id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 3
62.8k
| title
stringlengths 1
382
| comments
stringlengths 1
1.15k
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 7
153
⌀ | report-no
stringlengths 1
509
⌀ | categories
stringlengths 5
125
| license
stringclasses 9
values | abstract
stringlengths 6
6.09k
| versions
listlengths 1
187
| update_date
timestamp[s]date 2007-05-23 00:00:00
2025-04-25 00:00:00
| authors_parsed
sequencelengths 1
2.83k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0611100 | Mirco Mannucci Ph.D. | Mirco A. Mannucci, Rose M. Cherubin | Model Theory of Ultrafinitism I: Fuzzy Initial Segments of Arithmetics | 31 pages, Tennenbaum Memorial invited talk | null | null | null | cs.LO | null | This article is the first of an intended series of works on the model theory
of Ultrafinitism. It is roughly divided into two parts. The first one addresses
some of the issues related to ultrafinitistic programs, as well as some of the
core ideas proposed thus far. The second part of the paper presents a model of
ultrafinitistic arithmetics based on the notion of fuzzy initial segments of
the standard natural numbers series. We also introduce a proof theory and a
semantics for ultrafinitism through which feasibly consistent theories can be
treated on the same footing as their classically consistent counterparts. We
conclude with a brief sketch of a foundational program, that aims at
reproducing the transfinite within the finite realm.
| [
{
"version": "v1",
"created": "Tue, 21 Nov 2006 03:05:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mannucci",
"Mirco A.",
""
],
[
"Cherubin",
"Rose M.",
""
]
] |
cs/0611102 | Hanno Langweg | Hanno Langweg and Tommy Kristiansen | Extending the Trusted Path in Client-Server Interaction | 8 pages, 3 figures | null | null | null | cs.CR | null | We present a method to secure the complete path between a server and the
local human user at a network node. This is useful for scenarios like internet
banking, electronic signatures, or online voting. Protection of input
authenticity and output integrity and authenticity is accomplished by a
combination of traditional and novel technologies, e.g., SSL, ActiveX, and
DirectX. Our approach does not require administrative privileges to deploy and
is hence suitable for consumer applications. Results are based on the
implementation of a proof-of-concept application for the Windows platform.
| [
{
"version": "v1",
"created": "Tue, 21 Nov 2006 12:13:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Langweg",
"Hanno",
""
],
[
"Kristiansen",
"Tommy",
""
]
] |
cs/0611103 | Petteri Kaski | Petteri Kaski | Barriers and local minima in energy landscapes of stochastic local
search | null | null | null | null | cs.CC cond-mat.stat-mech | null | A local search algorithm operating on an instance of a Boolean constraint
satisfaction problem (in particular, k-SAT) can be viewed as a stochastic
process traversing successive adjacent states in an ``energy landscape''
defined by the problem instance on the n-dimensional Boolean hypercube. We
investigate analytically the worst-case topography of such landscapes in the
context of satisfiable k-SAT via a random ensemble of satisfiable ``k-regular''
linear equations modulo 2.
We show that for each fixed k=3,4,..., the typical k-SAT energy landscape
induced by an instance drawn from the ensemble has a set of 2^{\Omega(n)} local
energy minima, each separated by an unconditional \Omega(n) energy barrier from
each of the O(1) ground states, that is, solution states with zero energy. The
main technical aspect of the analysis is that a random k-regular 0/1 matrix
constitutes a strong boundary expander with almost full GF(2)-linear rank, a
property which also enables us to prove a 2^{\Omega(n)} lower bound for the
expected number of steps required by the focused random walk heuristic to solve
typical instances drawn from the ensemble. These results paint a grim picture
of the worst-case topography of k-SAT for local search, and constitute
apparently the first rigorous analysis of the growth of energy barriers in a
random ensemble of k-SAT landscapes as the number of variables n is increased.
| [
{
"version": "v1",
"created": "Tue, 21 Nov 2006 12:52:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kaski",
"Petteri",
""
]
] |
cs/0611107 | Adam L. Buchsbaum | Adam L. Buchsbaum, Emden R. Gansner, Cecilia M. Procopiuc, Suresh
Venkatasubramanian | Rectangular Layouts and Contact Graphs | 28 pages, 13 figures, 55 references, 1 appendix | null | null | null | cs.DS cs.DM | null | Contact graphs of isothetic rectangles unify many concepts from applications
including VLSI and architectural design, computational geometry, and GIS.
Minimizing the area of their corresponding {\em rectangular layouts} is a key
problem. We study the area-optimization problem and show that it is NP-hard to
find a minimum-area rectangular layout of a given contact graph. We present
O(n)-time algorithms that construct $O(n^2)$-area rectangular layouts for
general contact graphs and $O(n\log n)$-area rectangular layouts for trees.
(For trees, this is an $O(\log n)$-approximation algorithm.) We also present an
infinite family of graphs (rsp., trees) that require $\Omega(n^2)$ (rsp.,
$\Omega(n\log n)$) area.
We derive these results by presenting a new characterization of graphs that
admit rectangular layouts using the related concept of {\em rectangular duals}.
A corollary to our results relates the class of graphs that admit rectangular
layouts to {\em rectangle of influence drawings}.
| [
{
"version": "v1",
"created": "Tue, 21 Nov 2006 15:03:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Buchsbaum",
"Adam L.",
""
],
[
"Gansner",
"Emden R.",
""
],
[
"Procopiuc",
"Cecilia M.",
""
],
[
"Venkatasubramanian",
"Suresh",
""
]
] |
cs/0611108 | Jon Feldman | Jon Feldman, S. Muthukrishnan, Anastasios Sidiropoulos, Cliff Stein,
Zoya Svitkina | On the Complexity of Processing Massive, Unordered, Distributed Data | null | null | null | null | cs.CC cs.DC | null | An existing approach for dealing with massive data sets is to stream over the
input in few passes and perform computations with sublinear resources. This
method does not work for truly massive data where even making a single pass
over the data with a processor is prohibitive. Successful log processing
systems in practice such as Google's MapReduce and Apache's Hadoop use multiple
machines. They efficiently perform a certain class of highly distributable
computations defined by local computations that can be applied in any order to
the input.
Motivated by the success of these systems, we introduce a simple algorithmic
model for massive, unordered, distributed (mud) computation. We initiate the
study of understanding its computational complexity. Our main result is a
positive one: any unordered function that can be computed by a streaming
algorithm can also be computed with a mud algorithm, with comparable space and
communication complexity. We extend this result to some useful classes of
approximate and randomized streaming algorithms. We also give negative results,
using communication complexity arguments to prove that extensions to private
randomness, promise problems and indeterminate functions are impossible.
We believe that the line of research we introduce in this paper has the
potential for tremendous impact. The distributed systems that motivate our work
successfully process data at an unprecedented scale, distributed over hundreds
or even thousands of machines, and perform hundreds of such analyses each day.
The mud model (and its generalizations) inspire a set of complexity-theoretic
questions that lie at their heart.
| [
{
"version": "v1",
"created": "Tue, 21 Nov 2006 16:11:06 GMT"
},
{
"version": "v2",
"created": "Tue, 22 May 2007 14:35:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Feldman",
"Jon",
""
],
[
"Muthukrishnan",
"S.",
""
],
[
"Sidiropoulos",
"Anastasios",
""
],
[
"Stein",
"Cliff",
""
],
[
"Svitkina",
"Zoya",
""
]
] |
cs/0611110 | Amine Chigani | Amine Chigani, James D. Arthur | The Implications of Network-Centric Software Systems on Software
Architecture: A Critical Evaluation | 6 pages, 2 figures, ACMSE Conference 2007 | null | null | null | cs.SE | null | The purpose of this paper is to evaluate the impact of emerging
network-centric software systems on the field of software architecture. We
first develop an insight concerning the term "network-centric" by presenting
its origin and its implications within the context of software architecture. On
the basis of this insight, we present our definition of a network-centric
framework and its distinguishing characteristics. We then enumerate the
challenges that face the field of software architecture as software development
shifts from a platform-centric to a network-centric model. In order to face
these challenges, we propose a formal approach embodied in a new architectural
style that supports overcoming these challenges at the architectural level.
Finally, we conclude by presenting an illustrative example to demonstrate the
usefulness of the concepts of network centricity, summarizing our
contributions, and linking our approach to future work that needs to be done in
this area.
| [
{
"version": "v1",
"created": "Tue, 21 Nov 2006 19:23:32 GMT"
},
{
"version": "v2",
"created": "Sat, 30 Dec 2006 03:38:50 GMT"
},
{
"version": "v3",
"created": "Sat, 10 Feb 2007 21:30:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chigani",
"Amine",
""
],
[
"Arthur",
"James D.",
""
]
] |
cs/0611113 | Maurice H. T. Ling | Maurice HT Ling | An Anthological Review of Research Utilizing MontyLingua, a Python-Based
End-to-End Text Processor | 9 pages | Ling, Maurice HT. 2006. An Anthological Review of Research
Utilizing MontyLingua, a Python-Based End-to-End Text Processor. The Python
Papers 1 (1): 5-13 | null | null | cs.CL | null | MontyLingua, an integral part of ConceptNet which is currently the largest
commonsense knowledge base, is an English text processor developed using Python
programming language in MIT Media Lab. The main feature of MontyLingua is the
coverage for all aspects of English text processing from raw input text to
semantic meanings and summary generation, yet each component in MontyLingua is
loosely-coupled to each other at the architectural and code level, which
enabled individual components to be used independently or substituted. However,
there has been no review exploring the role of MontyLingua in recent research
work utilizing it. This paper aims to review the use of and roles played by
MontyLingua and its components in research work published in 19 articles
between October 2004 and August 2006. We had observed a diversified use of
MontyLingua in many different areas, both generic and domain-specific. Although
the use of text summarizing component had not been observe, we are optimistic
that it will have a crucial role in managing the current trend of information
overload in future research.
| [
{
"version": "v1",
"created": "Wed, 22 Nov 2006 03:24:54 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ling",
"Maurice HT",
""
]
] |
cs/0611115 | Ian Jermyn | Peter Horvath (INRIA Sophia Antipolis), Ian Jermyn (INRIA Sophia
Antipolis), Zoltan Kato, Josiane Zerubia (INRIA Sophia Antipolis) | A higher-order active contour model of a `gas of circles' and its
application to tree crown extraction | null | null | null | null | cs.CV | null | Many image processing problems involve identifying the region in the image
domain occupied by a given entity in the scene. Automatic solution of these
problems requires models that incorporate significant prior knowledge about the
shape of the region. Many methods for including such knowledge run into
difficulties when the topology of the region is unknown a priori, for example
when the entity is composed of an unknown number of similar objects.
Higher-order active contours (HOACs) represent one method for the modelling of
non-trivial prior knowledge about shape without necessarily constraining region
topology, via the inclusion of non-local interactions between region boundary
points in the energy defining the model. The case of an unknown number of
circular objects arises in a number of domains, e.g. medical, biological,
nanotechnological, and remote sensing imagery. Regions composed of an a priori
unknown number of circles may be referred to as a `gas of circles'. In this
report, we present a HOAC model of a `gas of circles'. In order to guarantee
stable circles, we conduct a stability analysis via a functional Taylor
expansion of the HOAC energy around a circular shape. This analysis fixes one
of the model parameters in terms of the others and constrains the rest. In
conjunction with a suitable likelihood energy, we apply the model to the
extraction of tree crowns from aerial imagery, and show that the new model
outperforms other techniques.
| [
{
"version": "v1",
"created": "Wed, 22 Nov 2006 13:44:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Horvath",
"Peter",
"",
"INRIA Sophia Antipolis"
],
[
"Jermyn",
"Ian",
"",
"INRIA Sophia\n Antipolis"
],
[
"Kato",
"Zoltan",
"",
"INRIA Sophia Antipolis"
],
[
"Zerubia",
"Josiane",
"",
"INRIA Sophia Antipolis"
]
] |
cs/0611117 | Mikhail Nesterenko | Mark Miyashita and Mikhail Nesterenko | 2FACE: Bi-Directional Face Traversal for Efficient Geometric Routing | null | null | null | null | cs.DC cs.DS cs.OS | null | We propose bi-directional face traversal algorithm $2FACE$ to shorten the
path the message takes to reach the destination in geometric routing. Our
algorithm combines the practicality of the best single-direction traversal
algorithms with the worst case message complexity of $O(|E|)$, where $E$ is the
number of network edges. We apply $2FACE$ to a variety of geometric routing
algorithms. Our simulation results indicate that bi-directional face traversal
decreases the latency of message delivery two to three times compared to single
direction face traversal. The thus selected path approaches the shortest
possible route. This gain in speed comes with a similar message overhead
increase. We describe an algorithm which compensates for this message overhead
by recording the preferable face traversal direction. Thus, if a source has
several messages to send to the destination, the subsequent messages follow the
shortest route. Our simulation results show that with most geometric routing
algorithms the message overhead of finding the short route by bi-directional
face traversal is compensated within two to four repeat messages.
| [
{
"version": "v1",
"created": "Wed, 22 Nov 2006 19:28:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Miyashita",
"Mark",
""
],
[
"Nesterenko",
"Mikhail",
""
]
] |
cs/0611122 | Adrian Paschke | Adrian Paschke, Martin Bichler | Knowledge Representation Concepts for Automated SLA Management | Paschke, A. and Bichler, M.: Knowledge Representation Concepts for
Automated SLA Management, Int. Journal of Decision Support Systems (DSS),
submitted 19th March 2006 | null | null | null | cs.SE cs.AI cs.LO cs.PL | null | Outsourcing of complex IT infrastructure to IT service providers has
increased substantially during the past years. IT service providers must be
able to fulfil their service-quality commitments based upon predefined Service
Level Agreements (SLAs) with the service customer. They need to manage, execute
and maintain thousands of SLAs for different customers and different types of
services, which needs new levels of flexibility and automation not available
with the current technology. The complexity of contractual logic in SLAs
requires new forms of knowledge representation to automatically draw inferences
and execute contractual agreements. A logic-based approach provides several
advantages including automated rule chaining allowing for compact knowledge
representation as well as flexibility to adapt to rapidly changing business
requirements. We suggest adequate logical formalisms for representation and
enforcement of SLA rules and describe a proof-of-concept implementation. The
article describes selected formalisms of the ContractLog KR and their adequacy
for automated SLA management and presents results of experiments to demonstrate
flexibility and scalability of the approach.
| [
{
"version": "v1",
"created": "Thu, 23 Nov 2006 13:25:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Paschke",
"Adrian",
""
],
[
"Bichler",
"Martin",
""
]
] |
cs/0611124 | Francis Bach | Jacob Abernethy, Francis Bach, Theodoros Evgeniou, Jean-Philippe Vert | Low-rank matrix factorization with attributes | 12 pages, 2 figures | null | null | N-24/06/MM | cs.LG cs.AI cs.IR | null | We develop a new collaborative filtering (CF) method that combines both
previously known users' preferences, i.e. standard CF, as well as product/user
attributes, i.e. classical function approximation, to predict a given user's
interest in a particular product. Our method is a generalized low rank matrix
completion problem, where we learn a function whose inputs are pairs of vectors
-- the standard low rank matrix completion problem being a special case where
the inputs to the function are the row and column indices of the matrix. We
solve this generalized matrix completion problem using tensor product kernels
for which we also formally generalize standard kernel properties. Benchmark
experiments on movie ratings show the advantages of our generalized matrix
completion method over the standard matrix completion one with no information
about movies or people, as well as over standard multi-task or single task
learning methods.
| [
{
"version": "v1",
"created": "Fri, 24 Nov 2006 08:49:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Abernethy",
"Jacob",
""
],
[
"Bach",
"Francis",
""
],
[
"Evgeniou",
"Theodoros",
""
],
[
"Vert",
"Jean-Philippe",
""
]
] |
cs/0611126 | Mahmoud Fouz | Benjamin Doerr, Mahmoud Fouz | Hereditary Discrepancies in Different Numbers of Colors II | null | null | null | null | cs.DM | null | We bound the hereditary discrepancy of a hypergraph $\HH$ in two colors in
terms of its hereditary discrepancy in $c$ colors. We show that
$\herdisc(\HH,2) \le K c \herdisc(\HH,c)$, where $K$ is some absolute constant.
