id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
3
62.8k
title
stringlengths
1
382
comments
stringlengths
1
1.15k
journal-ref
stringlengths
1
557
doi
stringlengths
7
153
report-no
stringlengths
1
509
categories
stringlengths
5
125
license
stringclasses
9 values
abstract
stringlengths
6
6.09k
versions
listlengths
1
187
update_date
timestamp[s]date
2007-05-23 00:00:00
2025-04-25 00:00:00
authors_parsed
sequencelengths
1
2.83k
cs/0611100
Mirco Mannucci Ph.D.
Mirco A. Mannucci, Rose M. Cherubin
Model Theory of Ultrafinitism I: Fuzzy Initial Segments of Arithmetics
31 pages, Tennenbaum Memorial invited talk
null
null
null
cs.LO
null
This article is the first of an intended series of works on the model theory of Ultrafinitism. It is roughly divided into two parts. The first one addresses some of the issues related to ultrafinitistic programs, as well as some of the core ideas proposed thus far. The second part of the paper presents a model of ultrafinitistic arithmetics based on the notion of fuzzy initial segments of the standard natural numbers series. We also introduce a proof theory and a semantics for ultrafinitism through which feasibly consistent theories can be treated on the same footing as their classically consistent counterparts. We conclude with a brief sketch of a foundational program, that aims at reproducing the transfinite within the finite realm.
[ { "version": "v1", "created": "Tue, 21 Nov 2006 03:05:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Mannucci", "Mirco A.", "" ], [ "Cherubin", "Rose M.", "" ] ]
cs/0611102
Hanno Langweg
Hanno Langweg and Tommy Kristiansen
Extending the Trusted Path in Client-Server Interaction
8 pages, 3 figures
null
null
null
cs.CR
null
We present a method to secure the complete path between a server and the local human user at a network node. This is useful for scenarios like internet banking, electronic signatures, or online voting. Protection of input authenticity and output integrity and authenticity is accomplished by a combination of traditional and novel technologies, e.g., SSL, ActiveX, and DirectX. Our approach does not require administrative privileges to deploy and is hence suitable for consumer applications. Results are based on the implementation of a proof-of-concept application for the Windows platform.
[ { "version": "v1", "created": "Tue, 21 Nov 2006 12:13:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Langweg", "Hanno", "" ], [ "Kristiansen", "Tommy", "" ] ]
cs/0611103
Petteri Kaski
Petteri Kaski
Barriers and local minima in energy landscapes of stochastic local search
null
null
null
null
cs.CC cond-mat.stat-mech
null
A local search algorithm operating on an instance of a Boolean constraint satisfaction problem (in particular, k-SAT) can be viewed as a stochastic process traversing successive adjacent states in an ``energy landscape'' defined by the problem instance on the n-dimensional Boolean hypercube. We investigate analytically the worst-case topography of such landscapes in the context of satisfiable k-SAT via a random ensemble of satisfiable ``k-regular'' linear equations modulo 2. We show that for each fixed k=3,4,..., the typical k-SAT energy landscape induced by an instance drawn from the ensemble has a set of 2^{\Omega(n)} local energy minima, each separated by an unconditional \Omega(n) energy barrier from each of the O(1) ground states, that is, solution states with zero energy. The main technical aspect of the analysis is that a random k-regular 0/1 matrix constitutes a strong boundary expander with almost full GF(2)-linear rank, a property which also enables us to prove a 2^{\Omega(n)} lower bound for the expected number of steps required by the focused random walk heuristic to solve typical instances drawn from the ensemble. These results paint a grim picture of the worst-case topography of k-SAT for local search, and constitute apparently the first rigorous analysis of the growth of energy barriers in a random ensemble of k-SAT landscapes as the number of variables n is increased.
[ { "version": "v1", "created": "Tue, 21 Nov 2006 12:52:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Kaski", "Petteri", "" ] ]
cs/0611107
Adam L. Buchsbaum
Adam L. Buchsbaum, Emden R. Gansner, Cecilia M. Procopiuc, Suresh Venkatasubramanian
Rectangular Layouts and Contact Graphs
28 pages, 13 figures, 55 references, 1 appendix
null
null
null
cs.DS cs.DM
null
Contact graphs of isothetic rectangles unify many concepts from applications including VLSI and architectural design, computational geometry, and GIS. Minimizing the area of their corresponding {\em rectangular layouts} is a key problem. We study the area-optimization problem and show that it is NP-hard to find a minimum-area rectangular layout of a given contact graph. We present O(n)-time algorithms that construct $O(n^2)$-area rectangular layouts for general contact graphs and $O(n\log n)$-area rectangular layouts for trees. (For trees, this is an $O(\log n)$-approximation algorithm.) We also present an infinite family of graphs (rsp., trees) that require $\Omega(n^2)$ (rsp., $\Omega(n\log n)$) area. We derive these results by presenting a new characterization of graphs that admit rectangular layouts using the related concept of {\em rectangular duals}. A corollary to our results relates the class of graphs that admit rectangular layouts to {\em rectangle of influence drawings}.
[ { "version": "v1", "created": "Tue, 21 Nov 2006 15:03:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Buchsbaum", "Adam L.", "" ], [ "Gansner", "Emden R.", "" ], [ "Procopiuc", "Cecilia M.", "" ], [ "Venkatasubramanian", "Suresh", "" ] ]
cs/0611108
Jon Feldman
Jon Feldman, S. Muthukrishnan, Anastasios Sidiropoulos, Cliff Stein, Zoya Svitkina
On the Complexity of Processing Massive, Unordered, Distributed Data
null
null
null
null
cs.CC cs.DC
null
An existing approach for dealing with massive data sets is to stream over the input in few passes and perform computations with sublinear resources. This method does not work for truly massive data where even making a single pass over the data with a processor is prohibitive. Successful log processing systems in practice such as Google's MapReduce and Apache's Hadoop use multiple machines. They efficiently perform a certain class of highly distributable computations defined by local computations that can be applied in any order to the input. Motivated by the success of these systems, we introduce a simple algorithmic model for massive, unordered, distributed (mud) computation. We initiate the study of understanding its computational complexity. Our main result is a positive one: any unordered function that can be computed by a streaming algorithm can also be computed with a mud algorithm, with comparable space and communication complexity. We extend this result to some useful classes of approximate and randomized streaming algorithms. We also give negative results, using communication complexity arguments to prove that extensions to private randomness, promise problems and indeterminate functions are impossible. We believe that the line of research we introduce in this paper has the potential for tremendous impact. The distributed systems that motivate our work successfully process data at an unprecedented scale, distributed over hundreds or even thousands of machines, and perform hundreds of such analyses each day. The mud model (and its generalizations) inspire a set of complexity-theoretic questions that lie at their heart.
[ { "version": "v1", "created": "Tue, 21 Nov 2006 16:11:06 GMT" }, { "version": "v2", "created": "Tue, 22 May 2007 14:35:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Feldman", "Jon", "" ], [ "Muthukrishnan", "S.", "" ], [ "Sidiropoulos", "Anastasios", "" ], [ "Stein", "Cliff", "" ], [ "Svitkina", "Zoya", "" ] ]
cs/0611110
Amine Chigani
Amine Chigani, James D. Arthur
The Implications of Network-Centric Software Systems on Software Architecture: A Critical Evaluation
6 pages, 2 figures, ACMSE Conference 2007
null
null
null
cs.SE
null
The purpose of this paper is to evaluate the impact of emerging network-centric software systems on the field of software architecture. We first develop an insight concerning the term "network-centric" by presenting its origin and its implications within the context of software architecture. On the basis of this insight, we present our definition of a network-centric framework and its distinguishing characteristics. We then enumerate the challenges that face the field of software architecture as software development shifts from a platform-centric to a network-centric model. In order to face these challenges, we propose a formal approach embodied in a new architectural style that supports overcoming these challenges at the architectural level. Finally, we conclude by presenting an illustrative example to demonstrate the usefulness of the concepts of network centricity, summarizing our contributions, and linking our approach to future work that needs to be done in this area.
[ { "version": "v1", "created": "Tue, 21 Nov 2006 19:23:32 GMT" }, { "version": "v2", "created": "Sat, 30 Dec 2006 03:38:50 GMT" }, { "version": "v3", "created": "Sat, 10 Feb 2007 21:30:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Chigani", "Amine", "" ], [ "Arthur", "James D.", "" ] ]
cs/0611113
Maurice H. T. Ling
Maurice HT Ling
An Anthological Review of Research Utilizing MontyLingua, a Python-Based End-to-End Text Processor
9 pages
Ling, Maurice HT. 2006. An Anthological Review of Research Utilizing MontyLingua, a Python-Based End-to-End Text Processor. The Python Papers 1 (1): 5-13
null
null
cs.CL
null
MontyLingua, an integral part of ConceptNet which is currently the largest commonsense knowledge base, is an English text processor developed using Python programming language in MIT Media Lab. The main feature of MontyLingua is the coverage for all aspects of English text processing from raw input text to semantic meanings and summary generation, yet each component in MontyLingua is loosely-coupled to each other at the architectural and code level, which enabled individual components to be used independently or substituted. However, there has been no review exploring the role of MontyLingua in recent research work utilizing it. This paper aims to review the use of and roles played by MontyLingua and its components in research work published in 19 articles between October 2004 and August 2006. We had observed a diversified use of MontyLingua in many different areas, both generic and domain-specific. Although the use of text summarizing component had not been observe, we are optimistic that it will have a crucial role in managing the current trend of information overload in future research.
[ { "version": "v1", "created": "Wed, 22 Nov 2006 03:24:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Ling", "Maurice HT", "" ] ]
cs/0611115
Ian Jermyn
Peter Horvath (INRIA Sophia Antipolis), Ian Jermyn (INRIA Sophia Antipolis), Zoltan Kato, Josiane Zerubia (INRIA Sophia Antipolis)
A higher-order active contour model of a `gas of circles' and its application to tree crown extraction
null
null
null
null
cs.CV
null
Many image processing problems involve identifying the region in the image domain occupied by a given entity in the scene. Automatic solution of these problems requires models that incorporate significant prior knowledge about the shape of the region. Many methods for including such knowledge run into difficulties when the topology of the region is unknown a priori, for example when the entity is composed of an unknown number of similar objects. Higher-order active contours (HOACs) represent one method for the modelling of non-trivial prior knowledge about shape without necessarily constraining region topology, via the inclusion of non-local interactions between region boundary points in the energy defining the model. The case of an unknown number of circular objects arises in a number of domains, e.g. medical, biological, nanotechnological, and remote sensing imagery. Regions composed of an a priori unknown number of circles may be referred to as a `gas of circles'. In this report, we present a HOAC model of a `gas of circles'. In order to guarantee stable circles, we conduct a stability analysis via a functional Taylor expansion of the HOAC energy around a circular shape. This analysis fixes one of the model parameters in terms of the others and constrains the rest. In conjunction with a suitable likelihood energy, we apply the model to the extraction of tree crowns from aerial imagery, and show that the new model outperforms other techniques.
[ { "version": "v1", "created": "Wed, 22 Nov 2006 13:44:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Horvath", "Peter", "", "INRIA Sophia Antipolis" ], [ "Jermyn", "Ian", "", "INRIA Sophia\n Antipolis" ], [ "Kato", "Zoltan", "", "INRIA Sophia Antipolis" ], [ "Zerubia", "Josiane", "", "INRIA Sophia Antipolis" ] ]
cs/0611117
Mikhail Nesterenko
Mark Miyashita and Mikhail Nesterenko
2FACE: Bi-Directional Face Traversal for Efficient Geometric Routing
null
null
null
null
cs.DC cs.DS cs.OS
null
We propose bi-directional face traversal algorithm $2FACE$ to shorten the path the message takes to reach the destination in geometric routing. Our algorithm combines the practicality of the best single-direction traversal algorithms with the worst case message complexity of $O(|E|)$, where $E$ is the number of network edges. We apply $2FACE$ to a variety of geometric routing algorithms. Our simulation results indicate that bi-directional face traversal decreases the latency of message delivery two to three times compared to single direction face traversal. The thus selected path approaches the shortest possible route. This gain in speed comes with a similar message overhead increase. We describe an algorithm which compensates for this message overhead by recording the preferable face traversal direction. Thus, if a source has several messages to send to the destination, the subsequent messages follow the shortest route. Our simulation results show that with most geometric routing algorithms the message overhead of finding the short route by bi-directional face traversal is compensated within two to four repeat messages.
[ { "version": "v1", "created": "Wed, 22 Nov 2006 19:28:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Miyashita", "Mark", "" ], [ "Nesterenko", "Mikhail", "" ] ]
cs/0611122
Adrian Paschke
Adrian Paschke, Martin Bichler
Knowledge Representation Concepts for Automated SLA Management
Paschke, A. and Bichler, M.: Knowledge Representation Concepts for Automated SLA Management, Int. Journal of Decision Support Systems (DSS), submitted 19th March 2006
null
null
null
cs.SE cs.AI cs.LO cs.PL
null
Outsourcing of complex IT infrastructure to IT service providers has increased substantially during the past years. IT service providers must be able to fulfil their service-quality commitments based upon predefined Service Level Agreements (SLAs) with the service customer. They need to manage, execute and maintain thousands of SLAs for different customers and different types of services, which needs new levels of flexibility and automation not available with the current technology. The complexity of contractual logic in SLAs requires new forms of knowledge representation to automatically draw inferences and execute contractual agreements. A logic-based approach provides several advantages including automated rule chaining allowing for compact knowledge representation as well as flexibility to adapt to rapidly changing business requirements. We suggest adequate logical formalisms for representation and enforcement of SLA rules and describe a proof-of-concept implementation. The article describes selected formalisms of the ContractLog KR and their adequacy for automated SLA management and presents results of experiments to demonstrate flexibility and scalability of the approach.
[ { "version": "v1", "created": "Thu, 23 Nov 2006 13:25:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Paschke", "Adrian", "" ], [ "Bichler", "Martin", "" ] ]
cs/0611124
Francis Bach
Jacob Abernethy, Francis Bach, Theodoros Evgeniou, Jean-Philippe Vert
Low-rank matrix factorization with attributes
12 pages, 2 figures
null
null
N-24/06/MM
cs.LG cs.AI cs.IR
null
We develop a new collaborative filtering (CF) method that combines both previously known users' preferences, i.e. standard CF, as well as product/user attributes, i.e. classical function approximation, to predict a given user's interest in a particular product. Our method is a generalized low rank matrix completion problem, where we learn a function whose inputs are pairs of vectors -- the standard low rank matrix completion problem being a special case where the inputs to the function are the row and column indices of the matrix. We solve this generalized matrix completion problem using tensor product kernels for which we also formally generalize standard kernel properties. Benchmark experiments on movie ratings show the advantages of our generalized matrix completion method over the standard matrix completion one with no information about movies or people, as well as over standard multi-task or single task learning methods.
