id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 3
62.8k
| title
stringlengths 1
382
| comments
stringlengths 1
1.15k
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 7
153
⌀ | report-no
stringlengths 1
509
⌀ | categories
stringlengths 5
125
| license
stringclasses 9
values | abstract
stringlengths 6
6.09k
| versions
listlengths 1
187
| update_date
timestamp[s]date 2007-05-23 00:00:00
2025-04-25 00:00:00
| authors_parsed
sequencelengths 1
2.83k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0701010 | Ahmed Sidky Ahmed Sidky | Ahmed Sidky, James Arthur | Determining the Applicability of Agile Practices to Mission and
Life-critical Systems | null | null | null | null | cs.SE | null | Adopting agile practices brings about many benefits and improvements to the
system being developed. However, in mission and life-critical systems, adopting
an inappropriate agile practice has detrimental impacts on the system in
various phases of its lifecycle as well as precludes desired qualities from
being actualized. This paper presents a three-stage process that provides
guidance to organizations on how to identify the agile practices they can
benefit from without causing any impact to the mission and life critical system
being developed.
| [
{
"version": "v1",
"created": "Mon, 1 Jan 2007 05:08:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sidky",
"Ahmed",
""
],
[
"Arthur",
"James",
""
]
] |
cs/0701013 | Zengyou He | Zengyou He, Xaiofei Xu, Shengchun Deng | Attribute Value Weighting in K-Modes Clustering | 15 pages | null | null | Tr-06-0615 | cs.AI | null | In this paper, the traditional k-modes clustering algorithm is extended by
weighting attribute value matches in dissimilarity computation. The use of
attribute value weighting technique makes it possible to generate clusters with
stronger intra-similarities, and therefore achieve better clustering
performance. Experimental results on real life datasets show that these value
weighting based k-modes algorithms are superior to the standard k-modes
algorithm with respect to clustering accuracy.
| [
{
"version": "v1",
"created": "Wed, 3 Jan 2007 09:06:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"He",
"Zengyou",
""
],
[
"Xu",
"Xaiofei",
""
],
[
"Deng",
"Shengchun",
""
]
] |
cs/0701014 | Moustapha Diaby | Moustapha Diaby | A Reply to Hofman On: "Why LP cannot solve large instances of
NP-complete problems in polynomial time" | 2 page; 1 table; clarification of some unclear statements | null | null | null | cs.CC | null | Using an approach that seems to be patterned after that of Yannakakis, Hofman
argues that an NP-complete problem cannot be formulated as a polynomial
bounded-sized linear programming problem. He then goes on to propose a
"construct" that he claims to be a counter-example to recently published linear
programming formulations of the Traveling Salesman Problem (TSP) and the
Quadratic Assignment Problems (QAP), respectively. In this paper, we show that
Hofman's construct is flawed, and provide further proof that his
"counter-example" is invalid.
| [
{
"version": "v1",
"created": "Wed, 3 Jan 2007 11:26:26 GMT"
},
{
"version": "v2",
"created": "Fri, 5 Jan 2007 00:39:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Diaby",
"Moustapha",
""
]
] |
cs/0701020 | Sumit Ganguly | Sumit Ganguly | A nearly optimal and deterministic summary structure for update data
streams | Withdrawn | null | null | null | cs.DS | null | The paper has been withdrawn due to an error in Lemma 1.
| [
{
"version": "v1",
"created": "Thu, 4 Jan 2007 09:03:08 GMT"
},
{
"version": "v2",
"created": "Fri, 5 Jan 2007 15:11:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ganguly",
"Sumit",
""
]
] |
cs/0701022 | Mateusz Zakrzewski | Mateusz Zakrzewski | Definable functions in the simply typed lambda-calculus | Submitted to TLCA 2007 | null | null | null | cs.LO | null | It is a common knowledge that the integer functions definable in simply typed
lambda-calculus are exactly the extended polynomials. This is indeed the case
when one interprets integers over the type (p->p)->p->p where p is a base type
and/or equality is taken as beta-conversion. It is commonly believed that the
same holds for beta-eta equality and for integers represented over any fixed
type of the form (t->t)->t->t. In this paper we show that this opinion is not
quite true.
We prove that the class of functions strictly definable in simply typed
lambda-calculus is considerably larger than the extended polynomials. Namely,
we define F as the class of strictly definable functions and G as a class that
contains extended polynomials and two additional functions, or more precisely,
two function schemas, and is closed under composition. We prove that G is a
subset of F.
