id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
3
62.8k
title
stringlengths
1
382
comments
stringlengths
1
1.15k
journal-ref
stringlengths
1
557
doi
stringlengths
7
153
report-no
stringlengths
1
509
categories
stringlengths
5
125
license
stringclasses
9 values
abstract
stringlengths
6
6.09k
versions
listlengths
1
187
update_date
timestamp[s]date
2007-05-23 00:00:00
2025-04-25 00:00:00
authors_parsed
sequencelengths
1
2.83k
cs/0607128
Sergey Zykov V.
Sergey V. Zykov
The Integrated Approach to ERP: Embracing the Web
6 pages, 3 pictures
Proceedings of 4th International Workshop on Computer Science and Information Technologies, (CSIT'2002) Sept., 2002, Patras, Greece, Vol.1, p.p.73-78
null
null
cs.SE cs.DC
null
Integrated approach to enterprise resource planning (ERP) software design and implementation can significantly improve the entire corporate information infrastructure and it helps to benefit from power of Internet services. The approach proposed provides for corporate Web portal integrity, consistency, urgency and front-end data processing. Human resources (HR) ERP component implementation is discussed as an essential instance.
[ { "version": "v1", "created": "Thu, 27 Jul 2006 12:58:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Zykov", "Sergey V.", "" ] ]
cs/0607129
Sergey Zykov V.
Sergey V. Zykov
Enterprise Resource Planning Systems: the Integrated Approach
12 pages, 6 pictures
Proceedings of the 3d International Workshop on Computer Science and Information Technologies, (CSIT'2001), Ufa:USATU, 2001, Vol.1, p.p.284-295
null
null
cs.SE cs.DC
null
Enterprise resource planning (ERP) systems enjoy an increasingly wide coverage. However, no truly integrate solution has been proposed as yet. ERP classification is given. Recent trends in commercial systems are analyzed on the basis of human resources (HR) management software. An innovative "straight through" design and implementation process of an open, secure, and scalable integrated event-driven enterprise solution is suggested. Implementation results are presented.
[ { "version": "v1", "created": "Thu, 27 Jul 2006 13:07:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Zykov", "Sergey V.", "" ] ]
cs/0607130
Sergey Zykov V.
Sergey V. Zykov
Towards Implementing an Enterprise Groupware-Integrated Human Resources Information System
9 pages, 3 pictures
Proceedings of the 2nd International Workshop on Computer Science and Information Technologies (CSIT'2000), Vol.1, Ufa State Aviation Technical University, USATU Editorial-Publishing Office, Ufa, 2000, p.p.188-196
null
null
cs.SE cs.CY
null
Human resources management software is having a wide audience at present. However, no truly integrate solution has been proposed yet to improve the systems concerned. Approaches to extra data collection for appraisal decision-making are considered on the concept modeling theoretical basis. Current technologies in state-of-the-art HR management software are compared. Design and implementation aspects for a Web-wired truly integrated secure and scalable event-driven enterprise system are described. Benchmark results are presented. Field perspectives are discussed.
[ { "version": "v1", "created": "Thu, 27 Jul 2006 13:14:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Zykov", "Sergey V.", "" ] ]
cs/0607134
Vladimir Vovk
Vladimir Vovk
Leading strategies in competitive on-line prediction
20 pages; a conference version is to appear in the ALT'2006 proceedings
null
null
null
cs.LG
null
We start from a simple asymptotic result for the problem of on-line regression with the quadratic loss function: the class of continuous limited-memory prediction strategies admits a "leading prediction strategy", which not only asymptotically performs at least as well as any continuous limited-memory strategy but also satisfies the property that the excess loss of any continuous limited-memory strategy is determined by how closely it imitates the leading strategy. More specifically, for any class of prediction strategies constituting a reproducing kernel Hilbert space we construct a leading strategy, in the sense that the loss of any prediction strategy whose norm is not too large is determined by how closely it imitates the leading strategy. This result is extended to the loss functions given by Bregman divergences and by strictly proper scoring rules.
[ { "version": "v1", "created": "Thu, 27 Jul 2006 22:11:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Vovk", "Vladimir", "" ] ]
cs/0607136
Vladimir Vovk
Vladimir Vovk
Competing with Markov prediction strategies
11 pages
null
null
null
cs.LG
null
Assuming that the loss function is convex in the prediction, we construct a prediction strategy universal for the class of Markov prediction strategies, not necessarily continuous. Allowing randomization, we remove the requirement of convexity.
[ { "version": "v1", "created": "Fri, 28 Jul 2006 21:45:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Vovk", "Vladimir", "" ] ]
cs/0607137
Henrik Petander
Henrik Petander, Eranga Perera, Aruna Seneviratne
Multicasting with selective delivery: A SafetyNet for vertical handoffs
20 pages
null
null
null
cs.NI
null
In future mobility support will require handling roaming in heterogeneous access networks. In order to enable seamless roaming it is necessary to minimize the impact of the vertical handoffs. Localized mobility management schemes such as FMIPv6 and HMIPv6 do not provide sufficient handoff performance, since they have been designed for horizontal handoffs. In this paper, we propose the SafetyNet protocol, which allows a Mobile Node to perform seamless vertical handoffs. Further, we propose a handoff timing algorithm which allows a Mobile Node to delay or even completely avoid upward vertical handoffs. We implement the SafetyNet protocol and compare its performance with the Fast Handovers for Mobile IPv6 protocol in our wireless test bed and analyze the results. The experimental results indicate that the proposed SafetyNet protocol can provide an improvement of up to 95% for TCP performance in vertical handoffs, when compared with FMIPv6 and an improvement of 64% over FMIPv6 with bicasting. We use numerical analysis of the protocol to show that its signaling and data transmission overhead is comparable to Fast Mobile IPv6 and significantly smaller than that of FMIPv6 with bicasting.
[ { "version": "v1", "created": "Sat, 29 Jul 2006 01:45:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Petander", "Henrik", "" ], [ "Perera", "Eranga", "" ], [ "Seneviratne", "Aruna", "" ] ]
cs/0607138
Mohamed Belal A.Y.
Mohamed A. Belal
A Foundation to Perception Computing, Logic and Automata
39 pages, pdf format, to be published
null
null
null
cs.AI cs.LG
null
In this report, a novel approach to intelligence and learning is introduced, this approach is based on what we call 'perception logic'. Based on this logic, a computing mechanism and automata are introduced. Multi-resolution analysis of perceptual information is given, in which learning is accomplished in at most O(log(N))epochs, where N is the number of samples, and the convergence is guarnteed. This approach combines the favors of computational modeles in the sense that they are structured and mathematically well-defined, and the adaptivity of soft computing approaches, in addition to the continuity and real-time response of dynamical systems.
[ { "version": "v1", "created": "Sun, 30 Jul 2006 10:44:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Belal", "Mohamed A.", "" ] ]
cs/0607141
Riccardo Pucella
Karl Crary and Robert Harper
Logic Column 16: Higher-Order Abstract Syntax: Setting the Record Straight
4 pages
null
null
null
cs.LO
null
This article responds to a critique of higher-order abstract syntax appearing in Logic Column 14, ``Nominal Logic and Abstract Syntax'', cs.LO/0511025.
[ { "version": "v1", "created": "Mon, 31 Jul 2006 14:15:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Crary", "Karl", "" ], [ "Harper", "Robert", "" ] ]
cs/0607142
Andreas U. Schmidt
Nicolai Kuntze, Dominique Maehler, and Andreas U. Schmidt
Employing Trusted Computing for the forward pricing of pseudonyms in reputation systems
Refereed contribution to the 4th International Workshop for Technical, Economic and Legal Aspects of Business Models for Virtual Goods, December 13 -15, 2006 on AXMEDIS 2006 in Leeds, England. 5 pages, 3 figures, final version
null
null
null
cs.CR
null
Reputation and recommendation systems are fundamental for the formation of community market places. Yet, they are easy targets for attacks which disturb a market's equilibrium and are often based on cheap pseudonyms used to submit ratings. We present a method to price ratings using trusted computing, based on pseudonymous tickets.
[ { "version": "v1", "created": "Mon, 31 Jul 2006 15:17:39 GMT" }, { "version": "v2", "created": "Tue, 29 Aug 2006 09:51:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Kuntze", "Nicolai", "" ], [ "Maehler", "Dominique", "" ], [ "Schmidt", "Andreas U.", "" ] ]
cs/0607143
Florentin Smarandache
Jean Dezert, Albena Tchamova, Florentin Smarandache, Pavlina Konstantinova
Target Type Tracking with PCR5 and Dempster's rules: A Comparative Analysis
10 pages, 5 diagrams. Presented to Fusion 2006 International Conference, Florence, Italy, July 2006
Proceedings of Fusion 2006 International Conference, Florence, Italy, July 2006
null
null
cs.AI
null
In this paper we consider and analyze the behavior of two combinational rules for temporal (sequential) attribute data fusion for target type estimation. Our comparative analysis is based on Dempster's fusion rule proposed in Dempster-Shafer Theory (DST) and on the Proportional Conflict Redistribution rule no. 5 (PCR5) recently proposed in Dezert-Smarandache Theory (DSmT). We show through very simple scenario and Monte-Carlo simulation, how PCR5 allows a very efficient Target Type Tracking and reduces drastically the latency delay for correct Target Type decision with respect to Demspter's rule. For cases presenting some short Target Type switches, Demspter's rule is proved to be unable to detect the switches and thus to track correctly the Target Type changes. The approach proposed here is totally new, efficient and promising to be incorporated in real-time Generalized Data Association - Multi Target Tracking systems (GDA-MTT) and provides an important result on the behavior of PCR5 with respect to Dempster's rule. The MatLab source code is provided in
[ { "version": "v1", "created": "Mon, 31 Jul 2006 15:32:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Dezert", "Jean", "" ], [ "Tchamova", "Albena", "" ], [ "Smarandache", "Florentin", "" ], [ "Konstantinova", "Pavlina", "" ] ]
cs/0607144
Stanimir Andonov A
Stanimir Andonov
Levels of Product Differentiation in the Global Mobile Phones Market
null
null
null
null
cs.OH
null
The sixth product level called compliant product is a connecting element between the physical product characteristics and the strategy of the producer company. The article discusses the differentiation among the product offers of companies working in the global markets, as well as the strategies which they use and could use in that respect.
[ { "version": "v1", "created": "Mon, 31 Jul 2006 15:43:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Andonov", "Stanimir", "" ] ]
cs/0607145
Ioannis Doxaras N. Mr
Yannis Bakopoulos, Theophanis Raptis, Doxaras Ioannis
Geometric definition of a new skeletonization concept
9 pages, 3 figures, to appear in "2nd Interdisciplinary Symposium and 2nd Summer School on Mathematical Modeling in Modern Technologies and Economics", 1-5 September, Athens, Greece
null
null
null
cs.CG
null
The Divider set, as an innovative alternative concept to maximal disks, Voronoi sets and cut loci, is presented with a formal definition based on topology and differential geometry. The relevant mathematical theory by previous authors and a comparison with other medial axis definitions is presented. Appropriate applications are proposed and examined.
[ { "version": "v1", "created": "Mon, 31 Jul 2006 18:17:30 GMT" }, { "version": "v2", "created": "Thu, 3 Aug 2006 13:53:45 GMT" }, { "version": "v3", "created": "Tue, 26 Sep 2006 13:26:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Bakopoulos", "Yannis", "" ], [ "Raptis", "Theophanis", "" ], [ "Ioannis", "Doxaras", "" ] ]
cs/0607147
Florentin Smarandache
Florentin Smarandache, Jean Dezert
Fusion of qualitative beliefs using DSmT
13 pages. To appear in "Advances and Applications of DSmT for Information Fusion", collected works, second volume, 2006
Presented as an extended version (Tutorial MO2) to the Fusion 2006 International Conference, Florence, Italy, July 10-13, 2006
null
null
cs.AI
null
This paper introduces the notion of qualitative belief assignment to model beliefs of human experts expressed in natural language (with linguistic labels). We show how qualitative beliefs can be efficiently combined using an extension of Dezert-Smarandache Theory (DSmT) of plausible and paradoxical quantitative reasoning to qualitative reasoning. We propose a new arithmetic on linguistic labels which allows a direct extension of classical DSm fusion rule or DSm Hybrid rules. An approximate qualitative PCR5 rule is also proposed jointly with a Qualitative Average Operator. We also show how crisp or interval mappings can be used to deal indirectly with linguistic labels. A very simple example is provided to illustrate our qualitative fusion rules.
[ { "version": "v1", "created": "Mon, 31 Jul 2006 17:16:57 GMT" }, { "version": "v2", "created": "Wed, 29 Nov 2006 19:16:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Smarandache", "Florentin", "" ], [ "Dezert", "Jean", "" ] ]
cs/0608001
Bas Luttik
Luca Aceto, Wan Fokkink, Anna Ingolfsdottir, and Bas Luttik
A Finite Equational Base for CCS with Left Merge and Communication Merge
null
null
null
null
cs.LO
null
Using the left merge and communication merge from ACP, we present an equational base (i.e., a ground-complete and $\omega$-complete set of valid equations) for the fragment of CCS without recursion, restriction and relabelling. Our equational base is finite if the set of actions is finite.