[ { "version": "v1", "created": "Fri, 24 Nov 2006 08:49:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Abernethy", "Jacob", "" ], [ "Bach", "Francis", "" ], [ "Evgeniou", "Theodoros", "" ], [ "Vert", "Jean-Philippe", "" ] ]
cs/0611126
Mahmoud Fouz
Benjamin Doerr, Mahmoud Fouz
Hereditary Discrepancies in Different Numbers of Colors II
null
null
null
null
cs.DM
null
We bound the hereditary discrepancy of a hypergraph $\HH$ in two colors in terms of its hereditary discrepancy in $c$ colors. We show that $\herdisc(\HH,2) \le K c \herdisc(\HH,c)$, where $K$ is some absolute constant. This bound is sharp.
[ { "version": "v1", "created": "Fri, 24 Nov 2006 14:46:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Doerr", "Benjamin", "" ], [ "Fouz", "Mahmoud", "" ] ]
cs/0611128
Hasan Guclu
Hasan Guclu and Murat Yuksel
Scale-Free Overlay Topologies with Hard Cutoffs for Unstructured Peer-to-Peer Networks
19 pages, 12 figures, submitted to ICDCS 2007 (International Conference on Distributed Computing Systems 2007), one minor correction and formatting changes
null
null
null
cs.NI cs.DC
null
In unstructured peer-to-peer (P2P) networks, the overlay topology (or connectivity graph) among peers is a crucial component in addition to the peer/data organization and search. Topological characteristics have profound impact on the efficiency of search on such unstructured P2P networks as well as other networks. It has been well-known that search on small-world topologies of N nodes can be as efficient as O(ln N), while scale-free (power-law) topologies offer even better search efficiencies like as good as O(lnln N) for a range of degree distribution exponents. However, generation and maintenance of such scale-free topologies are hard to realize in a distributed and potentially uncooperative environments as in the P2P networks. A key limitation of scale-free topologies is the high load (i.e. high degree) on very few number of hub nodes. In a typical unstructured P2P network, peers are not willing to maintain high degrees/loads as they may not want to store large number of entries for construction of the overlay topology. So, to achieve fairness and practicality among all peers, hard cutoffs on the number of entries are imposed by the individual peers, which limits scale-freeness of the overall topology. Thus, efficiency of the flooding search reduces as the size of the hard cutoff does. We investigate construction of scale-free topologies with hard cutoffs (i.e. there are not any major hubs) and effect of these hard cutoffs on the search efficiency. Interestingly, we observe that the efficiency of normalized flooding and random walk search algorithms increases as the hard cutoff decreases.
[ { "version": "v1", "created": "Sat, 25 Nov 2006 21:49:55 GMT" }, { "version": "v2", "created": "Tue, 5 Dec 2006 02:44:00 GMT" }, { "version": "v3", "created": "Wed, 6 Dec 2006 18:21:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Guclu", "Hasan", "" ], [ "Yuksel", "Murat", "" ] ]
cs/0611132
Vladimir Migunov
Vladimir V. Migunov
The specifications making in complex CAD-system of renovation of the enterprises on the basis of modules in the drawing and electronic catalogues
8 pages, 4 figures, in Russian
null
null
null
cs.CE
null
The experience of automation of the specifications making of the projects of renovation of the industrial enterprises is described, being based on the special modules in the drawing containing the visible image and additional parameters, and electronic catalogues
[ { "version": "v1", "created": "Mon, 27 Nov 2006 04:31:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Migunov", "Vladimir V.", "" ] ]
cs/0611133
Vladimir Migunov
Vladimir V. Migunov
The modelling of the automation schemes of technological processes in CAD-system of renovation of the enterprises
4 pages, 3 figures, in Russian
null
null
null
cs.CE
null
According to the requirements of the Russian standards, the automation schemes are necessary practically in each project of renovation of industrial buildings and facilities, in which any technological processes are realized. The model representations of the automation schemes in CAD-system TechnoCAD GlassX are described. The models follow a principle "to exclude a repeated input operations"
[ { "version": "v1", "created": "Mon, 27 Nov 2006 04:39:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Migunov", "Vladimir V.", "" ] ]
cs/0611134
Vladimir L. Safonov
Vladimir L. Safonov
Hard Disk Drive as a Magnetomechanical Logic Device
3pages, 3 figures
null
null
null
cs.OH cs.AR
null
We consider the conditions how two binary numbers can be superimposed on the same track with the use of different recording magnetic fields. As a result the average magnetization of longitudinal medium along the track can have three states: -M, 0 and +M. Possibility to perform logic operations with these states is considered. We demonstrate OR, AND, XOR and NOT operations and discuss a modification of a recording device.
[ { "version": "v1", "created": "Mon, 27 Nov 2006 19:45:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Safonov", "Vladimir L.", "" ] ]
cs/0611136
Edward Rietman PhD
E.A. Rietman and R.W. Hillis
Neural Computation with Rings of Quasiperiodic Oscillators
54 pages, 26 figures
null
null
PSI SR-1278
cs.RO
null
We describe the use of quasiperiodic oscillators for computation and control of robots. We also describe their relationship to central pattern generators in simple organisms and develop a group theory for describing the dynamics of these systems.
[ { "version": "v1", "created": "Mon, 27 Nov 2006 15:28:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Rietman", "E. A.", "" ], [ "Hillis", "R. W.", "" ] ]
cs/0611140
Marc Schoenauer
Yann Semet (INRIA Futurs), Marc Schoenauer (INRIA Futurs)
On the Benefits of Inoculation, an Example in Train Scheduling
null
Dans GECCO-2006 (2006)
null
null
cs.AI cs.NE
null
The local reconstruction of a railway schedule following a small perturbation of the traffic, seeking minimization of the total accumulated delay, is a very difficult and tightly constrained combinatorial problem. Notoriously enough, the railway company's public image degrades proportionally to the amount of daily delays, and the same goes for its profit! This paper describes an inoculation procedure which greatly enhances an evolutionary algorithm for train re-scheduling. The procedure consists in building the initial population around a pre-computed solution based on problem-related information available beforehand. The optimization is performed by adapting times of departure and arrival, as well as allocation of tracks, for each train at each station. This is achieved by a permutation-based evolutionary algorithm that relies on a semi-greedy heuristic scheduler to gradually reconstruct the schedule by inserting trains one after another. Experimental results are presented on various instances of a large real-world case involving around 500 trains and more than 1 million constraints. In terms of competition with commercial math ematical programming tool ILOG CPLEX, it appears that within a large class of instances, excluding trivial instances as well as too difficult ones, and with very few exceptions, a clever initialization turns an encouraging failure into a clear-cut success auguring of substantial financial savings.
[ { "version": "v1", "created": "Tue, 28 Nov 2006 12:44:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Semet", "Yann", "", "INRIA Futurs" ], [ "Schoenauer", "Marc", "", "INRIA Futurs" ] ]
cs/0611141
Peter Tiedemann
Peter Tiedemann, Henrik Reif Andersen and Rasmus Pagh
A Generic Global Constraint based on MDDs
Tech report, 31 pages, 3 figures
null
null
null
cs.AI
null
The paper suggests the use of Multi-Valued Decision Diagrams (MDDs) as the supporting data structure for a generic global constraint. We give an algorithm for maintaining generalized arc consistency (GAC) on this constraint that amortizes the cost of the GAC computation over a root-to-terminal path in the search tree. The technique used is an extension of the GAC algorithm for the regular language constraint on finite length input. Our approach adds support for skipped variables, maintains the reduced property of the MDD dynamically and provides domain entailment detection. Finally we also show how to adapt the approach to constraint types that are closely related to MDDs, such as AOMDDs and Case DAGs.
[ { "version": "v1", "created": "Tue, 28 Nov 2006 14:23:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Tiedemann", "Peter", "" ], [ "Andersen", "Henrik Reif", "" ], [ "Pagh", "Rasmus", "" ] ]
cs/0611142
Mounira Kourjieh
Yannick Chevalier (IRIT), Mounira Kourjieh (IRIT)
A Symbolic Intruder Model for Hash-Collision Attacks
null
CSTVA'06, France (25/09/2006)
null
null
cs.CR
null
In the recent years, several practical methods have been published to compute collisions on some commonly used hash functions. In this paper we present a method to take into account, at the symbolic level, that an intruder actively attacking a protocol execution may use these collision algorithms in reasonable time during the attack. Our decision procedure relies on the reduction of constraint solving for an intruder exploiting the collision properties of hush functions to constraint solving for an intruder operating on words.
[ { "version": "v1", "created": "Tue, 28 Nov 2006 14:09:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Chevalier", "Yannick", "", "IRIT" ], [ "Kourjieh", "Mounira", "", "IRIT" ] ]
cs/0611145
Manuel Loth
Manuel Loth (INRIA Futurs), Philippe Preux (INRIA Futurs)
A Unified View of TD Algorithms; Introducing Full-Gradient TD and Equi-Gradient Descent TD
null
Dans European Symposium on Artificial Neural Networks (2006)
null
null
cs.LG
null
This paper addresses the issue of policy evaluation in Markov Decision Processes, using linear function approximation. It provides a unified view of algorithms such as TD(lambda), LSTD(lambda), iLSTD, residual-gradient TD. It is asserted that they all consist in minimizing a gradient function and differ by the form of this function and their means of minimizing it. Two new schemes are introduced in that framework: Full-gradient TD which uses a generalization of the principle introduced in iLSTD, and EGD TD, which reduces the gradient by successive equi-gradient descents. These three algorithms form a new intermediate family with the interesting property of making much better use of the samples than TD while keeping a gradient descent scheme, which is useful for complexity issues and optimistic policy iteration.
[ { "version": "v1", "created": "Wed, 29 Nov 2006 00:00:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Loth", "Manuel", "", "INRIA Futurs" ], [ "Preux", "Philippe", "", "INRIA Futurs" ] ]
cs/0611148
Federico Calzolari dr
Federico Calzolari, Eva Sassolini, Manuela Sassi, Sebastiana Cucurullo, Eugenio Picchi, Francesca Bertagna, Alessandro Enea, Monica Monachini, Claudia Soria, Nicoletta Calzolari
Next Generation Language Resources using GRID
4 pages
Language Resources and Evaluation Conference LREC 2006 proceedings pp.1858-1861, Genoa [Italy]
null
null
cs.DC cs.CL
null
This paper presents a case study concerning the challenges and requirements posed by next generation language resources, realized as an overall model of open, distributed and collaborative language infrastructure. If a sort of "new paradigm" is required, we think that the emerging and still evolving technology connected to Grid computing is a very interesting and suitable one for a concrete realization of this vision. Given the current limitations of Grid computing, it is very important to test the new environment on basic language analysis tools, in order to get the feeling of what are the potentialities and possible limitations connected to its use in NLP. For this reason, we have done some experiments on a module of Linguistic Miner, i.e. the extraction of linguistic patterns from restricted domain corpora.
[ { "version": "v1", "created": "Wed, 29 Nov 2006 10:49:23 GMT" }, { "version": "v2", "created": "Mon, 11 Dec 2006 14:26:07 GMT" }, { "version": "v3", "created": "Wed, 13 Dec 2006 11:11:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Calzolari", "Federico", "" ], [ "Sassolini", "Eva", "" ], [ "Sassi", "Manuela", "" ], [ "Cucurullo", "Sebastiana", "" ], [ "Picchi", "Eugenio", "" ], [ "Bertagna", "Francesca", "" ], [ "Enea", "Alessandro", "" ], [ "Monachini", "Monica", "" ], [ "Soria", "Claudia", "" ], [ "Calzolari", "Nicoletta", "" ] ]
cs/0611149
Eric Rondeau
Belynda Brahimi (CRAN), Eric Rondeau (CRAN), Christophe Aubrun (CRAN)
Comparison between Networked Control System behaviour based on CAN and Switched Ethernet networks
7 pages
2nd Workshop on Networked Control Systems : Tolerant to fault (23/11/2006) 7 pages
null
null
cs.NI
null
The distributed control systems are more and more used in many industrial applications. These systems are often referred as "Networked control systems". The goal of this paper is to show the network influence on feedback control systems. Two networks are considered: Switched Ethernet network and CAN fieldbus. The first one represents the non deterministic network and second one represents the deterministic one. Several scenarii are studied to analyse the stability of system according to different network parameters (packets losses, congestion and frame priority). The Truetime simulator is used in this work.
[ { "version": "v1", "created": "Wed, 29 Nov 2006 11:05:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Brahimi", "Belynda", "", "CRAN" ], [ "Rondeau", "Eric", "", "CRAN" ], [ "Aubrun", "Christophe", "", "CRAN" ] ]
cs/0611150
Saket Sathe
Saket Sathe
A Novel Bayesian Classifier using Copula Functions
null
null
null
null
cs.LG cs.AI cs.IR
null
A useful method for representing Bayesian classifiers is through \emph{discriminant functions}. Here, using copula functions, we propose a new model for discriminants. This model provides a rich and generalized class of decision boundaries. These decision boundaries significantly boost the classification accuracy especially for high dimensional feature spaces. We strengthen our analysis through simulation results.
[ { "version": "v1", "created": "Wed, 29 Nov 2006 13:59:31 GMT" }, { "version": "v2", "created": "Thu, 30 Nov 2006 03:58:23 GMT" }, { "version": "v3", "created": "Tue, 5 Dec 2006 15:04:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Sathe", "Saket", "" ] ]
cs/0611157
Mira Gonen
Reuven Cohen, Mira Gonen, Avishai Wool
Bounding the Bias of Tree-Like Sampling in IP Topologies
12 pages, 1 figure
null
null
null
cs.NI
null
It is widely believed that the Internet's AS-graph degree distribution obeys a power-law form. Most of the evidence showing the power-law distribution is based on BGP data. However, it was recently argued that since BGP collects data in a tree-like fashion, it only produces a sample of the degree distribution, and this sample may be biased. This argument was backed by simulation data and mathematical analysis, which demonstrated that under certain conditions a tree sampling procedure can produce an artificail power-law in the degree distribution. Thus, although the observed degree distribution of the AS-graph follows a power-law, this phenomenon may be an artifact of the sampling process. In this work we provide some evidence to the contrary. We show, by analysis and simulation, that when the underlying graph degree distribution obeys a power-law with an exponent larger than 2, a tree-like sampling process produces a negligible bias in the sampled degree distribution. Furthermore, recent data collected from the DIMES project, which is not based on BGP sampling, indicates that the underlying AS-graph indeed obeys a power-law degree distribution with an exponent larger than 2. By combining this empirical data with our analysis, we conclude that the bias in the degree distribution calculated from BGP data is negligible.
[ { "version": "v1", "created": "Thu, 30 Nov 2006 08:59:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Cohen", "Reuven", "" ], [ "Gonen", "Mira", "" ], [ "Wool", "Avishai", "" ] ]
cs/0611163
Dimitris Kalles
Dimitris Kalles (Hellenic Open University)
On Measuring the Impact of Human Actions in the Machine Learning of a Board Game's Playing Policies
Contains 19 pages, 10 figures, 8 tables. Submitted to a journal
null
null
null
cs.AI cs.GT cs.NE
null
We investigate systematically the impact of human intervention in the training of computer players in a strategy board game. In that game, computer players utilise reinforcement learning with neural networks for evolving their playing strategies and demonstrate a slow learning speed. Human intervention can significantly enhance learning performance, but carry-ing it out systematically seems to be more of a problem of an integrated game development environment as opposed to automatic evolutionary learning.