We conjecture that G exactly characterizes strictly definable functions, i.e.
G=F, and we gather some evidence for this conjecture proving, for example, that
every skewly representable finite range function is strictly representable over
(t->t)->t->t for some t.
| [
{
"version": "v1",
"created": "Thu, 4 Jan 2007 17:50:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zakrzewski",
"Mateusz",
""
]
] |
cs/0701029 | Dariusz Ku\'smierek | Dariusz Kusmierek | The Inhabitation Problem for Rank Two Intersection Types | 15 pages | null | null | null | cs.LO | null | We prove that the inhabitation problem for rank two intersection types is
decidable, but (contrary to common belief) EXPTIME-hard. The exponential time
hardness is shown by reduction from the in-place acceptance problem for
alternating Turing machines.
| [
{
"version": "v1",
"created": "Fri, 5 Jan 2007 08:38:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kusmierek",
"Dariusz",
""
]
] |
cs/0701033 | Blake Hegerle | Blake Hegerle | A Counterexample to a Proposed Proof of P=NP by S. Gubin | 2 pages | null | null | null | cs.CC | null | In a recent paper by S. Gubin [cs/0701023v1], a polynomial-time solution to
the 3SAT problem was presented as proof that P=NP. The proposed algorithm
cannot be made to work, which I shall demonstrate.
| [
{
"version": "v1",
"created": "Fri, 5 Jan 2007 19:16:46 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hegerle",
"Blake",
""
]
] |
cs/0701035 | Edwin Henneken | Edwin A. Henneken, Michael J. Kurtz, Guenther Eichhorn, Alberto
Accomazzi, Carolyn S. Grant, Donna Thompson, Elizabeth Bohlen, Stephen S.
Murray | Finding Astronomical Communities Through Co-readership Analysis | poster presented at the 209th AAS Meeting, 7 pages, 4 figures | null | null | null | cs.DL astro-ph | null | Whenever a large group of people are engaged in an activity, communities will
form. The nature of these communities depends on the relationship considered.
In the group of people who regularly use scholarly literature, a relationship
like ``person i and person j have cited the same paper'' might reveal
communities of people working in a particular field. On this poster, we will
investigate the relationship ``person i and person j have read the same
paper''. Using the data logs of the NASA/Smithsonian Astrophysics Data System
(ADS), we first determine the population that will participate by requiring
that a user queries the ADS at a certain rate. Next, we apply the relationship
to this population. The result of this will be an abstract ``relationship
space'', which we will describe in terms of various ``representations''.
Examples of such ``representations'' are the projection of co-read vectors onto
Principal Components and the spectral density of the co-read network. We will
show that the co-read relationship results in structure, we will describe this
structure and we will provide a first attempt in the classification of this
structure in terms of astronomical communities.
The ADS is funded by NASA Grant NNG06GG68G.
| [
{
"version": "v1",
"created": "Sat, 6 Jan 2007 00:02:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Henneken",
"Edwin A.",
""
],
[
"Kurtz",
"Michael J.",
""
],
[
"Eichhorn",
"Guenther",
""
],
[
"Accomazzi",
"Alberto",
""
],
[
"Grant",
"Carolyn S.",
""
],
[
"Thompson",
"Donna",
""
],
[
"Bohlen",
"Elizabeth",
""
],
[
"Murray",
"Stephen S.",
""
]
] |
cs/0701040 | Fumin Zhang | F. Zhang | Curve Tracking Control for Legged Locomotion in Horizontal Plane | 10 pages, 11 figures, Submitted to IEEE Transactions on Automatic
Control | null | null | null | cs.RO | null | We derive a hybrid feedback control law for the lateral leg spring (LLS)
model so that the center of mass of a legged runner follows a curved path in
horizontal plane. The control law enables the runner to change the placement
and the elasticity of its legs to move in a desired direction. Stable motion
along a curved path is achieved using curvature, bearing and relative distance
between the runner and the curve as feedback. Constraints on leg parameters
determine the class of curves that can be followed. We also derive an optimal
control law that stabilizes the orientation of the runner's body relative to
the velocity of the runner's center of mass.