This bound is sharp.
| [
{
"version": "v1",
"created": "Fri, 24 Nov 2006 14:46:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Doerr",
"Benjamin",
""
],
[
"Fouz",
"Mahmoud",
""
]
] |
cs/0611128 | Hasan Guclu | Hasan Guclu and Murat Yuksel | Scale-Free Overlay Topologies with Hard Cutoffs for Unstructured
Peer-to-Peer Networks | 19 pages, 12 figures, submitted to ICDCS 2007 (International
Conference on Distributed Computing Systems 2007), one minor correction and
formatting changes | null | null | null | cs.NI cs.DC | null | In unstructured peer-to-peer (P2P) networks, the overlay topology (or
connectivity graph) among peers is a crucial component in addition to the
peer/data organization and search. Topological characteristics have profound
impact on the efficiency of search on such unstructured P2P networks as well as
other networks. It has been well-known that search on small-world topologies of
N nodes can be as efficient as O(ln N), while scale-free (power-law) topologies
offer even better search efficiencies like as good as O(lnln N) for a range of
degree distribution exponents. However, generation and maintenance of such
scale-free topologies are hard to realize in a distributed and potentially
uncooperative environments as in the P2P networks. A key limitation of
scale-free topologies is the high load (i.e. high degree) on very few number of
hub nodes. In a typical unstructured P2P network, peers are not willing to
maintain high degrees/loads as they may not want to store large number of
entries for construction of the overlay topology. So, to achieve fairness and
practicality among all peers, hard cutoffs on the number of entries are imposed
by the individual peers, which limits scale-freeness of the overall topology.
Thus, efficiency of the flooding search reduces as the size of the hard cutoff
does. We investigate construction of scale-free topologies with hard cutoffs
(i.e. there are not any major hubs) and effect of these hard cutoffs on the
search efficiency. Interestingly, we observe that the efficiency of normalized
flooding and random walk search algorithms increases as the hard cutoff
decreases.
| [
{
"version": "v1",
"created": "Sat, 25 Nov 2006 21:49:55 GMT"
},
{
"version": "v2",
"created": "Tue, 5 Dec 2006 02:44:00 GMT"
},
{
"version": "v3",
"created": "Wed, 6 Dec 2006 18:21:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Guclu",
"Hasan",
""
],
[
"Yuksel",
"Murat",
""
]
] |
cs/0611132 | Vladimir Migunov | Vladimir V. Migunov | The specifications making in complex CAD-system of renovation of the
enterprises on the basis of modules in the drawing and electronic catalogues | 8 pages, 4 figures, in Russian | null | null | null | cs.CE | null | The experience of automation of the specifications making of the projects of
renovation of the industrial enterprises is described, being based on the
special modules in the drawing containing the visible image and additional
parameters, and electronic catalogues
| [
{
"version": "v1",
"created": "Mon, 27 Nov 2006 04:31:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Migunov",
"Vladimir V.",
""
]
] |
cs/0611133 | Vladimir Migunov | Vladimir V. Migunov | The modelling of the automation schemes of technological processes in
CAD-system of renovation of the enterprises | 4 pages, 3 figures, in Russian | null | null | null | cs.CE | null | According to the requirements of the Russian standards, the automation
schemes are necessary practically in each project of renovation of industrial
buildings and facilities, in which any technological processes are realized.
The model representations of the automation schemes in CAD-system TechnoCAD
GlassX are described. The models follow a principle "to exclude a repeated
input operations"
| [
{
"version": "v1",
"created": "Mon, 27 Nov 2006 04:39:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Migunov",
"Vladimir V.",
""
]
] |
cs/0611134 | Vladimir L. Safonov | Vladimir L. Safonov | Hard Disk Drive as a Magnetomechanical Logic Device | 3pages, 3 figures | null | null | null | cs.OH cs.AR | null | We consider the conditions how two binary numbers can be superimposed on the
same track with the use of different recording magnetic fields. As a result the
average magnetization of longitudinal medium along the track can have three
states: -M, 0 and +M. Possibility to perform logic operations with these states
is considered. We demonstrate OR, AND, XOR and NOT operations and discuss a
modification of a recording device.
| [
{
"version": "v1",
"created": "Mon, 27 Nov 2006 19:45:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Safonov",
"Vladimir L.",
""
]
] |
cs/0611136 | Edward Rietman PhD | E.A. Rietman and R.W. Hillis | Neural Computation with Rings of Quasiperiodic Oscillators | 54 pages, 26 figures | null | null | PSI SR-1278 | cs.RO | null | We describe the use of quasiperiodic oscillators for computation and control
of robots. We also describe their relationship to central pattern generators in
simple organisms and develop a group theory for describing the dynamics of
these systems.
| [
{
"version": "v1",
"created": "Mon, 27 Nov 2006 15:28:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rietman",
"E. A.",
""
],
[
"Hillis",
"R. W.",
""
]
] |
cs/0611140 | Marc Schoenauer | Yann Semet (INRIA Futurs), Marc Schoenauer (INRIA Futurs) | On the Benefits of Inoculation, an Example in Train Scheduling | null | Dans GECCO-2006 (2006) | null | null | cs.AI cs.NE | null | The local reconstruction of a railway schedule following a small perturbation
of the traffic, seeking minimization of the total accumulated delay, is a very
difficult and tightly constrained combinatorial problem. Notoriously enough,
the railway company's public image degrades proportionally to the amount of
daily delays, and the same goes for its profit! This paper describes an
inoculation procedure which greatly enhances an evolutionary algorithm for
train re-scheduling. The procedure consists in building the initial population
around a pre-computed solution based on problem-related information available
beforehand. The optimization is performed by adapting times of departure and
arrival, as well as allocation of tracks, for each train at each station. This
is achieved by a permutation-based evolutionary algorithm that relies on a
semi-greedy heuristic scheduler to gradually reconstruct the schedule by
inserting trains one after another. Experimental results are presented on
various instances of a large real-world case involving around 500 trains and
more than 1 million constraints. In terms of competition with commercial math
ematical programming tool ILOG CPLEX, it appears that within a large class of
instances, excluding trivial instances as well as too difficult ones, and with
very few exceptions, a clever initialization turns an encouraging failure into
a clear-cut success auguring of substantial financial savings.
| [
{
"version": "v1",
"created": "Tue, 28 Nov 2006 12:44:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Semet",
"Yann",
"",
"INRIA Futurs"
],
[
"Schoenauer",
"Marc",
"",
"INRIA Futurs"
]
] |
cs/0611141 | Peter Tiedemann | Peter Tiedemann, Henrik Reif Andersen and Rasmus Pagh | A Generic Global Constraint based on MDDs | Tech report, 31 pages, 3 figures | null | null | null | cs.AI | null | The paper suggests the use of Multi-Valued Decision Diagrams (MDDs) as the
supporting data structure for a generic global constraint. We give an algorithm
for maintaining generalized arc consistency (GAC) on this constraint that
amortizes the cost of the GAC computation over a root-to-terminal path in the
search tree. The technique used is an extension of the GAC algorithm for the
regular language constraint on finite length input. Our approach adds support
for skipped variables, maintains the reduced property of the MDD dynamically
and provides domain entailment detection. Finally we also show how to adapt the
approach to constraint types that are closely related to MDDs, such as AOMDDs
and Case DAGs.
| [
{
"version": "v1",
"created": "Tue, 28 Nov 2006 14:23:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Tiedemann",
"Peter",
""
],
[
"Andersen",
"Henrik Reif",
""
],
[
"Pagh",
"Rasmus",
""
]
] |
cs/0611142 | Mounira Kourjieh | Yannick Chevalier (IRIT), Mounira Kourjieh (IRIT) | A Symbolic Intruder Model for Hash-Collision Attacks | null | CSTVA'06, France (25/09/2006) | null | null | cs.CR | null | In the recent years, several practical methods have been published to compute
collisions on some commonly used hash functions. In this paper we present a
method to take into account, at the symbolic level, that an intruder actively
attacking a protocol execution may use these collision algorithms in reasonable
time during the attack. Our decision procedure relies on the reduction of
constraint solving for an intruder exploiting the collision properties of hush
functions to constraint solving for an intruder operating on words.
| [
{
"version": "v1",
"created": "Tue, 28 Nov 2006 14:09:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chevalier",
"Yannick",
"",
"IRIT"
],
[
"Kourjieh",
"Mounira",
"",
"IRIT"
]
] |
cs/0611145 | Manuel Loth | Manuel Loth (INRIA Futurs), Philippe Preux (INRIA Futurs) | A Unified View of TD Algorithms; Introducing Full-Gradient TD and
Equi-Gradient Descent TD | null | Dans European Symposium on Artificial Neural Networks (2006) | null | null | cs.LG | null | This paper addresses the issue of policy evaluation in Markov Decision
Processes, using linear function approximation. It provides a unified view of
algorithms such as TD(lambda), LSTD(lambda), iLSTD, residual-gradient TD. It is
asserted that they all consist in minimizing a gradient function and differ by
the form of this function and their means of minimizing it. Two new schemes are
introduced in that framework: Full-gradient TD which uses a generalization of
the principle introduced in iLSTD, and EGD TD, which reduces the gradient by
successive equi-gradient descents. These three algorithms form a new
intermediate family with the interesting property of making much better use of
the samples than TD while keeping a gradient descent scheme, which is useful
for complexity issues and optimistic policy iteration.
| [
{
"version": "v1",
"created": "Wed, 29 Nov 2006 00:00:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Loth",
"Manuel",
"",
"INRIA Futurs"
],
[
"Preux",
"Philippe",
"",
"INRIA Futurs"
]
] |
cs/0611148 | Federico Calzolari dr | Federico Calzolari, Eva Sassolini, Manuela Sassi, Sebastiana
Cucurullo, Eugenio Picchi, Francesca Bertagna, Alessandro Enea, Monica
Monachini, Claudia Soria, Nicoletta Calzolari | Next Generation Language Resources using GRID | 4 pages | Language Resources and Evaluation Conference LREC 2006 proceedings
pp.1858-1861, Genoa [Italy] | null | null | cs.DC cs.CL | null | This paper presents a case study concerning the challenges and requirements
posed by next generation language resources, realized as an overall model of
open, distributed and collaborative language infrastructure. If a sort of "new
paradigm" is required, we think that the emerging and still evolving technology
connected to Grid computing is a very interesting and suitable one for a
concrete realization of this vision. Given the current limitations of Grid
computing, it is very important to test the new environment on basic language
analysis tools, in order to get the feeling of what are the potentialities and
possible limitations connected to its use in NLP. For this reason, we have done
some experiments on a module of Linguistic Miner, i.e. the extraction of
linguistic patterns from restricted domain corpora.
| [
{
"version": "v1",
"created": "Wed, 29 Nov 2006 10:49:23 GMT"
},
{
"version": "v2",
"created": "Mon, 11 Dec 2006 14:26:07 GMT"
},
{
"version": "v3",
"created": "Wed, 13 Dec 2006 11:11:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Calzolari",
"Federico",
""
],
[
"Sassolini",
"Eva",
""
],
[
"Sassi",
"Manuela",
""
],
[
"Cucurullo",
"Sebastiana",
""
],
[
"Picchi",
"Eugenio",
""
],
[
"Bertagna",
"Francesca",
""
],
[
"Enea",
"Alessandro",
""
],
[
"Monachini",
"Monica",
""
],
[
"Soria",
"Claudia",
""
],
[
"Calzolari",
"Nicoletta",
""
]
] |
cs/0611149 | Eric Rondeau | Belynda Brahimi (CRAN), Eric Rondeau (CRAN), Christophe Aubrun (CRAN) | Comparison between Networked Control System behaviour based on CAN and
Switched Ethernet networks | 7 pages | 2nd Workshop on Networked Control Systems : Tolerant to fault
(23/11/2006) 7 pages | null | null | cs.NI | null | The distributed control systems are more and more used in many industrial
applications. These systems are often referred as "Networked control systems".
The goal of this paper is to show the network influence on feedback control
systems. Two networks are considered: Switched Ethernet network and CAN
fieldbus. The first one represents the non deterministic network and second one
represents the deterministic one. Several scenarii are studied to analyse the
stability of system according to different network parameters (packets losses,
congestion and frame priority). The Truetime simulator is used in this work.
| [
{
"version": "v1",
"created": "Wed, 29 Nov 2006 11:05:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Brahimi",
"Belynda",
"",
"CRAN"
],
[
"Rondeau",
"Eric",
"",
"CRAN"
],
[
"Aubrun",
"Christophe",
"",
"CRAN"
]
] |
cs/0611150 | Saket Sathe | Saket Sathe | A Novel Bayesian Classifier using Copula Functions | null | null | null | null | cs.LG cs.AI cs.IR | null | A useful method for representing Bayesian classifiers is through
\emph{discriminant functions}. Here, using copula functions, we propose a new
model for discriminants. This model provides a rich and generalized class of
decision boundaries. These decision boundaries significantly boost the
classification accuracy especially for high dimensional feature spaces. We
strengthen our analysis through simulation results.
| [
{
"version": "v1",
"created": "Wed, 29 Nov 2006 13:59:31 GMT"
},
{
"version": "v2",
"created": "Thu, 30 Nov 2006 03:58:23 GMT"
},
{
"version": "v3",
"created": "Tue, 5 Dec 2006 15:04:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sathe",
"Saket",
""
]
] |
cs/0611157 | Mira Gonen | Reuven Cohen, Mira Gonen, Avishai Wool | Bounding the Bias of Tree-Like Sampling in IP Topologies | 12 pages, 1 figure | null | null | null | cs.NI | null | It is widely believed that the Internet's AS-graph degree distribution obeys
a power-law form. Most of the evidence showing the power-law distribution is
based on BGP data. However, it was recently argued that since BGP collects data
in a tree-like fashion, it only produces a sample of the degree distribution,
and this sample may be biased. This argument was backed by simulation data and
mathematical analysis, which demonstrated that under certain conditions a tree
sampling procedure can produce an artificail power-law in the degree
distribution. Thus, although the observed degree distribution of the AS-graph
follows a power-law, this phenomenon may be an artifact of the sampling
process. In this work we provide some evidence to the contrary. We show, by
analysis and simulation, that when the underlying graph degree distribution
obeys a power-law with an exponent larger than 2, a tree-like sampling process
produces a negligible bias in the sampled degree distribution. Furthermore,
recent data collected from the DIMES project, which is not based on BGP
sampling, indicates that the underlying AS-graph indeed obeys a power-law
degree distribution with an exponent larger than 2. By combining this empirical
data with our analysis, we conclude that the bias in the degree distribution
calculated from BGP data is negligible.
