 12 Jul 2006 12:57:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dieudonne",
"Yoann",
"",
"LaRIA"
],
[
"Labbani-Igbida",
"Ouiddad",
"",
"CREA"
],
[
"Petit",
"Franck",
"",
"LaRIA"
]
] |
cs/0607061 | Igor Mackarov Dr. | Igor Mackarov (Maharishi University of Management) | On Some Peculiarities of Dynamic Switch between Component
Implementations in an Autonomic Computing System | 16 pages, 3 figures | null | null | null | cs.DS cs.DC cs.NA | null | Behavior of the delta algorithm of autonomic switch between two component
implementations is considered on several examples of a client-server systems
involving, in particular, periodic change of intensities of requests for the
component. It is shown that in the cases of some specific combinations of
elementary requests costs, the number of clients in the system, the number of
requests per unit of time, and the cost of switch between the implementations,
the algorithm may reveal behavior that is rather far from the desired. A
sufficient criterion of a success of the algorithm is proposed based on the
analysis of the accumulated implementations costs difference as a function of
time. Suggestions are pointed out of practical evaluation of the algorithm
functioning regarding the observations made in this paper.
| [
{
"version": "v1",
"created": "Wed, 12 Jul 2006 11:09:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mackarov",
"Igor",
"",
"Maharishi University of Management"
]
] |
cs/0607063 | Leon Moonen | Cathal Boogerd and Leon Moonen | Prioritizing Software Inspection Results using Static Profiling | 14 pages | null | null | TUD-SERG-2006-001 | cs.SE | null | Static software checking tools are useful as an additional automated software
inspection step that can easily be integrated in the development cycle and
assist in creating secure, reliable and high quality code. However, an often
quoted disadvantage of these tools is that they generate an overly large number
of warnings, including many false positives due to the approximate analysis
techniques. This information overload effectively limits their usefulness.
In this paper we present ELAN, a technique that helps the user prioritize the
information generated by a software inspection tool, based on a demand-driven
computation of the likelihood that execution reaches the locations for which
warnings are reported. This analysis is orthogonal to other prioritization
techniques known from literature, such as severity levels and statistical
analysis to reduce false positives. We evaluate feasibility of our technique
using a number of case studies and assess the quality of our predictions by
comparing them to actual values obtained by dynamic profiling.
| [
{
"version": "v1",
"created": "Wed, 12 Jul 2006 20:35:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Boogerd",
"Cathal",
""
],
[
"Moonen",
"Leon",
""
]
] |
cs/0607065 | Khalil Djelloul | Khalil Djelloul | Decomposable Theories | null | null | null | null | cs.LO cs.AI | null | We present in this paper a general algorithm for solving first-order formulas
in particular theories called "decomposable theories". First of all, using
special quantifiers, we give a formal characterization of decomposable theories
and show some of their properties. Then, we present a general algorithm for
solving first-order formulas in any decomposable theory "T". The algorithm is
given in the form of five rewriting rules. It transforms a first-order formula
"P", which can possibly contain free variables, into a conjunction "Q" of
solved formulas easily transformable into a Boolean combination of
existentially quantified conjunctions of atomic formulas. In particular, if "P"
has no free variables then "Q" is either the formula "true" or "false". The
correctness of our algorithm proves the completeness of the decomposable
theories.
Finally, we show that the theory "Tr" of finite or infinite trees is a
decomposable theory and give some benchmarks realized by an implementation of
our algorithm, solving formulas on two-partner games in "Tr" with more than 160
nested alternated quantifiers.
| [
{
"version": "v1",
"created": "Thu, 13 Jul 2006 14:46:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Djelloul",
"Khalil",
""
]
] |
cs/0607066 | Dimitrios Katsaros | Antonis Sidiropoulos, Dimitrios Katsaros, Yannis Manolopoulos | Generalized h-index for Disclosing Latent Facts in Citation Networks | 19 pages, 17 tables, 27 figures | null | null | null | cs.DL | null | What is the value of a scientist and its impact upon the scientific thinking?
How can we measure the prestige of a journal or of a conference? The evaluation
of the scientific work of a scientist and the estimation of the quality of a
journal or conference has long attracted significant interest, due to the
benefits from obtaining an unbiased and fair criterion. Although it appears to
be simple, defining a quality metric is not an easy task. To overcome the
disadvantages of the present metrics used for ranking scientists and journals,
J.E. Hirsch proposed a pioneering metric, the now famous h-index. In this
article, we demonstrate several inefficiencies of this index and develop a pair
of generalizations and effective variants of it to deal with scientist ranking
and with publication forum ranking. The new citation indices are able to
disclose trendsetters in scientific research, as well as researchers that
constantly shape their field with their influential work, no matter how old
they are. We exhibit the effectiveness and the benefits of the new indices to
unfold the full potential of the h-index, with extensive experimental results
obtained from DBLP, a widely known on-line digital library.