| [
{
"version": "v1",
"created": "Sat, 6 Jan 2007 20:55:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zhang",
"F.",
""
]
] |
cs/0701044 | Tej Singh | Sunder Lal and Tej Singh | New ID Based Multi-Proxy Multi-Signcryption Scheme from Pairings | 9 pages | null | null | null | cs.CR | null | This paper presents an identity based multi-proxy multi-signcryption scheme
from pairings. In this scheme a proxy signcrypter group could authorized as a
proxy agent by the coopration of all members in the original signcryption
group. Then the proxy signcryption can be generated by the cooperation of all
the signcrypters in the authorized proxy signcrypter group on the behalf of the
original signcrypter group. As compared to the scheme of Liu and Xiao, the
proposed scheme provides public verifiability of the signature along with
simplified key management.
| [
{
"version": "v1",
"created": "Mon, 8 Jan 2007 18:02:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lal",
"Sunder",
""
],
[
"Singh",
"Tej",
""
]
] |
cs/0701045 | Iosif Pinelis | Iosif Pinelis | Polygon Convexity: Another O(n) Test | 14 pages; changes: (i) a test for non-strict convexity is added; (ii)
the proofs are gathered in a separate section; (iii) a more detailed abstract
is given | null | null | null | cs.CG cs.DS | null | An n-gon is defined as a sequence \P=(V_0,...,V_{n-1}) of n points on the
plane. An n-gon \P is said to be convex if the boundary of the convex hull of
the set {V_0,...,V_{n-1}} of the vertices of \P coincides with the union of the
edges [V_0,V_1],...,[V_{n-1},V_0]; if at that no three vertices of \P are
collinear then \P is called strictly convex. We prove that an n-gon \P with
n\ge3 is strictly convex if and only if a cyclic shift of the sequence
(\al_0,...,\al_{n-1})\in[0,2\pi)^n of the angles between the x-axis and the
vectors V_1-V_0,...,V_0-V_{n-1} is strictly monotone. A ``non-strict'' version
of this result is also proved.
| [
{
"version": "v1",
"created": "Mon, 8 Jan 2007 18:51:37 GMT"
},
{
"version": "v2",
"created": "Tue, 16 Jan 2007 22:57:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pinelis",
"Iosif",
""
]
] |
cs/0701046 | Andrea Forte | Andrea G. Forte, Henning Schulzrinne | Cooperation Between Stations in Wireless Networks | 16 pages, 49 references, 12 figures, 3 tables | null | null | cucs-044-06 | cs.NI | null | In a wireless network, mobile nodes (MNs) repeatedly perform tasks such as
layer 2 (L2) handoff, layer 3 (L3) handoff and authentication. These tasks are
critical, particularly for real-time applications such as VoIP. We propose a
novel approach, namely Cooperative Roaming (CR), in which MNs can collaborate
with each other and share useful information about the network in which they
move. We show how we can achieve seamless L2 and L3 handoffs regardless of the
authentication mechanism used and without any changes to either the
infrastructure or the protocol. In particular, we provide a working
implementation of CR and show how, with CR, MNs can achieve a total L2+L3
handoff time of less than 16 ms in an open network and of about 21 ms in an
IEEE 802.11i network. We consider behaviors typical of IEEE 802.11 networks,
although many of the concepts and problems addressed here apply to any kind of
mobile network.
| [
{
"version": "v1",
"created": "Mon, 8 Jan 2007 20:01:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Forte",
"Andrea G.",
""
],
[
"Schulzrinne",
"Henning",
""
]
] |
cs/0701049 | Barnaby Martin | Barnaby Martin | On the Complexity of a Derivative Chess Problem | null | null | null | null | cs.CC | null | We introduce QUEENS, a derivative chess problem based on the classical
n-queens problem. We prove that QUEENS is NP-complete, with respect to
polynomial-time reductions.
| [
{
"version": "v1",
"created": "Mon, 8 Jan 2007 16:45:55 GMT"
},
{
"version": "v2",
"created": "Mon, 26 Mar 2007 15:40:54 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Martin",
"Barnaby",
""
]
] |
cs/0701054 | Nathan Segerlind | Nathan Segerlind | Nearly-Exponential Size Lower Bounds for Symbolic Quantifier Elimination
Algorithms and OBDD-Based Proofs of Unsatisfiability | 40 pages, 3 figures. First public draft, comments welcome. Also
submitted at ECCC | null | null | null | cs.CC cs.LO | null | We demonstrate a family of propositional formulas in conjunctive normal form
so that a formula of size $N$ requires size $2^{\Omega(\sqrt[7]{N/logN})}$ to
refute using the tree-like OBDD refutation system of Atserias, Kolaitis and
Vardi with respect to all variable orderings. All known symbolic quantifier
elimination algorithms for satisfiability generate tree-like proofs when run on
unsatisfiable CNFs, so this lower bound applies to the run-times of these
algorithms. Furthermore, the lower bound generalizes earlier results on
OBDD-based proofs of unsatisfiability in that it applies for all variable
orderings, it applies when the clauses are processed according to an arbitrary
schedule, and it applies when variables are eliminated via quantification.