| [
{
"version": "v1",
"created": "Thu, 30 Nov 2006 08:59:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cohen",
"Reuven",
""
],
[
"Gonen",
"Mira",
""
],
[
"Wool",
"Avishai",
""
]
] |
cs/0611163 | Dimitris Kalles | Dimitris Kalles (Hellenic Open University) | On Measuring the Impact of Human Actions in the Machine Learning of a
Board Game's Playing Policies | Contains 19 pages, 10 figures, 8 tables. Submitted to a journal | null | null | null | cs.AI cs.GT cs.NE | null | We investigate systematically the impact of human intervention in the
training of computer players in a strategy board game. In that game, computer
players utilise reinforcement learning with neural networks for evolving their
playing strategies and demonstrate a slow learning speed. Human intervention
can significantly enhance learning performance, but carry-ing it out
systematically seems to be more of a problem of an integrated game development
environment as opposed to automatic evolutionary learning.
| [
{
"version": "v1",
"created": "Thu, 30 Nov 2006 15:30:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kalles",
"Dimitris",
"",
"Hellenic Open University"
]
] |
cs/0611164 | Dimitris Kalles | Dimitris Kalles (Hellenic Open University) | Player co-modelling in a strategy board game: discovering how to play
fast | Contains 19 pages, 6 figures, 7 tables. Submitted to a journal | null | null | null | cs.AI cs.LG | null | In this paper we experiment with a 2-player strategy board game where playing
models are evolved using reinforcement learning and neural networks. The models
are evolved to speed up automatic game development based on human involvement
at varying levels of sophistication and density when compared to fully
autonomous playing. The experimental results suggest a clear and measurable
association between the ability to win games and the ability to do that fast,
while at the same time demonstrating that there is a minimum level of human
involvement beyond which no learning really occurs.
| [
{
"version": "v1",
"created": "Thu, 30 Nov 2006 15:36:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kalles",
"Dimitris",
"",
"Hellenic Open University"
]
] |
cs/0612001 | Matthew Delacorte | Matthew Delacorte | Polynomial Time Symmetry and Isomorphism Testing for Connected Graphs | null | null | null | null | cs.DM | null | We use the concept of a Kirchhoff resistor network (alternatively random walk
on a network) to probe connected graphs and produce symmetry revealing
canonical labelings of the graph(s) nodes and edges.
| [
{
"version": "v1",
"created": "Fri, 1 Dec 2006 14:08:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Delacorte",
"Matthew",
""
]
] |
cs/0612002 | Willemien Visser | Willemien Visser (INRIA Rocquencourt), Brigitte Trousse (INRIA Sophia
Antipolis) | Reuse of designs: Desperately seeking an interdisciplinary cognitive
approach | null | Dans IJCAI Thirteenth International Joint Conference on Artificial
Intelligence Workshop "Reuse of designs: An interdisciplinary cognitive
approach" (1993) | null | null | cs.HC cs.AI | null | This text analyses the papers accepted for the workshop "Reuse of designs: an
interdisciplinary cognitive approach". Several dimensions and questions
considered as important (by the authors and/or by us) are addressed: What about
the "interdisciplinary cognitive" character of the approaches adopted by the
authors? Is design indeed a domain where the use of CBR is particularly
suitable? Are there important distinctions between CBR and other approaches?
Which types of knowledge -other than cases- is being, or might be, used in CBR
systems? With respect to cases: are there different "types" of case and
different types of case use? which formats are adopted for their
representation? do cases have "components"? how are cases organised in the case
memory? Concerning their retrieval: which types of index are used? on which
types of relation is retrieval based? how does one retrieve only a selected
number of cases, i.e., how does one retrieve only the "best" cases? which
processes and strategies are used, by the system and by its user? Finally, some
important aspects of CBR system development are shortly discussed: should CBR
systems be assistance or autonomous systems? how can case knowledge be
"acquired"? what about the empirical evaluation of CBR systems? The conclusion
points out some lacking points: not much attention is paid to the user, and few
papers have indeed adopted an interdisciplinary cognitive approach.
| [
{
"version": "v1",
"created": "Thu, 30 Nov 2006 22:38:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Visser",
"Willemien",
"",
"INRIA Rocquencourt"
],
[
"Trousse",
"Brigitte",
"",
"INRIA Sophia\n Antipolis"
]
] |
cs/0612006 | Willemien Visser | Willemien Visser (INRIA Rocquencourt) | Evocation and elaboration of solutions: Different types of
problem-solving actions. An empirical study on the design of an aerospace
artifact | null | Dans COGNITIVA 90. At the crossroads of Artificial Intelligence,
Cognitive science, and Neuroscience (1991) 689-696 | null | null | cs.HC | null | An observational study was conducted on a professional designer working on a
design project in aerospace industry. The protocol data were analyzed in order
to gain insight into the actions the designer used for the development of a
solution to the corresponding problem. Different processes are described: from
the "simple" evocation of a solution existing in memory, to the elaboration of
a "new" solution out of mnesic entities without any clear link to the current
problem. Control is addressed in so far as it concerns the priority among the
different types of development processes: the progression from evocation of a
"standard" solution to elaboration of a "new" solution is supposed to
correspond to the resulting order, that is, the one in which the designer's
activity proceeds. Short discussions of * the double status of "problem" and
"solution," * the problem/solution knowledge units in memory and their access,
and * the different abstraction levels on which problem and solution
representations are developed, are illustrated by the results.
| [
{
"version": "v1",
"created": "Thu, 30 Nov 2006 22:49:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Visser",
"Willemien",
"",
"INRIA Rocquencourt"
]
] |
cs/0612013 | Al-Mukaddim Khan Pathan | Al-Mukaddim Khan Pathan, Rajkumar Buyya, James Broberg and Kris
Bubendorfer | Economy-based Content Replication for Peering Content Delivery Networks | Technical Report, GRIDS-TR-2006-20, Grid Computing and Distributed
Systems Laboratory, University of Melbourne, Australia | null | null | null | cs.DC | null | Existing Content Delivery Networks (CDNs) exhibit the nature of closed
delivery networks which do not cooperate with other CDNs and in practice,
islands of CDNs are formed. The logical separation between contents and
services in this context results in two content networking domains. In addition
to that, meeting the Quality of Service requirements of users according to
negotiated Service Level Agreement is crucial for a CDN. Present trends in
content networks and content networking capabilities give rise to the interest
in interconnecting content networks. Hence, in this paper, we present an open,
scalable, and Service-Oriented Architecture (SOA)-based system that assist the
creation of open Content and Service Delivery Networks (CSDNs), which scale and
supports sharing of resources through peering with other CSDNs. To encourage
resource sharing and peering arrangements between different CDN providers at
global level, we propose using market-based models by introducing an
economy-based strategy for content replication.
| [
{
"version": "v1",
"created": "Mon, 4 Dec 2006 06:29:16 GMT"
},
{
"version": "v2",
"created": "Mon, 4 Dec 2006 23:24:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pathan",
"Al-Mukaddim Khan",
""
],
[
"Buyya",
"Rajkumar",
""
],
[
"Broberg",
"James",
""
],
[
"Bubendorfer",
"Kris",
""
]
] |
cs/0612022 | Willemien Visser | Willemien Visser (INRIA Rocquencourt) | Both Generic Design and Different Forms of Designing | null | Dans Wonderground, the 2006 DRS (Design Research Society)
International Conference (2006) | null | null | cs.HC | null | This paper defends an augmented cognitively oriented "generic-design
hypothesis": There are both significant similarities between the design
activities implemented in different situations and crucial differences between
these and other cognitive activities; yet, characteristics of a design
situation (i.e., related to the designers, the artefact, and other task
variables influencing these two) introduce specificities in the corresponding
design activities and cognitive structures that are used. We thus combine the
generic-design hypothesis with that of different "forms" of designing. In this
paper, outlining a number of directions that need further elaboration, we
propose a series of candidate dimensions underlying such forms of design.
| [
{
"version": "v1",
"created": "Mon, 4 Dec 2006 16:28:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Visser",
"Willemien",
"",
"INRIA Rocquencourt"
]
] |
cs/0612025 | Paul Vitanyi | Paul M.B. Vitanyi (CWI and University of Amsterdam) | Registers | 5 pages, LaTeX, Entry in: Encyclopedia of Algorithms, Ming-Yang Kao,
Ed., Springer, To appear | null | null | null | cs.DC | null | Entry in: Encyclopedia of Algorithms, Ming-Yang Kao, Ed., Springer, To
appear.
Synonyms: Wait-free registers, wait-free shared variables, asynchronous
communication hardware. Problem Definition: Consider a system of asynchronous
processes that communicate among themselves by only executing read and write
operations on a set of shared variables (also known as shared registers). The
system has no global clock or other synchronization primitives.
| [
{
"version": "v1",
"created": "Tue, 5 Dec 2006 16:51:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vitanyi",
"Paul M. B.",
"",
"CWI and University of Amsterdam"
]
] |
cs/0612026 | Trung Nguyen | Trung Nguyen, Jean-Daniel Boissonnat, Frederic Falzon and Christian
Knauer | A disk-covering problem with application in optical interferometry | 10 pages, 8 figures | null | null | null | cs.CG | null | Given a disk O in the plane called the objective, we want to find n small
disks P_1,...,P_n called the pupils such that $\bigcup_{i,j=1}^n P_i \ominus
P_j \supseteq O$, where $\ominus$ denotes the Minkowski difference operator,
while minimizing the number of pupils, the sum of the radii or the total area
of the pupils. This problem is motivated by the construction of very large
telescopes from several smaller ones by so-called Optical Aperture Synthesis.
In this paper, we provide exact, approximate and heuristic solutions to several
variations of the problem.
| [
{
"version": "v1",
"created": "Tue, 5 Dec 2006 15:36:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Nguyen",
"Trung",
""
],
[
"Boissonnat",
"Jean-Daniel",
""
],
[
"Falzon",
"Frederic",
""
],
[
"Knauer",
"Christian",
""
]
] |
cs/0612029 | Ming-Zhe Chen | Ming-Zhe Chen | A Classification of 6R Manipulators | 4 pages | null | null | null | cs.RO | null | This paper presents a classification of generic 6-revolute jointed (6R)
manipulators using homotopy class of their critical point manifold. A part of
classification is listed in this paper because of the complexity of homotopy
class of 4-torus. The results of this classification will serve future research
of the classification and topological properties of maniplators joint space and
workspace.
| [
{
"version": "v1",
"created": "Tue, 5 Dec 2006 16:04:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chen",
"Ming-Zhe",
""
]
] |
cs/0612031 | Andrew McGregor | Andrew McGregor and S. Muthukrishnan | Estimating Aggregate Properties on Probabilistic Streams | 11 pages | null | null | null | cs.DS cs.DB | null | The probabilistic-stream model was introduced by Jayram et al. \cite{JKV07}.
It is a generalization of the data stream model that is suited to handling
``probabilistic'' data where each item of the stream represents a probability
distribution over a set of possible events. Therefore, a probabilistic stream
determines a distribution over potentially a very large number of classical
"deterministic" streams where each item is deterministically one of the domain
values. The probabilistic model is applicable for not only analyzing streams
where the input has uncertainties (such as sensor data streams that measure
physical processes) but also where the streams are derived from the input data
by post-processing, such as tagging or reconciling inconsistent and poor
quality data.
We present streaming algorithms for computing commonly used aggregates on a
probabilistic stream. We present the first known, one pass streaming algorithm
for estimating the \AVG, improving results in \cite{JKV07}. We present the
first known streaming algorithms for estimating the number of \DISTINCT items
on probabilistic streams. Further, we present extensions to other aggregates
such as the repeat rate, quantiles, etc. In all cases, our algorithms work with
provable accuracy guarantees and within the space constraints of the data
stream model.
| [
{
"version": "v1",
"created": "Tue, 5 Dec 2006 23:34:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"McGregor",
"Andrew",
""
],
[
"Muthukrishnan",
"S.",
""
]
] |
cs/0612034 | Jean-Marc Fran\c{c}ois | Jean-Marc Francois and Guy Leduc | Predictable Disruption Tolerant Networks and Delivery Guarantees | 9 pages | null | null | null | cs.NI | null | This article studies disruption tolerant networks (DTNs) where each node
knows the probabilistic distribution of contacts with other nodes. It proposes
a framework that allows one to formalize the behaviour of such a network. It
generalizes extreme cases that have been studied before where (a) either nodes
only know their contact frequency with each other or (b) they have a perfect
knowledge of who meets who and when. This paper then gives an example of how
this framework can be used; it shows how one can find a packet forwarding
algorithm optimized to meet the 'delay/bandwidth consumption' trade-off:
packets are duplicated so as to (statistically) guarantee a given delay or
delivery probability, but not too much so as to reduce the bandwidth, energy,
and memory consumption.
| [
{
"version": "v1",
"created": "Wed, 6 Dec 2006 13:57:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Francois",
"Jean-Marc",
""
],
[
"Leduc",
"Guy",
""
]
] |
cs/0612035 | Vincent Gramoli | Antonio Fernandez (LADYR), Vincent Gramoli (IRISA), Ernesto Jimenez
(EUI), Anne-Marie Kermarrec (IRISA), Michel Raynal (IRISA) | Distributed Slicing in Dynamic Systems | null | null | null | null | cs.DC | null | Peer to peer (P2P) systems are moving from application specific architectures
to a generic service oriented design philosophy. This raises interesting
problems in connection with providing useful P2P middleware services that are
capable of dealing with resource assignment and management in a large-scale,
heterogeneous and unreliable environment. One such service, the slicing
service, has been proposed to allow for an automatic partitioning of P2P
networks into groups (slices) that represent a controllable amount of some
resource and that are also relatively homogeneous with respect to that
resource, in the face of churn and other failures. In this report we propose
two algorithms to solve the distributed slicing problem. The first algorithm
improves upon an existing algorithm that is based on gossip-based sorting of a
set of uniform random numbers. We speed up convergence via a heuristic for
gossip peer selection. The second algorithm is based on a different approach:
statistical approximation of the rank of nodes in the ordering. The
scalability, efficiency and resilience to dynamics of both algorithms relies on
their gossip-based models. We present theoretical and experimental results to
prove the viability of these algorithms.
| [
{
"version": "v1",
"created": "Wed, 6 Dec 2006 13:57:54 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fernandez",
"Antonio",
"",
"LADYR"
],
[
"Gramoli",
"Vincent",
"",
"IRISA"
],
[
"Jimenez",
"Ernesto",
"",
"EUI"
],
[
"Kermarrec",
"Anne-Marie",
"",
"IRISA"
],
[
"Raynal",
"Michel",
"",
"IRISA"
]
] |
cs/0612036 | Fr\'ed\'eric Vivien | Jack Dongarra, Jean-Francois Pineau, Yves Robert, Zhiao Shi, and
Frederic Vivien | Revisiting Matrix Product on Master-Worker Platforms | null | null | null | null | cs.DC cs.MS | null | This paper is aimed at designing efficient parallel matrix-product algorithms
for heterogeneous master-worker platforms. While matrix-product is
well-understood for homogeneous 2D-arrays of processors (e.g., Cannon algorithm
and ScaLAPACK outer product algorithm), there are three key hypotheses that
render our work original and innovative:
- Centralized data. We assume that all matrix files originate from, and must
be returned to, the master.
- Heterogeneous star-shaped platforms. We target fully heterogeneous
platforms, where computational resources have different computing powers.
- Limited memory. Because we investigate the parallelization of large
problems, we cannot assume that full matrix panels can be stored in the worker
memories and re-used for subsequent updates (as in ScaLAPACK).