| [
{
"version": "v1",
"created": "Thu, 13 Jul 2006 15:47:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sidiropoulos",
"Antonis",
""
],
[
"Katsaros",
"Dimitrios",
""
],
[
"Manolopoulos",
"Yannis",
""
]
] |
cs/0607067 | Vladimir Vovk | Vladimir Vovk | Competing with stationary prediction strategies | 20 pages | null | null | null | cs.LG | null | In this paper we introduce the class of stationary prediction strategies and
construct a prediction algorithm that asymptotically performs as well as the
best continuous stationary strategy. We make mild compactness assumptions but
no stochastic assumptions about the environment. In particular, no assumption
of stationarity is made about the environment, and the stationarity of the
considered strategies only means that they do not depend explicitly on time; we
argue that it is natural to consider only stationary strategies even for highly
non-stationary environments.
| [
{
"version": "v1",
"created": "Thu, 13 Jul 2006 15:52:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vovk",
"Vladimir",
""
]
] |
cs/0607070 | Victor Kryssanov | V. V. Kryssanov, F. J. Rinaldo, H. Ogawa, E. Kuleshov | Citation as a Representation Process | 5 pages, 2 figures. Preprint completed in July 2006 | null | null | null | cs.DL cs.CY physics.data-an | null | The presented work proposes a novel approach to model the citation rate. The
paper begins with a brief introduction into informetrics studies and highlights
drawbacks of the contemporary approaches to modeling the citation process as a
product of social interactions. An alternative modeling framework based on
results obtained in cognitive psychology is then introduced and applied in an
experiment to investigate properties of the citation process, as they are
revealed by a large collection of citation statistics. Major research findings
are discussed, and a summary is given.
| [
{
"version": "v1",
"created": "Fri, 14 Jul 2006 10:38:11 GMT"
},
{
"version": "v2",
"created": "Mon, 17 Jul 2006 01:36:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kryssanov",
"V. V.",
""
],
[
"Rinaldo",
"F. J.",
""
],
[
"Ogawa",
"H.",
""
],
[
"Kuleshov",
"E.",
""
]
] |
cs/0607071 | Peter J. Stuckey | H. Fang, Y. Kilani, J.H.M. Lee, and P.J. Stuckey | Islands for SAT | 7 pages | null | null | null | cs.AI | null | In this note we introduce the notion of islands for restricting local search.
We show how we can construct islands for CNF SAT problems, and how much search
space can be eliminated by restricting search to the island.
| [
{
"version": "v1",
"created": "Fri, 14 Jul 2006 12:44:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fang",
"H.",
""
],
[
"Kilani",
"Y.",
""
],
[
"Lee",
"J. H. M.",
""
],
[
"Stuckey",
"P. J.",
""
]
] |
cs/0607072 | Scott Turner | Scott A. Turner, Manuel A. Perez-Quinones, Stephen H. Edwards | Effect of Interface Style in Peer Review Comments for UML Designs | 8 pages, 7 figures | null | null | null | cs.HC | null | This paper presents our evaluation of using a Tablet-PC to provide
peer-review comments in the first year Computer Science course. Our exploration
consisted of an evaluation of how students write comments on other students'
assignments using three different methods: pen and paper, a Tablet-PC, and a
desktop computer. Our ultimate goal is to explore the effect that interface
style (Tablet vs. Desktop) has on the quality and quantity of the comments
provided.
| [
{
"version": "v1",
"created": "Fri, 14 Jul 2006 16:00:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Turner",
"Scott A.",
""
],
[
"Perez-Quinones",
"Manuel A.",
""
],
[
"Edwards",
"Stephen H.",
""
]
] |
cs/0607073 | Andrea Montanari | Andrea Montanari, Devavrat Shah | Counting good truth assignments of random k-SAT formulae | 13 pages, 1 eps figure | null | null | null | cs.DM cond-mat.dis-nn | null | We present a deterministic approximation algorithm to compute logarithm of
the number of `good' truth assignments for a random k-satisfiability (k-SAT)
formula in polynomial time (by `good' we mean that violate a small fraction of
clauses). The relative error is bounded above by an arbitrarily small constant
epsilon with high probability as long as the clause density (ratio of clauses
to variables) alpha<alpha_{u}(k) = 2k^{-1}\log k(1+o(1)). The algorithm is
based on computation of marginal distribution via belief propagation and use of
an interpolation procedure. This scheme substitutes the traditional one based
on approximation of marginal probabilities via MCMC, in conjunction with
self-reduction, which is not easy to extend to the present problem.