[ { "version": "v1", "created": "Thu, 30 Nov 2006 15:30:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Kalles", "Dimitris", "", "Hellenic Open University" ] ]
cs/0611164
Dimitris Kalles
Dimitris Kalles (Hellenic Open University)
Player co-modelling in a strategy board game: discovering how to play fast
Contains 19 pages, 6 figures, 7 tables. Submitted to a journal
null
null
null
cs.AI cs.LG
null
In this paper we experiment with a 2-player strategy board game where playing models are evolved using reinforcement learning and neural networks. The models are evolved to speed up automatic game development based on human involvement at varying levels of sophistication and density when compared to fully autonomous playing. The experimental results suggest a clear and measurable association between the ability to win games and the ability to do that fast, while at the same time demonstrating that there is a minimum level of human involvement beyond which no learning really occurs.
[ { "version": "v1", "created": "Thu, 30 Nov 2006 15:36:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Kalles", "Dimitris", "", "Hellenic Open University" ] ]
cs/0612001
Matthew Delacorte
Matthew Delacorte
Polynomial Time Symmetry and Isomorphism Testing for Connected Graphs
null
null
null
null
cs.DM
null
We use the concept of a Kirchhoff resistor network (alternatively random walk on a network) to probe connected graphs and produce symmetry revealing canonical labelings of the graph(s) nodes and edges.
[ { "version": "v1", "created": "Fri, 1 Dec 2006 14:08:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Delacorte", "Matthew", "" ] ]
cs/0612002
Willemien Visser
Willemien Visser (INRIA Rocquencourt), Brigitte Trousse (INRIA Sophia Antipolis)
Reuse of designs: Desperately seeking an interdisciplinary cognitive approach
null
Dans IJCAI Thirteenth International Joint Conference on Artificial Intelligence Workshop "Reuse of designs: An interdisciplinary cognitive approach" (1993)
null
null
cs.HC cs.AI
null
This text analyses the papers accepted for the workshop "Reuse of designs: an interdisciplinary cognitive approach". Several dimensions and questions considered as important (by the authors and/or by us) are addressed: What about the "interdisciplinary cognitive" character of the approaches adopted by the authors? Is design indeed a domain where the use of CBR is particularly suitable? Are there important distinctions between CBR and other approaches? Which types of knowledge -other than cases- is being, or might be, used in CBR systems? With respect to cases: are there different "types" of case and different types of case use? which formats are adopted for their representation? do cases have "components"? how are cases organised in the case memory? Concerning their retrieval: which types of index are used? on which types of relation is retrieval based? how does one retrieve only a selected number of cases, i.e., how does one retrieve only the "best" cases? which processes and strategies are used, by the system and by its user? Finally, some important aspects of CBR system development are shortly discussed: should CBR systems be assistance or autonomous systems? how can case knowledge be "acquired"? what about the empirical evaluation of CBR systems? The conclusion points out some lacking points: not much attention is paid to the user, and few papers have indeed adopted an interdisciplinary cognitive approach.
[ { "version": "v1", "created": "Thu, 30 Nov 2006 22:38:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Visser", "Willemien", "", "INRIA Rocquencourt" ], [ "Trousse", "Brigitte", "", "INRIA Sophia\n Antipolis" ] ]
cs/0612006
Willemien Visser
Willemien Visser (INRIA Rocquencourt)
Evocation and elaboration of solutions: Different types of problem-solving actions. An empirical study on the design of an aerospace artifact
null
Dans COGNITIVA 90. At the crossroads of Artificial Intelligence, Cognitive science, and Neuroscience (1991) 689-696
null
null
cs.HC
null
An observational study was conducted on a professional designer working on a design project in aerospace industry. The protocol data were analyzed in order to gain insight into the actions the designer used for the development of a solution to the corresponding problem. Different processes are described: from the "simple" evocation of a solution existing in memory, to the elaboration of a "new" solution out of mnesic entities without any clear link to the current problem. Control is addressed in so far as it concerns the priority among the different types of development processes: the progression from evocation of a "standard" solution to elaboration of a "new" solution is supposed to correspond to the resulting order, that is, the one in which the designer's activity proceeds. Short discussions of * the double status of "problem" and "solution," * the problem/solution knowledge units in memory and their access, and * the different abstraction levels on which problem and solution representations are developed, are illustrated by the results.
[ { "version": "v1", "created": "Thu, 30 Nov 2006 22:49:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Visser", "Willemien", "", "INRIA Rocquencourt" ] ]
cs/0612013
Al-Mukaddim Khan Pathan
Al-Mukaddim Khan Pathan, Rajkumar Buyya, James Broberg and Kris Bubendorfer
Economy-based Content Replication for Peering Content Delivery Networks
Technical Report, GRIDS-TR-2006-20, Grid Computing and Distributed Systems Laboratory, University of Melbourne, Australia
null
null
null
cs.DC
null
Existing Content Delivery Networks (CDNs) exhibit the nature of closed delivery networks which do not cooperate with other CDNs and in practice, islands of CDNs are formed. The logical separation between contents and services in this context results in two content networking domains. In addition to that, meeting the Quality of Service requirements of users according to negotiated Service Level Agreement is crucial for a CDN. Present trends in content networks and content networking capabilities give rise to the interest in interconnecting content networks. Hence, in this paper, we present an open, scalable, and Service-Oriented Architecture (SOA)-based system that assist the creation of open Content and Service Delivery Networks (CSDNs), which scale and supports sharing of resources through peering with other CSDNs. To encourage resource sharing and peering arrangements between different CDN providers at global level, we propose using market-based models by introducing an economy-based strategy for content replication.
[ { "version": "v1", "created": "Mon, 4 Dec 2006 06:29:16 GMT" }, { "version": "v2", "created": "Mon, 4 Dec 2006 23:24:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Pathan", "Al-Mukaddim Khan", "" ], [ "Buyya", "Rajkumar", "" ], [ "Broberg", "James", "" ], [ "Bubendorfer", "Kris", "" ] ]
cs/0612022
Willemien Visser
Willemien Visser (INRIA Rocquencourt)
Both Generic Design and Different Forms of Designing
null
Dans Wonderground, the 2006 DRS (Design Research Society) International Conference (2006)
null
null
cs.HC
null
This paper defends an augmented cognitively oriented "generic-design hypothesis": There are both significant similarities between the design activities implemented in different situations and crucial differences between these and other cognitive activities; yet, characteristics of a design situation (i.e., related to the designers, the artefact, and other task variables influencing these two) introduce specificities in the corresponding design activities and cognitive structures that are used. We thus combine the generic-design hypothesis with that of different "forms" of designing. In this paper, outlining a number of directions that need further elaboration, we propose a series of candidate dimensions underlying such forms of design.
[ { "version": "v1", "created": "Mon, 4 Dec 2006 16:28:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Visser", "Willemien", "", "INRIA Rocquencourt" ] ]
cs/0612025
Paul Vitanyi
Paul M.B. Vitanyi (CWI and University of Amsterdam)
Registers
5 pages, LaTeX, Entry in: Encyclopedia of Algorithms, Ming-Yang Kao, Ed., Springer, To appear
null
null
null
cs.DC
null
Entry in: Encyclopedia of Algorithms, Ming-Yang Kao, Ed., Springer, To appear. Synonyms: Wait-free registers, wait-free shared variables, asynchronous communication hardware. Problem Definition: Consider a system of asynchronous processes that communicate among themselves by only executing read and write operations on a set of shared variables (also known as shared registers). The system has no global clock or other synchronization primitives.
[ { "version": "v1", "created": "Tue, 5 Dec 2006 16:51:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Vitanyi", "Paul M. B.", "", "CWI and University of Amsterdam" ] ]
cs/0612026
Trung Nguyen
Trung Nguyen, Jean-Daniel Boissonnat, Frederic Falzon and Christian Knauer
A disk-covering problem with application in optical interferometry
10 pages, 8 figures
null
null
null
cs.CG
null
Given a disk O in the plane called the objective, we want to find n small disks P_1,...,P_n called the pupils such that $\bigcup_{i,j=1}^n P_i \ominus P_j \supseteq O$, where $\ominus$ denotes the Minkowski difference operator, while minimizing the number of pupils, the sum of the radii or the total area of the pupils. This problem is motivated by the construction of very large telescopes from several smaller ones by so-called Optical Aperture Synthesis. In this paper, we provide exact, approximate and heuristic solutions to several variations of the problem.
[ { "version": "v1", "created": "Tue, 5 Dec 2006 15:36:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Nguyen", "Trung", "" ], [ "Boissonnat", "Jean-Daniel", "" ], [ "Falzon", "Frederic", "" ], [ "Knauer", "Christian", "" ] ]
cs/0612029
Ming-Zhe Chen
Ming-Zhe Chen
A Classification of 6R Manipulators
4 pages
null
null
null
cs.RO
null
This paper presents a classification of generic 6-revolute jointed (6R) manipulators using homotopy class of their critical point manifold. A part of classification is listed in this paper because of the complexity of homotopy class of 4-torus. The results of this classification will serve future research of the classification and topological properties of maniplators joint space and workspace.
[ { "version": "v1", "created": "Tue, 5 Dec 2006 16:04:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Chen", "Ming-Zhe", "" ] ]
cs/0612031
Andrew McGregor
Andrew McGregor and S. Muthukrishnan
Estimating Aggregate Properties on Probabilistic Streams
11 pages
null
null
null
cs.DS cs.DB
null
The probabilistic-stream model was introduced by Jayram et al. \cite{JKV07}. It is a generalization of the data stream model that is suited to handling ``probabilistic'' data where each item of the stream represents a probability distribution over a set of possible events. Therefore, a probabilistic stream determines a distribution over potentially a very large number of classical "deterministic" streams where each item is deterministically one of the domain values. The probabilistic model is applicable for not only analyzing streams where the input has uncertainties (such as sensor data streams that measure physical processes) but also where the streams are derived from the input data by post-processing, such as tagging or reconciling inconsistent and poor quality data. We present streaming algorithms for computing commonly used aggregates on a probabilistic stream. We present the first known, one pass streaming algorithm for estimating the \AVG, improving results in \cite{JKV07}. We present the first known streaming algorithms for estimating the number of \DISTINCT items on probabilistic streams. Further, we present extensions to other aggregates such as the repeat rate, quantiles, etc. In all cases, our algorithms work with provable accuracy guarantees and within the space constraints of the data stream model.
[ { "version": "v1", "created": "Tue, 5 Dec 2006 23:34:52 GMT" } ]
2007-05-23T00:00:00
[ [ "McGregor", "Andrew", "" ], [ "Muthukrishnan", "S.", "" ] ]
cs/0612034
Jean-Marc Fran\c{c}ois
Jean-Marc Francois and Guy Leduc
Predictable Disruption Tolerant Networks and Delivery Guarantees
9 pages
null
null
null
cs.NI
null
This article studies disruption tolerant networks (DTNs) where each node knows the probabilistic distribution of contacts with other nodes. It proposes a framework that allows one to formalize the behaviour of such a network. It generalizes extreme cases that have been studied before where (a) either nodes only know their contact frequency with each other or (b) they have a perfect knowledge of who meets who and when. This paper then gives an example of how this framework can be used; it shows how one can find a packet forwarding algorithm optimized to meet the 'delay/bandwidth consumption' trade-off: packets are duplicated so as to (statistically) guarantee a given delay or delivery probability, but not too much so as to reduce the bandwidth, energy, and memory consumption.
[ { "version": "v1", "created": "Wed, 6 Dec 2006 13:57:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Francois", "Jean-Marc", "" ], [ "Leduc", "Guy", "" ] ]
cs/0612035
Vincent Gramoli
Antonio Fernandez (LADYR), Vincent Gramoli (IRISA), Ernesto Jimenez (EUI), Anne-Marie Kermarrec (IRISA), Michel Raynal (IRISA)
Distributed Slicing in Dynamic Systems
null
null
null
null
cs.DC
null
Peer to peer (P2P) systems are moving from application specific architectures to a generic service oriented design philosophy. This raises interesting problems in connection with providing useful P2P middleware services that are capable of dealing with resource assignment and management in a large-scale, heterogeneous and unreliable environment. One such service, the slicing service, has been proposed to allow for an automatic partitioning of P2P networks into groups (slices) that represent a controllable amount of some resource and that are also relatively homogeneous with respect to that resource, in the face of churn and other failures. In this report we propose two algorithms to solve the distributed slicing problem. The first algorithm improves upon an existing algorithm that is based on gossip-based sorting of a set of uniform random numbers. We speed up convergence via a heuristic for gossip peer selection. The second algorithm is based on a different approach: statistical approximation of the rank of nodes in the ordering. The scalability, efficiency and resilience to dynamics of both algorithms relies on their gossip-based models. We present theoretical and experimental results to prove the viability of these algorithms.
[ { "version": "v1", "created": "Wed, 6 Dec 2006 13:57:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Fernandez", "Antonio", "", "LADYR" ], [ "Gramoli", "Vincent", "", "IRISA" ], [ "Jimenez", "Ernesto", "", "EUI" ], [ "Kermarrec", "Anne-Marie", "", "IRISA" ], [ "Raynal", "Michel", "", "IRISA" ] ]
cs/0612036
Fr\'ed\'eric Vivien
Jack Dongarra, Jean-Francois Pineau, Yves Robert, Zhiao Shi, and Frederic Vivien
Revisiting Matrix Product on Master-Worker Platforms
null
null
null
null
cs.DC cs.MS
null
This paper is aimed at designing efficient parallel matrix-product algorithms for heterogeneous master-worker platforms. While matrix-product is well-understood for homogeneous 2D-arrays of processors (e.g., Cannon algorithm and ScaLAPACK outer product algorithm), there are three key hypotheses that render our work original and innovative: - Centralized data. We assume that all matrix files originate from, and must be returned to, the master. - Heterogeneous star-shaped platforms. We target fully heterogeneous platforms, where computational resources have different computing powers. - Limited memory. Because we investigate the parallelization of large problems, we cannot assume that full matrix panels can be stored in the worker memories and re-used for subsequent updates (as in ScaLAPACK). We have devised efficient algorithms for resource selection (deciding which workers to enroll) and communication ordering (both for input and result messages), and we report a set of numerical experiments on various platforms at Ecole Normale Superieure de Lyon and the University of Tennessee. However, we point out that in this first version of the report, experiments are limited to homogeneous platforms.