We have devised efficient algorithms for resource selection (deciding which
workers to enroll) and communication ordering (both for input and result
messages), and we report a set of numerical experiments on various platforms at
Ecole Normale Superieure de Lyon and the University of Tennessee. However, we
point out that in this first version of the report, experiments are limited to
homogeneous platforms.
| [
{
"version": "v1",
"created": "Wed, 6 Dec 2006 14:34:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dongarra",
"Jack",
""
],
[
"Pineau",
"Jean-Francois",
""
],
[
"Robert",
"Yves",
""
],
[
"Shi",
"Zhiao",
""
],
[
"Vivien",
"Frederic",
""
]
] |
cs/0612038 | Vladimir Anashin | Vladimir Anashin | Non-Archimedean analysis, T-functions, and cryptography | 53 pages, 9 figures, LaTeX 2e. Lecture notes of a 20-hour course at
the International Summer School `Mathematical Methods and Technologies in
Computer Security' at Lomonosov Moscow State University, July 9--23, 2006 | null | null | null | cs.CR math.DS | null | These are lecture notes of a 20-hour course at the International Summer
School \emph{Mathematical Methods and Technologies in Computer Security} at
Lomonosov Moscow State University, July 9--23, 2006.
Loosely speaking, a $T$-function is a map of $n$-bit words into $n$-bit words
such that each $i$-th bit of image depends only on low-order bits $0,..., i$ of
the pre-image. For example, all arithmetic operations (addition,
multiplication) are $T$-functions, all bitwise logical operations ($\XOR$,
$\AND$, etc.) are $T$-functions. Any composition of $T$-functions is a
$T$-function as well. Thus $T$-functions are natural computer word-oriented
functions.
It turns out that $T$-functions are continuous (and often differentiable!)
functions with respect to the so-called 2-adic distance. This observation gives
a powerful tool to apply 2-adic analysis to construct wide classes of
$T$-functions with provable cryptographic properties (long period, balance,
uniform distribution, high linear complexity, etc.); these functions currently
are being used in new generation of fast stream ciphers. We consider these
ciphers as specific automata that could be associated to dynamical systems on
the space of 2-adic integers. From this view the lectures could be considered
as a course in cryptographic applications of the non-Archimedean dynamics; the
latter has recently attracted significant attention in connection with
applications to physics, biology and cognitive sciences.
During the course listeners study non-Archimedean machinery and its
applications to stream cipher design.
| [
{
"version": "v1",
"created": "Wed, 6 Dec 2006 15:11:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Anashin",
"Vladimir",
""
]
] |
cs/0612039 | Raghav Aras | Raghav Aras (INRIA Lorraine - LORIA), Alain Dutech (INRIA Lorraine -
LORIA), Fran\c{c}ois Charpillet (INRIA Lorraine - LORIA) | Computing the Equilibria of Bimatrix Games using Dominance Heuristics | null | null | null | null | cs.GT | null | We propose a formulation of a general-sum bimatrix game as a bipartite
directed graph with the objective of establishing a correspondence between the
set of the relevant structures of the graph (in particular elementary cycles)
and the set of the Nash equilibria of the game. We show that finding the set of
elementary cycles of the graph permits the computation of the set of
equilibria. For games whose graphs have a sparse adjacency matrix, this serves
as a good heuristic for computing the set of equilibria. The heuristic also
allows the discarding of sections of the support space that do not yield any
equilibrium, thus serving as a useful pre-processing step for algorithms that
compute the equilibria through support enumeration.
| [
{
"version": "v1",
"created": "Wed, 6 Dec 2006 15:55:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Aras",
"Raghav",
"",
"INRIA Lorraine - LORIA"
],
[
"Dutech",
"Alain",
"",
"INRIA Lorraine -\n LORIA"
],
[
"Charpillet",
"François",
"",
"INRIA Lorraine - LORIA"
]
] |
cs/0612043 | Paul Vitanyi | R. Cilibrasi (CWI), Z. Lotker (CWI), A. Navarra (LaBRI - Univ.
Bordeaux 1), S. Perennes (CNRS/INRIA/Univ. Nice), P. Vitanyi (CWI/Univ.
Amsterdam) | About the Lifespan of Peer to Peer Networks | 15 pages, LaTeX, 1 figure, Proc. 10th Int'nl Conf. Principles Of
Distributed Systems (OPODIS), Lecture Notes in Computer Science, Vol. 4305,
Springer Verlag, Berlin, 2006, 290--305 | null | null | null | cs.DC cs.IR | null | We analyze the ability of peer to peer networks to deliver a complete file
among the peers. Early on we motivate a broad generalization of network
behavior organizing it into one of two successive phases. According to this
view the network has two main states: first centralized - few sources (roots)
hold the complete file, and next distributed - peers hold some parts (chunks)
of the file such that the entire network has the whole file, but no individual
has it. In the distributed state we study two scenarios, first, when the peers
are ``patient'', i.e, do not leave the system until they obtain the complete
file; second, peers are ``impatient'' and almost always leave the network
before obtaining the complete file.
| [
{
"version": "v1",
"created": "Thu, 7 Dec 2006 16:20:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cilibrasi",
"R.",
"",
"CWI"
],
[
"Lotker",
"Z.",
"",
"CWI"
],
[
"Navarra",
"A.",
"",
"LaBRI - Univ.\n Bordeaux 1"
],
[
"Perennes",
"S.",
"",
"CNRS/INRIA/Univ. Nice"
],
[
"Vitanyi",
"P.",
"",
"CWI/Univ.\n Amsterdam"
]
] |
cs/0612045 | Vincent Borrel | Vincent Borrel, Franck Legendre, Marcelo Dias de Amorim, Serge Fdida | SIMPS: Using Sociology for Personal Mobility | null | null | null | null | cs.NI | null | Assessing mobility in a thorough fashion is a crucial step toward more
efficient mobile network design. Recent research on mobility has focused on two
main points: analyzing models and studying their impact on data transport.
These works investigate the consequences of mobility. In this paper, instead,
we focus on the causes of mobility. Starting from established research in
sociology, we propose SIMPS, a mobility model of human crowd motion. This model
defines two complimentary behaviors, namely socialize and isolate, that
regulate an individual with regard to her/his own sociability level. SIMPS
leads to results that agree with scaling laws observed both in small-scale and
large-scale human motion. Although our model defines only two simple individual
behaviors, we observe many emerging collective behaviors (group
formation/splitting, path formation, and evolution). To our knowledge, SIMPS is
the first model in the networking community that tackles the roots governing
mobility.
| [
{
"version": "v1",
"created": "Thu, 7 Dec 2006 21:29:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Borrel",
"Vincent",
""
],
[
"Legendre",
"Franck",
""
],
[
"de Amorim",
"Marcelo Dias",
""
],
[
"Fdida",
"Serge",
""
]
] |
cs/0612046 | Kristina Lerman | Kristina Lerman | Social Networks and Social Information Filtering on Digg | 8 pages, 5 figures Submitted to the International Conference on
Weblogs and Social Media | null | null | null | cs.HC cs.AI cs.IR | null | The new social media sites -- blogs, wikis, Flickr and Digg, among others --
underscore the transformation of the Web to a participatory medium in which
users are actively creating, evaluating and distributing information. Digg is a
social news aggregator which allows users to submit links to, vote on and
discuss news stories. Each day Digg selects a handful of stories to feature on
its front page. Rather than rely on the opinion of a few editors, Digg
aggregates opinions of thousands of its users to decide which stories to
promote to the front page.
Digg users can designate other users as ``friends'' and easily track friends'
activities: what new stories they submitted, commented on or read. The friends
interface acts as a \emph{social filtering} system, recommending to user
stories his or her friends liked or found interesting. By tracking the votes
received by newly submitted stories over time, we showed that social filtering
is an effective information filtering approach. Specifically, we showed that
(a) users tend to like stories submitted by friends and (b) users tend to like
stories their friends read and liked. As a byproduct of social filtering,
social networks also play a role in promoting stories to Digg's front page,
potentially leading to ``tyranny of the minority'' situation where a
disproportionate number of front page stories comes from the same small group
of interconnected users. Despite this, social filtering is a promising new
technology that can be used to personalize and tailor information to individual
users: for example, through personal front pages.
| [
{
"version": "v1",
"created": "Thu, 7 Dec 2006 23:38:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lerman",
"Kristina",
""
]
] |
cs/0612047 | Kristina Lerman | Kristina Lerman and Laurie Jones | Social Browsing on Flickr | 8 pages; submitted to the International Conference on Weblogs and
Social Media | null | null | null | cs.HC cs.AI | null | The new social media sites - blogs, wikis, del.icio.us and Flickr, among
others - underscore the transformation of the Web to a participatory medium in
which users are actively creating, evaluating and distributing information. The
photo-sharing site Flickr, for example, allows users to upload photographs,
view photos created by others, comment on those photos, etc. As is common to
other social media sites, Flickr allows users to designate others as
``contacts'' and to track their activities in real time. The contacts (or
friends) lists form the social network backbone of social media sites. We claim
that these social networks facilitate new ways of interacting with information,
e.g., through what we call social browsing. The contacts interface on Flickr
enables users to see latest images submitted by their friends. Through an
extensive analysis of Flickr data, we show that social browsing through the
contacts' photo streams is one of the primary methods by which users find new
images on Flickr. This finding has implications for creating personalized
recommendation systems based on the user's declared contacts lists.
| [
{
"version": "v1",
"created": "Thu, 7 Dec 2006 23:41:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lerman",
"Kristina",
""
],
[
"Jones",
"Laurie",
""
]
] |
cs/0612048 | Changjia Chen | chunxi li and changjia chen | Queue Model of Leaf Degree Keeping Process in Gnutella Network | 3 pages, 6 figures | null | null | null | cs.NI cs.PF | null | Leaf degree keeping process of Gnutella is discussed in this paper. Queue
system based on rules of Gnutella protocol are introduced to modeling this
process. The leaf degree distributions resulted from the queue system and from
our real measurement are compared. The well match of those distributions reveal
that the leaf degree distribution in Gnutella network should not be power law
or power law like as reported before. It is more likely a distribution driven
by certain queue process specified by the protocol.
| [
{
"version": "v1",
"created": "Fri, 8 Dec 2006 00:44:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"li",
"chunxi",
""
],
[
"chen",
"changjia",
""
]
] |
cs/0612052 | Jon Feldman | Jon Feldman, S. Muthukrishnan, Martin Pal, Cliff Stein | Budget Optimization in Search-Based Advertising Auctions | null | null | null | null | cs.DS cs.CE cs.GT | null | Internet search companies sell advertisement slots based on users' search
queries via an auction. While there has been a lot of attention on the auction
process and its game-theoretic aspects, our focus is on the advertisers. In
particular, the advertisers have to solve a complex optimization problem of how
to place bids on the keywords of their interest so that they can maximize their
return (the number of user clicks on their ads) for a given budget. We model
the entire process and study this budget optimization problem. While most
variants are NP hard, we show, perhaps surprisingly, that simply randomizing
between two uniform strategies that bid equally on all the keywords works well.
More precisely, this strategy gets at least 1-1/e fraction of the maximum
clicks possible. Such uniform strategies are likely to be practical. We also
present inapproximability results, and optimal algorithms for variants of the
budget optimization problem.
| [
{
"version": "v1",
"created": "Fri, 8 Dec 2006 17:33:54 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Feldman",
"Jon",
""
],
[
"Muthukrishnan",
"S.",
""
],
[
"Pal",
"Martin",
""
],
[
"Stein",
"Cliff",
""
]
] |
cs/0612054 | Wojciech Mazurczyk | Wojciech Mazurczyk, Zbigniew Kotulski | Lightweight security mechanism for PSTN-VoIP cooperation | 6 pages, 5 figures | null | null | null | cs.CR cs.MM | null | In this paper we describe a new, lightweight security mechanism for PSTN-VoIP
cooperation that is based on two information hiding techniques: digital
watermarking and steganography. Proposed scheme is especially suitable for
PSTN-IP-PSTN (toll-by-passing) scenario which nowadays is very popular
application of IP Telephony systems. With the use of this mechanism we
authenticate end-to-end transmitted voice between PSTN users. Additionally we
improve IP part traffic security (both media stream and VoIP signalling
messages). Exemplary scenario is presented for SIP signalling protocol along
with SIP-T extension and H.248/Megaco protocol.
| [
{
"version": "v1",
"created": "Fri, 8 Dec 2006 22:05:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mazurczyk",
"Wojciech",
""
],
[
"Kotulski",
"Zbigniew",
""
]
] |
cs/0612055 | Milan Ruzic | Anna Pagh and Rasmus Pagh and Milan Ruzic | Linear Probing with Constant Independence | 13 pages | null | null | null | cs.DS cs.DB | null | Hashing with linear probing dates back to the 1950s, and is among the most
studied algorithms. In recent years it has become one of the most important
hash table organizations since it uses the cache of modern computers very well.
Unfortunately, previous analysis rely either on complicated and space consuming
hash functions, or on the unrealistic assumption of free access to a truly
random hash function. Already Carter and Wegman, in their seminal paper on
universal hashing, raised the question of extending their analysis to linear
probing. However, we show in this paper that linear probing using a pairwise
independent family may have expected {\em logarithmic} cost per operation. On
the positive side, we show that 5-wise independence is enough to ensure
constant expected time per operation. This resolves the question of finding a
space and time efficient hash function that provably ensures good performance
for linear probing.
| [
{
"version": "v1",
"created": "Fri, 8 Dec 2006 22:50:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pagh",
"Anna",
""
],
[
"Pagh",
"Rasmus",
""
],
[
"Ruzic",
"Milan",
""
]
] |
cs/0612056 | Gayathree U | U. Gayathree | Conscious Intelligent Systems - Part 1 : I X I | null | null | null | null | cs.AI | null | Did natural consciousness and intelligent systems arise out of a path that
was co-evolutionary to evolution? Can we explain human self-consciousness as
having risen out of such an evolutionary path? If so how could it have been?
In this first part of a two-part paper (titled IXI), we take a learning
system perspective to the problem of consciousness and intelligent systems, an
approach that may look unseasonable in this age of fMRI's and high tech
neuroscience.
We posit conscious intelligent systems in natural environments and wonder how
natural factors influence their design paths. Such a perspective allows us to
explain seamlessly a variety of natural factors, factors ranging from the rise
and presence of the human mind, man's sense of I, his self-consciousness and
his looping thought processes to factors like reproduction, incubation,
extinction, sleep, the richness of natural behavior, etc. It even allows us to
speculate on a possible human evolution scenario and other natural phenomena.
| [
{
"version": "v1",
"created": "Sat, 9 Dec 2006 17:18:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gayathree",
"U.",
""
]
] |
cs/0612057 | Gayathree U | U. Gayathree | Conscious Intelligent Systems - Part II - Mind, Thought, Language and
Understanding | null | null | null | null | cs.AI | null | This is the second part of a paper on Conscious Intelligent Systems. We use
the understanding gained in the first part (Conscious Intelligent Systems Part
1: IXI (arxiv id cs.AI/0612056)) to look at understanding. We see how the
presence of mind affects understanding and intelligent systems; we see that the
presence of mind necessitates language. The rise of language in turn has
important effects on understanding. We discuss the humanoid question and how
the question of self-consciousness (and by association mind/thought/language)
would affect humanoids too.
| [
{
"version": "v1",
"created": "Sat, 9 Dec 2006 17:28:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gayathree",
"U.",
""
]
] |
cs/0612058 | Eric Vigoda | Daniel Stefankovic, Santosh Vempala, Eric Vigoda | Adaptive Simulated Annealing: A Near-optimal Connection between Sampling
and Counting | null | null | null | null | cs.DS cs.DM | null | We present a near-optimal reduction from approximately counting the
cardinality of a discrete set to approximately sampling elements of the set. An
important application of our work is to approximating the partition function
$Z$ of a discrete system, such as the Ising model, matchings or colorings of a
graph. The typical approach to estimating the partition function $Z(\beta^*)$
at some desired inverse temperature $\beta^*$ is to define a sequence, which we
call a {\em cooling schedule}, $\beta_0=0<\beta_1<...<\beta_\ell=\beta^*$ where
Z(0) is trivial to compute and the ratios $Z(\beta_{i+1})/Z(\beta_i)$ are easy
to estimate by sampling from the distribution corresponding to $Z(\beta_i)$.