We derive 2k^{-1}\log k (1+o(1)) as threshold for uniqueness of the Gibbs
distribution on satisfying assignment of random infinite tree k-SAT formulae to
establish our results, which is of interest in its own right.
| [
{
"version": "v1",
"created": "Fri, 14 Jul 2006 16:05:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Montanari",
"Andrea",
""
],
[
"Shah",
"Devavrat",
""
]
] |
cs/0607077 | Emin Gabrielyan | Emin Gabrielyan | Fault-Tolerant Real-Time Streaming with FEC thanks to Capillary
Multi-Path Routing | null | Emin Gabrielyan, Fault-Tolerant Real-Time Streaming with FEC
thanks to Capillary Multi-Path Routing, International Conference on
Communications, Circuits and Systems - ICCCAS'06 - Gui Lin, China, 25-28 June
2006, Vol. 3, pp. 1497-1501 | null | null | cs.NI cs.MM | null | Erasure resilient FEC codes in off-line packetized streaming rely on time
diversity. This requires unrestricted buffering time at the receiver. In
real-time streaming the playback buffering time must be very short. Path
diversity is an orthogonal strategy. However, the large number of long paths
increases the number of underlying links and consecutively the overall link
failure rate. This may increase the overall requirement in redundant FEC
packets for combating the link failures. We introduce the Redundancy Overall
Requirement (ROR) metric, a routing coefficient specifying the total number of
FEC packets required for compensation of all underlying link failures. We
present a capillary routing algorithm for constructing layer by layer steadily
diversifying multi-path routing patterns. By measuring the ROR coefficients of
a dozen of routing layers on hundreds of network samples, we show that the
number of required FEC packets decreases substantially when the path diversity
is increased by the capillary routing construction algorithm.
| [
{
"version": "v1",
"created": "Mon, 17 Jul 2006 08:10:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gabrielyan",
"Emin",
""
]
] |
cs/0607081 | Marie-France Ango-Obiang | Marie-France Ango-Obiang (LORIA) | Syst\`{e}me de repr\'{e}sentation d'aide au besoin dans le domaine
architectural | null | Dans CONFERE 2006, Conception et Innovation | null | null | cs.OH cs.IR | null | The image is a very important mean of communication in the field of
architectural who intervenes in the various phases of the design of a project.
It can be regarded as a tool of decision-making aid. The study of our research
aims at to see the contribution of the Economic Intelligence in the resolution
of a decisional problem of the various partners (Architect, Contractor,
Customer) in the architectural field, in order to make strategic decisions
within the framework of the realization or design of an architectural work. The
economic Intelligence allows the taking into account of the real needs for the
user-decision makers, so that their waiting are considered at the first stage
of a search for information and not in the final stage of the development of
the tool in the evaluation of this last.
| [
{
"version": "v1",
"created": "Tue, 18 Jul 2006 05:04:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ango-Obiang",
"Marie-France",
"",
"LORIA"
]
] |
cs/0607083 | Stanko Shtrakov | Stanko Vl. Shtrakov, Anton Stoilov | Mathematical Modelling of the Thermal Accumulation in Hot Water Solar
Systems | 11 pages, 5 figures | null | null | null | cs.CE | null | Mathematical modelling and defining useful recommendations for construction
and regimes of exploitation for hot water solar installation with thermal
stratification is the main purpose of this work. A special experimental solar
module for hot water was build and equipped with sufficient measure apparatus.
The main concept of investigation is to optimise the stratified regime of
thermal accumulation and constructive parameters of heat exchange equipment
(heat serpentine in tank). Accumulation and heat exchange processes were
investigated by theoretical end experimental means. Special mathematical model
was composed to simulate the energy transfer in stratified tank. Computer
program was developed to solve mathematical equations for thermal accumulation
and energy exchange. Extensive numerical and experimental tests were carried
out. A good correspondence between theoretical and experimental data was
arrived. Keywords: Mathematical modelling, accumulation
| [
{
"version": "v1",
"created": "Tue, 18 Jul 2006 08:07:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Shtrakov",
"Stanko Vl.",
""
],
[
"Stoilov",
"Anton",
""
]
] |
cs/0607084 | Farid Nouioua | Daniel Kayser (LIPN), Farid Nouioua (LIPN) | About Norms and Causes | null | The 17th FLAIRS'04 Conference (2004) 502-507 | null | null | cs.AI | null | Knowing the norms of a domain is crucial, but there exist no repository of
norms. We propose a method to extract them from texts: texts generally do not
describe a norm, but rather how a state-of-affairs differs from it. Answers
concerning the cause of the state-of-affairs described often reveal the
implicit norm. We apply this idea to the domain of driving, and validate it by
designing algorithms that identify, in a text, the "basic" norms to which it
refers implicitly.
| [
{
"version": "v1",
"created": "Tue, 18 Jul 2006 07:46:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kayser",
"Daniel",
"",
"LIPN"
],
[
"Nouioua",
"Farid",
"",
"LIPN"
]
] |
cs/0607086 | Farid Nouioua | Daniel Kayser (LIPN), Farid Nouioua (LIPN) | Representing Knowledge about Norms | null | The 16th European Conference on Artificial Intelligence (ECAI'04)
(2004) 363-367 | null | null | cs.AI | null | Norms are essential to extend inference: inferences based on norms are far
richer than those based on logical implications. In the recent decades, much
effort has been devoted to reason on a domain, once its norms are represented.
How to extract and express those norms has received far less attention.