[ { "version": "v1", "created": "Tue, 1 Aug 2006 10:45:29 GMT" }, { "version": "v2", "created": "Wed, 2 Aug 2006 08:20:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Aceto", "Luca", "" ], [ "Fokkink", "Wan", "" ], [ "Ingolfsdottir", "Anna", "" ], [ "Luttik", "Bas", "" ] ]
cs/0608002
Florentin Smarandache
Florentin Smarandache, Jean Dezert
An Introduction to the DSm Theory for the Combination of Paradoxical, Uncertain, and Imprecise Sources of Information
21 pages, many tables, figures. To appear in Information&Security International Journal, 2006
Presented at 13th International Congress of Cybernetics and Systems, Maribor, Slovenia, July 6-10, 2005.
null
null
cs.AI
null
The management and combination of uncertain, imprecise, fuzzy and even paradoxical or high conflicting sources of information has always been, and still remains today, of primal importance for the development of reliable modern information systems involving artificial reasoning. In this introduction, we present a survey of our recent theory of plausible and paradoxical reasoning, known as Dezert-Smarandache Theory (DSmT) in the literature, developed for dealing with imprecise, uncertain and paradoxical sources of information. We focus our presentation here rather on the foundations of DSmT, and on the two important new rules of combination, than on browsing specific applications of DSmT available in literature. Several simple examples are given throughout the presentation to show the efficiency and the generality of this new approach.
[ { "version": "v1", "created": "Tue, 1 Aug 2006 15:31:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Smarandache", "Florentin", "" ], [ "Dezert", "Jean", "" ] ]
cs/0608004
Jose M. Soler
Jose M. Soler
Separating the articles of authors with the same name
4 pages, 0 figures
null
null
null
cs.DL cs.IR
null
I describe a method to separate the articles of different authors with the same name. It is based on a distance between any two publications, defined in terms of the probability that they would have as many coincidences if they were drawn at random from all published documents. Articles with a given author name are then clustered according to their distance, so that all articles in a cluster belong very likely to the same author. The method has proven very useful in generating groups of papers that are then selected manually. This simplifies considerably citation analysis when the author publication lists are not available.
[ { "version": "v1", "created": "Tue, 1 Aug 2006 18:23:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Soler", "Jose M.", "" ] ]
cs/0608008
Ilya Safro
Ilya Safro
The minimum linear arrangement problem on proper interval graphs
null
null
null
null
cs.DM cs.DS
null
We present a linear time algorithm for the minimum linear arrangement problem on proper interval graphs. The obtained ordering is a 4-approximation for general interval graphs
[ { "version": "v1", "created": "Wed, 2 Aug 2006 07:46:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Safro", "Ilya", "" ] ]
cs/0608009
Claudia Landi
Andrea Cerri, Patrizio Frosini and Claudia Landi
Stability in multidimensional Size Theory
15 pages, 1 figure, uses psfrag
null
null
Universita' di Modena e Reggio Emilia, DISMI-85 june 2006
cs.CG cs.CV
null
This paper proves that in Size Theory the comparison of multidimensional size functions can be reduced to the 1-dimensional case by a suitable change of variables. Indeed, we show that a foliation in half-planes can be given, such that the restriction of a multidimensional size function to each of these half-planes turns out to be a classical size function in two scalar variables. This leads to the definition of a new distance between multidimensional size functions, and to the proof of their stability with respect to that distance.
[ { "version": "v1", "created": "Wed, 2 Aug 2006 08:49:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Cerri", "Andrea", "" ], [ "Frosini", "Patrizio", "" ], [ "Landi", "Claudia", "" ] ]
cs/0608013
Julien Robert
Julien Robert, Nicolas Schabanel
Pull-Based Data Broadcast with Dependencies: Be Fair to Users, not to Items
null
null
null
null
cs.DS cs.CC
null
Broadcasting is known to be an efficient means of disseminating data in wireless communication environments (such as Satellite, mobile phone networks,...). It has been recently observed that the average service time of broadcast systems can be considerably improved by taking into consideration existing correlations between requests. We study a pull-based data broadcast system where users request possibly overlapping sets of items; a request is served when all its requested items are downloaded. We aim at minimizing the average user perceived latency, i.e. the average flow time of the requests. We first show that any algorithm that ignores the dependencies can yield arbitrary bad performances with respect to the optimum even if it is given arbitrary extra resources. We then design a $(4+\epsilon)$-speed $O(1+1/\epsilon^2)$-competitive algorithm for this setting that consists in 1) splitting evenly the bandwidth among each requested set and in 2) broadcasting arbitrarily the items still missing in each set into the bandwidth the set has received. Our algorithm presents several interesting features: it is simple to implement, non-clairvoyant, fair to users so that no user may starve for a long period of time, and guarantees good performances in presence of correlations between user requests (without any change in the broadcast protocol). We also present a $ (4+\epsilon)$-speed $O(1+1/\epsilon^3)$-competitive algorithm which broadcasts at most one item at any given time and preempts each item broadcast at most once on average. As a side result of our analysis, we design a competitive algorithm for a particular setting of non-clairvoyant job scheduling with dependencies, which might be of independent interest.
[ { "version": "v1", "created": "Wed, 2 Aug 2006 15:00:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Robert", "Julien", "" ], [ "Schabanel", "Nicolas", "" ] ]
cs/0608015
Sebastian Brand
Sebastian Brand, Roland H. C. Yap
Towards "Propagation = Logic + Control"
15 pages; 22nd International Conference on Logic Programming (ICLP'06)
null
null
null
cs.PL cs.AI
null
Constraint propagation algorithms implement logical inference. For efficiency, it is essential to control whether and in what order basic inference steps are taken. We provide a high-level framework that clearly differentiates between information needed for controlling propagation versus that needed for the logical semantics of complex constraints composed from primitive ones. We argue for the appropriateness of our controlled propagation framework by showing that it captures the underlying principles of manually designed propagation algorithms, such as literal watching for unit clause propagation and the lexicographic ordering constraint. We provide an implementation and benchmark results that demonstrate the practicality and efficiency of our framework.
[ { "version": "v1", "created": "Thu, 3 Aug 2006 02:41:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Brand", "Sebastian", "" ], [ "Yap", "Roland H. C.", "" ] ]
cs/0608016
Sebastian Brand
Gregory J. Duck, Peter J. Stuckey, Sebastian Brand
ACD Term Rewriting
21 pages; 22nd International Conference on Logic Programming (ICLP'06)
null
null
null
cs.PL cs.SC
null
We introduce Associative Commutative Distributive Term Rewriting (ACDTR), a rewriting language for rewriting logical formulae. ACDTR extends AC term rewriting by adding distribution of conjunction over other operators. Conjunction is vital for expressive term rewriting systems since it allows us to require that multiple conditions hold for a term rewriting rule to be used. ACDTR uses the notion of a "conjunctive context", which is the conjunction of constraints that must hold in the context of a term, to enable the programmer to write very expressive and targeted rewriting rules. ACDTR can be seen as a general logic programming language that extends Constraint Handling Rules and AC term rewriting. In this paper we define the semantics of ACDTR and describe our prototype implementation.
[ { "version": "v1", "created": "Thu, 3 Aug 2006 02:55:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Duck", "Gregory J.", "" ], [ "Stuckey", "Peter J.", "" ], [ "Brand", "Sebastian", "" ] ]
cs/0608017
Sebastian Brand
Krzysztof R. Apt, Sebastian Brand
Infinite Qualitative Simulations by Means of Constraint Programming
15 pages; 12th International Conference on Principles and Practice of Constraint Programming (CP'06)
null
null
null
cs.AI cs.LO
null
We introduce a constraint-based framework for studying infinite qualitative simulations concerned with contingencies such as time, space, shape, size, abstracted into a finite set of qualitative relations. To define the simulations, we combine constraints that formalize the background knowledge concerned with qualitative reasoning with appropriate inter-state constraints that are formulated using linear temporal logic. We implemented this approach in a constraint programming system by drawing on ideas from bounded model checking. The resulting system allows us to test and modify the problem specifications in a straightforward way and to combine various knowledge aspects.
[ { "version": "v1", "created": "Thu, 3 Aug 2006 03:08:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Apt", "Krzysztof R.", "" ], [ "Brand", "Sebastian", "" ] ]
cs/0608019
Sebastian Brand
Sebastian Brand
Relation Variables in Qualitative Spatial Reasoning
14 pages; 27th German Conference on Artificial Intelligence (KI'04)
null
null
null
cs.AI
null
We study an alternative to the prevailing approach to modelling qualitative spatial reasoning (QSR) problems as constraint satisfaction problems. In the standard approach, a relation between objects is a constraint whereas in the alternative approach it is a variable. The relation-variable approach greatly simplifies integration and implementation of QSR. To substantiate this point, we discuss several QSR algorithms from the literature which in the relation-variable approach reduce to the customary constraint propagation algorithm enforcing generalised arc-consistency.
[ { "version": "v1", "created": "Thu, 3 Aug 2006 03:24:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Brand", "Sebastian", "" ] ]
cs/0608020
Romain Pechoux
Jean-Yves Marion and Romain Pechoux
Quasi-friendly sup-interpretations
null
null
null
null
cs.CC
null
In a previous paper, the sup-interpretation method was proposed as a new tool to control memory resources of first order functional programs with pattern matching by static analysis. Basically, a sup-interpretation provides an upper bound on the size of function outputs. In this former work, a criterion, which can be applied to terminating as well as non-terminating programs, was developed in order to bound polynomially the stack frame size. In this paper, we suggest a new criterion which captures more algorithms computing values polynomially bounded in the size of the inputs. Since this work is related to quasi-interpretations, we compare the two notions obtaining two main features. The first one is that, given a program, we have heuristics for finding a sup-interpretation when we consider polynomials of bounded degree. The other one consists in the characterizations of the set of function computable in polynomial time and in polynomial space.
[ { "version": "v1", "created": "Thu, 3 Aug 2006 13:05:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Marion", "Jean-Yves", "" ], [ "Pechoux", "Romain", "" ] ]
cs/0608022
Joseph Y. Halpern
Joseph Y. Halpern and Sabina Petride
Expressing Security Properties Using Selective Interleaving Functions
null
null
null
null
cs.CR
null
McLean's notion of Selective Interleaving Functions (SIFs) is perhaps the best-known attempt to construct a framework for expressing various security properties. We examine the expressive power of SIFs carefully. We show that SIFs cannot capture nondeducibility on strategies (NOS). We also prove that the set of security properties expressed with SIFs is not closed under conjunction, from which it follows that separability is strictly stronger than double generalized noninterference. However, we show that if we generalize the notion of SIF in a natural way, then NOS is expressible, and the set of security properties expressible by generalized SIFs is closed under conjunction.
[ { "version": "v1", "created": "Thu, 3 Aug 2006 20:15:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Halpern", "Joseph Y.", "" ], [ "Petride", "Sabina", "" ] ]
cs/0608025
Dinesh Kumar
Dinesh Kumar (INRIA Sophia Antipolis), Eitan Altman (INRIA Sophia Antipolis), Jean-Marc Kelif (INRIA Sophia Antipolis)
User-Network Association in a WLAN-UMTS Hybrid Cell: Global & Individual Optimality
null
null
null
null
cs.NI
null
We study optimal user-network association in an integrated 802.11 WLAN and 3G-UMTS hybrid cell. Assuming saturated resource allocation on the downlink of WLAN and UMTS networks and a single QoS class of mobiles arriving at an average location in the hybrid cell, we formulate the problem with two different approaches: Global and Individual optimality. The Globally optimal association is formulated as an SMDP (Semi Markov Decision Process) connection routing decision problem where rewards comprise a financial gain component and an aggregate network throughput component. The corresponding Dynamic Programming equations are solved using Value Iteration method and a stationary optimal policy with neither convex nor concave type switching curve structure is obtained. Threshold type and symmetric switching curves are observed for the analogous homogenous network cases. The Individual optimality is studied under a non-cooperative dynamic game framework with expected service time of a mobile as the decision cost criteria. It is shown that individual optimality in a WLAN-UMTS hybrid cell, results in a threshold policy curve of descending staircase form with increasing Poisson arrival rate of mobiles.
[ { "version": "v1", "created": "Fri, 4 Aug 2006 11:44:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Kumar", "Dinesh", "", "INRIA Sophia Antipolis" ], [ "Altman", "Eitan", "", "INRIA Sophia\n Antipolis" ], [ "Kelif", "Jean-Marc", "", "INRIA Sophia Antipolis" ] ]
cs/0608026
Dinesh Kumar
Dinesh Kumar (INRIA Sophia Antipolis), Dhiman Barman, Eitan Altman (INRIA Sophia Antipolis), Jean-Marc Kelif (FT R&D)
New Cross-Layer Channel Switching Policy for TCP Transmission on 3G UMTS Downlink
null
null
null
null
cs.NI
null
In 3G UMTS, two main transport channels have been provided for downlink data transmission: a common FACH channel and a dedicated DCH channel. The performance of TCP in UMTS depends much on the channel switching policy used. In this paper, we propose and analyze three new basic threshold-based channel switching policies for UMTS that we name as QS (Queue Size), FS (Flow Size) and QSFS (QS & FS combined) policy. These policies significantly improve over a modified threshold policy in [1] by about 17% in response time metrics. We further propose and evaluate a new improved switching policy that we call FS-DCH (at-least flow-size threshold on DCH) policy. This policy is biased towards short TCP flows of few packets and is thus a cross-layer policy that improves the performance of TCP by giving priority to the initial few packets of a flow on the fast DCH channel. Extensive simulation results confirm this improvement for the case when number of TCP connections is low.