Previous approaches required a cooling schedule of length $O^*(\ln{A})$ where
$A=Z(0)$, thereby ensuring that each ratio $Z(\beta_{i+1})/Z(\beta_i)$ is
bounded. We present a cooling schedule of length $\ell=O^*(\sqrt{\ln{A}})$.
For well-studied problems such as estimating the partition function of the
Ising model, or approximating the number of colorings or matchings of a graph,
our cooling schedule is of length $O^*(\sqrt{n})$, which implies an overall
savings of $O^*(n)$ in the running time of the approximate counting algorithm
(since roughly $\ell$ samples are needed to estimate each ratio).
| [
{
"version": "v1",
"created": "Sun, 10 Dec 2006 20:00:38 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Stefankovic",
"Daniel",
""
],
[
"Vempala",
"Santosh",
""
],
[
"Vigoda",
"Eric",
""
]
] |
cs/0612060 | Sreyash Kenkre | Sreyash Kenkre, Sundar Vishwanathan | The Common Prefix Problem On Trees | 8 pages | null | null | null | cs.DS cs.CC | null | We present a theoretical study of a problem arising in database query
optimization, which we call as The Common Prefix Problem. We present a
$(1-o(1))$ factor approximation algorithm for this problem, when the underlying
graph is a binary tree. We then use a result of Feige and Kogan to show that
even on stars, the problem is hard to approximate.
| [
{
"version": "v1",
"created": "Mon, 11 Dec 2006 12:32:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kenkre",
"Sreyash",
""
],
[
"Vishwanathan",
"Sundar",
""
]
] |
cs/0612062 | Federico Calzolari | Federico Calzolari, Michele Mammini, Monica Monachini | Unifying Lexicons in view of a Phonological and Morphological Lexical DB | 4 pages | null | null | null | cs.IR | null | The present work falls in the line of activities promoted by the European
Languguage Resource Association (ELRA) Production Committee (PCom) and raises
issues in methods, procedures and tools for the reusability, creation, and
management of Language Resources. A two-fold purpose lies behind this
experiment. The first aim is to investigate the feasibility, define methods and
procedures for combining two Italian lexical resources that have incompatible
formats and complementary information into a Unified Lexicon (UL). The adopted
strategy and the procedures appointed are described together with the driving
criterion of the merging task, where a balance between human and computational
efforts is pursued. The coverage of the UL has been maximized, by making use of
simple and fast matching procedures. The second aim is to exploit this newly
obtained resource for implementing the phonological and morphological layers of
the CLIPS lexical database. Implementing these new layers and linking them with
the already exisitng syntactic and semantic layers is not a trivial task. The
constraints imposed by the model, the impact at the architectural level and the
solution adopted in order to make the whole database `speak' efficiently are
presented. Advantages vs. disadvantages are discussed.
| [
{
"version": "v1",
"created": "Mon, 11 Dec 2006 14:45:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Calzolari",
"Federico",
""
],
[
"Mammini",
"Michele",
""
],
[
"Monachini",
"Monica",
""
]
] |
cs/0612066 | Karim El Defrawy | Karim El Defrawy, Athina Markopoulou and Katerina Argyraki | Optimal Filtering for DDoS Attacks | 13 pages, 14 figures | null | null | null | cs.NI | null | Distributed Denial-of-Service (DDoS) attacks are a major problem in the
Internet today. In one form of a DDoS attack, a large number of compromised
hosts send unwanted traffic to the victim, thus exhausting the resources of the
victim and preventing it from serving its legitimate clients. One of the main
mechanisms that have been proposed to deal with DDoS is filtering, which allows
routers to selectively block unwanted traffic. Given the magnitude of DDoS
attacks and the high cost of filters in the routers today, the successful
mitigation of a DDoS attack using filtering crucially depends on the efficient
allocation of filtering resources. In this paper, we consider a single router,
typically the gateway of the victim, with a limited number of available
filters. We study how to optimally allocate filters to attack sources, or
entire domains of attack sources, so as to maximize the amount of good traffic
preserved, under a constraint on the number of filters. We formulate the
problem as an optimization problem and solve it optimally using dynamic
programming, study the properties of the optimal allocation, experiment with a
simple heuristic and evaluate our solutions for a range of realistic
attack-scenarios. First, we look at a single-tier where the collateral damage
is high due to the filtering at the granularity of domains. Second, we look at
the two-tier problem where we have an additional constraint on the number of
filters and the filtering is performed on the granularity of attackers and
domains.
| [
{
"version": "v1",
"created": "Tue, 12 Dec 2006 04:52:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Defrawy",
"Karim El",
""
],
[
"Markopoulou",
"Athina",
""
],
[
"Argyraki",
"Katerina",
""
]
] |
cs/0612068 | Esben Rune Hansen | Esben Rune Hansen and Henrik Reif Andersen | Interactive Configuration by Regular String Constraints | Tech Report | null | null | null | cs.AI | null | A product configurator which is complete, backtrack free and able to compute
the valid domains at any state of the configuration can be constructed by
building a Binary Decision Diagram (BDD). Despite the fact that the size of the
BDD is exponential in the number of variables in the worst case, BDDs have
proved to work very well in practice. Current BDD-based techniques can only
handle interactive configuration with small finite domains. In this paper we
extend the approach to handle string variables constrained by regular
expressions. The user is allowed to change the strings by adding letters at the
end of the string. We show how to make a data structure that can perform fast
valid domain computations given some assignment on the set of string variables.
We first show how to do this by using one large DFA. Since this approach is
too space consuming to be of practical use, we construct a data structure that
simulates the large DFA and in most practical cases are much more space
efficient. As an example a configuration problem on $n$ string variables with
only one solution in which each string variable is assigned to a value of
length of $k$ the former structure will use $\Omega(k^n)$ space whereas the
latter only need $O(kn)$. We also show how this framework easily can be
combined with the recent BDD techniques to allow both boolean, integer and
string variables in the configuration problem.
| [
{
"version": "v1",
"created": "Tue, 12 Dec 2006 16:21:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hansen",
"Esben Rune",
""
],
[
"Andersen",
"Henrik Reif",
""
]
] |
cs/0612070 | Ilya Safro Mr. | Sergey Benditkis, Illya Safro | Generalizations of the Hanoi Towers Problem | null | null | null | null | cs.DM | null | Our theme bases on the classical Hanoi Towers Problem. In this paper we will
define a new problem, permitting some positions, that were not legal in the
classical problem. Our goal is to find an optimal (shortest possible) sequence
of discs' moves. Besides that, we will research all versions of 3-pegs
classical problem with some special constraints, when some types of moves are
disallowed.
| [
{
"version": "v1",
"created": "Wed, 13 Dec 2006 22:30:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Benditkis",
"Sergey",
""
],
[
"Safro",
"Illya",
""
]
] |
cs/0612071 | Francis Heylighen | Francis Heylighen | Why is Open Access Development so Successful? Stigmergic organization
and the economics of information | null | in: B. Lutterbeck, M. Baerwolff & R. A. Gehring (eds.), Open
Source Jahrbuch 2007, Lehmanns Media, 2007 | null | ECCO Working Paper 2006-06 | cs.CY cs.DL physics.soc-ph | null | The explosive development of "free" or "open source" information goods
contravenes the conventional wisdom that markets and commercial organizations
are necessary to efficiently supply products. This paper proposes a theoretical
explanation for this phenomenon, using concepts from economics and theories of
self-organization. Once available on the Internet, information is intrinsically
not a scarce good, as it can be replicated virtually without cost. Moreover,
freely distributing information is profitable to its creator, since it improves
the quality of the information, and enhances the creator's reputation. This
provides a sufficient incentive for people to contribute to open access
projects. Unlike traditional organizations, open access communities are open,
distributed and self-organizing. Coordination is achieved through stigmergy:
listings of "work-in-progress" direct potential contributors to the tasks where
their contribution is most likely to be fruitful. This obviates the need both
for centralized planning and for the "invisible hand" of the market.
| [
{
"version": "v1",
"created": "Thu, 14 Dec 2006 12:15:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Heylighen",
"Francis",
""
]
] |
cs/0612074 | Zengjian Hu | Petra Berenbrink and Colin Cooper and Zengjian Hu | Energy Efficient Randomized Communication in Unknown AdHoc Networks | 15 pages. 1 figure | null | null | null | cs.DC cs.DS | null | This paper studies broadcasting and gossiping algorithms in random and
general AdHoc networks. Our goal is not only to minimise the broadcasting and
gossiping time, but also to minimise the energy consumption, which is measured
in terms of the total number of messages (or transmissions) sent. We assume
that the nodes of the network do not know the network, and that they can only
send with a fixed power, meaning they can not adjust the areas sizes that their
messages cover. We believe that under these circumstances the number of
transmissions is a very good measure for the overall energy consumption.
For random networks, we present a broadcasting algorithm where every node
transmits at most once. We show that our algorithm broadcasts in $O(\log n)$
steps, w.h.p, where $n$ is the number of nodes. We then present a $O(d \log n)$
($d$ is the expected degree) gossiping algorithm using $O(\log n)$ messages per
node.
For general networks with known diameter $D$, we present a randomised
broadcasting algorithm with optimal broadcasting time $O(D \log (n/D) + \log^2
n)$ that uses an expected number of $O(\log^2 n / \log (n/D))$ transmissions
per node. We also show a tradeoff result between the broadcasting time and the
number of transmissions: we construct a network such that any oblivious
algorithmusing a time-invariant distribution requires $\Omega(\log^2 n / \log
(n/D))$ messages per node in order to finish broadcasting in optimal time. This
demonstrates the tightness of our upper bound. We also show that no oblivious
algorithm can complete broadcasting w.h.p. using $o(\log n)$ messages per node.
| [
{
"version": "v1",
"created": "Fri, 15 Dec 2006 03:43:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Berenbrink",
"Petra",
""
],
[
"Cooper",
"Colin",
""
],
[
"Hu",
"Zengjian",
""
]
] |
cs/0612081 | Manas Tungare | Manas Tungare, Pardha S. Pyla, Manuel P\'erez-Qui\~nones, and Steve
Harrison | Personal Information Ecosystems and Implications for Design | null | null | null | null | cs.HC | null | Today, people use multiple devices to fulfill their information needs.
However, designers design each device individually, without accounting for the
other devices that users may also use. In many cases, the applications on all
these devices are designed to be functional replicates of each other. We argue
that this results in an over-reliance on data synchronization across devices,
version control nightmares, and increased burden of file management. In this
paper, we present the idea of a \textit{personal information ecosystem}, an
analogy to biological ecosystems, which allows us to discuss the
inter-relationships among these devices to fulfill the information needs of the
user. There is a need for designers to design devices as part of a complete
ecosystem, not as independent devices that simply share data replicated across
them. To help us understand this domain and to facilitate the dialogue and
study of such systems, we present the terminology, classifications of the
interdependencies among different devices, and resulting implications for
design.
| [
{
"version": "v1",
"created": "Mon, 18 Dec 2006 07:53:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Tungare",
"Manas",
""
],
[
"Pyla",
"Pardha S.",
""
],
[
"Pérez-Quiñones",
"Manuel",
""
],
[
"Harrison",
"Steve",
""
]
] |
cs/0612082 | Thierry Despeyroux | Thierry Despeyroux (INRIA Rocquencourt / INRIA Sophia Antipolis) | Developing efficient parsers in Prolog: the CLF manual (v1.0) | null | null | null | null | cs.SE | null | This document describes a couple of tools that help to quickly design and
develop computer (formalized) languages. The first one use Flex to perform
lexical analysis and the second is an extention of Prolog DCGs to perfom
syntactical analysis. Initially designed as a new component for the Centaur
system, these tools are now available independently and can be used to
construct efficient Prolog parsers that can be integrated in Prolog or
heterogeneous systems. This is the initial version of the CLF documentation.
Updated version will be available online when necessary.
| [
{
"version": "v1",
"created": "Mon, 18 Dec 2006 08:40:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Despeyroux",
"Thierry",
"",
"INRIA Rocquencourt / INRIA Sophia Antipolis"
]
] |
cs/0612085 | Roberto Bagnara | Roberto Bagnara, Patricia M. Hill, Enea Zaffanella | The Parma Polyhedra Library: Toward a Complete Set of Numerical
Abstractions for the Analysis and Verification of Hardware and Software
Systems | 38 pages, 2 figures, 3 listings, 3 tables | null | null | Quaderno 457 | cs.MS cs.PL | null | Since its inception as a student project in 2001, initially just for the
handling (as the name implies) of convex polyhedra, the Parma Polyhedra Library
has been continuously improved and extended by joining scrupulous research on
the theoretical foundations of (possibly non-convex) numerical abstractions to
a total adherence to the best available practices in software development. Even
though it is still not fully mature and functionally complete, the Parma
Polyhedra Library already offers a combination of functionality, reliability,
usability and performance that is not matched by similar, freely available
libraries. In this paper, we present the main features of the current version
of the library, emphasizing those that distinguish it from other similar
libraries and those that are important for applications in the field of
analysis and verification of hardware and software systems.
| [
{
"version": "v1",
"created": "Mon, 18 Dec 2006 10:15:38 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bagnara",
"Roberto",
""
],
[
"Hill",
"Patricia M.",
""
],
[
"Zaffanella",
"Enea",
""
]
] |
cs/0612088 | Julien Robert | Julien Robert and Nicolas Schabanel | Non-Clairvoyant Batch Sets Scheduling: Fairness is Fair enough | 12 pages, 1 figure | null | null | null | cs.DC cs.DS | null | Scheduling questions arise naturally in many different areas among which
operating system design, compiling,... In real life systems, the
characteristics of the jobs (such as release time and processing time) are
usually unknown and unpredictable beforehand. The system is typically unaware
of the remaining work in each job or of the ability of the job to take
advantage of more resources. Following these observations, we adopt the job
model by Edmonds et al (2000, 2003) in which the jobs go through a sequence of
different phases. Each phase consists of a certain quantity of work and a
speed-up function that models how it takes advantage of the number of
processors it receives. We consider the non-clairvoyant online setting where a
collection of jobs arrives at time 0. We consider the metrics setflowtime
introduced by Robert et al (2007). The goal is to minimize the sum of the
completion time of the sets, where a set is completed when all of its jobs are
done. If the input consists of a single set of jobs, this is simply the
makespan of the jobs; and if the input consists of a collection of singleton
sets, it is simply the flowtime of the jobs. We show that the non-clairvoyant
strategy EQUIoEQUI that evenly splits the available processors among the still
unserved sets and then evenly splits these processors among the still
uncompleted jobs of each unserved set, achieves a competitive ratio
(2+\sqrt3+o(1))\frac{ln n}{lnln n} for the setflowtime minimization and that
this is asymptotically optimal (up to a constant factor), where n is the size
of the largest set. For makespan minimization, we show that the non-clairvoyant
strategy EQUI achieves a competitive ratio of (1+o(1))\frac{ln n}{lnln n},
which is again asymptotically optimal.
| [
{
"version": "v1",
"created": "Tue, 19 Dec 2006 15:19:59 GMT"
},
{
"version": "v2",
"created": "Tue, 19 Dec 2006 21:55:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Robert",
"Julien",
""
],
[
"Schabanel",
"Nicolas",
""
]
] |
cs/0612090 | Vita Hinze-Hoare | Vita Hinze-Hoare | A Review of Papers that have a bearing on an Analysis of User
Interactions in A Collaborative On-line Laboratory | null | null | null | null | cs.HC | null | A number of papers have been reviewed in the areas of HCI, CSCW, CSCL. These
have been analyzed with a view to extract the ideas relevant to a consideration
of user interactions in a collaborative on line laboratory which is being under
development for use in the ITO BSc course at Southampton University. The
construction of new theoretical models is to be based upon principles of
collaborative HCI design and constructivist and situational educational theory.