Extraction is difficult: as the readers are supposed to know them, the norms of
a domain are seldom made explicit. For one thing, extracting norms requires a
language to represent them, and this is the topic of this paper. We apply this
language to represent norms in the domain of driving, and show that it is
adequate to reason on the causes of accidents, as described by car-crash
reports.
| [
{
"version": "v1",
"created": "Tue, 18 Jul 2006 08:15:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kayser",
"Daniel",
"",
"LIPN"
],
[
"Nouioua",
"Farid",
"",
"LIPN"
]
] |
cs/0607088 | Farid Nouioua | Farid Nouioua (LIPN), Pascal Nicolas (LERIA) | Using Answer Set Programming in an Inference-Based approach to Natural
Language Semantics | null | Inference in Computational Semantics ICoS-5, France (2006) 77-86 | null | null | cs.CL cs.AI | null | Using Answer Set Programming in an Inference-Based approach to Natural
Language Semantics
| [
{
"version": "v1",
"created": "Tue, 18 Jul 2006 07:43:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Nouioua",
"Farid",
"",
"LIPN"
],
[
"Nicolas",
"Pascal",
"",
"LERIA"
]
] |
cs/0607090 | Adityan Rishiyur | Adityan Rishiyur | Neural Networks with Complex and Quaternion Inputs | 14 pages, 2 figures | null | null | null | cs.NE | null | This article investigates Kak neural networks, which can be instantaneously
trained, for complex and quaternion inputs. The performance of the basic
algorithm has been analyzed and shown how it provides a plausible model of
human perception and understanding of images. The motivation for studying
quaternion inputs is their use in representing spatial rotations that find
applications in computer graphics, robotics, global navigation, computer vision
and the spatial orientation of instruments. The problem of efficient mapping of
data in quaternion neural networks is examined. Some problems that need to be
addressed before quaternion neural networks find applications are identified.
| [
{
"version": "v1",
"created": "Tue, 18 Jul 2006 21:01:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rishiyur",
"Adityan",
""
]
] |
cs/0607091 | Stanko Shtrakov | Stanko Shtrakov, Anton Stoilov | Finite element method for thermal analysis of concentrating solar
receivers | 8 pages; 5 figures | null | null | null | cs.CE | null | Application of finite element method and heat conductivity transfer model for
calculation of temperature distribution in receiver for dish-Stirling
concentrating solar system is described. The method yields discretized
equations that are entirely local to the elements and provides complete
geometric flexibility. A computer program solving the finite element method
problem is created and great number of numerical experiments is carried out.
Illustrative numerical results are given for an array of triangular elements in
receiver for dish-Stirling system.
| [
{
"version": "v1",
"created": "Wed, 19 Jul 2006 06:58:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Shtrakov",
"Stanko",
""
],
[
"Stoilov",
"Anton",
""
]
] |
cs/0607100 | Xin Han | Xin Han, Kazuo Iwama, Guochuan Zhang | New Upper Bounds on The Approximability of 3D Strip Packing | Submitted to SODA 2007 | null | null | null | cs.DS | null | In this paper, we study the 3D strip packing problem in which we are given a
list of 3-dimensional boxes and required to pack all of them into a
3-dimensional strip with length 1 and width 1 and unlimited height to minimize
the height used. Our results are below: i) we give an approximation algorithm
with asymptotic worst-case ratio 1.69103, which improves the previous best
bound of $2+\epsilon$ by Jansen and Solis-Oba of SODA 2006; ii) we also present
an asymptotic PTAS for the case in which all items have {\em square} bases.
| [
{
"version": "v1",
"created": "Sat, 22 Jul 2006 02:06:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Han",
"Xin",
""
],
[
"Iwama",
"Kazuo",
""
],
[
"Zhang",
"Guochuan",
""
]
] |
cs/0607101 | Patricia Hill | Patricia M. Hill, Fausto Spoto | Deriving Escape Analysis by Abstract Interpretation: Proofs of results | null | null | null | null | cs.PL | null | Escape analysis of object-oriented languages approximates the set of objects
which do not escape from a given context. If we take a method as context, the
non-escaping objects can be allocated on its activation stack; if we take a
thread, Java synchronisation locks on such objects are not needed. In this
paper, we formalise a basic escape domain e as an abstract interpretation of
concrete states, which we then refine into an abstract domain er which is more
concrete than e and, hence, leads to a more precise escape analysis than e. We
provide optimality results for both e and er, in the form of Galois insertions
from the concrete to the abstract domains and of optimal abstract operations.
The Galois insertion property is obtained by restricting the abstract domains
to those elements which do not contain garbage, by using an abstract garbage
collector. Our implementation of er is hence an implementation of a formally
correct escape analyser, able to detect the stack allocatable creation points
of Java (bytecode) applications.