[ { "version": "v1", "created": "Fri, 4 Aug 2006 11:53:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Kumar", "Dinesh", "", "INRIA Sophia Antipolis" ], [ "Barman", "Dhiman", "", "INRIA Sophia Antipolis" ], [ "Altman", "Eitan", "", "INRIA Sophia Antipolis" ], [ "Kelif", "Jean-Marc", "", "FT R&D" ] ]
cs/0608027
Edwin Henneken
E. Henneken, M.J. Kurtz, G. Eichhorn, A. Accomazzi, C.S. Grant, D. Thompson, E. Bohlen, S.S. Murray
myADS-arXiv - a Tailor-Made, Open Access, Virtual Journal
4 pages, 2 figures, poster paper to appear in the proceedings of the LISA V conference
null
null
null
cs.DL astro-ph
null
The myADS-arXiv service provides the scientific community with a one stop shop for staying up-to-date with a researcher's field of interest. The service provides a powerful and unique filter on the enormous amount of bibliographic information added to the ADS on a daily basis. It also provides a complete view with the most relevant papers available in the subscriber's field of interest. With this service, the subscriber will get to know the lastest developments, popular trends and the most important papers. This makes the service not only unique from a technical point of view, but also from a content point of view. On this poster we will argue why myADS-arXiv is a tailor-made, open access, virtual journal and we will illustrate its unique character.
[ { "version": "v1", "created": "Fri, 4 Aug 2006 15:23:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Henneken", "E.", "" ], [ "Kurtz", "M. J.", "" ], [ "Eichhorn", "G.", "" ], [ "Accomazzi", "A.", "" ], [ "Grant", "C. S.", "" ], [ "Thompson", "D.", "" ], [ "Bohlen", "E.", "" ], [ "Murray", "S. S.", "" ] ]
cs/0608028
Joseph Y. Halpern
Joseph Y. Halpern
Using Sets of Probability Measures to Represent Uncertainty
null
null
null
null
cs.AI
null
I explore the use of sets of probability measures as a representation of uncertainty.
[ { "version": "v1", "created": "Fri, 4 Aug 2006 20:26:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Halpern", "Joseph Y.", "" ] ]
cs/0608030
Ugo Dal Lago
Patrick Baillot, Ugo Dal Lago and Jean-Yves Moyen
On Quasi-Interpretations, Blind Abstractions and Implicit Complexity
18 pages
null
null
null
cs.PL cs.CC cs.LO
null
Quasi-interpretations are a technique to guarantee complexity bounds on first-order functional programs: with termination orderings they give in particular a sufficient condition for a program to be executable in polynomial time, called here the P-criterion. We study properties of the programs satisfying the P-criterion, in order to better understand its intensional expressive power. Given a program on binary lists, its blind abstraction is the nondeterministic program obtained by replacing lists by their lengths (natural numbers). A program is blindly polynomial if its blind abstraction terminates in polynomial time. We show that all programs satisfying a variant of the P-criterion are in fact blindly polynomial. Then we give two extensions of the P-criterion: one by relaxing the termination ordering condition, and the other one (the bounded value property) giving a necessary and sufficient condition for a program to be polynomial time executable, with memoisation.
[ { "version": "v1", "created": "Sun, 6 Aug 2006 07:20:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Baillot", "Patrick", "" ], [ "Lago", "Ugo Dal", "" ], [ "Moyen", "Jean-Yves", "" ] ]
cs/0608031
Mikio Fujii
Mikio Fujii
Secure Positioning of Mobile Terminals with Simplex Radio Communication
8 pages, 4 figures
null
null
null
cs.CR
null
With the rapid spread of various mobile terminals in our society, the importance of secure positioning is growing for wireless networks in adversarial settings. Recently, several authors have proposed a secure positioning mechanism of mobile terminals which is based on the geometric property of wireless node placement, and on the postulate of modern physics that a propagation speed of information never exceeds the velocity of light. In particular, they utilize the measurements of the round-trip time of radio signal propagation and bidirectional communication for variants of the challenge-and-response. In this paper, we propose a novel means to construct the above mechanism by use of unidirectional communication instead of bidirectional communication. Our proposal is based on the assumption that a mobile terminal incorporates a high-precision inner clock in a tamper-resistant protected area. In positioning, the mobile terminal uses its inner clock and the time and location information broadcasted by radio from trusted stations. Our proposal has a major advantage in protecting the location privacy of mobile terminal users, because the mobile terminal need not provide any information to the trusted stations through positioning procedures. Besides, our proposal is free from the positioning error due to claimant's processing-time fluctuations in the challenge-and-response, and is well-suited for mobile terminals in the open air, or on the move at high speed, in terms of practical usage. We analyze the security, the functionality, and the feasibility of our proposal in comparison to previous proposals.
[ { "version": "v1", "created": "Mon, 7 Aug 2006 05:49:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Fujii", "Mikio", "" ] ]
cs/0608032
Harald Zankl
Harald Zankl, Aart Middeldorp
Satisfying KBO Constraints
15 pages
null
null
null
cs.SC cs.LO
null
This paper presents two new approaches to prove termination of rewrite systems with the Knuth-Bendix order efficiently. The constraints for the weight function and for the precedence are encoded in (pseudo-)propositional logic and the resulting formula is tested for satisfiability. Any satisfying assignment represents a weight function and a precedence such that the induced Knuth-Bendix order orients the rules of the encoded rewrite system from left to right.
[ { "version": "v1", "created": "Sun, 6 Aug 2006 12:42:31 GMT" }, { "version": "v2", "created": "Tue, 3 Apr 2007 08:45:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Zankl", "Harald", "" ], [ "Middeldorp", "Aart", "" ] ]
cs/0608034
William Yurcik
Aashish Sharma, William Yurcik
Security Assessment of E-Tax Filing Websites
9 pages
null
null
null
cs.CR
null
Technical security is only part of E-Commerce security operations; human usability and security perception play major and sometimes dominating factors. For instance, slick websites with impressive security icons but no real technical security are often perceived by users to be trustworthy (and thus more profitable) than plain vanilla websites that use powerful encryption for transmission and server protection. We study one important type of E-Commerce transaction website, E-Tax Filing, that is exposed to large populations. We assess a large number of international (5), Federal (USA), and state E-Tax filing websites (38) for both technical security protection and human perception of security. As a result of this assessment, we identify security best practices across these E-Tax Filing websites and recommend additional security techniques that have not been found in current use by E-Tax Filing websites.
[ { "version": "v1", "created": "Sun, 6 Aug 2006 22:56:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Sharma", "Aashish", "" ], [ "Yurcik", "William", "" ] ]
cs/0608036
Andre Hernich
Andre Hernich, Nicole Schweikardt
Reversal Complexity Revisited
19 pages, 2 figures
null
null
null
cs.CC
null
We study a generalized version of reversal bounded Turing machines where, apart from several tapes on which the number of head reversals is bounded by r(n), there are several further tapes on which head reversals remain unrestricted, but size is bounded by s(n). Recently, such machines were introduced as a formalization of a computation model that restricts random access to external memory and internal memory space. Here, each of the tapes with a restriction on the head reversals corresponds to an external memory device, and the tapes of restricted size model internal memory. We use ST(r(n),s(n),O(1)) to denote the class of all problems that can be solved by deterministic Turing machines that comply to the above resource bounds. Similarly, NST and RST, respectively, are used for the corresponding nondeterministic and randomized classes. While previous papers focused on lower bounds for particular problems, including sorting, the set equality problem, and several query evaluation problems, the present paper addresses the relations between the (R,N)ST-classes and classical complexity classes and investigates the structural complexity of the (R,N)ST-classes. Our main results are (1) a trade-off between internal memory space and external memory head reversals, (2) correspondences between the (R,N)ST-classes and ``classical'' time-bounded, space-bounded, reversal-bounded, and circuit complexity classes, and (3) hierarchies of (R)ST-classes in terms of increasing numbers of head reversals on external memory tapes.
[ { "version": "v1", "created": "Mon, 7 Aug 2006 11:37:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Hernich", "Andre", "" ], [ "Schweikardt", "Nicole", "" ] ]
cs/0608038
Joachim Wehler
Joachim Wehler
Morphisms of Coloured Petri Nets
null
null
null
null
cs.SE
null
We introduce the concept of a morphism between coloured nets. Our definition generalizes Petris definition for ordinary nets. A morphism of coloured nets maps the topological space of the underlying undirected net as well as the kernel and cokernel of the incidence map. The kernel are flows along the transition-bordered fibres of the morphism, the cokernel are classes of markings of the place-bordered fibres. The attachment of bindings, colours, flows and marking classes to a subnet is formalized by using concepts from sheaf theory. A coloured net is a sheaf-cosheaf pair over a Petri space and a morphism between coloured nets is a morphism between such pairs. Coloured nets and their morphisms form a category. We prove the existence of a product in the subcategory of sort-respecting morphisms. After introducing markings our concepts generalize to coloured Petri nets.
[ { "version": "v1", "created": "Mon, 7 Aug 2006 19:03:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Wehler", "Joachim", "" ] ]
cs/0608039
Norman Danner
Norman Danner and Chris Pollett
The weak pigeonhole principle for function classes in S^1_2
11 pages
Mathematical Logic Quarterly 52(6):575-584, 2006
10.1002/malq.200610015
null
cs.LO
null
It is well known that S^1_2 cannot prove the injective weak pigeonhole principle for polynomial time functions unless RSA is insecure. In this note we investigate the provability of the surjective (dual) weak pigeonhole principle in S^1_2 for provably weaker function classes.
[ { "version": "v1", "created": "Mon, 7 Aug 2006 19:44:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Danner", "Norman", "" ], [ "Pollett", "Chris", "" ] ]
cs/0608040
Patrick Baillot
Patrick Baillot (LIPN), Marco Pedicini
An Embedding of the BSS Model of Computation in Light Affine Lambda-Calculus
11 pages. A preliminary version appeared as Research Report IAC CNR Roma, N.57 (11/2004), november 2004
8th International Workshop on Logic and Computational Complexity Seattle, August 10 - 11, 2006 (Satellite Workshop of FLOC-LICS 2006), \'{E}tats-Unis d'Am\'{e}rique (2006)
null
null
cs.LO
null
This paper brings together two lines of research: implicit characterization of complexity classes by Linear Logic (LL) on the one hand, and computation over an arbitrary ring in the Blum-Shub-Smale (BSS) model on the other. Given a fixed ring structure K we define an extension of Terui's light affine lambda-calculus typed in LAL (Light Affine Logic) with a basic type for K. We show that this calculus captures the polynomial time function class FP(K): every typed term can be evaluated in polynomial time and conversely every polynomial time BSS machine over K can be simulated in this calculus.
[ { "version": "v1", "created": "Tue, 8 Aug 2006 07:13:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Baillot", "Patrick", "", "LIPN" ], [ "Pedicini", "Marco", "" ] ]
cs/0608041
Igor Sobrado
Igor Sobrado and Dave Uhring
The Dynamics of A Self-Forming Network
5 pages; 8 figures; 2 tables
null
null
null
cs.NI
null
This article describes our strategy for deploying self-forming ad hoc networks based on the Internet Protocol version 6 and evaluates the dynamics of this proposal. Among others, we suggest a technique called adaptive routing that provides secure intelligent routing capabilities to computer communication networks. This technique uses the flow label, supports hybrid metrics, network load sharing, and is not restricted to evaluation of performance on first hop routers when making routing decisions. Selective anycasting is an extension to the anycast addressing model that supports exclusion of members of groups that perform poorly or inappropriately on a per-host basis. Distributed name lookup is suggested for integrating self-forming and global networks where they coexist. At last, we pose an address hierarchy to support unmanaged discovery of services in unknown networks.
[ { "version": "v1", "created": "Tue, 8 Aug 2006 16:33:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Sobrado", "Igor", "" ], [ "Uhring", "Dave", "" ] ]
cs/0608043
Babajide Afolabi
Babajide Afolabi (LORIA), Odile Thiery (LORIA)
Using Users' Expectations to Adapt Business Intelligence Systems
null
Advances in Knowledge Organization 10 (2006) 247-254
null
null
cs.IR
null
This paper takes a look at the general characteristics of business or economic intelligence system. The role of the user within this type of system is emphasized. We propose two models which we consider important in order to adapt this system to the user. The first model is based on the definition of decisional problem and the second on the four cognitive phases of human learning. We also describe the application domain we are using to test these models in this type of system.
[ { "version": "v1", "created": "Tue, 8 Aug 2006 13:19:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Afolabi", "Babajide", "", "LORIA" ], [ "Thiery", "Odile", "", "LORIA" ] ]
cs/0608045
Fotis Georgatos Drs
Giannis Kouretis, Fotis Georgatos
LiveWN, cpu scavenging in the Grid Era
4 pages
null
null
null
cs.DC cs.NI
null
The goal of this research is to introduce an easy and versatile way to provide and use Grid resources without the need of any OS installation or middleware configuration. At the same time we provide an excellent training tool for newer Grid users and people that want to experiment, without enforcing any installation. We have been testing it thoroughly under different circumstances with firm success.
[ { "version": "v1", "created": "Tue, 8 Aug 2006 15:28:53 GMT" }, { "version": "v2", "created": "Tue, 8 Aug 2006 22:13:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Kouretis", "Giannis", "" ], [ "Georgatos", "Fotis", "" ] ]
cs/0608051
Marco Maggesi
Andr\'e Hirschowitz, Marco Maggesi
Modules over Monads and Linearity
15 pages, too many changes to be summarized
null
null
null
cs.LO cs.PL
null
Inspired by the classical theory of modules over a monoid, we give a first account of the natural notion of module over a monad. The associated notion of morphism of left modules ("Linear" natural transformations) captures an important property of compatibility with substitution, in the heterogeneous case where "terms" and variables therein could be of different types as well as in the homogeneous case. In this paper, we present basic constructions of modules and we show examples concerning in particular abstract syntax and lambda-calculus.