| [
{
"version": "v1",
"created": "Tue, 9 Jan 2007 01:16:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Segerlind",
"Nathan",
""
]
] |
cs/0701057 | Xiaofei Huang | Xiaofei Huang | Cooperative Optimization for Energy Minimization: A Case Study of Stereo
Matching | null | null | null | null | cs.CV cs.AI | null | Often times, individuals working together as a team can solve hard problems
beyond the capability of any individual in the team. Cooperative optimization
is a newly proposed general method for attacking hard optimization problems
inspired by cooperation principles in team playing. It has an established
theoretical foundation and has demonstrated outstanding performances in solving
real-world optimization problems. With some general settings, a cooperative
optimization algorithm has a unique equilibrium and converges to it with an
exponential rate regardless initial conditions and insensitive to
perturbations. It also possesses a number of global optimality conditions for
identifying global optima so that it can terminate its search process
efficiently. This paper offers a general description of cooperative
optimization, addresses a number of design issues, and presents a case study to
demonstrate its power.
| [
{
"version": "v1",
"created": "Tue, 9 Jan 2007 01:03:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Huang",
"Xiaofei",
""
]
] |
cs/0701072 | Jakob Vo{\ss} | Jakob Voss | Tagging, Folksonomy & Co - Renaissance of Manual Indexing? | Preprint. 12 pages, 1 figure, 54 references | null | null | null | cs.IR | null | This paper gives an overview of current trends in manual indexing on the Web.
Along with a general rise of user generated content there are more and more
tagging systems that allow users to annotate digital resources with tags
(keywords) and share their annotations with other users. Tagging is frequently
seen in contrast to traditional knowledge organization systems or as something
completely new. This paper shows that tagging should better be seen as a
popular form of manual indexing on the Web. Difference between controlled and
free indexing blurs with sufficient feedback mechanisms. A revised typology of
tagging systems is presented that includes different user roles and knowledge
organization systems with hierarchical relationships and vocabulary control. A
detailed bibliography of current research in collaborative tagging is included.
| [
{
"version": "v1",
"created": "Wed, 10 Jan 2007 18:18:28 GMT"
},
{
"version": "v2",
"created": "Fri, 26 Jan 2007 14:36:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Voss",
"Jakob",
""
]
] |
cs/0701073 | Jeremy Avigad | Jeremy Avigad and Kevin Donnelly | A decision procedure for linear "big O" equations | null | null | null | null | cs.LO | null | Let $F$ be the set of functions from an infinite set, $S$, to an ordered
ring, $R$. For $f$, $g$, and $h$ in $F$, the assertion $f = g + O(h)$ means
that for some constant $C$, $|f(x) - g(x)| \leq C |h(x)|$ for every $x$ in $S$.
Let $L$ be the first-order language with variables ranging over such functions,
symbols for $0, +, -, \min, \max$, and absolute value, and a ternary relation
$f = g + O(h)$. We show that the set of quantifier-free formulas in this
language that are valid in the intended class of interpretations is decidable,
and does not depend on the underlying set, $S$, or the ordered ring, $R$. If
$R$ is a subfield of the real numbers, we can add a constant 1 function, as
well as multiplication by constants from any computable subfield. We obtain
further decidability results for certain situations in which one adds symbols
denoting the elements of a fixed sequence of functions of strictly increasing
rates of growth.
| [
{
"version": "v1",
"created": "Wed, 10 Jan 2007 19:46:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Avigad",
"Jeremy",
""
],
[
"Donnelly",
"Kevin",
""
]
] |
cs/0701075 | Toshiya Takami | Toshiya Takami, Jun Maki, Jun-ichi Ooba, Yuichi Inadomi, Hiroaki
Honda, Taizo Kobayashi, Rie Nogita, and Mutsumi Aoyagi | Open-architecture Implementation of Fragment Molecular Orbital Method
for Peta-scale Computing | 6 pages, 9 figures, proceedings of the 2nd IEEE/ACM international
workshop on high performance computing for nano-science and technology
(HPCNano06) | null | null | null | cs.DC physics.comp-ph | null | We present our perspective and goals on highperformance computing for
nanoscience in accordance with the global trend toward "peta-scale computing."