[ { "version": "v1", "created": "Wed, 6 Dec 2006 14:34:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Dongarra", "Jack", "" ], [ "Pineau", "Jean-Francois", "" ], [ "Robert", "Yves", "" ], [ "Shi", "Zhiao", "" ], [ "Vivien", "Frederic", "" ] ]
cs/0612038
Vladimir Anashin
Vladimir Anashin
Non-Archimedean analysis, T-functions, and cryptography
53 pages, 9 figures, LaTeX 2e. Lecture notes of a 20-hour course at the International Summer School `Mathematical Methods and Technologies in Computer Security' at Lomonosov Moscow State University, July 9--23, 2006
null
null
null
cs.CR math.DS
null
These are lecture notes of a 20-hour course at the International Summer School \emph{Mathematical Methods and Technologies in Computer Security} at Lomonosov Moscow State University, July 9--23, 2006. Loosely speaking, a $T$-function is a map of $n$-bit words into $n$-bit words such that each $i$-th bit of image depends only on low-order bits $0,..., i$ of the pre-image. For example, all arithmetic operations (addition, multiplication) are $T$-functions, all bitwise logical operations ($\XOR$, $\AND$, etc.) are $T$-functions. Any composition of $T$-functions is a $T$-function as well. Thus $T$-functions are natural computer word-oriented functions. It turns out that $T$-functions are continuous (and often differentiable!) functions with respect to the so-called 2-adic distance. This observation gives a powerful tool to apply 2-adic analysis to construct wide classes of $T$-functions with provable cryptographic properties (long period, balance, uniform distribution, high linear complexity, etc.); these functions currently are being used in new generation of fast stream ciphers. We consider these ciphers as specific automata that could be associated to dynamical systems on the space of 2-adic integers. From this view the lectures could be considered as a course in cryptographic applications of the non-Archimedean dynamics; the latter has recently attracted significant attention in connection with applications to physics, biology and cognitive sciences. During the course listeners study non-Archimedean machinery and its applications to stream cipher design.
[ { "version": "v1", "created": "Wed, 6 Dec 2006 15:11:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Anashin", "Vladimir", "" ] ]
cs/0612039
Raghav Aras
Raghav Aras (INRIA Lorraine - LORIA), Alain Dutech (INRIA Lorraine - LORIA), Fran\c{c}ois Charpillet (INRIA Lorraine - LORIA)
Computing the Equilibria of Bimatrix Games using Dominance Heuristics
null
null
null
null
cs.GT
null
We propose a formulation of a general-sum bimatrix game as a bipartite directed graph with the objective of establishing a correspondence between the set of the relevant structures of the graph (in particular elementary cycles) and the set of the Nash equilibria of the game. We show that finding the set of elementary cycles of the graph permits the computation of the set of equilibria. For games whose graphs have a sparse adjacency matrix, this serves as a good heuristic for computing the set of equilibria. The heuristic also allows the discarding of sections of the support space that do not yield any equilibrium, thus serving as a useful pre-processing step for algorithms that compute the equilibria through support enumeration.
[ { "version": "v1", "created": "Wed, 6 Dec 2006 15:55:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Aras", "Raghav", "", "INRIA Lorraine - LORIA" ], [ "Dutech", "Alain", "", "INRIA Lorraine -\n LORIA" ], [ "Charpillet", "François", "", "INRIA Lorraine - LORIA" ] ]
cs/0612043
Paul Vitanyi
R. Cilibrasi (CWI), Z. Lotker (CWI), A. Navarra (LaBRI - Univ. Bordeaux 1), S. Perennes (CNRS/INRIA/Univ. Nice), P. Vitanyi (CWI/Univ. Amsterdam)
About the Lifespan of Peer to Peer Networks
15 pages, LaTeX, 1 figure, Proc. 10th Int'nl Conf. Principles Of Distributed Systems (OPODIS), Lecture Notes in Computer Science, Vol. 4305, Springer Verlag, Berlin, 2006, 290--305
null
null
null
cs.DC cs.IR
null
We analyze the ability of peer to peer networks to deliver a complete file among the peers. Early on we motivate a broad generalization of network behavior organizing it into one of two successive phases. According to this view the network has two main states: first centralized - few sources (roots) hold the complete file, and next distributed - peers hold some parts (chunks) of the file such that the entire network has the whole file, but no individual has it. In the distributed state we study two scenarios, first, when the peers are ``patient'', i.e, do not leave the system until they obtain the complete file; second, peers are ``impatient'' and almost always leave the network before obtaining the complete file.
[ { "version": "v1", "created": "Thu, 7 Dec 2006 16:20:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Cilibrasi", "R.", "", "CWI" ], [ "Lotker", "Z.", "", "CWI" ], [ "Navarra", "A.", "", "LaBRI - Univ.\n Bordeaux 1" ], [ "Perennes", "S.", "", "CNRS/INRIA/Univ. Nice" ], [ "Vitanyi", "P.", "", "CWI/Univ.\n Amsterdam" ] ]
cs/0612045
Vincent Borrel
Vincent Borrel, Franck Legendre, Marcelo Dias de Amorim, Serge Fdida
SIMPS: Using Sociology for Personal Mobility
null
null
null
null
cs.NI
null
Assessing mobility in a thorough fashion is a crucial step toward more efficient mobile network design. Recent research on mobility has focused on two main points: analyzing models and studying their impact on data transport. These works investigate the consequences of mobility. In this paper, instead, we focus on the causes of mobility. Starting from established research in sociology, we propose SIMPS, a mobility model of human crowd motion. This model defines two complimentary behaviors, namely socialize and isolate, that regulate an individual with regard to her/his own sociability level. SIMPS leads to results that agree with scaling laws observed both in small-scale and large-scale human motion. Although our model defines only two simple individual behaviors, we observe many emerging collective behaviors (group formation/splitting, path formation, and evolution). To our knowledge, SIMPS is the first model in the networking community that tackles the roots governing mobility.
[ { "version": "v1", "created": "Thu, 7 Dec 2006 21:29:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Borrel", "Vincent", "" ], [ "Legendre", "Franck", "" ], [ "de Amorim", "Marcelo Dias", "" ], [ "Fdida", "Serge", "" ] ]
cs/0612046
Kristina Lerman
Kristina Lerman
Social Networks and Social Information Filtering on Digg
8 pages, 5 figures Submitted to the International Conference on Weblogs and Social Media
null
null
null
cs.HC cs.AI cs.IR
null
The new social media sites -- blogs, wikis, Flickr and Digg, among others -- underscore the transformation of the Web to a participatory medium in which users are actively creating, evaluating and distributing information. Digg is a social news aggregator which allows users to submit links to, vote on and discuss news stories. Each day Digg selects a handful of stories to feature on its front page. Rather than rely on the opinion of a few editors, Digg aggregates opinions of thousands of its users to decide which stories to promote to the front page. Digg users can designate other users as ``friends'' and easily track friends' activities: what new stories they submitted, commented on or read. The friends interface acts as a \emph{social filtering} system, recommending to user stories his or her friends liked or found interesting. By tracking the votes received by newly submitted stories over time, we showed that social filtering is an effective information filtering approach. Specifically, we showed that (a) users tend to like stories submitted by friends and (b) users tend to like stories their friends read and liked. As a byproduct of social filtering, social networks also play a role in promoting stories to Digg's front page, potentially leading to ``tyranny of the minority'' situation where a disproportionate number of front page stories comes from the same small group of interconnected users. Despite this, social filtering is a promising new technology that can be used to personalize and tailor information to individual users: for example, through personal front pages.
[ { "version": "v1", "created": "Thu, 7 Dec 2006 23:38:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Lerman", "Kristina", "" ] ]
cs/0612047
Kristina Lerman
Kristina Lerman and Laurie Jones
Social Browsing on Flickr
8 pages; submitted to the International Conference on Weblogs and Social Media
null
null
null
cs.HC cs.AI
null
The new social media sites - blogs, wikis, del.icio.us and Flickr, among others - underscore the transformation of the Web to a participatory medium in which users are actively creating, evaluating and distributing information. The photo-sharing site Flickr, for example, allows users to upload photographs, view photos created by others, comment on those photos, etc. As is common to other social media sites, Flickr allows users to designate others as ``contacts'' and to track their activities in real time. The contacts (or friends) lists form the social network backbone of social media sites. We claim that these social networks facilitate new ways of interacting with information, e.g., through what we call social browsing. The contacts interface on Flickr enables users to see latest images submitted by their friends. Through an extensive analysis of Flickr data, we show that social browsing through the contacts' photo streams is one of the primary methods by which users find new images on Flickr. This finding has implications for creating personalized recommendation systems based on the user's declared contacts lists.
[ { "version": "v1", "created": "Thu, 7 Dec 2006 23:41:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Lerman", "Kristina", "" ], [ "Jones", "Laurie", "" ] ]
cs/0612048
Changjia Chen
chunxi li and changjia chen
Queue Model of Leaf Degree Keeping Process in Gnutella Network
3 pages, 6 figures
null
null
null
cs.NI cs.PF
null
Leaf degree keeping process of Gnutella is discussed in this paper. Queue system based on rules of Gnutella protocol are introduced to modeling this process. The leaf degree distributions resulted from the queue system and from our real measurement are compared. The well match of those distributions reveal that the leaf degree distribution in Gnutella network should not be power law or power law like as reported before. It is more likely a distribution driven by certain queue process specified by the protocol.
[ { "version": "v1", "created": "Fri, 8 Dec 2006 00:44:26 GMT" } ]
2007-05-23T00:00:00
[ [ "li", "chunxi", "" ], [ "chen", "changjia", "" ] ]
cs/0612052
Jon Feldman
Jon Feldman, S. Muthukrishnan, Martin Pal, Cliff Stein
Budget Optimization in Search-Based Advertising Auctions
null
null
null
null
cs.DS cs.CE cs.GT
null
Internet search companies sell advertisement slots based on users' search queries via an auction. While there has been a lot of attention on the auction process and its game-theoretic aspects, our focus is on the advertisers. In particular, the advertisers have to solve a complex optimization problem of how to place bids on the keywords of their interest so that they can maximize their return (the number of user clicks on their ads) for a given budget. We model the entire process and study this budget optimization problem. While most variants are NP hard, we show, perhaps surprisingly, that simply randomizing between two uniform strategies that bid equally on all the keywords works well. More precisely, this strategy gets at least 1-1/e fraction of the maximum clicks possible. Such uniform strategies are likely to be practical. We also present inapproximability results, and optimal algorithms for variants of the budget optimization problem.
[ { "version": "v1", "created": "Fri, 8 Dec 2006 17:33:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Feldman", "Jon", "" ], [ "Muthukrishnan", "S.", "" ], [ "Pal", "Martin", "" ], [ "Stein", "Cliff", "" ] ]
cs/0612054
Wojciech Mazurczyk
Wojciech Mazurczyk, Zbigniew Kotulski
Lightweight security mechanism for PSTN-VoIP cooperation
6 pages, 5 figures
null
null
null
cs.CR cs.MM
null
In this paper we describe a new, lightweight security mechanism for PSTN-VoIP cooperation that is based on two information hiding techniques: digital watermarking and steganography. Proposed scheme is especially suitable for PSTN-IP-PSTN (toll-by-passing) scenario which nowadays is very popular application of IP Telephony systems. With the use of this mechanism we authenticate end-to-end transmitted voice between PSTN users. Additionally we improve IP part traffic security (both media stream and VoIP signalling messages). Exemplary scenario is presented for SIP signalling protocol along with SIP-T extension and H.248/Megaco protocol.
[ { "version": "v1", "created": "Fri, 8 Dec 2006 22:05:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Mazurczyk", "Wojciech", "" ], [ "Kotulski", "Zbigniew", "" ] ]
cs/0612055
Milan Ruzic
Anna Pagh and Rasmus Pagh and Milan Ruzic
Linear Probing with Constant Independence
13 pages
null
null
null
cs.DS cs.DB
null
Hashing with linear probing dates back to the 1950s, and is among the most studied algorithms. In recent years it has become one of the most important hash table organizations since it uses the cache of modern computers very well. Unfortunately, previous analysis rely either on complicated and space consuming hash functions, or on the unrealistic assumption of free access to a truly random hash function. Already Carter and Wegman, in their seminal paper on universal hashing, raised the question of extending their analysis to linear probing. However, we show in this paper that linear probing using a pairwise independent family may have expected {\em logarithmic} cost per operation. On the positive side, we show that 5-wise independence is enough to ensure constant expected time per operation. This resolves the question of finding a space and time efficient hash function that provably ensures good performance for linear probing.
[ { "version": "v1", "created": "Fri, 8 Dec 2006 22:50:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Pagh", "Anna", "" ], [ "Pagh", "Rasmus", "" ], [ "Ruzic", "Milan", "" ] ]
cs/0612056
Gayathree U
U. Gayathree
Conscious Intelligent Systems - Part 1 : I X I
null
null
null
null
cs.AI
null
Did natural consciousness and intelligent systems arise out of a path that was co-evolutionary to evolution? Can we explain human self-consciousness as having risen out of such an evolutionary path? If so how could it have been? In this first part of a two-part paper (titled IXI), we take a learning system perspective to the problem of consciousness and intelligent systems, an approach that may look unseasonable in this age of fMRI's and high tech neuroscience. We posit conscious intelligent systems in natural environments and wonder how natural factors influence their design paths. Such a perspective allows us to explain seamlessly a variety of natural factors, factors ranging from the rise and presence of the human mind, man's sense of I, his self-consciousness and his looping thought processes to factors like reproduction, incubation, extinction, sleep, the richness of natural behavior, etc. It even allows us to speculate on a possible human evolution scenario and other natural phenomena.
[ { "version": "v1", "created": "Sat, 9 Dec 2006 17:18:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Gayathree", "U.", "" ] ]
cs/0612057
Gayathree U
U. Gayathree
Conscious Intelligent Systems - Part II - Mind, Thought, Language and Understanding
null
null
null
null
cs.AI
null
This is the second part of a paper on Conscious Intelligent Systems. We use the understanding gained in the first part (Conscious Intelligent Systems Part 1: IXI (arxiv id cs.AI/0612056)) to look at understanding. We see how the presence of mind affects understanding and intelligent systems; we see that the presence of mind necessitates language. The rise of language in turn has important effects on understanding. We discuss the humanoid question and how the question of self-consciousness (and by association mind/thought/language) would affect humanoids too.