This report contains the proofs of results of a paper with the same title and
authors and to be published in the Journal "Higher-Order Symbolic Computation".
| [
{
"version": "v1",
"created": "Mon, 24 Jul 2006 09:24:07 GMT"
},
{
"version": "v2",
"created": "Fri, 28 Jul 2006 14:59:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hill",
"Patricia M.",
""
],
[
"Spoto",
"Fausto",
""
]
] |
cs/0607103 | Lester Ingber | Lester Ingber | Ideas by Statistical Mechanics (ISM) | null | null | null | null | cs.CE cs.MS cs.NE | null | Ideas by Statistical Mechanics (ISM) is a generic program to model evolution
and propagation of ideas/patterns throughout populations subjected to
endogenous and exogenous interactions. The program is based on the author's
work in Statistical Mechanics of Neocortical Interactions (SMNI), and uses the
author's Adaptive Simulated Annealing (ASA) code for optimizations of training
sets, as well as for importance-sampling to apply the author's copula financial
risk-management codes, Trading in Risk Dimensions (TRD), for assessments of
risk and uncertainty. This product can be used for decision support for
projects ranging from diplomatic, information, military, and economic (DIME)
factors of propagation/evolution of ideas, to commercial sales, trading
indicators across sectors of financial markets, advertising and political
campaigns, etc. A statistical mechanical model of neocortical interactions,
developed by the author and tested successfully in describing short-term memory
and EEG indicators, is the proposed model. Parameters with a given subset of
macrocolumns will be fit using ASA to patterns representing ideas. Parameters
of external and inter-regional interactions will be determined that promote or
inhibit the spread of these ideas. Tools of financial risk management,
developed by the author to process correlated multivariate systems with
differing non-Gaussian distributions using modern copula analysis,
importance-sampled using ASA, will enable bona fide correlations and
uncertainties of success and failure to be calculated. Marginal distributions
will be evolved to determine their expected duration and stability using
algorithms developed by the author, i.e., PATHTREE and PATHINT codes.
| [
{
"version": "v1",
"created": "Sun, 23 Jul 2006 16:12:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ingber",
"Lester",
""
]
] |
cs/0607106 | Hubie Chen | Hubie Chen | The Complexity of Quantified Constraint Satisfaction: Collapsibility,
Sink Algebras, and the Three-Element Case | null | null | null | null | cs.LO cs.CC | null | The constraint satisfaction probem (CSP) is a well-acknowledged framework in
which many combinatorial search problems can be naturally formulated. The CSP
may be viewed as the problem of deciding the truth of a logical sentence
consisting of a conjunction of constraints, in front of which all variables are
existentially quantified. The quantified constraint satisfaction problem (QCSP)
is the generalization of the CSP where universal quantification is permitted in
addition to existential quantification. The general intractability of these
problems has motivated research studying the complexity of these problems under
a restricted constraint language, which is a set of relations that can be used
to express constraints.
This paper introduces collapsibility, a technique for deriving positive
complexity results on the QCSP. In particular, this technique allows one to
show that, for a particular constraint language, the QCSP reduces to the CSP.
We show that collapsibility applies to three known tractable cases of the QCSP
that were originally studied using disparate proof techniques in different
decades: Quantified 2-SAT (Aspvall, Plass, and Tarjan 1979), Quantified
Horn-SAT (Karpinski, Kleine B\"{u}ning, and Schmitt 1987), and Quantified
Affine-SAT (Creignou, Khanna, and Sudan 2001). This reconciles and reveals
common structure among these cases, which are describable by constraint
languages over a two-element domain. In addition to unifying these known
tractable cases, we study constraint languages over domains of larger size.
| [
{
"version": "v1",
"created": "Mon, 24 Jul 2006 16:03:56 GMT"
},
{
"version": "v2",
"created": "Tue, 25 Jul 2006 13:06:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chen",
"Hubie",
""
]
] |
cs/0607109 | Marko Samer | Marko Samer and Stefan Szeider | Complexity and Applications of Edge-Induced Vertex-Cuts | 17 pages, 5 figures, 2 tables | null | null | null | cs.DM cs.CC | null | Motivated by hypergraph decomposition algorithms, we introduce the notion of
edge-induced vertex-cuts and compare it with the well-known notions of
edge-cuts and vertex-cuts. We investigate the complexity of computing minimum
edge-induced vertex-cuts and demonstrate the usefulness of our notion by
applications in network reliability and constraint satisfaction.
| [
{
"version": "v1",
"created": "Tue, 25 Jul 2006 16:17:22 GMT"
},
{
"version": "v2",
"created": "Mon, 31 Jul 2006 09:23:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Samer",
"Marko",
""
],
[
"Szeider",
"Stefan",
""
]
] |
cs/0607110 | Etienne Grossmann | Etienne Grossmann | A Theory of Probabilistic Boosting, Decision Trees and Matryoshki | null | null | null | null | cs.LG | null | We present a theory of boosting probabilistic classifiers. We place ourselves
in the situation of a user who only provides a stopping parameter and a
probabilistic weak learner/classifier and compare three types of boosting
algorithms: probabilistic Adaboost, decision tree, and tree of trees of ... of
trees, which we call matryoshka. "Nested tree," "embedded tree" and "recursive
tree" are also appropriate names for this algorithm, which is one of our
contributions. Our other contribution is the theoretical analysis of the
algorithms, in which we give training error bounds. This analysis suggests that
the matryoshka leverages probabilistic weak classifiers more efficiently than
simple decision trees.