An investigation of the review papers it is hoped will lead towards a
methodology/framework that can be used as guidance for collaborative learning
systems and these will need to be developed alongside the requirements as they
change during the development cycles. The primary outcome will be the analysis
and re-design of the online e-learning laboratory together with a measure of
its efficacy in the learning process.
| [
{
"version": "v1",
"created": "Mon, 18 Dec 2006 22:24:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hinze-Hoare",
"Vita",
""
]
] |
cs/0612092 | Ahmed Sidky Ahmed Sidky | Ahmed Sidky, James Arthur | Agile Adoption Process Framework | This is a reference document containing an overview of the adoption
framework along with all the indicators used for the assessment of the agile
practices | null | null | null | cs.SE | null | Today many organizations aspire to adopt agile processes in hope of
overcoming some of the difficulties they are facing with their current software
development process. There is no structured framework for the agile adoption
process. This paper presents a 3-Stage process framework that assists
organization and guides organizations through their agile adoption efforts. The
Process Framework has been received significantly positive feedback from
experts and leaders in agile adoption industry.
| [
{
"version": "v1",
"created": "Tue, 19 Dec 2006 16:35:46 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sidky",
"Ahmed",
""
],
[
"Arthur",
"James",
""
]
] |
cs/0612093 | Jo\~ao Barros | Miguel S. Silva, Francisco Martins, Luis Lopes, Joao Barros | A Calculus for Sensor Networks | 24 pages, 1 figure, submitted for publication | null | null | null | cs.DC cs.PL | null | We consider the problem of providing a rigorous model for programming
wireless sensor networks. Assuming that collisions, packet losses, and errors
are dealt with at the lower layers of the protocol stack, we propose a Calculus
for Sensor Networks (CSN) that captures the main abstractions for programming
applications for this class of devices. Besides providing the syntax and
semantics for the calculus, we show its expressiveness by providing
implementations for several examples of typical operations on sensor networks.
Also included is a detailed discussion of possible extensions to CSN that
enable the modeling of other important features of these networks such as
sensor state, sampling strategies, and network security.
| [
{
"version": "v1",
"created": "Tue, 19 Dec 2006 14:45:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Silva",
"Miguel S.",
""
],
[
"Martins",
"Francisco",
""
],
[
"Lopes",
"Luis",
""
],
[
"Barros",
"Joao",
""
]
] |
cs/0612098 | Manik Lal Das | Manik Lal Das, Ashutosh Saxena, Deepak B. Phatak | Algorithms and Approaches of Proxy Signature: A Survey | 29 pages | null | null | null | cs.CR | null | Numerous research studies have been investigated on proxy signatures over the
last decade. This survey reviews the research progress on proxy signatures,
analyzes a few notable proposals, and provides an overall remark of these
proposals.
| [
{
"version": "v1",
"created": "Wed, 20 Dec 2006 06:09:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Das",
"Manik Lal",
""
],
[
"Saxena",
"Ashutosh",
""
],
[
"Phatak",
"Deepak B.",
""
]
] |
cs/0612100 | Rob van Stee | Leah Epstein and Rob van Stee | Improved results for a memory allocation problem | null | null | null | null | cs.DS | null | We consider a memory allocation problem that can be modeled as a version of
bin packing where items may be split, but each bin may contain at most two
(parts of) items. A 3/2-approximation algorithm and an NP-hardness proof for
this problem was given by Chung et al. We give a simpler 3/2-approximation
algorithm for it which is in fact an online algorithm. This algorithm also has
good performance for the more general case where each bin may contain at most k
parts of items. We show that this general case is also strongly NP-hard.
Additionally, we give an efficient 7/5-approximation algorithm.
| [
{
"version": "v1",
"created": "Wed, 20 Dec 2006 13:39:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Epstein",
"Leah",
""
],
[
"van Stee",
"Rob",
""
]
] |
cs/0612102 | Nilesh Dalvi | Nilesh Dalvi and Dan Suciu | The Dichotomy of Conjunctive Queries on Probabilistic Structures | null | null | null | null | cs.DB | null | We show that for every conjunctive query, the complexity of evaluating it on
a probabilistic database is either \PTIME or #\P-complete, and we give an
algorithm for deciding whether a given conjunctive query is \PTIME or
#\P-complete. The dichotomy property is a fundamental result on query
evaluation on probabilistic databases and it gives a complete classification of
the complexity of conjunctive queries.
| [
{
"version": "v1",
"created": "Wed, 20 Dec 2006 21:11:05 GMT"
},
{
"version": "v2",
"created": "Sat, 13 Jan 2007 06:51:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dalvi",
"Nilesh",
""
],
[
"Suciu",
"Dan",
""
]
] |
cs/0612103 | Vibhor Rastogi | Vibhor Rastogi, Dan Suciu, Sungho Hong | The Boundary Between Privacy and Utility in Data Anonymization | null | null | null | null | cs.DB | null | We consider the privacy problem in data publishing: given a relation I
containing sensitive information 'anonymize' it to obtain a view V such that,
on one hand attackers cannot learn any sensitive information from V, and on the
other hand legitimate users can use V to compute useful statistics on I. These
are conflicting goals. We use a definition of privacy that is derived from
existing ones in the literature, which relates the a priori probability of a
given tuple t, Pr(t), with the a posteriori probability, Pr(t | V), and propose
a novel and quite practical definition for utility. Our main result is the
following. Denoting n the size of I and m the size of the domain from which I
was drawn (i.e. n < m) then: when the a priori probability is Pr(t) =
Omega(n/sqrt(m)) for some t, there exists no useful anonymization algorithm,
while when Pr(t) = O(n/m) for all tuples t, then we give a concrete
anonymization algorithm that is both private and useful. Our algorithm is quite
different from the k-anonymization algorithm studied intensively in the
literature, and is based on random deletions and insertions to I.
| [
{
"version": "v1",
"created": "Thu, 21 Dec 2006 00:21:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rastogi",
"Vibhor",
""
],
[
"Suciu",
"Dan",
""
],
[
"Hong",
"Sungho",
""
]
] |
cs/0612104 | Keki Burjorjee | Keki Burjorjee | Sufficient Conditions for Coarse-Graining Evolutionary Dynamics | 19 pages, 1 figure. Accepted to the Foundations of Genetic Algorithms
Conference 2007 (FOGA IX) | null | null | null | cs.NE cs.AI | null | It is commonly assumed that the ability to track the frequencies of a set of
schemata in the evolving population of an infinite population genetic algorithm
(IPGA) under different fitness functions will advance efforts to obtain a
theory of adaptation for the simple GA. Unfortunately, for IPGAs with long
genomes and non-trivial fitness functions there do not currently exist
theoretical results that allow such a study. We develop a simple framework for
analyzing the dynamics of an infinite population evolutionary algorithm (IPEA).
This framework derives its simplicity from its abstract nature. In particular
we make no commitment to the data-structure of the genomes, the kind of
variation performed, or the number of parents involved in a variation
operation. We use this framework to derive abstract conditions under which the
dynamics of an IPEA can be coarse-grained. We then use this result to derive
concrete conditions under which it becomes computationally feasible to closely
approximate the frequencies of a family of schemata of relatively low order
over multiple generations, even when the bitstsrings in the evolving population
of the IPGA are long.
| [
{
"version": "v1",
"created": "Thu, 21 Dec 2006 02:18:17 GMT"
},
{
"version": "v2",
"created": "Sat, 5 May 2007 02:25:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Burjorjee",
"Keki",
""
]
] |
cs/0612105 | Elankovan Sundararajan Mr. | Elankovan Sundararajan and Aaron Harwood | Towards Parallel Computing on the Internet: Applications, Architectures,
Models and Programming Tools | 39 pages, 9 figures | null | null | null | cs.DC cs.PF | null | The development of Internet wide resources for general purpose parallel
computing poses the challenging task of matching computation and communication
complexity. A number of parallel computing models exist that address this for
traditional parallel architectures, and there are a number of emerging models
that attempt to do this for large scale Internet-based systems like
computational grids. In this survey we cover the three fundamental aspects --
application, architecture and model, and we show how they have been developed
over the last decade. We also cover programming tools that are currently being
used for parallel programming in computational grids. The trend in conventional
computational models are to put emphasis on efficient communication between
participating nodes by adapting different types of communication to network
conditions. Effects of dynamism and uncertainties that arise in large scale
systems are evidently important to understand and yet there is currently little
work that addresses this from a parallel computing perspective.
| [
{
"version": "v1",
"created": "Thu, 21 Dec 2006 06:38:21 GMT"
},
{
"version": "v2",
"created": "Mon, 25 Dec 2006 00:51:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sundararajan",
"Elankovan",
""
],
[
"Harwood",
"Aaron",
""
]
] |
cs/0612107 | Friedhelm. R. Drepper | Friedhelm R. Drepper | Voiced speech as secondary response of a self-consistent fundamental
drive | 13 pages with 3 figures | null | null | null | cs.SD nlin.AO | null | Voiced segments of speech are assumed to be composed of non-stationary
acoustic objects which can be described as stationary response of a
non-stationary fundamental drive (FD) process and which are furthermore suited
to reconstruct the hidden FD by using a voice adapted (self-consistent)
part-tone decomposition of the speech signal. The universality and robustness
of human pitch perception encourages the reconstruction of a band-limited FD in
the frequency range of the pitch. The self-consistent decomposition of voiced
continuants generates several part-tones which can be confirmed to be
topologically equivalent to corresponding acoustic modes of the excitation on
the transmitter side. As topologically equivalent image of a glottal master
oscillator, the self-consistent FD is suited to serve as low frequency part of
the basic time-scale separation of auditive perception and to describe the
broadband voiced excitation as entrained (synchronized) and/or modulated
primary response. Being guided by the acoustic correlates of pitch and loudness
perception, the time-scale separation avoids the conventional assumption of
stationary excitation and represents the basic decoding step of an advanced
precision transmission protocol of self-consistent (voiced) acoustic objects.
The present study is focussed on the adaptation of the trajectories (contours)
of the centre filter frequency of the part-tones to the chirp of the glottal
master oscillator.
| [
{
"version": "v1",
"created": "Thu, 21 Dec 2006 12:39:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Drepper",
"Friedhelm R.",
""
]
] |
cs/0612108 | Fabien Mathieu | Dmitry Lebedev (INRIA Rocquencourt), Fabien Mathieu (INRIA
Rocquencourt), Laurent Viennot (INRIA Rocquencourt), Anh-Tuan Gai (INRIA
Rocquencourt), Julien Reynier (INRIA Rocquencourt, INRIA Rocquencourt),
Fabien De Montgolfier (INRIA Rocquencourt) | On Using Matching Theory to Understand P2P Network Design | null | null | null | null | cs.NI cs.GT | null | This paper aims to provide insight into stability of collaboration choices in
P2P networks. We study networks where exchanges between nodes are driven by the
desire to receive the best service available. This is the case for most
existing P2P networks. We explore an evolution model derived from stable
roommates theory that accounts for heterogeneity between nodes. We show that
most P2P applications can be modeled using stable matching theory. This is the
case whenever preference lists can be deduced from the exchange policy. In many
cases, the preferences lists are characterized by an interesting acyclic
property. We show that P2P networks with acyclic preferences possess a unique
stable state with good convergence properties.
| [
{
"version": "v1",
"created": "Thu, 21 Dec 2006 15:19:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lebedev",
"Dmitry",
"",
"INRIA Rocquencourt"
],
[
"Mathieu",
"Fabien",
"",
"INRIA\n Rocquencourt"
],
[
"Viennot",
"Laurent",
"",
"INRIA Rocquencourt"
],
[
"Gai",
"Anh-Tuan",
"",
"INRIA\n Rocquencourt"
],
[
"Reynier",
"Julien",
"",
"INRIA Rocquencourt, INRIA Rocquencourt"
],
[
"De Montgolfier",
"Fabien",
"",
"INRIA Rocquencourt"
]
] |
cs/0612110 | James Hamilton | James Hamilton | Architecture for Modular Data Centers | This article is published under a Creative Commons License Agreement
(http://creativecommons.org/licenses/by/2.5/.) You may copy, distribute,
display, and perform the work, make derivative works and make commercial use
of the work, but, you must attribute the work to the author and CIDR 2007.
3rd Biennial Conference on Innovative Data Systems Research (CIDR) January
710, 2007, Asilomar, California, USA | null | null | null | cs.DB | null | Several factors are driving high-scale deployments of large data centers
built upon commodity components. These commodity clusters are far cheaper than
mainframe systems of the past but they bring serious heat and power density
issues. Also the high failure rate of the individual components drives
significant administrative costs. This proposal outlines an architecture for
data center design based upon 20'x8'x8' modules that substantially changes how
these systems are acquired, administered, and then later recycled.
| [
{
"version": "v1",
"created": "Thu, 21 Dec 2006 19:36:38 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hamilton",
"James",
""
]
] |
cs/0612112 | Boris Baryshnikov | Boris Baryshnikov, Cipri Clinciu, Conor Cunningham, Leo Giakoumakis,
Slava Oks, Stefano Stefani | Managing Query Compilation Memory Consumption to Improve DBMS Throughput | This article is published under a Creative Commons License Agreement
(http://creativecommons.org/licenses/by/2.5/.) You may copy, distribute,
display, and perform the work, make derivative works and make commercial use
of the work, but, you must attribute the work to the author and CIDR 2007.
3rd Biennial Conference on Innovative Data Systems Research (CIDR) January
710, 2007, Asilomar, California, USA | null | null | null | cs.DB | null | While there are known performance trade-offs between database page buffer
pool and query execution memory allocation policies, little has been written on
the impact of query compilation memory use on overall throughput of the
database management system (DBMS). We present a new aspect of the query
optimization problem and offer a solution implemented in Microsoft SQL Server
2005. The solution provides stable throughput for a range of workloads even
when memory requests outstrip the ability of the hardware to service those
requests.
| [
{
"version": "v1",
"created": "Thu, 21 Dec 2006 21:51:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Baryshnikov",
"Boris",
""
],
[
"Clinciu",
"Cipri",
""
],
[
"Cunningham",
"Conor",
""
],
[
"Giakoumakis",
"Leo",
""
],
[
"Oks",
"Slava",
""
],
[
"Stefani",
"Stefano",
""
]
] |
cs/0612113 | Paul Greenfield | Paul Greenfield, Alan Fekete, Julian Jang, Dean Kuo, Surya Nepal | Isolation Support for Service-based Applications: A Position Paper | This article is published under a Creative Commons License Agreement
(http://creativecommons.org/licenses/by/2.5/.) You may copy, distribute,
display, and perform the work, make derivative works and make commercial use
of the work, but, you must attribute the work to the author and CIDR 2007.
3rd Biennial Conference on Innovative Data Systems Research (CIDR) January
710, 2007, Asilomar, California, USA | null | null | null | cs.DB | null | In this paper, we propose an approach to providing the benefits of isolation
in service-oriented applications where it is not feasible to hold traditional
locks for ACID transactions. Our technique, called "Promises", provides an
uniform view for clients which covers a wide range of implementation techniques
on the service side, all allowing the client to check a condition and then
later rely on that condition still holding.
| [
{
"version": "v1",
"created": "Thu, 21 Dec 2006 22:08:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Greenfield",
"Paul",
""
],
[
"Fekete",
"Alan",
""
],
[
"Jang",
"Julian",
""
],
[
"Kuo",
"Dean",
""
],
[
"Nepal",
"Surya",
""
]
] |
cs/0612114 | Alexander Bohm | Alexander B\"ohm, Carl-Christian Kanne, Guido Moerkotte | Demaq: A Foundation for Declarative XML Message Processing | This article is published under a Creative Commons License Agreement
(http://creativecommons.org/licenses/by/2.5/.) You may copy, distribute,
display, and perform the work, make derivative works and make commercial use
of the work, but, you must attribute the work to the author and CIDR 2007.