[ { "version": "v1", "created": "Sat, 9 Dec 2006 17:28:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Gayathree", "U.", "" ] ]
cs/0612058
Eric Vigoda
Daniel Stefankovic, Santosh Vempala, Eric Vigoda
Adaptive Simulated Annealing: A Near-optimal Connection between Sampling and Counting
null
null
null
null
cs.DS cs.DM
null
We present a near-optimal reduction from approximately counting the cardinality of a discrete set to approximately sampling elements of the set. An important application of our work is to approximating the partition function $Z$ of a discrete system, such as the Ising model, matchings or colorings of a graph. The typical approach to estimating the partition function $Z(\beta^*)$ at some desired inverse temperature $\beta^*$ is to define a sequence, which we call a {\em cooling schedule}, $\beta_0=0<\beta_1<...<\beta_\ell=\beta^*$ where Z(0) is trivial to compute and the ratios $Z(\beta_{i+1})/Z(\beta_i)$ are easy to estimate by sampling from the distribution corresponding to $Z(\beta_i)$. Previous approaches required a cooling schedule of length $O^*(\ln{A})$ where $A=Z(0)$, thereby ensuring that each ratio $Z(\beta_{i+1})/Z(\beta_i)$ is bounded. We present a cooling schedule of length $\ell=O^*(\sqrt{\ln{A}})$. For well-studied problems such as estimating the partition function of the Ising model, or approximating the number of colorings or matchings of a graph, our cooling schedule is of length $O^*(\sqrt{n})$, which implies an overall savings of $O^*(n)$ in the running time of the approximate counting algorithm (since roughly $\ell$ samples are needed to estimate each ratio).
[ { "version": "v1", "created": "Sun, 10 Dec 2006 20:00:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Stefankovic", "Daniel", "" ], [ "Vempala", "Santosh", "" ], [ "Vigoda", "Eric", "" ] ]
cs/0612060
Sreyash Kenkre
Sreyash Kenkre, Sundar Vishwanathan
The Common Prefix Problem On Trees
8 pages
null
null
null
cs.DS cs.CC
null
We present a theoretical study of a problem arising in database query optimization, which we call as The Common Prefix Problem. We present a $(1-o(1))$ factor approximation algorithm for this problem, when the underlying graph is a binary tree. We then use a result of Feige and Kogan to show that even on stars, the problem is hard to approximate.
[ { "version": "v1", "created": "Mon, 11 Dec 2006 12:32:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Kenkre", "Sreyash", "" ], [ "Vishwanathan", "Sundar", "" ] ]
cs/0612062
Federico Calzolari
Federico Calzolari, Michele Mammini, Monica Monachini
Unifying Lexicons in view of a Phonological and Morphological Lexical DB
4 pages
null
null
null
cs.IR
null
The present work falls in the line of activities promoted by the European Languguage Resource Association (ELRA) Production Committee (PCom) and raises issues in methods, procedures and tools for the reusability, creation, and management of Language Resources. A two-fold purpose lies behind this experiment. The first aim is to investigate the feasibility, define methods and procedures for combining two Italian lexical resources that have incompatible formats and complementary information into a Unified Lexicon (UL). The adopted strategy and the procedures appointed are described together with the driving criterion of the merging task, where a balance between human and computational efforts is pursued. The coverage of the UL has been maximized, by making use of simple and fast matching procedures. The second aim is to exploit this newly obtained resource for implementing the phonological and morphological layers of the CLIPS lexical database. Implementing these new layers and linking them with the already exisitng syntactic and semantic layers is not a trivial task. The constraints imposed by the model, the impact at the architectural level and the solution adopted in order to make the whole database `speak' efficiently are presented. Advantages vs. disadvantages are discussed.
[ { "version": "v1", "created": "Mon, 11 Dec 2006 14:45:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Calzolari", "Federico", "" ], [ "Mammini", "Michele", "" ], [ "Monachini", "Monica", "" ] ]
cs/0612066
Karim El Defrawy
Karim El Defrawy, Athina Markopoulou and Katerina Argyraki
Optimal Filtering for DDoS Attacks
13 pages, 14 figures
null
null
null
cs.NI
null
Distributed Denial-of-Service (DDoS) attacks are a major problem in the Internet today. In one form of a DDoS attack, a large number of compromised hosts send unwanted traffic to the victim, thus exhausting the resources of the victim and preventing it from serving its legitimate clients. One of the main mechanisms that have been proposed to deal with DDoS is filtering, which allows routers to selectively block unwanted traffic. Given the magnitude of DDoS attacks and the high cost of filters in the routers today, the successful mitigation of a DDoS attack using filtering crucially depends on the efficient allocation of filtering resources. In this paper, we consider a single router, typically the gateway of the victim, with a limited number of available filters. We study how to optimally allocate filters to attack sources, or entire domains of attack sources, so as to maximize the amount of good traffic preserved, under a constraint on the number of filters. We formulate the problem as an optimization problem and solve it optimally using dynamic programming, study the properties of the optimal allocation, experiment with a simple heuristic and evaluate our solutions for a range of realistic attack-scenarios. First, we look at a single-tier where the collateral damage is high due to the filtering at the granularity of domains. Second, we look at the two-tier problem where we have an additional constraint on the number of filters and the filtering is performed on the granularity of attackers and domains.
[ { "version": "v1", "created": "Tue, 12 Dec 2006 04:52:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Defrawy", "Karim El", "" ], [ "Markopoulou", "Athina", "" ], [ "Argyraki", "Katerina", "" ] ]
cs/0612068
Esben Rune Hansen
Esben Rune Hansen and Henrik Reif Andersen
Interactive Configuration by Regular String Constraints
Tech Report
null
null
null
cs.AI
null
A product configurator which is complete, backtrack free and able to compute the valid domains at any state of the configuration can be constructed by building a Binary Decision Diagram (BDD). Despite the fact that the size of the BDD is exponential in the number of variables in the worst case, BDDs have proved to work very well in practice. Current BDD-based techniques can only handle interactive configuration with small finite domains. In this paper we extend the approach to handle string variables constrained by regular expressions. The user is allowed to change the strings by adding letters at the end of the string. We show how to make a data structure that can perform fast valid domain computations given some assignment on the set of string variables. We first show how to do this by using one large DFA. Since this approach is too space consuming to be of practical use, we construct a data structure that simulates the large DFA and in most practical cases are much more space efficient. As an example a configuration problem on $n$ string variables with only one solution in which each string variable is assigned to a value of length of $k$ the former structure will use $\Omega(k^n)$ space whereas the latter only need $O(kn)$. We also show how this framework easily can be combined with the recent BDD techniques to allow both boolean, integer and string variables in the configuration problem.
[ { "version": "v1", "created": "Tue, 12 Dec 2006 16:21:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Hansen", "Esben Rune", "" ], [ "Andersen", "Henrik Reif", "" ] ]
cs/0612070
Ilya Safro Mr.
Sergey Benditkis, Illya Safro
Generalizations of the Hanoi Towers Problem
null
null
null
null
cs.DM
null
Our theme bases on the classical Hanoi Towers Problem. In this paper we will define a new problem, permitting some positions, that were not legal in the classical problem. Our goal is to find an optimal (shortest possible) sequence of discs' moves. Besides that, we will research all versions of 3-pegs classical problem with some special constraints, when some types of moves are disallowed.
[ { "version": "v1", "created": "Wed, 13 Dec 2006 22:30:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Benditkis", "Sergey", "" ], [ "Safro", "Illya", "" ] ]
cs/0612071
Francis Heylighen
Francis Heylighen
Why is Open Access Development so Successful? Stigmergic organization and the economics of information
null
in: B. Lutterbeck, M. Baerwolff & R. A. Gehring (eds.), Open Source Jahrbuch 2007, Lehmanns Media, 2007
null
ECCO Working Paper 2006-06
cs.CY cs.DL physics.soc-ph
null
The explosive development of "free" or "open source" information goods contravenes the conventional wisdom that markets and commercial organizations are necessary to efficiently supply products. This paper proposes a theoretical explanation for this phenomenon, using concepts from economics and theories of self-organization. Once available on the Internet, information is intrinsically not a scarce good, as it can be replicated virtually without cost. Moreover, freely distributing information is profitable to its creator, since it improves the quality of the information, and enhances the creator's reputation. This provides a sufficient incentive for people to contribute to open access projects. Unlike traditional organizations, open access communities are open, distributed and self-organizing. Coordination is achieved through stigmergy: listings of "work-in-progress" direct potential contributors to the tasks where their contribution is most likely to be fruitful. This obviates the need both for centralized planning and for the "invisible hand" of the market.
[ { "version": "v1", "created": "Thu, 14 Dec 2006 12:15:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Heylighen", "Francis", "" ] ]
cs/0612074
Zengjian Hu
Petra Berenbrink and Colin Cooper and Zengjian Hu
Energy Efficient Randomized Communication in Unknown AdHoc Networks
15 pages. 1 figure
null
null
null
cs.DC cs.DS
null
This paper studies broadcasting and gossiping algorithms in random and general AdHoc networks. Our goal is not only to minimise the broadcasting and gossiping time, but also to minimise the energy consumption, which is measured in terms of the total number of messages (or transmissions) sent. We assume that the nodes of the network do not know the network, and that they can only send with a fixed power, meaning they can not adjust the areas sizes that their messages cover. We believe that under these circumstances the number of transmissions is a very good measure for the overall energy consumption. For random networks, we present a broadcasting algorithm where every node transmits at most once. We show that our algorithm broadcasts in $O(\log n)$ steps, w.h.p, where $n$ is the number of nodes. We then present a $O(d \log n)$ ($d$ is the expected degree) gossiping algorithm using $O(\log n)$ messages per node. For general networks with known diameter $D$, we present a randomised broadcasting algorithm with optimal broadcasting time $O(D \log (n/D) + \log^2 n)$ that uses an expected number of $O(\log^2 n / \log (n/D))$ transmissions per node. We also show a tradeoff result between the broadcasting time and the number of transmissions: we construct a network such that any oblivious algorithmusing a time-invariant distribution requires $\Omega(\log^2 n / \log (n/D))$ messages per node in order to finish broadcasting in optimal time. This demonstrates the tightness of our upper bound. We also show that no oblivious algorithm can complete broadcasting w.h.p. using $o(\log n)$ messages per node.
[ { "version": "v1", "created": "Fri, 15 Dec 2006 03:43:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Berenbrink", "Petra", "" ], [ "Cooper", "Colin", "" ], [ "Hu", "Zengjian", "" ] ]
cs/0612081
Manas Tungare
Manas Tungare, Pardha S. Pyla, Manuel P\'erez-Qui\~nones, and Steve Harrison
Personal Information Ecosystems and Implications for Design
null
null
null
null
cs.HC
null
Today, people use multiple devices to fulfill their information needs. However, designers design each device individually, without accounting for the other devices that users may also use. In many cases, the applications on all these devices are designed to be functional replicates of each other. We argue that this results in an over-reliance on data synchronization across devices, version control nightmares, and increased burden of file management. In this paper, we present the idea of a \textit{personal information ecosystem}, an analogy to biological ecosystems, which allows us to discuss the inter-relationships among these devices to fulfill the information needs of the user. There is a need for designers to design devices as part of a complete ecosystem, not as independent devices that simply share data replicated across them. To help us understand this domain and to facilitate the dialogue and study of such systems, we present the terminology, classifications of the interdependencies among different devices, and resulting implications for design.
[ { "version": "v1", "created": "Mon, 18 Dec 2006 07:53:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Tungare", "Manas", "" ], [ "Pyla", "Pardha S.", "" ], [ "Pérez-Quiñones", "Manuel", "" ], [ "Harrison", "Steve", "" ] ]
cs/0612082
Thierry Despeyroux
Thierry Despeyroux (INRIA Rocquencourt / INRIA Sophia Antipolis)
Developing efficient parsers in Prolog: the CLF manual (v1.0)
null
null
null
null
cs.SE
null
This document describes a couple of tools that help to quickly design and develop computer (formalized) languages. The first one use Flex to perform lexical analysis and the second is an extention of Prolog DCGs to perfom syntactical analysis. Initially designed as a new component for the Centaur system, these tools are now available independently and can be used to construct efficient Prolog parsers that can be integrated in Prolog or heterogeneous systems. This is the initial version of the CLF documentation. Updated version will be available online when necessary.
[ { "version": "v1", "created": "Mon, 18 Dec 2006 08:40:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Despeyroux", "Thierry", "", "INRIA Rocquencourt / INRIA Sophia Antipolis" ] ]
cs/0612085
Roberto Bagnara
Roberto Bagnara, Patricia M. Hill, Enea Zaffanella
The Parma Polyhedra Library: Toward a Complete Set of Numerical Abstractions for the Analysis and Verification of Hardware and Software Systems
38 pages, 2 figures, 3 listings, 3 tables
null
null
Quaderno 457
cs.MS cs.PL
null
Since its inception as a student project in 2001, initially just for the handling (as the name implies) of convex polyhedra, the Parma Polyhedra Library has been continuously improved and extended by joining scrupulous research on the theoretical foundations of (possibly non-convex) numerical abstractions to a total adherence to the best available practices in software development. Even though it is still not fully mature and functionally complete, the Parma Polyhedra Library already offers a combination of functionality, reliability, usability and performance that is not matched by similar, freely available libraries. In this paper, we present the main features of the current version of the library, emphasizing those that distinguish it from other similar libraries and those that are important for applications in the field of analysis and verification of hardware and software systems.
[ { "version": "v1", "created": "Mon, 18 Dec 2006 10:15:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Bagnara", "Roberto", "" ], [ "Hill", "Patricia M.", "" ], [ "Zaffanella", "Enea", "" ] ]
cs/0612088
Julien Robert
Julien Robert and Nicolas Schabanel
Non-Clairvoyant Batch Sets Scheduling: Fairness is Fair enough
12 pages, 1 figure
null
null
null
cs.DC cs.DS
null
Scheduling questions arise naturally in many different areas among which operating system design, compiling,... In real life systems, the characteristics of the jobs (such as release time and processing time) are usually unknown and unpredictable beforehand. The system is typically unaware of the remaining work in each job or of the ability of the job to take advantage of more resources. Following these observations, we adopt the job model by Edmonds et al (2000, 2003) in which the jobs go through a sequence of different phases. Each phase consists of a certain quantity of work and a speed-up function that models how it takes advantage of the number of processors it receives. We consider the non-clairvoyant online setting where a collection of jobs arrives at time 0. We consider the metrics setflowtime introduced by Robert et al (2007). The goal is to minimize the sum of the completion time of the sets, where a set is completed when all of its jobs are done. If the input consists of a single set of jobs, this is simply the makespan of the jobs; and if the input consists of a collection of singleton sets, it is simply the flowtime of the jobs. We show that the non-clairvoyant strategy EQUIoEQUI that evenly splits the available processors among the still unserved sets and then evenly splits these processors among the still uncompleted jobs of each unserved set, achieves a competitive ratio (2+\sqrt3+o(1))\frac{ln n}{lnln n} for the setflowtime minimization and that this is asymptotically optimal (up to a constant factor), where n is the size of the largest set. For makespan minimization, we show that the non-clairvoyant strategy EQUI achieves a competitive ratio of (1+o(1))\frac{ln n}{lnln n}, which is again asymptotically optimal.