After reviewing our results obtained through the grid-enabled version of the
fragment molecular orbital method (FMO) on the grid testbed by the Japanese
Grid Project, National Research Grid Initiative (NAREGI), we show that FMO is
one of the best candidates for peta-scale applications by predicting its
effective performance in peta-scale computers. Finally, we introduce our new
project constructing a peta-scale application in an open-architecture
implementation of FMO in order to realize both goals of highperformance in
peta-scale computers and extendibility to multiphysics simulations.
| [
{
"version": "v1",
"created": "Thu, 11 Jan 2007 04:49:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Takami",
"Toshiya",
""
],
[
"Maki",
"Jun",
""
],
[
"Ooba",
"Jun-ichi",
""
],
[
"Inadomi",
"Yuichi",
""
],
[
"Honda",
"Hiroaki",
""
],
[
"Kobayashi",
"Taizo",
""
],
[
"Nogita",
"Rie",
""
],
[
"Aoyagi",
"Mutsumi",
""
]
] |
cs/0701076 | Norman Danner | Norman Danner and James S. Royer | Time-complexity semantics for feasible affine recursions (extended
abstract) | Typographical fixes; some rearrangement of material. A shortened
version is to appear in S.B. Cooper, B. Lowe, A. Sorbi (eds.),_Computation in
the Real World_ (Proceedings Computation in Europe 2007, Sienna),
Springer-Verlag, Berlin, 2007 | null | null | null | cs.LO | null | The authors' ATR programming formalism is a version of call-by-value PCF
under a complexity-theoretically motivated type system. ATR programs run in
type-2 polynomial-time and all standard type-2 basic feasible functionals are
ATR-definable (ATR types are confined to levels 0, 1, and 2). A limitation of
the original version of ATR is that the only directly expressible recursions
are tail-recursions. Here we extend ATR so that a broad range of affine
recursions are directly expressible. In particular, the revised ATR can fairly
naturally express the classic insertion- and selection-sort algorithms, thus
overcoming a sticking point of most prior implicit-complexity-based formalisms.
The paper's main work is in extending and simplifying the original
time-complexity semantics for ATR to develop a set of tools for extracting and
solving the higher-type recurrences arising from feasible affine recursions.
| [
{
"version": "v1",
"created": "Thu, 11 Jan 2007 16:22:11 GMT"
},
{
"version": "v2",
"created": "Tue, 20 Mar 2007 16:50:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Danner",
"Norman",
""
],
[
"Royer",
"James S.",
""
]
] |
cs/0701081 | Wim Vanhoof | Alexander Serebrenik and Wim Vanhoof | Fingerprinting Logic Programs | Paper presented at the 16th Workshop on Logic-based methods in
Programming Languages (WLPE2006) | null | null | null | cs.PL cs.SE | null | In this work we present work in progress on functionality duplication
detection in logic programs. Eliminating duplicated functionality recently
became prominent in context of refactoring. We describe a quantitative approach
that allows to measure the ``similarity'' between two predicate definitions.
Moreover, we show how to compute a so-called ``fingerprint'' for every
predicate. Fingerprints capture those characteristics of the predicate that are
significant when searching for duplicated functionality. Since reasoning on
fingerprints is much easier than reasoning on predicate definitions, comparing
the fingerprints is a promising direction in automated code duplication in
logic programs.
| [
{
"version": "v1",
"created": "Fri, 12 Jan 2007 15:39:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Serebrenik",
"Alexander",
""
],
[
"Vanhoof",
"Wim",
""
]
] |
cs/0701082 | Serebrenik Alexander | Fred Mesnard, Alexander Serebrenik | Recurrence with affine level mappings is P-time decidable for CLP(R) | To appear in Theory and Practice of Logic Programming (TPLP) | null | null | null | cs.PL cs.LO | null | In this paper we introduce a class of constraint logic programs such that
their termination can be proved by using affine level mappings. We show that
membership to this class is decidable in polynomial time.
| [
{
"version": "v1",
"created": "Fri, 12 Jan 2007 18:43:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mesnard",
"Fred",
""
],
[
"Serebrenik",
"Alexander",
""
]
] |
cs/0701087 | Jean-Philippe Rennard | Jean-Philippe Rennard | Artificiality in Social Sciences | 14 pages | Rennard, J.-P., Artificiality in Social Sciences, in Rennard,
J.-P. (Ed.), Handbook of Research on Nature Inspired Computing for Economics
and Management, p.1-15, IGR, 2006 | null | null | cs.MA | null | This text provides with an introduction to the modern approach of
artificiality and simulation in social sciences. It presents the relationship
between complexity and artificiality, before introducing the field of
artificial societies which greatly benefited from the computer power fast
increase, gifting social sciences with formalization and experimentation tools
previously owned by "hard" sciences alone. It shows that as "a new way of doing
social sciences", artificial societies should undoubtedly contribute to a
renewed approach in the study of sociality and should play a significant part
in the elaboration of original theories of social phenomena.