| [
{
"version": "v1",
"created": "Tue, 25 Jul 2006 15:57:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Grossmann",
"Etienne",
""
]
] |
cs/0607111 | William Yurcik | William Yurcik, Cristina Abad, Ragib Hasan, Moazzam Saleem, Shyama
Sridharan | UCLog+ : A Security Data Management System for Correlating Alerts,
Incidents, and Raw Data From Remote Logs | 10 pages, 9 Tables, 16 Figures | null | null | null | cs.CR | null | Source data for computer network security analysis takes different forms
(alerts, incidents, logs) and each source may be voluminous. Due to the
challenge this presents for data management, this has often lead to security
stovepipe operations which focus primarily on a small number of data sources
for analysis with little or no automated correlation between data sources
(although correlation may be done manually). We seek to address this systemic
problem.
In previous work we developed a unified correlated logging system (UCLog)
that automatically processes alerts from different devices. We take this work
one step further by presenting the architecture and applications of UCLog+
which adds the new capability to correlate between alerts and incidents and raw
data located on remote logs. UCLog+ can be used for forensic analysis including
queries and report generation but more importantly it can be used for
near-real-time situational awareness of attack patterns in progress. The
system, implemented with open source tools, can also be a repository for secure
information sharing by different organizations.
| [
{
"version": "v1",
"created": "Tue, 25 Jul 2006 19:44:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Yurcik",
"William",
""
],
[
"Abad",
"Cristina",
""
],
[
"Hasan",
"Ragib",
""
],
[
"Saleem",
"Moazzam",
""
],
[
"Sridharan",
"Shyama",
""
]
] |
cs/0607113 | David Eppstein | Josiah Carlson and David Eppstein | Trees with Convex Faces and Optimal Angles | 12 pages, 10 figures. To appear at 14th Int. Symp. Graph Drawing,
2006 | null | null | null | cs.CG | null | We consider drawings of trees in which all edges incident to leaves can be
extended to infinite rays without crossing, partitioning the plane into
infinite convex polygons. Among all such drawings we seek the one maximizing
the angular resolution of the drawing. We find linear time algorithms for
solving this problem, both for plane trees and for trees without a fixed
embedding. In any such drawing, the edge lengths may be set independently of
the angles, without crossing; we describe multiple strategies for setting these
lengths.
| [
{
"version": "v1",
"created": "Wed, 26 Jul 2006 00:44:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Carlson",
"Josiah",
""
],
[
"Eppstein",
"David",
""
]
] |
cs/0607115 | Marcin Kaminski | Marcin Kaminski and Vadim Lozin | Polynomial-time algorithm for vertex k-colorability of P_5-free graphs | null | null | null | null | cs.DM cs.DS | null | We give the first polynomial-time algorithm for coloring vertices of P_5-free
graphs with k colors. This settles an open problem and generalizes several
previously known results.
| [
{
"version": "v1",
"created": "Wed, 26 Jul 2006 09:20:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kaminski",
"Marcin",
""
],
[
"Lozin",
"Vadim",
""
]
] |
cs/0607116 | Rui Abreu Eng | Rui Abreu, Peter Zoeteweij and Arjan JC van Gemund | Program Spectra Analysis in Embedded Software: A Case Study | null | null | null | TUD-SERG-2006-007 | cs.SE | null | Because of constraints imposed by the market, embedded software in consumer
electronics is almost inevitably shipped with faults and the goal is just to
reduce the inherent unreliability to an acceptable level before a product has
to be released. Automatic fault diagnosis is a valuable tool to capture
software faults without extra effort spent on testing. Apart from a debugging
aid at design and integration time, fault diagnosis can help analyzing problems
during operation, which allows for more accurate system recovery. In this paper
we discuss perspectives and limitations for applying a particular fault
diagnosis technique, namely the analysis of program spectra, in the area of
embedded software in consumer electronics devices. We illustrate these by our
first experience with a test case from industry.
| [
{
"version": "v1",
"created": "Wed, 26 Jul 2006 09:26:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Abreu",
"Rui",
""
],
[
"Zoeteweij",
"Peter",
""
],
[
"van Gemund",
"Arjan JC",
""
]
] |
cs/0607117 | Jon Feldman | Gagan Aggarwal, S. Muthukrishnan, Jon Feldman | Bidding to the Top: VCG and Equilibria of Position-Based Auctions | null | null | null | null | cs.GT | null | Many popular search engines run an auction to determine the placement of
advertisements next to search results. Current auctions at Google and Yahoo!
let advertisers specify a single amount as their bid in the auction. This bid
is interpreted as the maximum amount the advertiser is willing to pay per click
on its ad. When search queries arrive, the bids are used to rank the ads
linearly on the search result page. The advertisers pay for each user who
clicks on their ad, and the amount charged depends on the bids of all the
advertisers participating in the auction. In order to be effective, advertisers
seek to be as high on the list as their budget permits, subject to the market.