[ { "version": "v1", "created": "Fri, 11 Aug 2006 15:05:27 GMT" }, { "version": "v2", "created": "Mon, 7 May 2007 10:52:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Hirschowitz", "André", "" ], [ "Maggesi", "Marco", "" ] ]
cs/0608053
Susan Coppersmith
S.N. Coppersmith
Renormalization group approach to the P versus NP question
Original version had a conjecture that is known to be false. Revised version corrects this error
null
null
null
cs.CC cond-mat.stat-mech
null
This paper argues that the ideas underlying the renormalization group technique used to characterize phase transitions in condensed matter systems could be useful for distinguishing computational complexity classes. The paper presents a renormalization group transformation that maps an arbitrary Boolean function of $N$ Boolean variables to one of $N-1$ variables. When this transformation is applied repeatedly, the behavior of the resulting sequence of functions is different for a generic Boolean function than for Boolean functions that can be written as a polynomial of degree $\xi$ with $\xi \ll N$ as well as for functions that depend on composite variables such as the arithmetic sum of the inputs. Being able to demonstrate that functions are non-generic is of interest because it suggests an avenue for constructing an algorithm capable of demonstrating that a given Boolean function cannot be computed using resources that are bounded by a polynomial of $N$.
[ { "version": "v1", "created": "Fri, 11 Aug 2006 17:48:42 GMT" }, { "version": "v2", "created": "Sun, 1 Oct 2006 15:37:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Coppersmith", "S. N.", "" ] ]
cs/0608055
Hao Chen
Hao Chen
MDS Ideal Secret Sharing Scheme from AG-codes on Elliptic Curves
null
null
null
null
cs.CR
null
For a secret sharing scheme, two parameters $d_{min}$ and $d_{cheat}$ are defined in [12] and [13]. These two parameters measure the error-correcting capability and the secret-recovering capability of the secret sharing scheme against cheaters. Some general properties of the parameters have been studied in [12,[9] and [13]. The MDS secret-sharing scheme was defined in [12] and it is proved that MDS perfect secret sharing scheme can be constructed for any monotone access structure. The famous Shamir $(k,n)$ threshold secret sharing scheme is the MDS with $d_{min}=d_{cheat}=n-k+1$. In [3] we proposed the linear secret sharing scheme from algebraic-geometric codes. In this paper the linear secret sharing scheme from AG-codes on elliptic curves is studied and it is shown that many of them are MDS linear secret sharing scheme.
[ { "version": "v1", "created": "Mon, 14 Aug 2006 01:49:34 GMT" }, { "version": "v2", "created": "Sun, 3 Sep 2006 03:59:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Chen", "Hao", "" ] ]
cs/0608063
Sylvain Pion
Sylvain Pion (INRIA Sophia Antipolis), Andreas Fabri
A Generic Lazy Evaluation Scheme for Exact Geometric Computations
null
null
null
null
cs.CG cs.PF
null
We present a generic C++ design to perform efficient and exact geometric computations using lazy evaluations. Exact geometric computations are critical for the robustness of geometric algorithms. Their efficiency is also critical for most applications, hence the need for delaying the exact computations at run time until they are actually needed. Our approach is generic and extensible in the sense that it is possible to make it a library which users can extend to their own geometric objects or primitives. It involves techniques such as generic functor adaptors, dynamic polymorphism, reference counting for the management of directed acyclic graphs and exception handling for detecting cases where exact computations are needed. It also relies on multiple precision arithmetic as well as interval arithmetic. We apply our approach to the whole geometric kernel of CGAL.
[ { "version": "v1", "created": "Tue, 15 Aug 2006 19:24:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Pion", "Sylvain", "", "INRIA Sophia Antipolis" ], [ "Fabri", "Andreas", "" ] ]
cs/0608065
Edita Pelantova
Lubom\'ira Balkov\'a, Edita Pelantov\'a, and Ond\v{r}ej Turek
Combinatorial and Arithmetical Properties of Infinite Words Associated with Non-simple Quadratic Parry Numbers
15 pages
null
null
null
cs.DM
null
We study arithmetical and combinatorial properties of $\beta$-integers for $\beta$ being the root of the equation $x^2=mx-n, m,n \in \mathbb N, m \geq n+2\geq 3$. We determine with the accuracy of $\pm 1$ the maximal number of $\beta$-fractional positions, which may arise as a result of addition of two $\beta$-integers. For the infinite word $u_\beta$ coding distances between consecutive $\beta$-integers, we determine precisely also the balance. The word $u_\beta$ is the fixed point of the morphism $A \to A^{m-1}B$ and $B\to A^{m-n-1}B$. In the case $n=1$ the corresponding infinite word $u_\beta$ is sturmian and therefore 1-balanced. On the simplest non-sturmian example with $n\geq 2$, we illustrate how closely the balance and arithmetical properties of $\beta$-integers are related.
[ { "version": "v1", "created": "Wed, 16 Aug 2006 09:39:01 GMT" }, { "version": "v2", "created": "Thu, 17 Aug 2006 10:08:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Balková", "Lubomíra", "" ], [ "Pelantová", "Edita", "" ], [ "Turek", "Ondřej", "" ] ]
cs/0608066
Mariano Zelke
Mariano Zelke
k-Connectivity in the Semi-Streaming Model
13 pages, submitted to Theoretical Computer Science
null
null
null
cs.DM cs.DS
null
We present the first semi-streaming algorithms to determine k-connectivity of an undirected graph with k being any constant. The semi-streaming model for graph algorithms was introduced by Muthukrishnan in 2003 and turns out to be useful when dealing with massive graphs streamed in from an external storage device. Our two semi-streaming algorithms each compute a sparse subgraph of an input graph G and can use this subgraph in a postprocessing step to decide k-connectivity of G. To this end the first algorithm reads the input stream only once and uses time O(k^2*n) to process each input edge. The second algorithm reads the input k+1 times and needs time O(k+alpha(n)) per input edge. Using its constructed subgraph the second algorithm can also generate all l-separators of the input graph for all l<k.
[ { "version": "v1", "created": "Wed, 16 Aug 2006 10:37:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Zelke", "Mariano", "" ] ]
cs/0608067
Tetsushi Matsui
Tetsushi Matsui
On Polynomial Time Computable Numbers
19 pages
null
null
null
cs.CC
null
It will be shown that the polynomial time computable numbers form a field, and especially an algebraically closed field.
[ { "version": "v1", "created": "Wed, 16 Aug 2006 15:26:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Matsui", "Tetsushi", "" ] ]
cs/0608073
Leonid Litinskii
Leonid B. Litinskii
Parametrical Neural Networks and Some Other Similar Architectures
15 pages, 2 figures, accepted for publication in "Optical Memory & Neural Networks" (2006)
null
null
null
cs.CV cs.NE
null
A review of works on associative neural networks accomplished during last four years in the Institute of Optical Neural Technologies RAS is given. The presentation is based on description of parametrical neural networks (PNN). For today PNN have record recognizing characteristics (storage capacity, noise immunity and speed of operation). Presentation of basic ideas and principles is accentuated.
[ { "version": "v1", "created": "Fri, 18 Aug 2006 08:28:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Litinskii", "Leonid B.", "" ] ]
cs/0608075
Jean-Philippe Diguet
Nader Ben Amor (LESTER, CES), Yannick Le Moullec (LESTER), Jean-Philippe Diguet (LESTER), Jean Luc Philippe (LESTER), Mohamed Abid (CES)
Design of multimedia processor based on metric computation
null
Advances in Engineering Software (Elsevier) Vol.36 No.7 (2005) 448-458
10.1016/j.advengsoft.2005.01.010
null
cs.AR
null
Media-processing applications, such as signal processing, 2D and 3D graphics rendering, and image compression, are the dominant workloads in many embedded systems today. The real-time constraints of those media applications have taxing demands on today's processor performances with low cost, low power and reduced design delay. To satisfy those challenges, a fast and efficient strategy consists in upgrading a low cost general purpose processor core. This approach is based on the personalization of a general RISC processor core according the target multimedia application requirements. Thus, if the extra cost is justified, the general purpose processor GPP core can be enforced with instruction level coprocessors, coarse grain dedicated hardware, ad hoc memories or new GPP cores. In this way the final design solution is tailored to the application requirements. The proposed approach is based on three main steps: the first one is the analysis of the targeted application using efficient metrics. The second step is the selection of the appropriate architecture template according to the first step results and recommendations. The third step is the architecture generation. This approach is experimented using various image and video algorithms showing its feasibility.
[ { "version": "v1", "created": "Fri, 18 Aug 2006 13:12:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Amor", "Nader Ben", "", "LESTER, CES" ], [ "Moullec", "Yannick Le", "", "LESTER" ], [ "Diguet", "Jean-Philippe", "", "LESTER" ], [ "Philippe", "Jean Luc", "", "LESTER" ], [ "Abid", "Mohamed", "", "CES" ] ]
cs/0608076
J\"urg Wullschleger
J\"urg Wullschleger
Oblivious-Transfer Amplification
PhD thesis, March 2007, ETH Zurich, 125 pages. Full version of the EUROCRYPT 2007 paper. Errors in the computational part corrected
null
null
null
cs.CR
null
Oblivious transfer is a primitive of paramount importance in cryptography or, more precisely, two- and multi-party computation due to its universality. Unfortunately, oblivious transfer cannot be achieved in an unconditionally secure way for both parties from scratch. Therefore, it is a natural question what information-theoretic primitives or computational assumptions oblivious transfer can be based on. The results in our thesis are threefold. First, we present a protocol that implements oblivious transfer from a weakened oblivious transfer called universal oblivious transfer, where one of the two players may get additional information. Our reduction is about twice as efficient as previous results. Weak oblivious transfer is an even weaker form of oblivious transfer, where both players may obtain additional information about the other player's input, and where the output can contain errors. We give a new, weaker definition of weak oblivious transfer, as well as new reductions with a more detailed analysis. Finally, we carry over our results to the computational setting and show how a weak oblivious transfer that is sometimes incorrect and only mildly secure against computationally bounded adversaries can be strengthened.
[ { "version": "v1", "created": "Fri, 18 Aug 2006 15:58:23 GMT" }, { "version": "v2", "created": "Thu, 9 Nov 2006 20:24:27 GMT" }, { "version": "v3", "created": "Thu, 12 Apr 2007 21:47:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Wullschleger", "Jürg", "" ] ]
cs/0608077
Vinay Kolar
Vinay Kolar and Nael Abu-Ghazaleh
The Effect of Scheduling on Link Capacity in Multi-hopWireless Networks
11 pages
null
null
null
cs.NI cs.AR cs.PF
null
Existing models of Multi-Hop Wireless Networks (MHWNs) assume that interference estimators of link quality such as observed busy time predict the capacity of the links. We show that these estimators do not capture the intricate interactions that occur at the scheduling level, which have a large impact on effective link capacity under contention based MAC protocols. We observe that scheduling problems arise only among those interfering sources whose concurrent transmissions cannot be prevented by the MAC protocol's collision management mechanisms; other interfering sources can arbitrate the medium and coexist successfully. Based on this observation, we propose a methodology for rating links and show that it achieves high correlation with observed behavior in simulation. We then use this rating as part of a branch-and-bound framework based on a linear programming formulation for traffic engineering in static MHWNs and show that it achieves considerable improvement in performance relative to interference based models.
[ { "version": "v1", "created": "Fri, 18 Aug 2006 16:45:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Kolar", "Vinay", "" ], [ "Abu-Ghazaleh", "Nael", "" ] ]
cs/0608078
Aidan Thompson
A. Slepoy, A. P. Thompson, M. D. Peters
Searching for Globally Optimal Functional Forms for Inter-Atomic Potentials Using Parallel Tempering and Genetic Programming
null
null
null
null
cs.NE cs.AI
null
We develop a Genetic Programming-based methodology that enables discovery of novel functional forms for classical inter-atomic force-fields, used in molecular dynamics simulations. Unlike previous efforts in the field, that fit only the parameters to the fixed functional forms, we instead use a novel algorithm to search the space of many possible functional forms. While a follow-on practical procedure will use experimental and {\it ab inito} data to find an optimal functional form for a forcefield, we first validate the approach using a manufactured solution. This validation has the advantage of a well-defined metric of success. We manufactured a training set of atomic coordinate data with an associated set of global energies using the well-known Lennard-Jones inter-atomic potential. We performed an automatic functional form fitting procedure starting with a population of random functions, using a genetic programming functional formulation, and a parallel tempering Metropolis-based optimization algorithm. Our massively-parallel method independently discovered the Lennard-Jones function after searching for several hours on 100 processors and covering a miniscule portion of the configuration space. We find that the method is suitable for unsupervised discovery of functional forms for inter-atomic potentials/force-fields. We also find that our parallel tempering Metropolis-based approach significantly improves the optimization convergence time, and takes good advantage of the parallel cluster architecture.
[ { "version": "v1", "created": "Fri, 18 Aug 2006 23:17:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Slepoy", "A.", "" ], [ "Thompson", "A. P.", "" ], [ "Peters", "M. D.", "" ] ]
cs/0608079
Anna Gilbert
A. C. Gilbert, M. J. Strauss, J. A. Tropp, and R. Vershynin
Algorithmic linear dimension reduction in the l_1 norm for sparse vectors
null
null
null
null
cs.DS
null
This paper develops a new method for recovering m-sparse signals that is simultaneously uniform and quick. We present a reconstruction algorithm whose run time, O(m log^2(m) log^2(d)), is sublinear in the length d of the signal. The reconstruction error is within a logarithmic factor (in m) of the optimal m-term approximation error in l_1. In particular, the algorithm recovers m-sparse signals perfectly and noisy signals are recovered with polylogarithmic distortion. Our algorithm makes O(m log^2 (d)) measurements, which is within a logarithmic factor of optimal. We also present a small-space implementation of the algorithm. These sketching techniques and the corresponding reconstruction algorithms provide an algorithmic dimension reduction in the l_1 norm. In particular, vectors of support m in dimension d can be linearly embedded into O(m log^2 d) dimensions with polylogarithmic distortion. We can reconstruct a vector from its low-dimensional sketch in time O(m log^2(m) log^2(d)). Furthermore, this reconstruction is stable and robust under small perturbations.