| [
{
"version": "v1",
"created": "Sat, 13 Jan 2007 16:50:37 GMT"
},
{
"version": "v2",
"created": "Fri, 27 Apr 2007 18:00:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rennard",
"Jean-Philippe",
""
]
] |
cs/0701088 | Frederick Furtek | Frederick Furtek | A Theory and Calculus for Reasoning about Sequential Behavior | 102 double-spaced pages, 17 figures. Abstract and introduction
revised 29 March 2007 to improve readability | null | null | null | cs.LO cs.DM | null | Basic results in combinatorial mathematics provide the foundation for a
theory and calculus for reasoning about sequential behavior. A key concept of
the theory is a generalization of Boolean implicant which deals with statements
of the form:
A sequence of Boolean expressions alpha is an implicant of a set of sequences
of Boolean expressions A
This notion of a generalized implicant takes on special significance when
each of the sequences in the set A describes a disallowed pattern of behavior.
That is because a disallowed sequence of Boolean expressions represents a
logical/temporal dependency, and because the implicants of a set of disallowed
Boolean sequences A are themselves disallowed and represent precisely those
dependencies that follow as a logical consequence from the dependencies
represented by A. The main result of the theory is a necessary and sufficient
condition for a sequence of Boolean expressions to be an implicant of a regular
set of sequences of Boolean expressions. This result is the foundation for two
new proof methods. Sequential resolution is a generalization of Boolean
resolution which allows new logical/temporal dependencies to be inferred from
existing dependencies. Normalization starts with a model (system) and a set of
logical/temporal dependencies and determines which of those dependencies are
satisfied by the model.
| [
{
"version": "v1",
"created": "Mon, 15 Jan 2007 18:57:14 GMT"
},
{
"version": "v2",
"created": "Thu, 29 Mar 2007 15:46:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Furtek",
"Frederick",
""
]
] |
cs/0701094 | Francois Ingelrest | Fran\c{c}ois Ingelrest (LIFL, INRIA Futurs), David Simplot-Ryl (LIFL,
INRIA Futurs) | Maximizing the Probability of Delivery of Multipoint Relay Broadcast
Protocol in Wireless Ad Hoc Networks with a Realistic Physical Layer | null | Proceedings of the 2nd International Conference on Mobile Ad-hoc
and Sensor Networks (MSN 2006) (2006) 143 | null | null | cs.NI | null | It is now commonly accepted that the unit disk graph used to model the
physical layer in wireless networks does not reflect real radio transmissions,
and that the lognormal shadowing model better suits to experimental
simulations. Previous work on realistic scenarios focused on unicast, while
broadcast requirements are fundamentally different and cannot be derived from
unicast case. Therefore, broadcast protocols must be adapted in order to still
be efficient under realistic assumptions. In this paper, we study the
well-known multipoint relay protocol (MPR). In the latter, each node has to
choose a set of neighbors to act as relays in order to cover the whole 2-hop
neighborhood. We give experimental results showing that the original method
provided to select the set of relays does not give good results with the
realistic model. We also provide three new heuristics in replacement and their
performances which demonstrate that they better suit to the considered model.
The first one maximizes the probability of correct reception between the node
and the considered relays multiplied by their coverage in the 2-hop
neighborhood. The second one replaces the coverage by the average of the
probabilities of correct reception between the considered neighbor and the
2-hop neighbors it covers. Finally, the third heuristic keeps the same concept
as the second one, but tries to maximize the coverage level of the 2-hop
neighborhood: 2-hop neighbors are still being considered as uncovered while
their coverage level is not higher than a given coverage threshold, many
neighbors may thus be selected to cover the same 2-hop neighbors.