We study the problem of ranking ads and associated pricing mechanisms when
the advertisers not only specify a bid, but additionally express their
preference for positions in the list of ads. In particular, we study "prefix
position auctions" where advertiser $i$ can specify that she is interested only
in the top $b_i$ positions.
We present a simple allocation and pricing mechanism that generalizes the
desirable properties of current auctions that do not have position constraints.
In addition, we show that our auction has an "envy-free" or "symmetric" Nash
equilibrium with the same outcome in allocation and pricing as the well-known
truthful Vickrey-Clarke-Groves (VCG) auction. Furthermore, we show that this
equilibrium is the best such equilibrium for the advertisers in terms of the
profit made by each advertiser. We also discuss other position-based auctions.
| [
{
"version": "v1",
"created": "Wed, 26 Jul 2006 15:42:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Aggarwal",
"Gagan",
""
],
[
"Muthukrishnan",
"S.",
""
],
[
"Feldman",
"Jon",
""
]
] |
cs/0607119 | Sergey Zykov V. | Sergey V. Zykov | Web-Based Enterprise Information Systems Development: The Integrated
Methodology | 5 pages | Proceedings of the 5th International Conference on Computer
Science and Information Technologies (CSIT 2005), Yerevan, Armenia, 19-23
September 2005. National Academy of Sciences of Armenia Publishers, 2005,
pp.373-381 | null | null | cs.SE cs.DC | null | The paper considers software development issues for large-scale enterprise
information systems (IS) with databases (DB) in global heterogeneous
distributed computational environment. Due to high IT development rates, the
present-day society has accumulated and rapidly increases an extremely huge
data burden. Manipulating with such huge data arrays becomes an essential
problem, particularly due to their global distribution, heterogeneous and
weak-structured character. The conceptual approach to integrated Internet-based
IS design, development and implementation is presented, including formal
models, software development methodology and original software development
tools for visual problem-oriented development and content management. IS
implementation results proved shortening terms and reducing costs of
implementation compared to commercial software available.
| [
{
"version": "v1",
"created": "Thu, 27 Jul 2006 07:47:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zykov",
"Sergey V.",
""
]
] |
cs/0607120 | Peter Turney | Peter D. Turney (National Research Council of Canada) | Expressing Implicit Semantic Relations without Supervision | 8 pages, related work available at http://purl.org/peter.turney/ | Proceedings of the 21st International Conference on Computational
Linguistics and 44th Annual Meeting of the Association for Computational
Linguistics (ACL-06), (2006), Sydney, Australia, 313-320 | null | NRC-48761 | cs.CL cs.AI cs.IR cs.LG | null | We present an unsupervised learning algorithm that mines large text corpora
for patterns that express implicit semantic relations. For a given input word
pair X:Y with some unspecified semantic relations, the corresponding output
list of patterns <P1,...,Pm> is ranked according to how well each pattern Pi
expresses the relations between X and Y. For example, given X=ostrich and
Y=bird, the two highest ranking output patterns are "X is the largest Y" and "Y
such as the X". The output patterns are intended to be useful for finding
further pairs with the same relations, to support the construction of lexicons,
ontologies, and semantic networks. The patterns are sorted by pertinence, where
the pertinence of a pattern Pi for a word pair X:Y is the expected relational
similarity between the given pair and typical pairs for Pi. The algorithm is
empirically evaluated on two tasks, solving multiple-choice SAT word analogy
questions and classifying semantic relations in noun-modifier pairs. On both
tasks, the algorithm achieves state-of-the-art results, performing
significantly better than several alternative pattern ranking algorithms, based
on tf-idf.
| [
{
"version": "v1",
"created": "Thu, 27 Jul 2006 18:23:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Turney",
"Peter D.",
"",
"National Research Council of Canada"
]
] |
cs/0607121 | Sergey Zykov V. | Sergey V.Zykov, Gleb G. Pogodayev | Object-Based Groupware: Theory, Design and Implementation Issues | 8 pages, 2 figures | In: J.Eder and L.A. Kalinichenko, (Ed.) Advances in Databases and
Information Systems, Vol.2. St.-Petersburg: Nevsky Dialect, 1997, p.p.10-17 | null | null | cs.SE | null | Document management software systems are having a wide audience at present.
However, groupware as a term has a wide variety of possible definitions.
Groupware classification attempt is made in this paper. Possible approaches to
groupware are considered including document management, document control and
mailing systems. Lattice theory and concept modelling are presented as a
theoretical background for the systems in question. Current technologies in
state-of-the-art document managenent software are discussed. Design and
implementation aspects for user-friendly integrate enterprise systems are
described. Results for a real system to be implemented are given. Perspectives
of the field in question are discussed.
| [
{
"version": "v1",
"created": "Thu, 27 Jul 2006 10:16:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zykov",
"Sergey V.",
""
],
[
"Pogodayev",
"Gleb G.",
""
]
] |
cs/0607122 | Sergey Zykov V. | Sergey V. Zykov | Enterprise Content Management: Theory and Engineering for Entire
Lifecycle Support | 6 pages, 1 figure | Proceedings of the 8th International Workshop on Computer Science
and Information Technologies (CSIT'2006), Vol.1, Karlsruhe, Germany,
Sept.28-29, 2006.- Karlsruhe University Publishers, Karlsruhe, 2006.- Vol.1,
p.p.92-97 | null | null | cs.SE cs.DC | null | The paper considers enterprise content management (ECM) issues in global
heterogeneous distributed computational environment. Present-day enterprises
have accumulated a huge data burden. Manipulating with such a bulk becomes an
essential problem, particularly due to its global distribution, heterogeneous
and weak-structured character. The conceptual approach to integrated ECM
lifecycle support is presented, including overview of formal models, software
development methodology and innovative software development tools.