3rd Biennial Conference on Innovative Data Systems Research (CIDR) January
710, 2007, Asilomar, California, USA | null | null | null | cs.DB | null | This paper gives an overview of Demaq, an XML message processing system
operating on the foundation of transactional XML message queues. We focus on
the syntax and semantics of its fully declarative, rule-based application
language and demonstrate our message-based programming paradigm in the context
of a case study. Further, we discuss optimization opportunities for executing
Demaq programs.
| [
{
"version": "v1",
"created": "Thu, 21 Dec 2006 22:29:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Böhm",
"Alexander",
""
],
[
"Kanne",
"Carl-Christian",
""
],
[
"Moerkotte",
"Guido",
""
]
] |
cs/0612115 | Roger Barga | Roger S. Barga, Jonathan Goldstein, Mohamed Ali, Mingsheng Hong | Consistent Streaming Through Time: A Vision for Event Stream Processing | This article is published under a Creative Commons License Agreement
(http://creativecommons.org/licenses/by/2.5/.) You may copy, distribute,
display, and perform the work, make derivative works and make commercial use
of the work, but, you must attribute the work to the author and CIDR 2007.
3rd Biennial Conference on Innovative Data Systems Research (CIDR) January
710, 2007, Asilomar, California, USA | null | null | null | cs.DB | null | Event processing will play an increasingly important role in constructing
enterprise applications that can immediately react to business critical events.
Various technologies have been proposed in recent years, such as event
processing, data streams and asynchronous messaging (e.g. pub/sub). We believe
these technologies share a common processing model and differ only in target
workload, including query language features and consistency requirements. We
argue that integrating these technologies is the next step in a natural
progression. In this paper, we present an overview and discuss the foundations
of CEDR, an event streaming system that embraces a temporal stream model to
unify and further enrich query language features, handle imperfections in event
delivery and define correctness guarantees. We describe specific contributions
made so far and outline next steps in developing the CEDR system.
| [
{
"version": "v1",
"created": "Thu, 21 Dec 2006 22:40:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Barga",
"Roger S.",
""
],
[
"Goldstein",
"Jonathan",
""
],
[
"Ali",
"Mohamed",
""
],
[
"Hong",
"Mingsheng",
""
]
] |
cs/0612119 | Philippe Saux Picart | Cyril Brunie (LACO), Philippe Saux Picart (LM) | Symmetric Subresultants and Applications | null | null | null | null | cs.SC | null | Schur's transforms of a polynomial are used to count its roots in the unit
disk. These are generalized them by introducing the sequence of symmetric
sub-resultants of two polynomials. Although they do have a determinantal
definition, we show that they satisfy a structure theorem which allows us to
compute them with a type of Euclidean division. As a consequence, a fast
algorithm based on a dichotomic process and FFT is designed. We prove also that
these symmetric sub-resultants have a deep link with Toeplitz matrices.
Finally, we propose a new algorithm of inversion for such matrices. It has the
same cost as those already known, however it is fraction-free and consequently
well adapted to computer algebra.
| [
{
"version": "v1",
"created": "Fri, 22 Dec 2006 08:20:11 GMT"
},
{
"version": "v2",
"created": "Thu, 29 Mar 2007 17:49:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Brunie",
"Cyril",
"",
"LACO"
],
[
"Picart",
"Philippe Saux",
"",
"LM"
]
] |
cs/0612120 | Francesco Ranzato | Francesco Ranzato and Francesco Tapparo | Generalizing the Paige-Tarjan Algorithm by Abstract Interpretation | Keywords: Abstract interpretation, abstract model checking, strong
preservation, Paige-Tarjan algorithm, refinement algorithm | null | null | null | cs.LO | null | The Paige and Tarjan algorithm (PT) for computing the coarsest refinement of
a state partition which is a bisimulation on some Kripke structure is well
known. It is also well known in model checking that bisimulation is equivalent
to strong preservation of CTL, or, equivalently, of Hennessy-Milner logic.
Drawing on these observations, we analyze the basic steps of the PT algorithm
from an abstract interpretation perspective, which allows us to reason on
strong preservation in the context of generic inductively defined (temporal)
languages and of possibly non-partitioning abstract models specified by
abstract interpretation. This leads us to design a generalized Paige-Tarjan
algorithm, called GPT, for computing the minimal refinement of an abstract
interpretation-based model that strongly preserves some given language. It
turns out that PT is a straight instance of GPT on the domain of state
partitions for the case of strong preservation of Hennessy-Milner logic. We
provide a number of examples showing that GPT is of general use. We first show
how a well-known efficient algorithm for computing stuttering equivalence can
be viewed as a simple instance of GPT. We then instantiate GPT in order to
design a new efficient algorithm for computing simulation equivalence that is
competitive with the best available algorithms. Finally, we show how GPT allows
to compute new strongly preserving abstract models by providing an efficient
algorithm that computes the coarsest refinement of a given partition that
strongly preserves the language generated by the reachability operator.
| [
{
"version": "v1",
"created": "Fri, 22 Dec 2006 19:45:34 GMT"
},
{
"version": "v2",
"created": "Wed, 27 Dec 2006 11:16:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ranzato",
"Francesco",
""
],
[
"Tapparo",
"Francesco",
""
]
] |
cs/0612121 | Stefan Funke | Stefan Funke, Soeren Laue, Zvi Lotker, Rouven Naujoks | Power Assignment Problems in Wireless Communication | 13 pages | null | null | null | cs.CG cs.AR cs.NI | null | A fundamental class of problems in wireless communication is concerned with
the assignment of suitable transmission powers to wireless devices/stations
such that the resulting communication graph satisfies certain desired
properties and the overall energy consumed is minimized. Many concrete
communication tasks in a wireless network like broadcast, multicast,
point-to-point routing, creation of a communication backbone, etc. can be
regarded as such a power assignment problem.
This paper considers several problems of that kind; for example one problem
studied before in \cite{Carrots, Bilo} aims to select and assign powers to $k$
of the stations such that all other stations are within reach of at least one
of the selected stations. We improve the running time for obtaining a
$(1+\epsilon)$-approximate solution for this problem from
$n^{((\alpha/\epsilon)^{O(d)})}$ as reported by Bilo et al. (\cite{Bilo}) to
$O(n+ {(\frac{k^{2d+1}}{\epsilon^d})}^{\min{\{2k, (\alpha/\epsilon)^{O(d)}
\}}})$ that is, we obtain a running time that is \emph{linear} in the network
size. Further results include a constant approximation algorithm for the TSP
problem under squared (non-metric!) edge costs, which can be employed to
implement a novel data aggregation protocol, as well as efficient schemes to
perform $k$-hop multicasts.
| [
{
"version": "v1",
"created": "Fri, 22 Dec 2006 12:53:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Funke",
"Stefan",
""
],
[
"Laue",
"Soeren",
""
],
[
"Lotker",
"Zvi",
""
],
[
"Naujoks",
"Rouven",
""
]
] |
cs/0612126 | Petr Ivankov | Petr R. Ivankov, Nikolay P. Ivankov | The virtual reality framework for engineering objects | null | null | null | null | cs.CE cs.MS | null | A framework for virtual reality of engineering objects has been developed.
This framework may simulate different equipment related to virtual reality.
Framework supports 6D dynamics, ordinary differential equations, finite
formulas, vector and matrix operations. The framework also supports embedding
of external software.
| [
{
"version": "v1",
"created": "Fri, 22 Dec 2006 19:19:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ivankov",
"Petr R.",
""
],
[
"Ivankov",
"Nikolay P.",
""
]
] |
cs/0612127 | Mohamed Y. Eltabakh | Mohamed Y. Eltabakh, Mourad Ouzzani, Walid G. Aref | bdbms -- A Database Management System for Biological Data | This article is published under a Creative Commons License Agreement
(http://creativecommons.org/licenses/by/2.5/.) You may copy, distribute,
display, and perform the work, make derivative works and make commercial use
of the work, but, you must attribute the work to the author and CIDR 2007.
3rd Biennial Conference on Innovative Data Systems Research (CIDR) January
710, 2007, Asilomar, California, USA | null | null | null | cs.DB | null | Biologists are increasingly using databases for storing and managing their
data. Biological databases typically consist of a mixture of raw data,
metadata, sequences, annotations, and related data obtained from various
sources. Current database technology lacks several functionalities that are
needed by biological databases. In this paper, we introduce bdbms, an
extensible prototype database management system for supporting biological data.
bdbms extends the functionalities of current DBMSs to include: (1) Annotation
and provenance management including storage, indexing, manipulation, and
querying of annotation and provenance as first class objects in bdbms, (2)
Local dependency tracking to track the dependencies and derivations among data
items, (3) Update authorization to support data curation via content-based
authorization, in contrast to identity-based authorization, and (4) New access
methods and their supporting operators that support pattern matching on various
types of compressed biological data types. This paper presents the design of
bdbms along with the techniques proposed to support these functionalities
including an extension to SQL. We also outline some open issues in building
bdbms.
| [
{
"version": "v1",
"created": "Fri, 22 Dec 2006 20:32:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Eltabakh",
"Mohamed Y.",
""
],
[
"Ouzzani",
"Mourad",
""
],
[
"Aref",
"Walid G.",
""
]
] |
cs/0612128 | Daniel Gyllstrom | Daniel Gyllstrom, Eugene Wu, Hee-Jin Chae, Yanlei Diao, Patrick
Stahlberg, Gordon Anderson | SASE: Complex Event Processing over Streams | This article is published under a Creative Commons License Agreement
(http://creativecommons.org/licenses/by/2.5/.) You may copy, distribute,
display, and perform the work, make derivative works and make commercial use
of the work, but, you must attribute the work to the author and CIDR 2007.
3rd Biennial Conference on Innovative Data Systems Research (CIDR) January
710, 2007, Asilomar, California, USA | null | null | null | cs.DB | null | RFID technology is gaining adoption on an increasing scale for tracking and
monitoring purposes. Wide deployments of RFID devices will soon generate an
unprecedented volume of data. Emerging applications require the RFID data to be
filtered and correlated for complex pattern detection and transformed to events
that provide meaningful, actionable information to end applications. In this
work, we design and develop SASE, a com-plex event processing system that
performs such data-information transformation over real-time streams. We design
a complex event language for specifying application logic for such
transformation, devise new query processing techniques to effi-ciently
implement the language, and develop a comprehensive system that collects,
cleans, and processes RFID data for deliv-ery of relevant, timely information
as well as storing necessary data for future querying. We demonstrate an
initial prototype of SASE through a real-world retail management scenario.
| [
{
"version": "v1",
"created": "Fri, 22 Dec 2006 20:38:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gyllstrom",
"Daniel",
""
],
[
"Wu",
"Eugene",
""
],
[
"Chae",
"Hee-Jin",
""
],
[
"Diao",
"Yanlei",
""
],
[
"Stahlberg",
"Patrick",
""
],
[
"Anderson",
"Gordon",
""
]
] |
cs/0612129 | Bishwaranjan Bhattacharjee | Bishwaranjan Bhattacharjee, Vuk Ercegovac, Joseph Glider, Richard
Golding, Guy Lohman, Volke Markl, Hamid Pirahesh, Jun Rao, Robert Rees,
Frederick Reiss, Eugene Shekita, Garret Swart | Impliance: A Next Generation Information Management Appliance | This article is published under a Creative Commons License Agreement
(http://creativecommons.org/licenses/by/2.5/.) You may copy, distribute,
display, and perform the work, make derivative works and make commercial use
of the work, but, you must attribute the work to the author and CIDR 2007.
3rd Biennial Conference on Innovative Data Systems Research (CIDR) January
710, 2007, Asilomar, California, USA | null | null | null | cs.DB | null | ably successful in building a large market and adapting to the changes of the
last three decades, its impact on the broader market of information management
is surprisingly limited. If we were to design an information management system
from scratch, based upon today's requirements and hardware capabilities, would
it look anything like today's database systems?" In this paper, we introduce
Impliance, a next-generation information management system consisting of
hardware and software components integrated to form an easy-to-administer
appliance that can store, retrieve, and analyze all types of structured,
semi-structured, and unstructured information. We first summarize the trends
that will shape information management for the foreseeable future. Those trends
imply three major requirements for Impliance: (1) to be able to store, manage,
and uniformly query all data, not just structured records; (2) to be able to
scale out as the volume of this data grows; and (3) to be simple and robust in
operation. We then describe four key ideas that are uniquely combined in
Impliance to address these requirements, namely the ideas of: (a) integrating
software and off-the-shelf hardware into a generic information appliance; (b)
automatically discovering, organizing, and managing all data - unstructured as
well as structured - in a uniform way; (c) achieving scale-out by exploiting
simple, massive parallel processing, and (d) virtualizing compute and storage
resources to unify, simplify, and streamline the management of Impliance.
Impliance is an ambitious, long-term effort to define simpler, more robust, and
more scalable information systems for tomorrow's enterprises.
| [
{
"version": "v1",
"created": "Fri, 22 Dec 2006 20:49:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bhattacharjee",
"Bishwaranjan",
""
],
[
"Ercegovac",
"Vuk",
""
],
[
"Glider",
"Joseph",
""
],
[
"Golding",
"Richard",
""
],
[
"Lohman",
"Guy",
""
],
[
"Markl",
"Volke",
""
],
[
"Pirahesh",
"Hamid",
""
],
[
"Rao",
"Jun",
""
],
[
"Rees",
"Robert",
""
],
[
"Reiss",
"Frederick",
""
],
[
"Shekita",
"Eugene",
""
],
[
"Swart",
"Garret",
""
]
] |
cs/0612130 | Fabien Mathieu | Anh-Tuan Gai (INRIA Rocquencourt), Fabien Mathieu (INRIA
Rocquencourt), Julien Reynier (INRIA Rocquencourt), Fabien De Montgolfier
(INRIA Rocquencourt) | Stratification in P2P Networks - Application to BitTorrent | null | null | null | null | cs.NI | null | We introduce a model for decentralized networks with collaborating peers. The
model is based on the stable matching theory which is applied to systems with a
global ranking utility function. We consider the dynamics of peers searching
for efficient collaborators and we prove that a unique stable solution exists.
We prove that the system converges towards the stable solution and analyze its
speed of convergence. We also study the stratification properties of the model,
both when all collaborations are possible and for random possible
collaborations. We present the corresponding fluid limit on the choice of
collaborators in the random case. As a practical example, we study the
BitTorrent Tit-for-Tat policy. For this system, our model provides an
interesting insight on peer download rates and a possible way to optimize peer
strategy.
| [
{
"version": "v1",
"created": "Fri, 22 Dec 2006 21:11:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gai",
"Anh-Tuan",
"",
"INRIA Rocquencourt"
],
[
"Mathieu",
"Fabien",
"",
"INRIA\n Rocquencourt"
],
[
"Reynier",
"Julien",
"",
"INRIA Rocquencourt"
],
[
"De Montgolfier",
"Fabien",
"",
"INRIA Rocquencourt"
]
] |
cs/0612131 | Amine Chigani | Amine Chigani James D. Arthur Shawn Bohner | Architecting Network-Centric Software Systems: A Style-Based Beginning | 10 pages, 3 figures, 2 table, Submitted to Software Engineering
Workshop 2007 | null | null | null | cs.SE | null | With the advent of potent network technology, software development has
evolved from traditional platform-centric construction to network-centric
evolution. This change involves largely the way we reason about systems as
evidenced in the introduction of Network- Centric Operations (NCO).