[ { "version": "v1", "created": "Tue, 19 Dec 2006 15:19:59 GMT" }, { "version": "v2", "created": "Tue, 19 Dec 2006 21:55:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Robert", "Julien", "" ], [ "Schabanel", "Nicolas", "" ] ]
cs/0612090
Vita Hinze-Hoare
Vita Hinze-Hoare
A Review of Papers that have a bearing on an Analysis of User Interactions in A Collaborative On-line Laboratory
null
null
null
null
cs.HC
null
A number of papers have been reviewed in the areas of HCI, CSCW, CSCL. These have been analyzed with a view to extract the ideas relevant to a consideration of user interactions in a collaborative on line laboratory which is being under development for use in the ITO BSc course at Southampton University. The construction of new theoretical models is to be based upon principles of collaborative HCI design and constructivist and situational educational theory. An investigation of the review papers it is hoped will lead towards a methodology/framework that can be used as guidance for collaborative learning systems and these will need to be developed alongside the requirements as they change during the development cycles. The primary outcome will be the analysis and re-design of the online e-learning laboratory together with a measure of its efficacy in the learning process.
[ { "version": "v1", "created": "Mon, 18 Dec 2006 22:24:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Hinze-Hoare", "Vita", "" ] ]
cs/0612092
Ahmed Sidky Ahmed Sidky
Ahmed Sidky, James Arthur
Agile Adoption Process Framework
This is a reference document containing an overview of the adoption framework along with all the indicators used for the assessment of the agile practices
null
null
null
cs.SE
null
Today many organizations aspire to adopt agile processes in hope of overcoming some of the difficulties they are facing with their current software development process. There is no structured framework for the agile adoption process. This paper presents a 3-Stage process framework that assists organization and guides organizations through their agile adoption efforts. The Process Framework has been received significantly positive feedback from experts and leaders in agile adoption industry.
[ { "version": "v1", "created": "Tue, 19 Dec 2006 16:35:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Sidky", "Ahmed", "" ], [ "Arthur", "James", "" ] ]
cs/0612093
Jo\~ao Barros
Miguel S. Silva, Francisco Martins, Luis Lopes, Joao Barros
A Calculus for Sensor Networks
24 pages, 1 figure, submitted for publication
null
null
null
cs.DC cs.PL
null
We consider the problem of providing a rigorous model for programming wireless sensor networks. Assuming that collisions, packet losses, and errors are dealt with at the lower layers of the protocol stack, we propose a Calculus for Sensor Networks (CSN) that captures the main abstractions for programming applications for this class of devices. Besides providing the syntax and semantics for the calculus, we show its expressiveness by providing implementations for several examples of typical operations on sensor networks. Also included is a detailed discussion of possible extensions to CSN that enable the modeling of other important features of these networks such as sensor state, sampling strategies, and network security.
[ { "version": "v1", "created": "Tue, 19 Dec 2006 14:45:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Silva", "Miguel S.", "" ], [ "Martins", "Francisco", "" ], [ "Lopes", "Luis", "" ], [ "Barros", "Joao", "" ] ]
cs/0612098
Manik Lal Das
Manik Lal Das, Ashutosh Saxena, Deepak B. Phatak
Algorithms and Approaches of Proxy Signature: A Survey
29 pages
null
null
null
cs.CR
null
Numerous research studies have been investigated on proxy signatures over the last decade. This survey reviews the research progress on proxy signatures, analyzes a few notable proposals, and provides an overall remark of these proposals.
[ { "version": "v1", "created": "Wed, 20 Dec 2006 06:09:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Das", "Manik Lal", "" ], [ "Saxena", "Ashutosh", "" ], [ "Phatak", "Deepak B.", "" ] ]
cs/0612100
Rob van Stee
Leah Epstein and Rob van Stee
Improved results for a memory allocation problem
null
null
null
null
cs.DS
null
We consider a memory allocation problem that can be modeled as a version of bin packing where items may be split, but each bin may contain at most two (parts of) items. A 3/2-approximation algorithm and an NP-hardness proof for this problem was given by Chung et al. We give a simpler 3/2-approximation algorithm for it which is in fact an online algorithm. This algorithm also has good performance for the more general case where each bin may contain at most k parts of items. We show that this general case is also strongly NP-hard. Additionally, we give an efficient 7/5-approximation algorithm.
[ { "version": "v1", "created": "Wed, 20 Dec 2006 13:39:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Epstein", "Leah", "" ], [ "van Stee", "Rob", "" ] ]
cs/0612102
Nilesh Dalvi
Nilesh Dalvi and Dan Suciu
The Dichotomy of Conjunctive Queries on Probabilistic Structures
null
null
null
null
cs.DB
null
We show that for every conjunctive query, the complexity of evaluating it on a probabilistic database is either \PTIME or #\P-complete, and we give an algorithm for deciding whether a given conjunctive query is \PTIME or #\P-complete. The dichotomy property is a fundamental result on query evaluation on probabilistic databases and it gives a complete classification of the complexity of conjunctive queries.
[ { "version": "v1", "created": "Wed, 20 Dec 2006 21:11:05 GMT" }, { "version": "v2", "created": "Sat, 13 Jan 2007 06:51:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Dalvi", "Nilesh", "" ], [ "Suciu", "Dan", "" ] ]
cs/0612103
Vibhor Rastogi
Vibhor Rastogi, Dan Suciu, Sungho Hong
The Boundary Between Privacy and Utility in Data Anonymization
null
null
null
null
cs.DB
null
We consider the privacy problem in data publishing: given a relation I containing sensitive information 'anonymize' it to obtain a view V such that, on one hand attackers cannot learn any sensitive information from V, and on the other hand legitimate users can use V to compute useful statistics on I. These are conflicting goals. We use a definition of privacy that is derived from existing ones in the literature, which relates the a priori probability of a given tuple t, Pr(t), with the a posteriori probability, Pr(t | V), and propose a novel and quite practical definition for utility. Our main result is the following. Denoting n the size of I and m the size of the domain from which I was drawn (i.e. n < m) then: when the a priori probability is Pr(t) = Omega(n/sqrt(m)) for some t, there exists no useful anonymization algorithm, while when Pr(t) = O(n/m) for all tuples t, then we give a concrete anonymization algorithm that is both private and useful. Our algorithm is quite different from the k-anonymization algorithm studied intensively in the literature, and is based on random deletions and insertions to I.
[ { "version": "v1", "created": "Thu, 21 Dec 2006 00:21:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Rastogi", "Vibhor", "" ], [ "Suciu", "Dan", "" ], [ "Hong", "Sungho", "" ] ]
cs/0612104
Keki Burjorjee
Keki Burjorjee
Sufficient Conditions for Coarse-Graining Evolutionary Dynamics
19 pages, 1 figure. Accepted to the Foundations of Genetic Algorithms Conference 2007 (FOGA IX)
null
null
null
cs.NE cs.AI
null
It is commonly assumed that the ability to track the frequencies of a set of schemata in the evolving population of an infinite population genetic algorithm (IPGA) under different fitness functions will advance efforts to obtain a theory of adaptation for the simple GA. Unfortunately, for IPGAs with long genomes and non-trivial fitness functions there do not currently exist theoretical results that allow such a study. We develop a simple framework for analyzing the dynamics of an infinite population evolutionary algorithm (IPEA). This framework derives its simplicity from its abstract nature. In particular we make no commitment to the data-structure of the genomes, the kind of variation performed, or the number of parents involved in a variation operation. We use this framework to derive abstract conditions under which the dynamics of an IPEA can be coarse-grained. We then use this result to derive concrete conditions under which it becomes computationally feasible to closely approximate the frequencies of a family of schemata of relatively low order over multiple generations, even when the bitstsrings in the evolving population of the IPGA are long.
[ { "version": "v1", "created": "Thu, 21 Dec 2006 02:18:17 GMT" }, { "version": "v2", "created": "Sat, 5 May 2007 02:25:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Burjorjee", "Keki", "" ] ]
cs/0612105
Elankovan Sundararajan Mr.
Elankovan Sundararajan and Aaron Harwood
Towards Parallel Computing on the Internet: Applications, Architectures, Models and Programming Tools
39 pages, 9 figures
null
null
null
cs.DC cs.PF
null
The development of Internet wide resources for general purpose parallel computing poses the challenging task of matching computation and communication complexity. A number of parallel computing models exist that address this for traditional parallel architectures, and there are a number of emerging models that attempt to do this for large scale Internet-based systems like computational grids. In this survey we cover the three fundamental aspects -- application, architecture and model, and we show how they have been developed over the last decade. We also cover programming tools that are currently being used for parallel programming in computational grids. The trend in conventional computational models are to put emphasis on efficient communication between participating nodes by adapting different types of communication to network conditions. Effects of dynamism and uncertainties that arise in large scale systems are evidently important to understand and yet there is currently little work that addresses this from a parallel computing perspective.
[ { "version": "v1", "created": "Thu, 21 Dec 2006 06:38:21 GMT" }, { "version": "v2", "created": "Mon, 25 Dec 2006 00:51:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Sundararajan", "Elankovan", "" ], [ "Harwood", "Aaron", "" ] ]
cs/0612107
Friedhelm. R. Drepper
Friedhelm R. Drepper
Voiced speech as secondary response of a self-consistent fundamental drive
13 pages with 3 figures
null
null
null
cs.SD nlin.AO
null
Voiced segments of speech are assumed to be composed of non-stationary acoustic objects which can be described as stationary response of a non-stationary fundamental drive (FD) process and which are furthermore suited to reconstruct the hidden FD by using a voice adapted (self-consistent) part-tone decomposition of the speech signal. The universality and robustness of human pitch perception encourages the reconstruction of a band-limited FD in the frequency range of the pitch. The self-consistent decomposition of voiced continuants generates several part-tones which can be confirmed to be topologically equivalent to corresponding acoustic modes of the excitation on the transmitter side. As topologically equivalent image of a glottal master oscillator, the self-consistent FD is suited to serve as low frequency part of the basic time-scale separation of auditive perception and to describe the broadband voiced excitation as entrained (synchronized) and/or modulated primary response. Being guided by the acoustic correlates of pitch and loudness perception, the time-scale separation avoids the conventional assumption of stationary excitation and represents the basic decoding step of an advanced precision transmission protocol of self-consistent (voiced) acoustic objects. The present study is focussed on the adaptation of the trajectories (contours) of the centre filter frequency of the part-tones to the chirp of the glottal master oscillator.
[ { "version": "v1", "created": "Thu, 21 Dec 2006 12:39:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Drepper", "Friedhelm R.", "" ] ]
cs/0612108
Fabien Mathieu
Dmitry Lebedev (INRIA Rocquencourt), Fabien Mathieu (INRIA Rocquencourt), Laurent Viennot (INRIA Rocquencourt), Anh-Tuan Gai (INRIA Rocquencourt), Julien Reynier (INRIA Rocquencourt, INRIA Rocquencourt), Fabien De Montgolfier (INRIA Rocquencourt)
On Using Matching Theory to Understand P2P Network Design
null
null
null
null
cs.NI cs.GT
null
This paper aims to provide insight into stability of collaboration choices in P2P networks. We study networks where exchanges between nodes are driven by the desire to receive the best service available. This is the case for most existing P2P networks. We explore an evolution model derived from stable roommates theory that accounts for heterogeneity between nodes. We show that most P2P applications can be modeled using stable matching theory. This is the case whenever preference lists can be deduced from the exchange policy. In many cases, the preferences lists are characterized by an interesting acyclic property. We show that P2P networks with acyclic preferences possess a unique stable state with good convergence properties.
[ { "version": "v1", "created": "Thu, 21 Dec 2006 15:19:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Lebedev", "Dmitry", "", "INRIA Rocquencourt" ], [ "Mathieu", "Fabien", "", "INRIA\n Rocquencourt" ], [ "Viennot", "Laurent", "", "INRIA Rocquencourt" ], [ "Gai", "Anh-Tuan", "", "INRIA\n Rocquencourt" ], [ "Reynier", "Julien", "", "INRIA Rocquencourt, INRIA Rocquencourt" ], [ "De Montgolfier", "Fabien", "", "INRIA Rocquencourt" ] ]
cs/0612110
James Hamilton
James Hamilton
Architecture for Modular Data Centers
This article is published under a Creative Commons License Agreement (http://creativecommons.org/licenses/by/2.5/.) You may copy, distribute, display, and perform the work, make derivative works and make commercial use of the work, but, you must attribute the work to the author and CIDR 2007. 3rd Biennial Conference on Innovative Data Systems Research (CIDR) January 710, 2007, Asilomar, California, USA
null
null
null
cs.DB
null
Several factors are driving high-scale deployments of large data centers built upon commodity components. These commodity clusters are far cheaper than mainframe systems of the past but they bring serious heat and power density issues. Also the high failure rate of the individual components drives significant administrative costs. This proposal outlines an architecture for data center design based upon 20'x8'x8' modules that substantially changes how these systems are acquired, administered, and then later recycled.
[ { "version": "v1", "created": "Thu, 21 Dec 2006 19:36:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Hamilton", "James", "" ] ]
cs/0612112
Boris Baryshnikov
Boris Baryshnikov, Cipri Clinciu, Conor Cunningham, Leo Giakoumakis, Slava Oks, Stefano Stefani
Managing Query Compilation Memory Consumption to Improve DBMS Throughput
This article is published under a Creative Commons License Agreement (http://creativecommons.org/licenses/by/2.5/.) You may copy, distribute, display, and perform the work, make derivative works and make commercial use of the work, but, you must attribute the work to the author and CIDR 2007. 3rd Biennial Conference on Innovative Data Systems Research (CIDR) January 710, 2007, Asilomar, California, USA
null
null
null
cs.DB
null
While there are known performance trade-offs between database page buffer pool and query execution memory allocation policies, little has been written on the impact of query compilation memory use on overall throughput of the database management system (DBMS). We present a new aspect of the query optimization problem and offer a solution implemented in Microsoft SQL Server 2005. The solution provides stable throughput for a range of workloads even when memory requests outstrip the ability of the hardware to service those requests.
[ { "version": "v1", "created": "Thu, 21 Dec 2006 21:51:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Baryshnikov", "Boris", "" ], [ "Clinciu", "Cipri", "" ], [ "Cunningham", "Conor", "" ], [ "Giakoumakis", "Leo", "" ], [ "Oks", "Slava", "" ], [ "Stefani", "Stefano", "" ] ]
cs/0612113
Paul Greenfield
Paul Greenfield, Alan Fekete, Julian Jang, Dean Kuo, Surya Nepal
Isolation Support for Service-based Applications: A Position Paper
This article is published under a Creative Commons License Agreement (http://creativecommons.org/licenses/by/2.5/.) You may copy, distribute, display, and perform the work, make derivative works and make commercial use of the work, but, you must attribute the work to the author and CIDR 2007. 3rd Biennial Conference on Innovative Data Systems Research (CIDR) January 710, 2007, Asilomar, California, USA
null
null
null
cs.DB
null
In this paper, we propose an approach to providing the benefits of isolation in service-oriented applications where it is not feasible to hold traditional locks for ACID transactions. Our technique, called "Promises", provides an uniform view for clients which covers a wide range of implementation techniques on the service side, all allowing the client to check a condition and then later rely on that condition still holding.