[ { "version": "v1", "created": "Sat, 19 Aug 2006 01:55:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Gilbert", "A. C.", "" ], [ "Strauss", "M. J.", "" ], [ "Tropp", "J. A.", "" ], [ "Vershynin", "R.", "" ] ]
cs/0608080
Hao Chen
Hao Chen and Jianhua Li
Lower Bounds on the Algebraic Immunity of Boolean Functions
null
null
null
null
cs.CR
null
From the motivation of algebraic attacks to stream and block ciphers([1,2,7,13,14,15]), the concept of {\em algebraic immunity} (AI) was introduced in [21] and studied in [3,5,10,11,17,18,19,20,21]. High algebraic immunity is a necessary condition for resisting algebraic attacks. In this paper, we give some lower bounds on algebraic immunity of Boolean functions. The results are applied to give lower bounds on AI of symmetric Boolean functions and rotation symmetric Boolean functions. Some balanced rotation symmetric Boolean functions with their AI near the maximum possible value $\lceil \frac{n}{2}\rceil$ are constructed.
[ { "version": "v1", "created": "Sat, 19 Aug 2006 02:46:28 GMT" }, { "version": "v2", "created": "Sun, 27 Aug 2006 02:59:30 GMT" }, { "version": "v3", "created": "Sun, 3 Sep 2006 02:47:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Chen", "Hao", "" ], [ "Li", "Jianhua", "" ] ]
cs/0608082
S. M. Nazrul Alam
S. M. Nazrul Alam and Peter Marbach
Competition and Request Routing Policies in Content Delivery Networks
null
null
null
null
cs.NI
null
The role of competition and monetary benefits in the design of Content Delivery Networks (CDNs) is largely an unexplored area. In this paper, we investigate the effect of competition among the competitive web based CDNs and show that little difference in their performance may cause significant financial gain/loss. It turns out that the economy of scale effect is very significant for the success of a CDN in a competitive market. So CDN peering might be a good idea. Since performance and conforming to the service level agreement (SLA) with content providers is very important, we then focus on designing CDN from this perspective. We provide an asymptotically optimal static request routing policy for a CDN under a model where a CDN company guarantees a certain level of user latency to the content providers in the SLA.
[ { "version": "v1", "created": "Sun, 20 Aug 2006 04:00:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Alam", "S. M. Nazrul", "" ], [ "Marbach", "Peter", "" ] ]
cs/0608083
Paul M. Aoki
Paul M. Aoki, Margaret H. Szymanski, Luke Plurkowski, James D. Thornton, Allison Woodruff, Weilie Yi
Where's the "Party" in "Multi-Party"? Analyzing the Structure of Small-Group Sociable Talk
10 pages
Proc. ACM Conf. on Computer Supported Cooperative Work, Banff, Alberta, Canada, Nov. 2006, 393-402. ACM Press.
10.1145/1180875.1180934
null
cs.HC
null
Spontaneous multi-party interaction - conversation among groups of three or more participants - is part of daily life. While automated modeling of such interactions has received increased attention in ubiquitous computing research, there is little applied research on the organization of this highly dynamic and spontaneous sociable interaction within small groups. We report here on an applied conversation analytic study of small-group sociable talk, emphasizing structural and temporal aspects that can inform computational models. In particular, we examine the mechanics of multiple simultaneous conversational floors - how participants initiate a new floor amidst an on-going floor, and how they subsequently show their affiliation with one floor over another. We also discuss the implications of these findings for the design of "smart" multi-party applications.
[ { "version": "v1", "created": "Mon, 21 Aug 2006 01:42:52 GMT" }, { "version": "v2", "created": "Thu, 14 Sep 2006 03:57:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Aoki", "Paul M.", "" ], [ "Szymanski", "Margaret H.", "" ], [ "Plurkowski", "Luke", "" ], [ "Thornton", "James D.", "" ], [ "Woodruff", "Allison", "" ], [ "Yi", "Weilie", "" ] ]
cs/0608084
James Aspnes
Dana Angluin and James Aspnes and David Eisenstat and Eric Ruppert
The computational power of population protocols
Combined version of OPODIS 2005 and PODC 2006 papers; submitted to Distributed Computing
null
null
null
cs.CC cs.DC
null
We consider the model of population protocols introduced by Angluin et al., in which anonymous finite-state agents stably compute a predicate of the multiset of their inputs via two-way interactions in the all-pairs family of communication networks. We prove that all predicates stably computable in this model (and certain generalizations of it) are semilinear, answering a central open question about the power of the model. Removing the assumption of two-way interaction, we also consider several variants of the model in which agents communicate by anonymous message-passing where the recipient of each message is chosen by an adversary and the sender is not identified to the recipient. These one-way models are distinguished by whether messages are delivered immediately or after a delay, whether a sender can record that it has sent a message, and whether a recipient can queue incoming messages, refusing to accept new messages until it has had a chance to send out messages of its own. We characterize the classes of predicates stably computable in each of these one-way models using natural subclasses of the semilinear predicates.
[ { "version": "v1", "created": "Mon, 21 Aug 2006 23:17:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Angluin", "Dana", "" ], [ "Aspnes", "James", "" ], [ "Eisenstat", "David", "" ], [ "Ruppert", "Eric", "" ] ]
cs/0608088
Petter Holme
Petter Holme, Josh Karlin, Stephanie Forrest
Radial Structure of the Internet
null
Proc. R. Soc. A 463, (2007) 1231-1246
10.1098/rspa.2007.1820
null
cs.NI physics.soc-ph
null
The structure of the Internet at the Autonomous System (AS) level has been studied by both the Physics and Computer Science communities. We extend this work to include features of the core and the periphery, taking a radial perspective on AS network structure. New methods for plotting AS data are described, and they are used to analyze data sets that have been extended to contain edges missing from earlier collections. In particular, the average distance from one vertex to the rest of the network is used as the baseline metric for investigating radial structure. Common vertex-specific quantities are plotted against this metric to reveal distinctive characteristics of central and peripheral vertices. Two data sets are analyzed using these measures as well as two common generative models (Barabasi-Albert and Inet). We find a clear distinction between the highly connected core and a sparse periphery. We also find that the periphery has a more complex structure than that predicted by degree distribution or the two generative models.
[ { "version": "v1", "created": "Tue, 22 Aug 2006 22:33:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Holme", "Petter", "" ], [ "Karlin", "Josh", "" ], [ "Forrest", "Stephanie", "" ] ]
cs/0608091
Jan Van den Bussche
Floris Geerts, Peter Revesz, Jan Van den Bussche
On-line topological simplification of weighted graphs
This is the full techreport corresponding to the paper "On-line maintenance of simplified weighted graphs for efficient distance queries" in the proceedings of ACM-GIS 2006
Proceedings ACM-GIS 2006, ACM Press
null
null
cs.DS cs.DB
null
We describe two efficient on-line algorithms to simplify weighted graphs by eliminating degree-two vertices. Our algorithms are on-line in that they react to updates on the data, keeping the simplification up-to-date. The supported updates are insertions of vertices and edges; hence, our algorithms are partially dynamic. We provide both analytical and empirical evaluations of the efficiency of our approaches. Specifically, we prove an O(log n) upper bound on the amortized time complexity of our maintenance algorithms, with n the number of insertions.
[ { "version": "v1", "created": "Wed, 23 Aug 2006 20:08:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Geerts", "Floris", "" ], [ "Revesz", "Peter", "" ], [ "Bussche", "Jan Van den", "" ] ]
cs/0608092
Danny Dolev
Ariel Daliot and Danny Dolev
Self-Stabilizing Byzantine Pulse Synchronization
An updated version. The original version appeared as TR-2005-84, The Hebrew university, Aug. 2005
null
null
TR-2005-84
cs.DC
null
The ``Pulse Synchronization'' problem can be loosely described as targeting to invoke a recurring distributed event as simultaneously as possible at the different nodes and with a frequency that is as regular as possible. This target becomes surprisingly subtle and difficult to achieve when facing both transient and permanent failures. In this paper we present an algorithm for pulse synchronization that self-stabilizes while at the same time tolerating a permanent presence of Byzantine faults. The Byzantine nodes might incessantly try to de-synchronize the correct nodes. Transient failures might throw the system into an arbitrary state in which correct nodes have no common notion what-so-ever, such as time or round numbers, and can thus not infer anything from their own local states upon the state of other correct nodes. The presented algorithm grants nodes the ability to infer that eventually all correct nodes will invoke their pulses within a very short time interval of each other and will do so regularly. Pulse synchronization has previously been shown to be a powerful tool for designing general self-stabilizing Byzantine algorithms and is hitherto the only method that provides for the general design of efficient practical protocols in the confluence of these two fault models. The difficulty, in general, to design any algorithm in this fault model may be indicated by the remarkably few algorithms resilient to both fault models. The few published self-stabilizing Byzantine algorithms are typically complicated and sometimes converge from an arbitrary initial state only after exponential or super exponential time.
[ { "version": "v1", "created": "Thu, 24 Aug 2006 16:07:07 GMT" }, { "version": "v2", "created": "Fri, 25 Aug 2006 03:24:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Daliot", "Ariel", "" ], [ "Dolev", "Danny", "" ] ]
cs/0608093
Alexander Evako
Alexander Evako
Connection between continuous and digital n-manifolds and the Poincare conjecture
39 pages, 26 figures
null
null
null
cs.DM cs.CV math.AT
null
We introduce LCL covers of closed n-dimensional manifolds by n-dimensional disks and study their properties. We show that any LCL cover of an n-dimensional sphere can be converted to the minimal LCL cover, which consists of 2n+2 disks. We prove that an LCL collection of n-disks is a cover of a continuous n-sphere if and only if the intersection graph of this collection is a digital n-sphere. Using a link between LCL covers of closed continuous n-manifolds and digital n-manifolds, we find conditions where a continuous closed three-dimensional manifold is the three-dimensional sphere. We discuss a connection between the classification problems for closed continuous three-dimensional manifolds and digital three-manifolds.
[ { "version": "v1", "created": "Thu, 24 Aug 2006 17:45:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Evako", "Alexander", "" ] ]
cs/0608096
Danny Dolev
Ariel Daliot, Danny Dolev and Hanna Parnas
Linear-time Self-stabilizing Byzantine Clock Synchronization
This is a corrected version. The original paper appeared in OPODIS'03
Proc. of 7th International Conference on Principles of Distributed Systems (OPODIS'03 La Martinique, France), December, 2003
null
null
cs.DC
null
Clock synchronization is a very fundamental task in distributed system. It thus makes sense to require an underlying clock synchronization mechanism to be highly fault-tolerant. A self-stabilizing algorithm seeks to attain synchronization once lost; a Byzantine algorithm assumes synchronization is never lost and focuses on containing the influence of the permanent presence of faulty nodes. There are efficient self-stabilizing solutions for clock synchronization as well as efficient solutions that are resilient to Byzantine faults. In contrast, to the best of our knowledge there is no practical solution that is self-stabilizing while tolerating the permanent presence of Byzantine nodes. We present the first linear-time self-stabilizing Byzantine clock synchronization algorithm. Our deterministic clock synchronization algorithm is based on the observation that all clock synchronization algorithms require events for exchanging clock values and re-synchronizing the clocks to within safe bounds. These events usually need to happen synchronously at the different nodes. In classic Byzantine algorithms this is fulfilled or aided by having the clocks initially close to each other and thus the actual clock values can be used for synchronizing the events. This implies that clock values cannot differ arbitrarily, which necessarily renders these solutions to be non-stabilizing. Our scheme suggests using an underlying distributed pulse synchronization module that is uncorrelated to the clock values.
[ { "version": "v1", "created": "Fri, 25 Aug 2006 03:11:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Daliot", "Ariel", "" ], [ "Dolev", "Danny", "" ], [ "Parnas", "Hanna", "" ] ]
cs/0608098
Arvind Parthasarathy
Arvind Parthasarathy
Improved Content Based Image Watermarking
24 pages
null
null
null
cs.CR
null
This paper presents a robust and transparent scheme of watermarking that exploits the human visual systems' sensitivity to frequency, along with local image characteristics obtained from the spatial domain. The underlying idea is generating a visual mask based on the visual systems' perception of image content. This mask is used to embed a decimal sequence while keeping its amplitude below the distortion sensitivity of the image pixel. We consider texture, luminance, corner and the edge information in the image to generate a mask that makes the addition of the watermark imperceptible to the human eye.
[ { "version": "v1", "created": "Fri, 25 Aug 2006 12:55:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Parthasarathy", "Arvind", "" ] ]
cs/0608099
Tomi Janhunen
Tomi Janhunen and Emilia Oikarinen
Automated verification of weak equivalence within the SMODELS system
48 pages, 7 figures, 2 tables
null
null
null
cs.AI cs.LO
null
In answer set programming (ASP), a problem at hand is solved by (i) writing a logic program whose answer sets correspond to the solutions of the problem, and by (ii) computing the answer sets of the program using an answer set solver as a search engine. Typically, a programmer creates a series of gradually improving logic programs for a particular problem when optimizing program length and execution time on a particular solver. This leads the programmer to a meta-level problem of ensuring that the programs are equivalent, i.e., they give rise to the same answer sets. To ease answer set programming at methodological level, we propose a translation-based method for verifying the equivalence of logic programs. The basic idea is to translate logic programs P and Q under consideration into a single logic program EQT(P,Q) whose answer sets (if such exist) yield counter-examples to the equivalence of P and Q. The method is developed here in a slightly more general setting by taking the visibility of atoms properly into account when comparing answer sets. The translation-based approach presented in the paper has been implemented as a translator called lpeq that enables the verification of weak equivalence within the smodels system using the same search engine as for the search of models. Our experiments with lpeq and smodels suggest that establishing the equivalence of logic programs in this way is in certain cases much faster than naive cross-checking of answer sets.