Unfortunately, it has resulted in conflicting interpretations of how to map NCO
concepts to the field of software architecture. In this paper, we capture the
core concepts and goals of NCO, investigate the implications of these concepts
and goals on software architecture, and identify the operational
characteristics that distinguish network-centric software systems from other
systems. More importantly, we use architectural design principles to propose an
outline for a network-centric architectural style that helps in characterizing
network-centric software systems and that provides a means by which their
distinguishing operational characteristics can be realized.
| [
{
"version": "v1",
"created": "Sat, 23 Dec 2006 01:00:32 GMT"
},
{
"version": "v2",
"created": "Sat, 30 Dec 2006 03:07:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bohner",
"Amine Chigani James D. Arthur Shawn",
""
]
] |
cs/0612132 | Lokman Meho | Lokman I. Meho, Kiduk Yang | A New Era in Citation and Bibliometric Analyses: Web of Science, Scopus,
and Google Scholar | 49 pages, accepted for publication in the Journal of the American
Society for Information Science and Technology | null | null | null | cs.DL cs.IR | null | Academic institutions, federal agencies, publishers, editors, authors, and
librarians increasingly rely on citation analysis for making hiring, promotion,
tenure, funding, and/or reviewer and journal evaluation and selection
decisions. The Institute for Scientific Information's (ISI) citation databases
have been used for decades as a starting point and often as the only tools for
locating citations and/or conducting citation analyses. ISI databases (or Web
of Science), however, may no longer be adequate as the only or even the main
sources of citations because new databases and tools that allow citation
searching are now available. Whether these new databases and tools complement
or represent alternatives to Web of Science (WoS) is important to explore.
Using a group of 15 library and information science faculty members as a case
study, this paper examines the effects of using Scopus and Google Scholar (GS)
on the citation counts and rankings of scholars as measured by WoS. The paper
discusses the strengths and weaknesses of WoS, Scopus, and GS, their overlap
and uniqueness, quality and language of the citations, and the implications of
the findings for citation analysis. The project involved citation searching for
approximately 1,100 scholarly works published by the study group and over 200
works by a test group (an additional 10 faculty members). Overall, more than
10,000 citing and purportedly citing documents were examined. WoS data took
about 100 hours of collecting and processing time, Scopus consumed 200 hours,
and GS a grueling 3,000 hours.
| [
{
"version": "v1",
"created": "Sat, 23 Dec 2006 14:47:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Meho",
"Lokman I.",
""
],
[
"Yang",
"Kiduk",
""
]
] |
cs/0612134 | Ketan Mulmuley D | Ketan D Mulmuley, Milind Sohoni | Geometric Complexity Theory II: Towards explicit obstructions for
embeddings among class varieties | 46 pages | null | null | null | cs.CC math.AG math.RT | null | In part I we reduced the arithmetic (characteristic zero) version of the P
\not \subseteq NP conjecture to the problem of showing that a variety
associated with the complexity class NP cannot be embedded in the variety
associated the complexity class P. We call these class varieties.
In this paper, this approach is developed further, reducing the nonexistence
problems, such as the P vs. NP and related lower bound problems, to existence
problems: specifically to proving existence of obstructions to such embeddings
among class varieties. It gives two results towards explicit construction of
such obstructions.
The first result is a generalization of the Borel-Weil theorem to a class of
orbit closures, which include class varieties. The recond result is a weaker
form of a conjectured analogue of the second fundamental theorem of invariant
theory for the class variety associated with the complexity class NC. These
results indicate that the fundamental lower bound problems in complexity theory
are intimately linked with explicit construction problems in algebraic geometry
and representation theory.
| [
{
"version": "v1",
"created": "Mon, 25 Dec 2006 18:51:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mulmuley",
"Ketan D",
""
],
[
"Sohoni",
"Milind",
""
]
] |
cs/0612135 | Eric Rondeau | Idriss Diouri (CRAN), Jean-Philippe Georges (CRAN), Eric Rondeau
(CRAN) | Accommodation of the Service Offered by the Network for Networked
Control Systems | 8 pages | 2nd workshop on Networked Control Systems : Tolerant to faults
(23/11/2006) 8 pages | null | null | cs.NI | null | Networked Controlled Systems (NCSs) are more and more used in industrial
applications. They are strongly connected to real-time constraints because
important delays induced by the network can lead to an unstable process
control. Usually, the network used in NCSs is shared with many others
applications requiring different Quality of Service. The objective of this
paper is to optimize the tuning of the network scheduling mechanisms in taking
into account the level of Quality of Control. The goal is to maximize the
bandwidth allocation for unconstrained frames in guarantying that the control
constraints are respected. In this paper, we focus on switched Ethernet network
implementing the Classification of Service (IEEE 802.1p) based on a Weighted
Round Robin policy.
| [
{
"version": "v1",
"created": "Tue, 26 Dec 2006 20:17:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Diouri",
"Idriss",
"",
"CRAN"
],
[
"Georges",
"Jean-Philippe",
"",
"CRAN"
],
[
"Rondeau",
"Eric",
"",
"CRAN"
]
] |
cs/0612137 | Eric Robinson | Eric Robinson, David DeWitt | Turning Cluster Management into Data Management: A System Overview | This article is published under a Creative Commons License Agreement
(http://creativecommons.org/licenses/by/2.5/.) You may copy, distribute,
display, and perform the work, make derivative works and make commercial use
of the work, but, you must attribute the work to the author and CIDR 2007.
3rd Biennial Conference on Innovative Data Systems Research (CIDR) January
710, 2007, Asilomar, California, USA | null | null | null | cs.DB | null | This paper introduces the CondorJ2 cluster management system. Traditionally,
cluster management systems such as Condor employ a process-oriented approach
with little or no use of modern database system technology. In contrast,
CondorJ2 employs a data-centric, 3-tier web-application architecture for all
system functions (e.g., job submission, monitoring and scheduling; node
configuration, monitoring and management, etc.) except for job execution.
Employing a data-oriented approach allows the core challenge (i.e., managing
and coordinating a large set of distributed computing resources) to be
transformed from a relatively low-level systems problem into a more abstract,
higher-level data management problem. Preliminary results suggest that
CondorJ2's use of standard 3-tier software represents a significant step
forward to the design and implementation of large clusters (1,000 to 10,000
nodes).
| [
{
"version": "v1",
"created": "Wed, 27 Dec 2006 22:21:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Robinson",
"Eric",
""
],
[
"DeWitt",
"David",
""
]
] |
cs/0612138 | Alexander Haubold | Alexander Haubold, John R. Kender | Accommodating Sample Size Effect on Similarity Measures in Speaker
Clustering | null | null | null | null | cs.SD cs.MM | null | We investigate the symmetric Kullback-Leibler (KL2) distance in speaker
clustering and its unreported effects for differently-sized feature matrices.
Speaker data is represented as Mel Frequency Cepstral Coefficient (MFCC)
vectors, and features are compared using the KL2 metric to form clusters of
speech segments for each speaker. We make two observations with respect to
clustering based on KL2: 1.) The accuracy of clustering is strongly dependent
on the absolute lengths of the speech segments and their extracted feature
vectors. 2.) The accuracy of the similarity measure strongly degrades with the
length of the shorter of the two speech segments. These effects of length can
be attributed to the measure of covariance used in KL2. We demonstrate an
empirical correction of this sample-size effect that increases clustering
accuracy. We draw parallels to two Vector Quantization-based (VQ) similarity
measures, one which exhibits an equivalent effect of sample size, and the
second being less influenced by it.
| [
{
"version": "v1",
"created": "Thu, 28 Dec 2006 06:39:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Haubold",
"Alexander",
""
],
[
"Kender",
"John R.",
""
]
] |
cs/0612139 | Alexander Haubold | Alexander Haubold, John R. Kender | Alignment of Speech to Highly Imperfect Text Transcriptions | null | null | null | null | cs.SD cs.MM | null | We introduce a novel and inexpensive approach for the temporal alignment of
speech to highly imperfect transcripts from automatic speech recognition (ASR).
Transcripts are generated for extended lecture and presentation videos, which
in some cases feature more than 30 speakers with different accents, resulting
in highly varying transcription qualities. In our approach we detect a subset
of phonemes in the speech track, and align them to the sequence of phonemes
extracted from the transcript. We report on the results for 4 speech-transcript
sets ranging from 22 to 108 minutes. The alignment performance is promising,
showing a correct matching of phonemes within 10, 20, 30 second error margins
for more than 60%, 75%, 90% of text, respectively, on average.
| [
{
"version": "v1",
"created": "Thu, 28 Dec 2006 06:45:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Haubold",
"Alexander",
""
],
[
"Kender",
"John R.",
""
]
] |
cs/0612141 | Christian Tanguy | Annie Druault-Vicard, Christian Tanguy | Exact Failure Frequency Calculations for Extended Systems | null | null | null | null | cs.PF | null | This paper shows how the steady-state availability and failure frequency can
be calculated in a single pass for very large systems, when the availability is
expressed as a product of matrices. We apply the general procedure to
$k$-out-of-$n$:G and linear consecutive $k$-out-of-$n$:F systems, and to a
simple ladder network in which each edge and node may fail. We also give the
associated generating functions when the components have identical
availabilities and failure rates. For large systems, the failure rate of the
whole system is asymptotically proportional to its size. This paves the way to
ready-to-use formulae for various architectures, as well as proof that the
differential operator approach to failure frequency calculations is very useful
and straightforward.
| [
{
"version": "v1",
"created": "Thu, 28 Dec 2006 19:35:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Druault-Vicard",
"Annie",
""
],
[
"Tanguy",
"Christian",
""
]
] |
cs/0612143 | Christian Tanguy | Christian Tanguy | Exact solutions for the two- and all-terminal reliabilities of a simple
ladder network | null | null | null | null | cs.PF | null | The exact calculation of network reliability in a probabilistic context has
been a long-standing issue of practical importance, but a difficult one, even
for planar graphs, with perfect nodes and with edges of identical reliability
p. Many approaches (determination of bounds, sums of disjoint products
algorithms, Monte Carlo evaluations, studies of the reliability polynomials,
etc.) can only provide approximations when the network's size increases. We
consider here a ladder graph of arbitrary size corresponding to real-life
network configurations, and give the exact, analytical solutions for the all-
and two-terminal reliabilities. These solutions use transfer matrices, in which
individual reliabilities of edges and nodes are taken into account. The special
case of identical edge and node reliabilities -- p and rho, respectively -- is
solved. We show that the zeros of the two-terminal reliability polynomial
exhibit structures which differ substantially for seemingly similar networks,
and we compare the sensitivity of various edges. We discuss how the present
work may be further extended to lead to a catalog of exactly solvable networks
in terms of reliability, which could be useful as elementary bricks for a new
and improved set of bounds or benchmarks in the general case.
| [
{
"version": "v1",
"created": "Thu, 28 Dec 2006 19:43:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Tanguy",
"Christian",
""
]
] |
cs/0701001 | Ashutosh Gore | Ashutosh Deepak Gore, Srikanth Jagabathula, Abhay Karandikar | On High Spatial Reuse Link Scheduling in STDMA Wireless Ad Hoc Networks | 10 pages (double column), 10 figures | null | null | null | cs.PF cs.NI | null | Graph-based algorithms for point-to-point link scheduling in Spatial reuse
Time Division Multiple Access (STDMA) wireless ad hoc networks often result in
a significant number of transmissions having low Signal to Interference and
Noise density Ratio (SINR) at intended receivers, leading to low throughput. To
overcome this problem, we propose a new algorithm for STDMA link scheduling
based on a graph model of the network as well as SINR computations. The
performance of our algorithm is evaluated in terms of spatial reuse and
computational complexity. Simulation results demonstrate that our algorithm
achieves better performance than existing algorithms.
| [
{
"version": "v1",
"created": "Tue, 2 Jan 2007 14:14:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gore",
"Ashutosh Deepak",
""
],
[
"Jagabathula",
"Srikanth",
""
],
[
"Karandikar",
"Abhay",
""
]
] |
cs/0701005 | Christian Tanguy | Christian Tanguy | Exact solutions for the two- and all-terminal reliabilities of the
Brecht-Colbourn ladder and the generalized fan | null | null | null | null | cs.PF | null | The two- and all-terminal reliabilities of the Brecht-Colbourn ladder and the
generalized fan have been calculated exactly for arbitrary size as well as
arbitrary individual edge and node reliabilities, using transfer matrices of
dimension four at most. While the all-terminal reliabilities of these graphs
are identical, the special case of identical edge ($p$) and node ($\rho$)
reliabilities shows that their two-terminal reliabilities are quite distinct,
as demonstrated by their generating functions and the locations of the zeros of
the reliability polynomials, which undergo structural transitions at $\rho =
\displaystyle {1/2}$.
| [
{
"version": "v1",
"created": "Sat, 30 Dec 2006 17:26:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Tanguy",
"Christian",
""
]
] |
cs/0701007 | Hamed Hatami | Hamed Hatami and Ruzbeh Tusserkani | On the Complexity of the Circular Chromatic Number | null | Journal of Graph Theory. 47(3) (2004) pp. 226-230 | null | null | cs.CG | null | Circular chromatic number, $\chi_c$ is a natural generalization of chromatic
number. It is known that it is \NP-hard to determine whether or not an
arbitrary graph $G$ satisfies $\chi(G) = \chi_c(G)$. In this paper we prove
that this problem is \NP-hard even if the chromatic number of the graph is
known. This answers a question of Xuding Zhu. Also we prove that for all
positive integers $k \ge 2$ and $n \ge 3$, for a given graph $G$ with
$\chi(G)=n$, it is \NP-complete to verify if $\chi_c(G) \le n- \frac{1}{k}$.
| [
{
"version": "v1",
"created": "Sun, 31 Dec 2006 04:48:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hatami",
"Hamed",
""
],
[
"Tusserkani",
"Ruzbeh",
""
]
] |
cs/0701008 | Hamed Hatami | Hamed Hatami and Hossein Maserrat | On the Computational Complexity of Defining Sets | null | Journal of Discrete Applied Mathematics .149(1-3) (2005) pp.
101-110 | null | null | cs.CC | null | Suppose we have a family ${\cal F}$ of sets. For every $S \in {\cal F}$, a
set $D \subseteq S$ is a {\sf defining set} for $({\cal F},S)$ if $S$ is the
only element of $\cal{F}$ that contains $D$ as a subset. This concept has been
studied in numerous cases, such as vertex colorings, perfect matchings,
dominating sets, block designs, geodetics, orientations, and Latin squares.
In this paper, first, we propose the concept of a defining set of a logical
formula, and we prove that the computational complexity of such a problem is
$\Sigma_2$-complete.
We also show that the computational complexity of the following problem about
the defining set of vertex colorings of graphs is $\Sigma_2$-complete:
{\sc Instance:} A graph $G$ with a vertex coloring $c$ and an integer $k$.
{\sc Question:} If ${\cal C}(G)$ be the set of all $\chi(G)$-colorings of
$G$, then does $({\cal C}(G),c)$ have a defining set of size at most $k$?
Moreover, we study the computational complexity of some other variants of
this problem.
| [
{
"version": "v1",
"created": "Sun, 31 Dec 2006 05:47:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hatami",
"Hamed",
""
],
[
"Maserrat",
"Hossein",
""
]
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.