| [
{
"version": "v1",
"created": "Tue, 16 Jan 2007 10:01:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ingelrest",
"François",
"",
"LIFL, INRIA Futurs"
],
[
"Simplot-Ryl",
"David",
"",
"LIFL,\n INRIA Futurs"
]
] |
cs/0701095 | Pedro Cabalar | Pedro Cabalar and Paolo Ferraris | Propositional theories are strongly equivalent to logic programs | 15 pages | null | null | null | cs.AI cs.LO | null | This paper presents a property of propositional theories under the answer
sets semantics (called Equilibrium Logic for this general syntax): any theory
can always be reexpressed as a strongly equivalent disjunctive logic program,
possibly with negation in the head. We provide two different proofs for this
result: one involving a syntactic transformation, and one that constructs a
program starting from the countermodels of the theory in the intermediate logic
of here-and-there.
| [
{
"version": "v1",
"created": "Tue, 16 Jan 2007 12:29:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cabalar",
"Pedro",
""
],
[
"Ferraris",
"Paolo",
""
]
] |
cs/0701096 | Maurice Margenstern | Margenstern Maurice | About the domino problem in the hyperbolic plane, a new solution | 60 pages, 16 figures | null | null | null | cs.CG | null | In this paper we improve the approach of a previous paper about the domino
problem in the hyperbolic plane, see arXiv.cs.CG/0603093. This time, we prove
that the general problem of the hyperbolic plane with \`a la Wang tiles is
undecidable.
| [
{
"version": "v1",
"created": "Tue, 16 Jan 2007 18:19:22 GMT"
},
{
"version": "v2",
"created": "Mon, 22 Jan 2007 19:11:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Maurice",
"Margenstern",
""
]
] |
cs/0701104 | Philipp Mayr | Philipp Mayr, Walther Umstaetter | Why is a new Journal of Informetrics needed? | 9 pages, 3 figures | null | null | null | cs.DL cs.DB | null | In our study we analysed 3.889 records which were indexed in the Library and
Information Science Abstracts (LISA) database in the research field of
informetrics. We can show the core journals of the field via a Bradford (power
law) distribution and corroborate on the basis of the restricted LISA data set
that it was the appropriate time to found a new specialized journal dedicated
to informetrics. According to Bradford's Law of scattering (pure quantitative
calculation), Egghe's Journal of Informetrics (JOI) first issue to appear in
2007, comes most probable at the right time.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2007 12:17:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mayr",
"Philipp",
""
],
[
"Umstaetter",
"Walther",
""
]
] |
cs/0701105 | Wim Vanhoof | Remko Troncon, Gerda Janssens | A Delta Debugger for ILP Query Execution | Paper presented at the 16th Workshop on Logic-based Methods in
Programming Environments (WLPE2006) | null | null | null | cs.PL cs.LG | null | Because query execution is the most crucial part of Inductive Logic
Programming (ILP) algorithms, a lot of effort is invested in developing faster
execution mechanisms. These execution mechanisms typically have a low-level
implementation, making them hard to debug. Moreover, other factors such as the
complexity of the problems handled by ILP algorithms and size of the code base
of ILP data mining systems make debugging at this level a very difficult job.
In this work, we present the trace-based debugging approach currently used in
the development of new execution mechanisms in hipP, the engine underlying the
ACE Data Mining system. This debugger uses the delta debugging algorithm to
automatically reduce the total time needed to expose bugs in ILP execution,
thus making manual debugging step much lighter.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2007 13:35:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Troncon",
"Remko",
""
],
[
"Janssens",
"Gerda",
""
]
] |
cs/0701106 | Wim Vanhoof | Pierre Deransart | On using Tracer Driver for External Dynamic Process Observation | Paper presented at the 16th Workshop on Logic-based Methods in
Programming Environments | null | null | null | cs.PL | null | One is interested here in the observation of dynamic processes starting from
the traces which they leave or those that one makes them produce. It is
considered here that it should be possible to make several observations
simultaneously, using a large variety of independently developed analyzers. For
this purpose, we introduce the original notion of ``full trace'' to capture the
idea that a process can be instrumented in such a way that it may broadcast all
information which could ever be requested by any kind of observer. Each
analyzer can then find in the full trace the data elements which it needs. This
approach uses what has been called a "tracer driver" which completes the tracer
and drives it to answer the requests of the analyzers. A tracer driver allows
to restrict the flow of information and makes this approach tractable. On the
other side, the potential size of a full trace seems to make the idea of full
trace unrealistic. In this work we explore the consequences of this notion in
term of potential efficiency, by analyzing the respective workloads between the
(full) tracer and many different analyzers, all being likely run in true
parallel environments. To illustrate this study, we use the example of the
observation of the resolution of constraints systems (proof-tree, search-tree