[ { "version": "v1", "created": "Thu, 21 Dec 2006 22:08:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Greenfield", "Paul", "" ], [ "Fekete", "Alan", "" ], [ "Jang", "Julian", "" ], [ "Kuo", "Dean", "" ], [ "Nepal", "Surya", "" ] ]
cs/0612114
Alexander Bohm
Alexander B\"ohm, Carl-Christian Kanne, Guido Moerkotte
Demaq: A Foundation for Declarative XML Message Processing
This article is published under a Creative Commons License Agreement (http://creativecommons.org/licenses/by/2.5/.) You may copy, distribute, display, and perform the work, make derivative works and make commercial use of the work, but, you must attribute the work to the author and CIDR 2007. 3rd Biennial Conference on Innovative Data Systems Research (CIDR) January 710, 2007, Asilomar, California, USA
null
null
null
cs.DB
null
This paper gives an overview of Demaq, an XML message processing system operating on the foundation of transactional XML message queues. We focus on the syntax and semantics of its fully declarative, rule-based application language and demonstrate our message-based programming paradigm in the context of a case study. Further, we discuss optimization opportunities for executing Demaq programs.
[ { "version": "v1", "created": "Thu, 21 Dec 2006 22:29:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Böhm", "Alexander", "" ], [ "Kanne", "Carl-Christian", "" ], [ "Moerkotte", "Guido", "" ] ]
cs/0612115
Roger Barga
Roger S. Barga, Jonathan Goldstein, Mohamed Ali, Mingsheng Hong
Consistent Streaming Through Time: A Vision for Event Stream Processing
This article is published under a Creative Commons License Agreement (http://creativecommons.org/licenses/by/2.5/.) You may copy, distribute, display, and perform the work, make derivative works and make commercial use of the work, but, you must attribute the work to the author and CIDR 2007. 3rd Biennial Conference on Innovative Data Systems Research (CIDR) January 710, 2007, Asilomar, California, USA
null
null
null
cs.DB
null
Event processing will play an increasingly important role in constructing enterprise applications that can immediately react to business critical events. Various technologies have been proposed in recent years, such as event processing, data streams and asynchronous messaging (e.g. pub/sub). We believe these technologies share a common processing model and differ only in target workload, including query language features and consistency requirements. We argue that integrating these technologies is the next step in a natural progression. In this paper, we present an overview and discuss the foundations of CEDR, an event streaming system that embraces a temporal stream model to unify and further enrich query language features, handle imperfections in event delivery and define correctness guarantees. We describe specific contributions made so far and outline next steps in developing the CEDR system.
[ { "version": "v1", "created": "Thu, 21 Dec 2006 22:40:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Barga", "Roger S.", "" ], [ "Goldstein", "Jonathan", "" ], [ "Ali", "Mohamed", "" ], [ "Hong", "Mingsheng", "" ] ]
cs/0612119
Philippe Saux Picart
Cyril Brunie (LACO), Philippe Saux Picart (LM)
Symmetric Subresultants and Applications
null
null
null
null
cs.SC
null
Schur's transforms of a polynomial are used to count its roots in the unit disk. These are generalized them by introducing the sequence of symmetric sub-resultants of two polynomials. Although they do have a determinantal definition, we show that they satisfy a structure theorem which allows us to compute them with a type of Euclidean division. As a consequence, a fast algorithm based on a dichotomic process and FFT is designed. We prove also that these symmetric sub-resultants have a deep link with Toeplitz matrices. Finally, we propose a new algorithm of inversion for such matrices. It has the same cost as those already known, however it is fraction-free and consequently well adapted to computer algebra.
[ { "version": "v1", "created": "Fri, 22 Dec 2006 08:20:11 GMT" }, { "version": "v2", "created": "Thu, 29 Mar 2007 17:49:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Brunie", "Cyril", "", "LACO" ], [ "Picart", "Philippe Saux", "", "LM" ] ]
cs/0612120
Francesco Ranzato
Francesco Ranzato and Francesco Tapparo
Generalizing the Paige-Tarjan Algorithm by Abstract Interpretation
Keywords: Abstract interpretation, abstract model checking, strong preservation, Paige-Tarjan algorithm, refinement algorithm
null
null
null
cs.LO
null
The Paige and Tarjan algorithm (PT) for computing the coarsest refinement of a state partition which is a bisimulation on some Kripke structure is well known. It is also well known in model checking that bisimulation is equivalent to strong preservation of CTL, or, equivalently, of Hennessy-Milner logic. Drawing on these observations, we analyze the basic steps of the PT algorithm from an abstract interpretation perspective, which allows us to reason on strong preservation in the context of generic inductively defined (temporal) languages and of possibly non-partitioning abstract models specified by abstract interpretation. This leads us to design a generalized Paige-Tarjan algorithm, called GPT, for computing the minimal refinement of an abstract interpretation-based model that strongly preserves some given language. It turns out that PT is a straight instance of GPT on the domain of state partitions for the case of strong preservation of Hennessy-Milner logic. We provide a number of examples showing that GPT is of general use. We first show how a well-known efficient algorithm for computing stuttering equivalence can be viewed as a simple instance of GPT. We then instantiate GPT in order to design a new efficient algorithm for computing simulation equivalence that is competitive with the best available algorithms. Finally, we show how GPT allows to compute new strongly preserving abstract models by providing an efficient algorithm that computes the coarsest refinement of a given partition that strongly preserves the language generated by the reachability operator.
[ { "version": "v1", "created": "Fri, 22 Dec 2006 19:45:34 GMT" }, { "version": "v2", "created": "Wed, 27 Dec 2006 11:16:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Ranzato", "Francesco", "" ], [ "Tapparo", "Francesco", "" ] ]
cs/0612121
Stefan Funke
Stefan Funke, Soeren Laue, Zvi Lotker, Rouven Naujoks
Power Assignment Problems in Wireless Communication
13 pages
null
null
null
cs.CG cs.AR cs.NI
null
A fundamental class of problems in wireless communication is concerned with the assignment of suitable transmission powers to wireless devices/stations such that the resulting communication graph satisfies certain desired properties and the overall energy consumed is minimized. Many concrete communication tasks in a wireless network like broadcast, multicast, point-to-point routing, creation of a communication backbone, etc. can be regarded as such a power assignment problem. This paper considers several problems of that kind; for example one problem studied before in \cite{Carrots, Bilo} aims to select and assign powers to $k$ of the stations such that all other stations are within reach of at least one of the selected stations. We improve the running time for obtaining a $(1+\epsilon)$-approximate solution for this problem from $n^{((\alpha/\epsilon)^{O(d)})}$ as reported by Bilo et al. (\cite{Bilo}) to $O(n+ {(\frac{k^{2d+1}}{\epsilon^d})}^{\min{\{2k, (\alpha/\epsilon)^{O(d)} \}}})$ that is, we obtain a running time that is \emph{linear} in the network size. Further results include a constant approximation algorithm for the TSP problem under squared (non-metric!) edge costs, which can be employed to implement a novel data aggregation protocol, as well as efficient schemes to perform $k$-hop multicasts.
[ { "version": "v1", "created": "Fri, 22 Dec 2006 12:53:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Funke", "Stefan", "" ], [ "Laue", "Soeren", "" ], [ "Lotker", "Zvi", "" ], [ "Naujoks", "Rouven", "" ] ]
cs/0612126
Petr Ivankov
Petr R. Ivankov, Nikolay P. Ivankov
The virtual reality framework for engineering objects
null
null
null
null
cs.CE cs.MS
null
A framework for virtual reality of engineering objects has been developed. This framework may simulate different equipment related to virtual reality. Framework supports 6D dynamics, ordinary differential equations, finite formulas, vector and matrix operations. The framework also supports embedding of external software.
[ { "version": "v1", "created": "Fri, 22 Dec 2006 19:19:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Ivankov", "Petr R.", "" ], [ "Ivankov", "Nikolay P.", "" ] ]
cs/0612127
Mohamed Y. Eltabakh
Mohamed Y. Eltabakh, Mourad Ouzzani, Walid G. Aref
bdbms -- A Database Management System for Biological Data
This article is published under a Creative Commons License Agreement (http://creativecommons.org/licenses/by/2.5/.) You may copy, distribute, display, and perform the work, make derivative works and make commercial use of the work, but, you must attribute the work to the author and CIDR 2007. 3rd Biennial Conference on Innovative Data Systems Research (CIDR) January 710, 2007, Asilomar, California, USA
null
null
null
cs.DB
null
Biologists are increasingly using databases for storing and managing their data. Biological databases typically consist of a mixture of raw data, metadata, sequences, annotations, and related data obtained from various sources. Current database technology lacks several functionalities that are needed by biological databases. In this paper, we introduce bdbms, an extensible prototype database management system for supporting biological data. bdbms extends the functionalities of current DBMSs to include: (1) Annotation and provenance management including storage, indexing, manipulation, and querying of annotation and provenance as first class objects in bdbms, (2) Local dependency tracking to track the dependencies and derivations among data items, (3) Update authorization to support data curation via content-based authorization, in contrast to identity-based authorization, and (4) New access methods and their supporting operators that support pattern matching on various types of compressed biological data types. This paper presents the design of bdbms along with the techniques proposed to support these functionalities including an extension to SQL. We also outline some open issues in building bdbms.
[ { "version": "v1", "created": "Fri, 22 Dec 2006 20:32:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Eltabakh", "Mohamed Y.", "" ], [ "Ouzzani", "Mourad", "" ], [ "Aref", "Walid G.", "" ] ]
cs/0612128
Daniel Gyllstrom
Daniel Gyllstrom, Eugene Wu, Hee-Jin Chae, Yanlei Diao, Patrick Stahlberg, Gordon Anderson
SASE: Complex Event Processing over Streams
This article is published under a Creative Commons License Agreement (http://creativecommons.org/licenses/by/2.5/.) You may copy, distribute, display, and perform the work, make derivative works and make commercial use of the work, but, you must attribute the work to the author and CIDR 2007. 3rd Biennial Conference on Innovative Data Systems Research (CIDR) January 710, 2007, Asilomar, California, USA
null
null
null
cs.DB
null
RFID technology is gaining adoption on an increasing scale for tracking and monitoring purposes. Wide deployments of RFID devices will soon generate an unprecedented volume of data. Emerging applications require the RFID data to be filtered and correlated for complex pattern detection and transformed to events that provide meaningful, actionable information to end applications. In this work, we design and develop SASE, a com-plex event processing system that performs such data-information transformation over real-time streams. We design a complex event language for specifying application logic for such transformation, devise new query processing techniques to effi-ciently implement the language, and develop a comprehensive system that collects, cleans, and processes RFID data for deliv-ery of relevant, timely information as well as storing necessary data for future querying. We demonstrate an initial prototype of SASE through a real-world retail management scenario.
[ { "version": "v1", "created": "Fri, 22 Dec 2006 20:38:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Gyllstrom", "Daniel", "" ], [ "Wu", "Eugene", "" ], [ "Chae", "Hee-Jin", "" ], [ "Diao", "Yanlei", "" ], [ "Stahlberg", "Patrick", "" ], [ "Anderson", "Gordon", "" ] ]
cs/0612129
Bishwaranjan Bhattacharjee
Bishwaranjan Bhattacharjee, Vuk Ercegovac, Joseph Glider, Richard Golding, Guy Lohman, Volke Markl, Hamid Pirahesh, Jun Rao, Robert Rees, Frederick Reiss, Eugene Shekita, Garret Swart
Impliance: A Next Generation Information Management Appliance
This article is published under a Creative Commons License Agreement (http://creativecommons.org/licenses/by/2.5/.) You may copy, distribute, display, and perform the work, make derivative works and make commercial use of the work, but, you must attribute the work to the author and CIDR 2007. 3rd Biennial Conference on Innovative Data Systems Research (CIDR) January 710, 2007, Asilomar, California, USA
null
null
null
cs.DB
null
ably successful in building a large market and adapting to the changes of the last three decades, its impact on the broader market of information management is surprisingly limited. If we were to design an information management system from scratch, based upon today's requirements and hardware capabilities, would it look anything like today's database systems?" In this paper, we introduce Impliance, a next-generation information management system consisting of hardware and software components integrated to form an easy-to-administer appliance that can store, retrieve, and analyze all types of structured, semi-structured, and unstructured information. We first summarize the trends that will shape information management for the foreseeable future. Those trends imply three major requirements for Impliance: (1) to be able to store, manage, and uniformly query all data, not just structured records; (2) to be able to scale out as the volume of this data grows; and (3) to be simple and robust in operation. We then describe four key ideas that are uniquely combined in Impliance to address these requirements, namely the ideas of: (a) integrating software and off-the-shelf hardware into a generic information appliance; (b) automatically discovering, organizing, and managing all data - unstructured as well as structured - in a uniform way; (c) achieving scale-out by exploiting simple, massive parallel processing, and (d) virtualizing compute and storage resources to unify, simplify, and streamline the management of Impliance. Impliance is an ambitious, long-term effort to define simpler, more robust, and more scalable information systems for tomorrow's enterprises.
[ { "version": "v1", "created": "Fri, 22 Dec 2006 20:49:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Bhattacharjee", "Bishwaranjan", "" ], [ "Ercegovac", "Vuk", "" ], [ "Glider", "Joseph", "" ], [ "Golding", "Richard", "" ], [ "Lohman", "Guy", "" ], [ "Markl", "Volke", "" ], [ "Pirahesh", "Hamid", "" ], [ "Rao", "Jun", "" ], [ "Rees", "Robert", "" ], [ "Reiss", "Frederick", "" ], [ "Shekita", "Eugene", "" ], [ "Swart", "Garret", "" ] ]
cs/0612130
Fabien Mathieu
Anh-Tuan Gai (INRIA Rocquencourt), Fabien Mathieu (INRIA Rocquencourt), Julien Reynier (INRIA Rocquencourt), Fabien De Montgolfier (INRIA Rocquencourt)
Stratification in P2P Networks - Application to BitTorrent
null
null
null
null
cs.NI
null
We introduce a model for decentralized networks with collaborating peers. The model is based on the stable matching theory which is applied to systems with a global ranking utility function. We consider the dynamics of peers searching for efficient collaborators and we prove that a unique stable solution exists. We prove that the system converges towards the stable solution and analyze its speed of convergence. We also study the stratification properties of the model, both when all collaborations are possible and for random possible collaborations. We present the corresponding fluid limit on the choice of collaborators in the random case. As a practical example, we study the BitTorrent Tit-for-Tat policy. For this system, our model provides an interesting insight on peer download rates and a possible way to optimize peer strategy.