[ { "version": "v1", "created": "Fri, 25 Aug 2006 13:12:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Janhunen", "Tomi", "" ], [ "Oikarinen", "Emilia", "" ] ]
cs/0608101
Gregory Gutin
G. Gutin, A. Rafiey, A. Yeo
Minimum Cost Homomorphisms to Semicomplete Bipartite Digraphs
null
null
null
null
cs.DM cs.CC
null
For digraphs $D$ and $H$, a mapping $f: V(D)\dom V(H)$ is a homomorphism of $D$ to $H$ if $uv\in A(D)$ implies $f(u)f(v)\in A(H).$ If, moreover, each vertex $u \in V(D)$ is associated with costs $c_i(u), i \in V(H)$, then the cost of the homomorphism $f$ is $\sum_{u\in V(D)}c_{f(u)}(u)$. For each fixed digraph $H$, we have the {\em minimum cost homomorphism problem for} $H$. The problem is to decide, for an input graph $D$ with costs $c_i(u),$ $u \in V(D), i\in V(H)$, whether there exists a homomorphism of $D$ to $H$ and, if one exists, to find one of minimum cost. Minimum cost homomorphism problems encompass (or are related to) many well studied optimization problems. We describe a dichotomy of the minimum cost homomorphism problem for semicomplete multipartite digraphs $H$. This solves an open problem from an earlier paper. To obtain the dichotomy of this paper, we introduce and study a new notion, a $k$-Min-Max ordering of digraphs.
[ { "version": "v1", "created": "Fri, 25 Aug 2006 17:47:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Gutin", "G.", "" ], [ "Rafiey", "A.", "" ], [ "Yeo", "A.", "" ] ]
cs/0608102
Jochen Mundinger
Jochen Mundinger, Jean-Yves Le Boudec
Analysis of a Reputation System for Mobile Ad-Hoc Networks with Liars
17 pages, 6 figures
null
null
LCA-REPORT-2006-009
cs.PF
null
The application of decentralized reputation systems is a promising approach to ensure cooperation and fairness, as well as to address random failures and malicious attacks in Mobile Ad-Hoc Networks. However, they are potentially vulnerable to liars. With our work, we provide a first step to analyzing robustness of a reputation system based on a deviation test. Using a mean-field approach to our stochastic process model, we show that liars have no impact unless their number exceeds a certain threshold (phase transition). We give precise formulae for the critical values and thus provide guidelines for an optimal choice of parameters.
[ { "version": "v1", "created": "Fri, 25 Aug 2006 18:12:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Mundinger", "Jochen", "" ], [ "Boudec", "Jean-Yves Le", "" ] ]
cs/0608103
Miroslaw Truszczynski
V.W. Marek, I. Niemela and M. Truszczynski]
Logic programs with monotone abstract constraint atoms
33 pages
null
null
null
cs.AI cs.LO
null
We introduce and study logic programs whose clauses are built out of monotone constraint atoms. We show that the operational concept of the one-step provability operator generalizes to programs with monotone constraint atoms, but the generalization involves nondeterminism. Our main results demonstrate that our formalism is a common generalization of (1) normal logic programming with its semantics of models, supported models and stable models, (2) logic programming with weight atoms (lparse programs) with the semantics of stable models, as defined by Niemela, Simons and Soininen, and (3) of disjunctive logic programming with the possible-model semantics of Sakama and Inoue.
[ { "version": "v1", "created": "Fri, 25 Aug 2006 18:24:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Marek", "V. W.", "" ], [ "Niemela", "I.", "" ], [ "Truszczynski]", "M.", "" ] ]
cs/0608105
Hui Guo
Hui Guo, Ying Jiang
Application Layer Definition and Analyses of Controller Area Network Bus for Wire Harness Assembly Machine
6 pages, 2 figures, 4 tables
null
null
null
cs.RO cs.NI
null
With the feature of multi-master bus access, nondestructive contention-based arbitration and flexible configuration, Controller Area Network (CAN) bus is applied into the control system of Wire Harness Assembly Machine (WHAM). To accomplish desired goal, the specific features of the CAN bus is analyzed by compared with other field buses and the functional performances in the CAN bus system of WHAM is discussed. Then the application layer planning of CAN bus for dynamic priority is presented. The critical issue for the use of CAN bus system in WHAM is the data transfer rate between different nodes. So processing efficient model is introduced to assist analyzing data transfer procedure. Through the model, it is convenient to verify the real time feature of the CAN bus system in WHAM.
[ { "version": "v1", "created": "Mon, 28 Aug 2006 12:42:38 GMT" }, { "version": "v2", "created": "Thu, 31 Aug 2006 13:40:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Guo", "Hui", "" ], [ "Jiang", "Ying", "" ] ]
cs/0608106
Philippe Moser
Philippe Moser
Lp Computable Functions and Fourier Series
corrected abstract
null
null
null
cs.CC
null
This paper studies how well computable functions can be approximated by their Fourier series. To this end, we equip the space of Lp-computable functions (computable Lebesgue integrable functions) with a size notion, by introducing Lp-computable Baire categories. We show that Lp-computable Baire categories satisfy the following three basic properties. Singleton sets {f} (where f is Lp-computable) are meager, suitable infinite unions of meager sets are meager, and the whole space of Lp-computable functions is not meager. We give an alternative characterization of meager sets via Banach Mazur games. We study the convergence of Fourier series for Lp-computable functions and show that whereas for every p>1, the Fourier series of every Lp-computable function f converges to f in the Lp norm, the set of L1-computable functions whose Fourier series does not diverge almost everywhere is meager.
[ { "version": "v1", "created": "Mon, 28 Aug 2006 12:50:36 GMT" }, { "version": "v2", "created": "Tue, 8 May 2007 09:03:15 GMT" }, { "version": "v3", "created": "Fri, 11 May 2007 12:44:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Moser", "Philippe", "" ] ]
cs/0608108
Nicolas Brodu
Nicolas Brodu
Spherical Indexing for Neighborhood Queries
9 pages, 10 figures. The source code is available at http://nicolas.brodu.free.fr/en/programmation/neighand/index.html
null
null
null
cs.DS cs.CG
null
This is an algorithm for finding neighbors when the objects can freely move and have no predefined position. The query consists in finding neighbors for a center location and a given radius. Space is discretized in cubic cells. This algorithm introduces a direct spherical indexing that gives the list of all cells making up the query sphere, for any radius and any center location. It can additionally take in account both cyclic and non-cyclic regions of interest. Finding only the K nearest neighbors naturally benefits from the spherical indexing by minimally running through the sphere from center to edge, and reducing the maximum distance when K neighbors have been found.
[ { "version": "v1", "created": "Tue, 29 Aug 2006 00:12:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Brodu", "Nicolas", "" ] ]
cs/0608110
Robert Colvin
Robert Colvin, Ian J. Hayes and Paul Strooper
Calculating modules in contextual logic program refinement
null
null
null
null
cs.LO
null
The refinement calculus for logic programs is a framework for deriving logic programs from specifications. It is based on a wide-spectrum language that can express both specifications and code, and a refinement relation that models the notion of correct implementation. In this paper we extend and generalise earlier work on contextual refinement. Contextual refinement simplifies the refinement process by abstractly capturing the context of a subcomponent of a program, which typically includes information about the values of the free variables. This paper also extends and generalises module refinement. A module is a collection of procedures that operate on a common data type; module refinement between a specification module A and an implementation module C allows calls to the procedures of A to be systematically replaced with calls to the corresponding procedures of C. Based on the conditions for module refinement, we present a method for calculating an implementation module from a specification module. Both contextual and module refinement within the refinement calculus have been generalised from earlier work and the results are presented in a unified framework.
[ { "version": "v1", "created": "Tue, 29 Aug 2006 05:31:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Colvin", "Robert", "" ], [ "Hayes", "Ian J.", "" ], [ "Strooper", "Paul", "" ] ]
cs/0608112
Benoit Hudzia
B. Hudzia, L. McDermott, T.N. Illahi and M-T. Kechadi
Entity Based Peer-to-Peer in a Data Grid Environment
null
B. Hudzia, L. McDermott, T.N. Illahi, and M-T. Kechadi, "Entity Based Peer-to-Peer in a Data Grid Environment", The 17th IMACS World Congress Scientific Computation, Applied Mathematics and Simulation, Paris, France, July, 11-15, 2005
null
null
cs.DC
null
During the last decade there has been a huge interest in Grid technologies, and numerous Grid projects have been initiated with various visions of the Grid. While all these visions have the same goal of resource sharing, they differ in the functionality that a Grid supports, the grid characterisation, programming environments, etc. In this paper we present a new Grid system dedicated to deal with data issues, called DGET (Data Grid Environment and Tools). DGET is characterized by its peer-to-peer communication system and entity-based architecture, therefore, taking advantage of the main functionality of both systems; P2P and Grid. DGET is currently under development and a prototype implementing the main components is in its first phase of testing. In this paper we limit our description to the system architectural features and to the main differences with other systems.
[ { "version": "v1", "created": "Tue, 29 Aug 2006 11:58:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Hudzia", "B.", "" ], [ "McDermott", "L.", "" ], [ "Illahi", "T. N.", "" ], [ "Kechadi", "M-T.", "" ] ]
cs/0608113
Benoit Hudzia
B. Hudzia, T. N. Ellahi, L. McDermott, T. Kechadi
A Java Based Architecture of P2P-Grid Middleware
null
B. Hudzia, T. N. Ellahi, L. McDermott, T. Kechadi, 'A Java Based Architecture of P2P-Grid Middleware', The 2006 International Conference on Parallel and Distributed Processing Techniques and Applications, June 26-29, 2006, Las Vegas, USA
null
null
cs.DC
null
During the last decade there has been a huge interest in Grid technologies, and numerous Grid projects have been initiated with various visions of the Grid. While all these visions have the same goal of resource sharing, they differ in the functionality that a Grid supports, characterization, programming environments, etc. We present a new Grid system dedicated to dealing with data issues, called DGET (Data Grid Environment and Tools). DGET is characterized by its peerto- peer communication system and entity-based architecture, therefore, taking advantage of the main functionality of both systems; P2P and Grid. DGET is currently under development and a prototype implementing the main components is in its first phase of testing. In this paper we limit our description to the system architectural features and to the main differences with other systems. Keywords: Grid Computing, Peer to Peer, Peer to Peer Grid
[ { "version": "v1", "created": "Tue, 29 Aug 2006 13:11:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Hudzia", "B.", "" ], [ "Ellahi", "T. N.", "" ], [ "McDermott", "L.", "" ], [ "Kechadi", "T.", "" ] ]
cs/0608114
Benoit Hudzia
Benoit Hudzia and Serge Petiton
Reliable multicast fault tolerant MPI in the Grid environment
null
Benoit Hudzia and Serge Petiton, "Reliable multicast fault tolerant MPI in the Grid environment", International Conference GRIDnet, october 2004
null
null
cs.DC
null
Grid environments have recently been developed with low stretch and overheads that increase with the logarithm of the number of nodes in the system. Getting and sending data to/from a large numbers of nodes is gaining importance due to an increasing number of independent data providers and the heterogeneity of the network/Grid. One of the key challenges is to achieve a balance between low bandwidth consumption and good reliability. In this paper we present an implementation of a reliable multicast protocol over a fault tolerant MPI: MPICHV2. It can provide one way to solve the problem of transferring large chunks of data between applications running on a grid with limited network links. We first show that we can achieve similar performance as the MPICH-P4 implementation by using multicast with data compression in a cluster. Next, we provide a theoretical cluster organization and GRID network architecture to harness the performance provided by using multicast. Finally, we present the conclusion and future work.
[ { "version": "v1", "created": "Tue, 29 Aug 2006 13:14:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Hudzia", "Benoit", "" ], [ "Petiton", "Serge", "" ] ]
cs/0608115
Leonid Litinskii
Leonid B. Litinskii, Dmitry E. Romanov
Neural Network Clustering Based on Distances Between Objects
7 pages,4 figures, presentation on ICANN (Athens, Greece, 2006)
null
null
null
cs.CV cs.NE
null
We present an algorithm of clustering of many-dimensional objects, where only the distances between objects are used. Centers of classes are found with the aid of neuron-like procedure with lateral inhibition. The result of clustering does not depend on starting conditions. Our algorithm makes it possible to give an idea about classes that really exist in the empirical data. The results of computer simulations are presented.
[ { "version": "v1", "created": "Tue, 29 Aug 2006 13:24:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Litinskii", "Leonid B.", "" ], [ "Romanov", "Dmitry E.", "" ] ]
cs/0608116
Benoit Hudzia
T. N. Ellahi, B. Hudzia, L. McDermott, T. Kechadi
Transparent Migration of Multi-Threaded Applications on a Java Based Grid
null
T. N. Ellahi, B. Hudzia, L. McDermott, T. Kechadi, Transparent Migration of Multi-Threaded Applications on a Java Based Grid, The IASTED International Conference on Web Technologies, Applications, and Services (WTAS 2006), July 17-19, 2006, Alberta, Canada
null
null
cs.DC
null
Grid computing has enabled pooling a very large number of heterogeneous resource administered by different security domains. Applications are dynamically deployed on the resources available at the time. Dynamic nature of the resources and applications requirements makes needs the grid middleware to support the ability of migrating a running application to a different resource. Especially, Grid applications are typically long running and thus stoping them and starting them from scratch is not a feasible option. This paper presents an overview of migration support in a java based grid middleware called DGET. Migration support in DGET includes multi-threaded migration and asynchronous migration as well.