Implementation results proved shortening terms and reducing costs of
implementation compared to commercial software available.
| [
{
"version": "v1",
"created": "Thu, 27 Jul 2006 10:32:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zykov",
"Sergey V.",
""
]
] |
cs/0607123 | Sergey Zykov V. | Sergey V. Zykov | Enterprise Portal Development Tools: Problem-Oriented Approach | 4 pages, 2 figures | Proceedings of the 7th International Workshop on Computer Science
and Information Technologies (CSIT'2005), Vol.1, Ufa State Aviation Technical
University, USATU Editorial-Publishing Office, Ufa, 2005, pp. 110-113 | null | null | cs.SE cs.DC | null | The paper deals with problem-oriented visual information system (IS)
engineering for enterprise Internet-based applications, which is a vital part
of the whole development process. The suggested approach is based on semantic
network theory and a novel ConceptModeller CASE tool.
| [
{
"version": "v1",
"created": "Thu, 27 Jul 2006 11:24:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zykov",
"Sergey V.",
""
]
] |
cs/0607124 | Sergey Zykov V. | Sergey V. Zykov | ConceptModeller: a Problem-Oriented Visual SDK for Globally Distributed
Enterprise Systems | 4 pages, 2 figures | Proceedings of the 7th International Workshop on Computer Science
and Information Technologies (CSIT'2005), Vol.1, Ufa State Aviation Technical
University, USATU Editorial-Publishing Office, Ufa, 2005, pp. 114-117 | null | cs.szykov.27374 | cs.SE cs.DC | null | The paper describes problem-oriented approach to software development. The
approach is a part of the original integrated methodology of enterprise
Internet-based software design and implementation. All aspects of software
development, from theory to implementation, are covered.
| [
{
"version": "v1",
"created": "Thu, 27 Jul 2006 11:35:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zykov",
"Sergey V.",
""
]
] |
cs/0607125 | Sergey Zykov V. | Sergey V. Zykov | Enterprise Portal: from Model to Implementation | 6 pages, 1 figure | Workshop on Computer Science and Information Technologies
(CSIT'2004), Budapest, Hungary, 2004, Vol.2, p.p.188-193 | null | null | cs.SE cs.DC | null | Portal technology can significantly improve the entire corporate information
infrastructure. The approach proposed is based on rigorous and consistent
(meta)data model and provides for efficient and accurate front-end integration
of heterogeneous corporate applications including enterprise resource planning
(ERP) systems, multimedia data warehouses and proprietary content databases.
The methodology proposed embraces entire software lifecycle; it is illustrated
by an enterprise-level Intranet portal implementation.
| [
{
"version": "v1",
"created": "Thu, 27 Jul 2006 12:12:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zykov",
"Sergey V.",
""
]
] |
cs/0607126 | Sergey Zykov V. | Sergey V. Zykov | Abstract Machine as a Model of Content Management Information System | 4 pages | Workshop on Computer Science and Information Technologies
(CSIT'2004), Budapest, Hungary, 2004, Vol.2, p.p.251-252 | null | null | cs.SE cs.DC | null | Enterprise content management is an urgent issue of current scientific and
practical activities in software design and implementation. However, papers
known as yet give insufficient coverage of theoretical background of the
software in question. The paper gives an attempt of building a state-based
model of content management. In accordance with the theoretical principles
outlined, a content management information system (CMIS) has been implemented
in a large international oil-and-gas group of companies.
| [
{
"version": "v1",
"created": "Thu, 27 Jul 2006 12:40:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zykov",
"Sergey V.",
""
]
] |
cs/0607127 | Sergey Zykov V. | Sergey V. Zykov | Integrating Enterprise Software Applications with Web Portal Technology | 6 pages, 1 picture | Proceedings of 5th International Workshop on Computer Science and
Information Technologies (CSIT'2003), Vol.1, Ufa State Aviation Technical
University, Ufa:USATU Editorial-Publishing Office, 2003, p.p.60-65 | null | null | cs.SE cs.DC | null | Web-portal based approach can significantly improve the entire corporate
information infrastructure. The approach proposed provides for rapid and
accurate front-end integration of heterogeneous corporate applications
including enterprise resource planning (ERP) systems. Human resources ERP
component and multimedia data warehouse implementations are discussed as
essential instances.
| [
{
"version": "v1",
"created": "Thu, 27 Jul 2006 12:49:54 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zykov",
"Sergey V.",
""
]
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.