[ { "version": "v1", "created": "Fri, 22 Dec 2006 21:11:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Gai", "Anh-Tuan", "", "INRIA Rocquencourt" ], [ "Mathieu", "Fabien", "", "INRIA\n Rocquencourt" ], [ "Reynier", "Julien", "", "INRIA Rocquencourt" ], [ "De Montgolfier", "Fabien", "", "INRIA Rocquencourt" ] ]
cs/0612131
Amine Chigani
Amine Chigani James D. Arthur Shawn Bohner
Architecting Network-Centric Software Systems: A Style-Based Beginning
10 pages, 3 figures, 2 table, Submitted to Software Engineering Workshop 2007
null
null
null
cs.SE
null
With the advent of potent network technology, software development has evolved from traditional platform-centric construction to network-centric evolution. This change involves largely the way we reason about systems as evidenced in the introduction of Network- Centric Operations (NCO). Unfortunately, it has resulted in conflicting interpretations of how to map NCO concepts to the field of software architecture. In this paper, we capture the core concepts and goals of NCO, investigate the implications of these concepts and goals on software architecture, and identify the operational characteristics that distinguish network-centric software systems from other systems. More importantly, we use architectural design principles to propose an outline for a network-centric architectural style that helps in characterizing network-centric software systems and that provides a means by which their distinguishing operational characteristics can be realized.
[ { "version": "v1", "created": "Sat, 23 Dec 2006 01:00:32 GMT" }, { "version": "v2", "created": "Sat, 30 Dec 2006 03:07:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Bohner", "Amine Chigani James D. Arthur Shawn", "" ] ]
cs/0612132
Lokman Meho
Lokman I. Meho, Kiduk Yang
A New Era in Citation and Bibliometric Analyses: Web of Science, Scopus, and Google Scholar
49 pages, accepted for publication in the Journal of the American Society for Information Science and Technology
null
null
null
cs.DL cs.IR
null
Academic institutions, federal agencies, publishers, editors, authors, and librarians increasingly rely on citation analysis for making hiring, promotion, tenure, funding, and/or reviewer and journal evaluation and selection decisions. The Institute for Scientific Information's (ISI) citation databases have been used for decades as a starting point and often as the only tools for locating citations and/or conducting citation analyses. ISI databases (or Web of Science), however, may no longer be adequate as the only or even the main sources of citations because new databases and tools that allow citation searching are now available. Whether these new databases and tools complement or represent alternatives to Web of Science (WoS) is important to explore. Using a group of 15 library and information science faculty members as a case study, this paper examines the effects of using Scopus and Google Scholar (GS) on the citation counts and rankings of scholars as measured by WoS. The paper discusses the strengths and weaknesses of WoS, Scopus, and GS, their overlap and uniqueness, quality and language of the citations, and the implications of the findings for citation analysis. The project involved citation searching for approximately 1,100 scholarly works published by the study group and over 200 works by a test group (an additional 10 faculty members). Overall, more than 10,000 citing and purportedly citing documents were examined. WoS data took about 100 hours of collecting and processing time, Scopus consumed 200 hours, and GS a grueling 3,000 hours.
[ { "version": "v1", "created": "Sat, 23 Dec 2006 14:47:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Meho", "Lokman I.", "" ], [ "Yang", "Kiduk", "" ] ]
cs/0612134
Ketan Mulmuley D
Ketan D Mulmuley, Milind Sohoni
Geometric Complexity Theory II: Towards explicit obstructions for embeddings among class varieties
46 pages
null
null
null
cs.CC math.AG math.RT
null
In part I we reduced the arithmetic (characteristic zero) version of the P \not \subseteq NP conjecture to the problem of showing that a variety associated with the complexity class NP cannot be embedded in the variety associated the complexity class P. We call these class varieties. In this paper, this approach is developed further, reducing the nonexistence problems, such as the P vs. NP and related lower bound problems, to existence problems: specifically to proving existence of obstructions to such embeddings among class varieties. It gives two results towards explicit construction of such obstructions. The first result is a generalization of the Borel-Weil theorem to a class of orbit closures, which include class varieties. The recond result is a weaker form of a conjectured analogue of the second fundamental theorem of invariant theory for the class variety associated with the complexity class NC. These results indicate that the fundamental lower bound problems in complexity theory are intimately linked with explicit construction problems in algebraic geometry and representation theory.
[ { "version": "v1", "created": "Mon, 25 Dec 2006 18:51:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Mulmuley", "Ketan D", "" ], [ "Sohoni", "Milind", "" ] ]
cs/0612135
Eric Rondeau
Idriss Diouri (CRAN), Jean-Philippe Georges (CRAN), Eric Rondeau (CRAN)
Accommodation of the Service Offered by the Network for Networked Control Systems
8 pages
2nd workshop on Networked Control Systems : Tolerant to faults (23/11/2006) 8 pages
null
null
cs.NI
null
Networked Controlled Systems (NCSs) are more and more used in industrial applications. They are strongly connected to real-time constraints because important delays induced by the network can lead to an unstable process control. Usually, the network used in NCSs is shared with many others applications requiring different Quality of Service. The objective of this paper is to optimize the tuning of the network scheduling mechanisms in taking into account the level of Quality of Control. The goal is to maximize the bandwidth allocation for unconstrained frames in guarantying that the control constraints are respected. In this paper, we focus on switched Ethernet network implementing the Classification of Service (IEEE 802.1p) based on a Weighted Round Robin policy.
[ { "version": "v1", "created": "Tue, 26 Dec 2006 20:17:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Diouri", "Idriss", "", "CRAN" ], [ "Georges", "Jean-Philippe", "", "CRAN" ], [ "Rondeau", "Eric", "", "CRAN" ] ]
cs/0612137
Eric Robinson
Eric Robinson, David DeWitt
Turning Cluster Management into Data Management: A System Overview
This article is published under a Creative Commons License Agreement (http://creativecommons.org/licenses/by/2.5/.) You may copy, distribute, display, and perform the work, make derivative works and make commercial use of the work, but, you must attribute the work to the author and CIDR 2007. 3rd Biennial Conference on Innovative Data Systems Research (CIDR) January 710, 2007, Asilomar, California, USA
null
null
null
cs.DB
null
This paper introduces the CondorJ2 cluster management system. Traditionally, cluster management systems such as Condor employ a process-oriented approach with little or no use of modern database system technology. In contrast, CondorJ2 employs a data-centric, 3-tier web-application architecture for all system functions (e.g., job submission, monitoring and scheduling; node configuration, monitoring and management, etc.) except for job execution. Employing a data-oriented approach allows the core challenge (i.e., managing and coordinating a large set of distributed computing resources) to be transformed from a relatively low-level systems problem into a more abstract, higher-level data management problem. Preliminary results suggest that CondorJ2's use of standard 3-tier software represents a significant step forward to the design and implementation of large clusters (1,000 to 10,000 nodes).
[ { "version": "v1", "created": "Wed, 27 Dec 2006 22:21:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Robinson", "Eric", "" ], [ "DeWitt", "David", "" ] ]
cs/0612138
Alexander Haubold
Alexander Haubold, John R. Kender
Accommodating Sample Size Effect on Similarity Measures in Speaker Clustering
null
null
null
null
cs.SD cs.MM
null
We investigate the symmetric Kullback-Leibler (KL2) distance in speaker clustering and its unreported effects for differently-sized feature matrices. Speaker data is represented as Mel Frequency Cepstral Coefficient (MFCC) vectors, and features are compared using the KL2 metric to form clusters of speech segments for each speaker. We make two observations with respect to clustering based on KL2: 1.) The accuracy of clustering is strongly dependent on the absolute lengths of the speech segments and their extracted feature vectors. 2.) The accuracy of the similarity measure strongly degrades with the length of the shorter of the two speech segments. These effects of length can be attributed to the measure of covariance used in KL2. We demonstrate an empirical correction of this sample-size effect that increases clustering accuracy. We draw parallels to two Vector Quantization-based (VQ) similarity measures, one which exhibits an equivalent effect of sample size, and the second being less influenced by it.
[ { "version": "v1", "created": "Thu, 28 Dec 2006 06:39:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Haubold", "Alexander", "" ], [ "Kender", "John R.", "" ] ]
cs/0612139
Alexander Haubold
Alexander Haubold, John R. Kender
Alignment of Speech to Highly Imperfect Text Transcriptions
null
null
null
null
cs.SD cs.MM
null
We introduce a novel and inexpensive approach for the temporal alignment of speech to highly imperfect transcripts from automatic speech recognition (ASR). Transcripts are generated for extended lecture and presentation videos, which in some cases feature more than 30 speakers with different accents, resulting in highly varying transcription qualities. In our approach we detect a subset of phonemes in the speech track, and align them to the sequence of phonemes extracted from the transcript. We report on the results for 4 speech-transcript sets ranging from 22 to 108 minutes. The alignment performance is promising, showing a correct matching of phonemes within 10, 20, 30 second error margins for more than 60%, 75%, 90% of text, respectively, on average.
[ { "version": "v1", "created": "Thu, 28 Dec 2006 06:45:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Haubold", "Alexander", "" ], [ "Kender", "John R.", "" ] ]
cs/0612141
Christian Tanguy
Annie Druault-Vicard, Christian Tanguy
Exact Failure Frequency Calculations for Extended Systems
null
null
null
null
cs.PF
null
This paper shows how the steady-state availability and failure frequency can be calculated in a single pass for very large systems, when the availability is expressed as a product of matrices. We apply the general procedure to $k$-out-of-$n$:G and linear consecutive $k$-out-of-$n$:F systems, and to a simple ladder network in which each edge and node may fail. We also give the associated generating functions when the components have identical availabilities and failure rates. For large systems, the failure rate of the whole system is asymptotically proportional to its size. This paves the way to ready-to-use formulae for various architectures, as well as proof that the differential operator approach to failure frequency calculations is very useful and straightforward.
[ { "version": "v1", "created": "Thu, 28 Dec 2006 19:35:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Druault-Vicard", "Annie", "" ], [ "Tanguy", "Christian", "" ] ]
cs/0612143
Christian Tanguy
Christian Tanguy
Exact solutions for the two- and all-terminal reliabilities of a simple ladder network
null
null
null
null
cs.PF
null
The exact calculation of network reliability in a probabilistic context has been a long-standing issue of practical importance, but a difficult one, even for planar graphs, with perfect nodes and with edges of identical reliability p. Many approaches (determination of bounds, sums of disjoint products algorithms, Monte Carlo evaluations, studies of the reliability polynomials, etc.) can only provide approximations when the network's size increases. We consider here a ladder graph of arbitrary size corresponding to real-life network configurations, and give the exact, analytical solutions for the all- and two-terminal reliabilities. These solutions use transfer matrices, in which individual reliabilities of edges and nodes are taken into account. The special case of identical edge and node reliabilities -- p and rho, respectively -- is solved. We show that the zeros of the two-terminal reliability polynomial exhibit structures which differ substantially for seemingly similar networks, and we compare the sensitivity of various edges. We discuss how the present work may be further extended to lead to a catalog of exactly solvable networks in terms of reliability, which could be useful as elementary bricks for a new and improved set of bounds or benchmarks in the general case.
[ { "version": "v1", "created": "Thu, 28 Dec 2006 19:43:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Tanguy", "Christian", "" ] ]
cs/0701001
Ashutosh Gore
Ashutosh Deepak Gore, Srikanth Jagabathula, Abhay Karandikar
On High Spatial Reuse Link Scheduling in STDMA Wireless Ad Hoc Networks
10 pages (double column), 10 figures
null
null
null
cs.PF cs.NI
null
Graph-based algorithms for point-to-point link scheduling in Spatial reuse Time Division Multiple Access (STDMA) wireless ad hoc networks often result in a significant number of transmissions having low Signal to Interference and Noise density Ratio (SINR) at intended receivers, leading to low throughput. To overcome this problem, we propose a new algorithm for STDMA link scheduling based on a graph model of the network as well as SINR computations. The performance of our algorithm is evaluated in terms of spatial reuse and computational complexity. Simulation results demonstrate that our algorithm achieves better performance than existing algorithms.
[ { "version": "v1", "created": "Tue, 2 Jan 2007 14:14:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Gore", "Ashutosh Deepak", "" ], [ "Jagabathula", "Srikanth", "" ], [ "Karandikar", "Abhay", "" ] ]
cs/0701005
Christian Tanguy
Christian Tanguy
Exact solutions for the two- and all-terminal reliabilities of the Brecht-Colbourn ladder and the generalized fan
null
null
null
null
cs.PF
null
The two- and all-terminal reliabilities of the Brecht-Colbourn ladder and the generalized fan have been calculated exactly for arbitrary size as well as arbitrary individual edge and node reliabilities, using transfer matrices of dimension four at most. While the all-terminal reliabilities of these graphs are identical, the special case of identical edge ($p$) and node ($\rho$) reliabilities shows that their two-terminal reliabilities are quite distinct, as demonstrated by their generating functions and the locations of the zeros of the reliability polynomials, which undergo structural transitions at $\rho = \displaystyle {1/2}$.
[ { "version": "v1", "created": "Sat, 30 Dec 2006 17:26:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Tanguy", "Christian", "" ] ]
cs/0701007
Hamed Hatami
Hamed Hatami and Ruzbeh Tusserkani
On the Complexity of the Circular Chromatic Number
null
Journal of Graph Theory. 47(3) (2004) pp. 226-230
null
null
cs.CG
null
Circular chromatic number, $\chi_c$ is a natural generalization of chromatic number. It is known that it is \NP-hard to determine whether or not an arbitrary graph $G$ satisfies $\chi(G) = \chi_c(G)$. In this paper we prove that this problem is \NP-hard even if the chromatic number of the graph is known. This answers a question of Xuding Zhu. Also we prove that for all positive integers $k \ge 2$ and $n \ge 3$, for a given graph $G$ with $\chi(G)=n$, it is \NP-complete to verify if $\chi_c(G) \le n- \frac{1}{k}$.
[ { "version": "v1", "created": "Sun, 31 Dec 2006 04:48:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Hatami", "Hamed", "" ], [ "Tusserkani", "Ruzbeh", "" ] ]
cs/0701008
Hamed Hatami
Hamed Hatami and Hossein Maserrat
On the Computational Complexity of Defining Sets
null
Journal of Discrete Applied Mathematics .149(1-3) (2005) pp. 101-110
null
null
cs.CC
null
Suppose we have a family ${\cal F}$ of sets. For every $S \in {\cal F}$, a set $D \subseteq S$ is a {\sf defining set} for $({\cal F},S)$ if $S$ is the only element of $\cal{F}$ that contains $D$ as a subset. This concept has been studied in numerous cases, such as vertex colorings, perfect matchings, dominating sets, block designs, geodetics, orientations, and Latin squares. In this paper, first, we propose the concept of a defining set of a logical formula, and we prove that the computational complexity of such a problem is $\Sigma_2$-complete. We also show that the computational complexity of the following problem about the defining set of vertex colorings of graphs is $\Sigma_2$-complete: {\sc Instance:} A graph $G$ with a vertex coloring $c$ and an integer $k$. {\sc Question:} If ${\cal C}(G)$ be the set of all $\chi(G)$-colorings of $G$, then does $({\cal C}(G),c)$ have a defining set of size at most $k$? Moreover, we study the computational complexity of some other variants of this problem.
[ { "version": "v1", "created": "Sun, 31 Dec 2006 05:47:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Hatami", "Hamed", "" ], [ "Maserrat", "Hossein", "" ] ]