[ { "version": "v1", "created": "Tue, 29 Aug 2006 13:29:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Ellahi", "T. N.", "" ], [ "Hudzia", "B.", "" ], [ "McDermott", "L.", "" ], [ "Kechadi", "T.", "" ] ]
cs/0608118
Benoit Hudzia
B. Hudzia, M-T. Kechadi and A. Ottewill
TreeP: A Tree-Based P2P Network Architecture
null
B. Hudzia, M-T. Kechadi, and A. Ottewill, "TreeP: A Tree-Based P2P Network Architecture", International Workshop on Algorithms, Models and tools for parallel computing on heterogeneous networks (HeteroPar' 05), Boston, Massachusetts, USA, September 27-30, 2005
null
null
cs.DC
null
In this paper we proposed a hierarchical P2P network based on a dynamic partitioning on a 1-D space. This hierarchy is created and maintained dynamically and provides a gridmiddleware (like DGET) a P2P basic functionality for resource discovery and load-balancing.This network architecture is called TreeP (Tree based P2P network architecture) and is based on atessellation of a 1-D space. We show that this topology exploits in an efficient way theheterogeneity feature of the network while limiting the overhead introduced by the overlaymaintenance. Experimental results show that this topology is highly resilient to a large number ofnetwork failures.
[ { "version": "v1", "created": "Tue, 29 Aug 2006 15:08:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Hudzia", "B.", "" ], [ "Kechadi", "M-T.", "" ], [ "Ottewill", "A.", "" ] ]
cs/0608119
Shiguo Lian
Shiguo Lian, Jinsheng Sun, Zhiquan Wang
Security Analysis of A Chaos-based Image Encryption Algorithm
16 pages,4 figures
null
null
null
cs.MM cs.CR
null
The security of Fridrich Image Encryption Algorithm against brute-force attack, statistical attack, known-plaintext attack and select-plaintext attack is analyzed by investigating the properties of the involved chaotic maps and diffusion functions. Based on the given analyses, some means are proposed to strengthen the overall performance of the focused cryptosystem.
[ { "version": "v1", "created": "Wed, 30 Aug 2006 03:22:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Lian", "Shiguo", "" ], [ "Sun", "Jinsheng", "" ], [ "Wang", "Zhiquan", "" ] ]
cs/0608120
Thierry Cachat
Thierry Cachat (LIAFA)
Controller synthesis & Ordinal Automata
with appendix
Proceedings of the 4th International Symposium on Automated Technology for Verification and Analysis (ATVA'06) Springer (Ed.) (2006) 215-228
null
null
cs.GT
null
Ordinal automata are used to model physical systems with Zeno behavior. Using automata and games techniques we solve a control problem formulated and left open by Demri and Nowak in 2005. It involves partial observability and a new synchronization between the controller and the environment.
[ { "version": "v1", "created": "Wed, 30 Aug 2006 09:58:08 GMT" }, { "version": "v2", "created": "Mon, 30 Oct 2006 11:04:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Cachat", "Thierry", "", "LIAFA" ] ]
cs/0609003
Emanuel Diamant
Emanuel Diamant
In Quest of Image Semantics: Are We Looking for It Under the Right Lamppost?
In 2006, this paper has been submitted to 13 computer vision conferences, and was strongly rejected by 12 of them
null
null
null
cs.CV cs.IR
null
In the last years we witness a dramatic growth of research focused on semantic image understanding. Indeed, without understanding image content successful accomplishment of any image-processing task is simply incredible. Up to the recent times, the ultimate need for such understanding has been met by the knowledge that a domain expert or a vision system supervisor have contributed to every image-processing application. The advent of the Internet has drastically changed this situation. Internet sources of visual information are diffused and dispersed over the whole Web, so the duty of information content discovery and evaluation must be relegated now to an image understanding agent (a machine or a computer program) capable to perform image content assessment at a remote image location. Development of Content Based Image Retrieval (CBIR) techniques was a right move in a right direction, launched about ten years ago. Unfortunately, very little progress has been made since then. The reason for this can be seen in a rank of long lasting misconceptions that CBIR designers are continuing to adhere to. I hope, my arguments will help them to change their minds.
[ { "version": "v1", "created": "Sat, 2 Sep 2006 11:50:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Diamant", "Emanuel", "" ] ]
cs/0609004
Moustapha Diaby
Moustapha Diaby
Equality of complexity classes P and NP: Linear programming formulation of the quadratic assignment problem
6 pages; Published in the 2006 IMECS Conference Proceedings (ISBN: 988 98671-3-3); Hofman's claimed "counter-example" is invalid: violates set of constraints 2.10
null
null
null
cs.CC cs.DM
null
In this paper, we present a polynomial-sized linear programming formulation of the Quadratic Assignment Problem (QAP). The proposed linear program is a network flow-based model. Hence, it provides for the solution of the QAP in polynomial time. Computational testing and results are discussed.
[ { "version": "v1", "created": "Sat, 2 Sep 2006 09:12:27 GMT" }, { "version": "v2", "created": "Wed, 20 Sep 2006 18:45:01 GMT" }, { "version": "v3", "created": "Thu, 21 Sep 2006 01:39:27 GMT" }, { "version": "v4", "created": "Sun, 1 Oct 2006 19:25:04 GMT" }, { "version": "v5", "created": "Wed, 4 Oct 2006 18:43:28 GMT" }, { "version": "v6", "created": "Sun, 22 Oct 2006 13:20:38 GMT" }, { "version": "v7", "created": "Fri, 10 Nov 2006 08:48:05 GMT" }, { "version": "v8", "created": "Wed, 27 Dec 2006 23:44:18 GMT" }, { "version": "v9", "created": "Sun, 13 May 2007 21:04:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Diaby", "Moustapha", "" ] ]
cs/0609007
Vladislav Malyshkin
Vladislav Malyshkin, Ray Bakhramov, Andrey Gorodetsky
A Massive Local Rules Search Approach to the Classification Problem
24 pages
null
null
null
cs.LG
null
An approach to the classification problem of machine learning, based on building local classification rules, is developed. The local rules are considered as projections of the global classification rules to the event we want to classify. A massive global optimization algorithm is used for optimization of quality criterion. The algorithm, which has polynomial complexity in typical case, is used to find all high--quality local rules. The other distinctive feature of the algorithm is the integration of attributes levels selection (for ordered attributes) with rules searching and original conflicting rules resolution strategy. The algorithm is practical; it was tested on a number of data sets from UCI repository, and a comparison with the other predicting techniques is presented.
[ { "version": "v1", "created": "Sun, 3 Sep 2006 21:30:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Malyshkin", "Vladislav", "" ], [ "Bakhramov", "Ray", "" ], [ "Gorodetsky", "Andrey", "" ] ]
cs/0609008
David Nowak
St\'ephane Demri, Ranko Lazic, David Nowak
On the freeze quantifier in Constraint LTL: decidability and complexity
29 pages
Information and Computation, 205(1):2-24, January 2007
10.1016/j.ic.2006.08.003
null
cs.LO cs.CC
null
Constraint LTL, a generalisation of LTL over Presburger constraints, is often used as a formal language to specify the behavior of operational models with constraints. The freeze quantifier can be part of the language, as in some real-time logics, but this variable-binding mechanism is quite general and ubiquitous in many logical languages (first-order temporal logics, hybrid logics, logics for sequence diagrams, navigation logics, logics with lambda-abstraction etc.). We show that Constraint LTL over the simple domain (N,=) augmented with the freeze quantifier is undecidable which is a surprising result in view of the poor language for constraints (only equality tests). Many versions of freeze-free Constraint LTL are decidable over domains with qualitative predicates and our undecidability result actually establishes Sigma_1^1-completeness. On the positive side, we provide complexity results when the domain is finite (EXPSPACE-completeness) or when the formulae are flat in a sense introduced in the paper. Our undecidability results are sharp (i.e. with restrictions on the number of variables) and all our complexity characterisations ensure completeness with respect to some complexity class (mainly PSPACE and EXPSPACE).
[ { "version": "v1", "created": "Mon, 4 Sep 2006 06:20:03 GMT" }, { "version": "v2", "created": "Fri, 29 Sep 2006 09:36:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Demri", "Stéphane", "" ], [ "Lazic", "Ranko", "" ], [ "Nowak", "David", "" ] ]
cs/0609009
Virginia Vassilevska
Virginia Vassilevska, Ryan Williams and Raphael Yuster
Finding heaviest H-subgraphs in real weighted graphs, with applications
23 pages
null
null
null
cs.DS cs.DM
null
For a graph G with real weights assigned to the vertices (edges), the MAX H-SUBGRAPH problem is to find an H-subgraph of G with maximum total weight, if one exists. The all-pairs MAX H-SUBGRAPH problem is to find for every pair of vertices u,v, a maximum H-subgraph containing both u and v, if one exists. Our main results are new strongly polynomial algorithms for the all-pairs MAX H-SUBGRAPH problem for vertex weighted graphs. We also give improved algorithms for the MAX-H SUBGRAPH problem for edge weighted graphs, and various related problems, including computing the first k most significant bits of the distance product of two matrices. Some of our algorithms are based, in part, on fast matrix multiplication.
[ { "version": "v1", "created": "Mon, 4 Sep 2006 08:08:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Vassilevska", "Virginia", "" ], [ "Williams", "Ryan", "" ], [ "Yuster", "Raphael", "" ] ]
cs/0609010
Artur Rataj
Artur Rataj
An effective edge--directed frequency filter for removal of aliasing in upsampled images
10 pages, 11 figures
null
null
null
cs.CV
null
Raster images can have a range of various distortions connected to their raster structure. Upsampling them might in effect substantially yield the raster structure of the original image, known as aliasing. The upsampling itself may introduce aliasing into the upsampled image as well. The presented method attempts to remove the aliasing using frequency filters based on the discrete fast Fourier transform, and applied directionally in certain regions placed along the edges in the image. As opposed to some anisotropic smoothing methods, the presented algorithm aims to selectively reduce only the aliasing, preserving the sharpness of image details. The method can be used as a post--processing filter along with various upsampling algorithms. It was experimentally shown that the method can improve the visual quality of the upsampled images.
[ { "version": "v1", "created": "Mon, 4 Sep 2006 13:04:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Rataj", "Artur", "" ] ]
cs/0609012
Philippe Moser
Philippe Moser
Baire Categories on Small Complexity Classes and Meager-Comeager Laws
to be published in Inform. and comp
null
null
null
cs.CC
null
We introduce two resource-bounded Baire category notions on small complexity classes such as P, SUBEXP, and PSPACE and on probabilistic classes such as BPP, which differ on how the corresponding finite extension strategies are computed. We give an alternative characterization of small sets via resource-bounded Banach-Mazur games. As an application of the first notion, we show that for almost every language A (i.e. all except a meager class) computable in subexponential time, P(A)=BPP(A). We also show that almost all languages in PSPACE do not have small nonuniform complexity. We then switch to the second Baire category notion (called locally-computable), and show that the class SPARSE is meager in P. We show that in contrast to the resource-bounded measure case, meager-comeager laws can be obtained for many standard complexity classes, relative to locally-computable Baire category on BPP and PSPACE. Another topic where locally-computable Baire categories differ from resource-bounded measure is regarding weak-completeness: we show that there is no weak-completeness notion in P based on locally-computable Baire categories, i.e. every P-weakly-complete set is complete for P. We also prove that the class of complete sets for P under Turing-logspace reductions is meager in P, if P is not equal to DSPACE(log n), and that the same holds unconditionally for quasi-poly time. Finally we observe that locally-computable Baire categories are incomparable with all existing resource-bounded measure notions on small complexity classes, which might explain why those two settings seem to differ so fundamentally.
[ { "version": "v1", "created": "Tue, 5 Sep 2006 09:02:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Moser", "Philippe", "" ] ]
cs/0609014
Julien Reynier
Julien Reynier (INRIA Rocquencourt)
A simple stability condition for RED using TCP mean-field modeling
null
null
null
null
cs.NI math.PR
null
Congestion on the Internet is an old problem but still a subject of intensive research. The TCP protocol with its AIMD (Additive Increase and Multiplicative Decrease) behavior hides very challenging problems; one of them is to understand the interaction between a large number of users with delayed feedback. This article will focus on two modeling issues of TCP which appeared to be important to tackle concrete scenarios when implementing the model proposed in [Baccelli McDonald Reynier 02] firstly the modeling of the maximum TCP window size: this maximum can be reached quickly in many practical cases; secondly the delay structure: the usual Little-like formula behaves really poorly when queuing delays are variable, and may change dramatically the evolution of the predicted queue size, which makes it useless to study drop-tail or RED (Random Early Detection) mechanisms. Within proposed TCP modeling improvements, we are enabled to look at a concrete example where RED should be used in FIFO routers instead of letting the default drop-tail happen. We study mathematically fixed points of the window size distribution and local stability of RED. An interesting case is when RED operates at the limit when the congestion starts, it avoids unwanted loss of bandwidth and delay variations.
[ { "version": "v1", "created": "Tue, 5 Sep 2006 14:27:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Reynier", "Julien", "", "INRIA Rocquencourt" ] ]
cs/0609015
Marc Tommasi
J. Carme (INRIA Futurs), R. Gilleron (INRIA Futurs), A. Lemay (INRIA Futurs), A. Terlutte (INRIA Futurs), M. Tommasi (INRIA Futurs)
Residual Finite Tree Automata
null
null
null
null
cs.CC cs.LO
null
Tree automata based algorithms are essential in many fields in computer science such as verification, specification, program analysis. They become also essential for databases with the development of standards such as XML. In this paper, we define new classes of non deterministic tree automata, namely residual finite tree automata (RFTA). In the bottom-up case, we obtain a new characterization of regular tree languages. In the top-down case, we obtain a subclass of regular tree languages which contains the class of languages recognized by deterministic top-down tree automata. RFTA also come with the property of existence of canonical non deterministic tree automata.
[ { "version": "v1", "created": "Tue, 5 Sep 2006 16:23:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Carme", "J.", "", "INRIA Futurs" ], [ "Gilleron", "R.", "", "INRIA Futurs" ], [ "Lemay", "A.", "", "INRIA\n Futurs" ], [ "Terlutte", "A.", "", "INRIA Futurs" ], [ "Tommasi", "M.", "", "INRIA Futurs" ] ]
cs/0609016
Tomasz Ciszkowski Mr
Tomasz Ciszkowski, Zbigniew Kotulski
ANAP: Anonymous Authentication Protocol in Mobile Ad hoc Networks
12 pages, 10th Domestic Conference on Applied Cryptography ENIGMA, Warsaw, Poland, May 2006, The second author's last name was corrected
null
null
null
cs.CR cs.NI
null
The pervasiveness of wireless communication recently gave mobile ad hoc networks (MANET) a significant researchers' attention, due to its innate capabilities of instant communication in many time and mission critical applications. However, its natural advantages of networking in civilian and military environments make them vulnerable to security threats. Support for an anonymity in MANET is an orthogonal to security critical challenge we faced in this paper. We propose a new anonymous authentication protocol for mobile ad hoc networks enhanced with a distributed reputation system. The main its objective is to provide mechanisms concealing a real identity of communicating nodes with an ability of resist to known attacks. The distributed reputation system is incorporated for a trust management and malicious behavior detection in the network. The end-to-end anonymous authentication is conducted in three-pass handshake based on an asymmetric and symmetric key cryptography. After successfully finished authentication phase secure and multiple anonymous data channels are established. The anonymity is guarantied by randomly chosen pseudonyms owned by a user. Nodes of the network are publicly identified and are independent of users' pseudonyms. In this paper we presented an example of the protocol implementation.
[ { "version": "v1", "created": "Tue, 5 Sep 2006 18:21:45 GMT" }, { "version": "v2", "created": "Wed, 6 Sep 2006 14:40:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Ciszkowski", "Tomasz", "" ], [ "Kotulski", "Zbigniew", "" ] ]
cs/0609017
Wolfgang Slany
Wolfgang Slany and Wolfgang Kienreich
On some winning strategies for the Iterated Prisoner's Dilemma or Mr. Nice Guy and the Cosa Nostra
null
null
null
null
cs.GT
null
We submitted two kinds of strategies to the iterated prisoner's dilemma (IPD) competitions organized by Graham Kendall, Paul Darwen and Xin Yao in 2004 and 2005. Our strategies performed exceedingly well in both years. One type is an intelligent and optimistic enhanced version of the well known TitForTat strategy which we named OmegaTitForTat. It recognizes common behaviour patterns and detects and recovers from repairable mutual defect deadlock situations, otherwise behaving much like TitForTat. The second type consists of a set of strategies working together as a team. These group strategies have one distinguished individual Godfather strategy that plays OmegaTitForTat against non-members while heavily profiting from the behaviour of the other members of his group, the Hitman. The Hitman willingly let themselves being abused by their Godfather while themselves lowering the scores of all other players as much as possible, thus further maximizing the performance of their Godfather in relation to other participants. The study of collusion in the simplified framework of the iterated prisoner's dilemma allows us to draw parallels to many common aspects of reality both in Nature as well as Human Society, and therefore further extends the scope of the iterated prisoner's dilemma as a metaphor for the study of cooperative behaviour in a new and natural direction. We further provide evidence that it will be unavoidable that such group strategies will dominate all future iterated prisoner's dilemma competitions as they can be stealthy camouflaged as non-group strategies with arbitrary subtlety. Moreover, we show that the general problem of recognizing stealth colluding strategies is undecidable in the theoretical sense.
[ { "version": "v1", "created": "Tue, 5 Sep 2006 18:42:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Slany", "Wolfgang", "" ], [ "Kienreich", "Wolfgang", "" ] ]
cs/0609019
Sophie Aubin
Sophie Aubin (LIPN), Thierry Hamon (LIPN)
Improving Term Extraction with Terminological Resources
null
Advances in Natural Language Processing 5th International Conference on NLP, FinTAL 2006 (2006) 380
null
null
cs.CL
null
Studies of different term extractors on a corpus of the biomedical domain revealed decreasing performances when applied to highly technical texts. The difficulty or impossibility of customising them to new domains is an additional limitation. In this paper, we propose to use external terminologies to influence generic linguistic data in order to augment the quality of the extraction. The tool we implemented exploits testified terms at different steps of the process: chunking, parsing and extraction of term candidates. Experiments reported here show that, using this method, more term candidates can be acquired with a higher level of reliability. We further describe the extraction process involving endogenous disambiguation implemented in the term extractor YaTeA.
[ { "version": "v1", "created": "Wed, 6 Sep 2006 11:41:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Aubin", "Sophie", "", "LIPN" ], [ "Hamon", "Thierry", "", "LIPN" ] ]
cs/0609021
Pierre Boudes
Pierre Boudes (LIPN)
Non uniform (hyper/multi)coherence spaces
32 pages
null
null
null
cs.LO
null
In (hyper)coherence semantics, proofs/terms are cliques in (hyper)graphs. Intuitively, vertices represent results of computations and the edge relation witnesses the ability of being assembled into a same piece of data or a same (strongly) stable function, at arrow types. In (hyper)coherence semantics, the argument of a (strongly) stable functional is always a (strongly) stable function. As a consequence, comparatively to the relational semantics, where there is no edge relation, some vertices are missing. Recovering these vertices is essential for the purpose of reconstructing proofs/terms from their interpretations. It shall also be useful for the comparison with other semantics, like game semantics. In [BE01], Bucciarelli and Ehrhard introduced a so called non uniform coherence space semantics where no vertex is missing. By constructing the co-free exponential we set a new version of this last semantics, together with non uniform versions of hypercoherences and multicoherences, a new semantics where an edge is a finite multiset. Thanks to the co-free construction, these non uniform semantics are deterministic in the sense that the intersection of a clique and of an anti-clique contains at most one vertex, a result of interaction, and extensionally collapse onto the corresponding uniform semantics.
[ { "version": "v1", "created": "Wed, 6 Sep 2006 12:14:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Boudes", "Pierre", "", "LIPN" ] ]
cs/0609022
Barnaby Martin
Barnaby Martin
Dichotomies and Duality in First-order Model Checking Problems
null
null
null
null
cs.LO cs.CC
null
We study the complexity of the model checking problem, for fixed model A, over certain fragments L of first-order logic. These are sometimes known as the expression complexities of L. We obtain various complexity classification theorems for these logics L as each ranges over models A, in the spirit of the dichotomy conjecture for the Constraint Satisfaction Problem -- which itself may be seen as the model checking problem for existential conjunctive positive first-order logic.
[ { "version": "v1", "created": "Wed, 6 Sep 2006 13:04:36 GMT" }, { "version": "v2", "created": "Tue, 28 Nov 2006 16:14:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Martin", "Barnaby", "" ] ]
cs/0609024
Prashant Singh
Prashant
Linux, Open Source and Unicode
10 pages, 1 figure, 1 table
null
null
null
cs.SE
null
The paper is taken out.
[ { "version": "v1", "created": "Wed, 6 Sep 2006 18:12:27 GMT" }, { "version": "v2", "created": "Thu, 11 Jan 2007 17:04:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Prashant", "", "" ] ]
cs/0609025
Prashant Singh
Prashant
A XML Schema Definition based Universal User Interface
6 pages, 5 figures
null
null
null
cs.SE
null
The article is taken out for change of contents.
[ { "version": "v1", "created": "Wed, 6 Sep 2006 18:21:23 GMT" }, { "version": "v2", "created": "Thu, 11 Jan 2007 17:03:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Prashant", "", "" ] ]
cs/0609027
Al-Mukaddim Khan Pathan
Rajkumar Buyya, Al-Mukaddim Khan Pathan, James Broberg and Zahir Tari
A Case for Peering of Content Delivery Networks
Short Article (Submitted in DS Online as Work in Progress)
null
null
null
cs.DC
null
The proliferation of Content Delivery Networks (CDN) reveals that existing content networks are owned and operated by individual companies. As a consequence, closed delivery networks are evolved which do not cooperate with other CDNs and in practice, islands of CDNs are formed. Moreover, the logical separation between contents and services in this context results in two content networking domains. But present trends in content networks and content networking capabilities give rise to the interest in interconnecting content networks. Finding ways for distinct content networks to coordinate and cooperate with other content networks is necessary for better overall service. In addition to that, meeting the QoS requirements of users according to the negotiated Service Level Agreements between the user and the content network is a burning issue in this perspective. In this article, we present an open, scalable and Service-Oriented Architecture based system to assist the creation of open Content and Service Delivery Networks (CSDN) that scale and support sharing of resources with other CSDNs.
[ { "version": "v1", "created": "Wed, 6 Sep 2006 23:41:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Buyya", "Rajkumar", "" ], [ "Pathan", "Al-Mukaddim Khan", "" ], [ "Broberg", "James", "" ], [ "Tari", "Zahir", "" ] ]
cs/0609028
Himanshu Thapliyal
Himanshu Thapliyal and M.B Srinivas
VLSI Implementation of RSA Encryption System Using Ancient Indian Vedic Mathematics
5 Pages: Proceedings of SPIE -- Volume 5837 VLSI Circuits and Systems II, Jose F. Lopez, Francisco V. Fernandez, Jose Maria Lopez-Villegas, Jose M. de la Rosa, Editors, June 2005, pp. 888-892
null
null
null
cs.AR
null
This paper proposes the hardware implementation of RSA encryption/decryption algorithm using the algorithms of Ancient Indian Vedic Mathematics that have been modified to improve performance. The recently proposed hierarchical overlay multiplier architecture is used in the RSA circuitry for multiplication operation. The most significant aspect of the paper is the development of a division architecture based on Straight Division algorithm of Ancient Indian Vedic Mathematics and embedding it in RSA encryption/decryption circuitry for improved efficiency. The coding is done in Verilog HDL and the FPGA synthesis is done using Xilinx Spartan library. The results show that RSA circuitry implemented using Vedic division and multiplication is efficient in terms of area/speed compared to its implementation using conventional multiplication and division architectures
[ { "version": "v1", "created": "Thu, 7 Sep 2006 14:18:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Thapliyal", "Himanshu", "" ], [ "Srinivas", "M. B", "" ] ]
cs/0609029
Himanshu Thapliyal
Himanshu Thapliyal and Hamid R. Arabnia
Reversible Programmable Logic Array (RPLA) using Fredkin & Feynman Gates for Industrial Electronics and Applications
Published in Proceedings of the International Conference on Embedded Systems and Applications(ESA'06),Las Vegas, U.S.A, June 2006(CSREA Press)
null
null
null
cs.AR
null
In recent years, reversible logic has emerged as a promising computing paradigm having application in low power CMOS, quantum computing, nanotechnology, and optical computing. The classical set of gates such as AND, OR, and EXOR are not reversible. In this paper, the authors have proposed reversible programmable logic array (RPLA) architecture using reversible Fredkin and Feynman gates. The proposed RPLA has n inputs and m outputs and can realize m functions of n variables. In order to demonstrate the design of RPLA, a 3 input RPLA is designed which can perform any 28 functions using the combination of 8 min terms (23). Furthermore, the application of the designed 3 input RPLA is shown by implementing the full adder and full subtractor functions through it.
[ { "version": "v1", "created": "Thu, 7 Sep 2006 14:25:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Thapliyal", "Himanshu", "" ], [ "Arabnia", "Hamid R.", "" ] ]
cs/0609031
Sreyash Kenkre
Sreyash Kenkre and Sundar Vishwanathan
Approximation Algorithms for the Bipartite Multi-cut Problem
11 pages
null
null
null
cs.CC cs.DS
null
We introduce the {\it Bipartite Multi-cut} problem. This is a generalization of the {\it st-Min-cut} problem, is similar to the {\it Multi-cut} problem (except for more stringent requirements) and also turns out to be an immediate generalization of the {\it Min UnCut} problem. We prove that this problem is {\bf NP}-hard and then present LP and SDP based approximation algorithms. While the LP algorithm is based on the Garg-Vazirani-Yannakakis algorithm for {\it Multi-cut}, the SDP algorithm uses the {\it Structure Theorem} of $\ell_2^2$ Metrics.
[ { "version": "v1", "created": "Thu, 7 Sep 2006 18:10:39 GMT" }, { "version": "v2", "created": "Tue, 26 Sep 2006 06:46:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Kenkre", "Sreyash", "" ], [ "Vishwanathan", "Sundar", "" ] ]
cs/0609032
Sumit Ganguly
Sumit Ganguly and Anirban Majumder
CR-precis: A deterministic summary structure for update data streams
11 pages
null
null
IIT Kanpur, July 1 2006
cs.DS
null
We present the \crprecis structure, that is a general-purpose, deterministic and sub-linear data structure for summarizing \emph{update} data streams. The \crprecis structure yields the \emph{first deterministic sub-linear space/time algorithms for update streams} for answering a variety of fundamental stream queries, such as, (a) point queries, (b) range queries, (c) finding approximate frequent items, (d) finding approximate quantiles, (e) finding approximate hierarchical heavy hitters, (f) estimating inner-products, (g) near-optimal $B$-bucket histograms, etc..
[ { "version": "v1", "created": "Thu, 7 Sep 2006 19:21:01 GMT" }, { "version": "v2", "created": "Sun, 17 Sep 2006 05:51:43 GMT" }, { "version": "v3", "created": "Tue, 10 Oct 2006 07:37:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Ganguly", "Sumit", "" ], [ "Majumder", "Anirban", "" ] ]