and propagation) using sophisticated visualization tools, as developed in the
project OADymPPaC (2001-2004). The processes considered here are computer
programs, but we believe the approach can be extended to many other kinds of
processes.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2007 13:43:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Deransart",
"Pierre",
""
]
] |
cs/0701107 | Wim Vanhoof | Hani Girgis, Bharat Jayaraman | JavaTA: A Logic-based Debugger for Java | Paper presented at the 16th Workshop on Logic-based Methods in
Programming Environments (WLPE2006) | null | null | null | cs.PL | null | This paper presents a logic based approach to debugging Java programs. In
contrast with traditional debugging we propose a debugging methodology for Java
programs using logical queries on individual execution states and also over the
history of execution. These queries were arrived at by a systematic study of
errors in object-oriented programs in our earlier research. We represent the
salient events during the execution of a Java program by a logic database, and
implement the queries as logic programs. Such an approach allows us to answer a
number of useful and interesting queries about a Java program, such as the
calling sequence that results in a certain outcome, the state of an object at a
particular execution point, etc. Our system also provides the ability to
compose new queries during a debugging session. We believe that logic
programming offers a significant contribution to the art of object-oriented
programs debugging.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2007 13:48:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Girgis",
"Hani",
""
],
[
"Jayaraman",
"Bharat",
""
]
] |
cs/0701108 | Wim Vanhoof | Edison Mera, Pedro Lopez-Garcia, German Puebla, Manuel Carro, Manuel
Hermenegildo | Towards Execution Time Estimation for Logic Programs via Static Analysis
and Profiling | Paper presented at the 16th Workshop on Logic-based Methods in
Programming Environments | null | null | null | cs.PL | null | Effective static analyses have been proposed which infer bounds on the number
of resolutions or reductions. These have the advantage of being independent
from the platform on which the programs are executed and have been shown to be
useful in a number of applications, such as granularity control in parallel
execution. On the other hand, in distributed computation scenarios where
platforms with different capabilities come into play, it is necessary to
express costs in metrics that include the characteristics of the platform. In
particular, it is specially interesting to be able to infer upper and lower
bounds on actual execution times. With this objective in mind, we propose an
approach which combines compile-time analysis for cost bounds with a one-time
profiling of the platform in order to determine the values of certain
parameters for a given platform. These parameters calibrate a cost model which,
from then on, is able to compute statically time bound functions for procedures
and to predict with a significant degree of accuracy the execution times of
such procedures in the given platform. The approach has been implemented and
integrated in the CiaoPP system.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2007 14:22:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mera",
"Edison",
""
],
[
"Lopez-Garcia",
"Pedro",
""
],
[
"Puebla",
"German",
""
],
[
"Carro",
"Manuel",
""
],
[
"Hermenegildo",
"Manuel",
""
]
] |
cs/0701109 | Wim Vanhoof | Siddharth Chitnis, Madhu Yennamani, Gopal Gupta | ExSched: Solving Constraint Satisfaction Problems with the Spreadsheet
Paradigm | Paper presented at the 16th Workshop on Logic-based Methods in
Programming Environments (WLPE2006) | null | null | null | cs.PL | null | We report on the development of a general tool called ExSched, implemented as
a plug-in for Microsoft Excel, for solving a class of constraint satisfaction
problems. The traditional spreadsheet paradigm is based on attaching arithmetic
expressions to individual cells and then evaluating them. The ExSched interface
generalizes the spreadsheet paradigm to allow finite domain constraints to be
attached to the individual cells that are then solved to get a solution. This
extension provides a user-friendly interface for solving constraint
satisfaction problems that can be modeled as 2D tables, such as scheduling
problems, timetabling problems, product configuration, etc. ExSched can be
regarded as a spreadsheet interface to CLP(FD) that hides the syntactic and
semantic complexity of CLP(FD) and enables novice users to solve many
scheduling and timetabling problems interactively.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2007 14:26:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chitnis",
"Siddharth",
""
],
[
"Yennamani",
"Madhu",
""
],
[
"Gupta",
"Gopal",
""
]
] |
cs/0701110 | Wim Vanhoof | Kim Henriksen, John Gallagher | A Web-based Tool Combining Different Type Analyses | Paper presented at the 16th Workshop on Logic-based Methods in
Programming Environments (WLPE2006) | null | null | null | cs.PL | null | There are various kinds of type analysis of logic programs. These include for
example inference of types that describe an over-approximation of the success
set of a program, inference of well-typings, and abstractions based on given
types. Analyses can be descriptive or prescriptive or a mixture of both, and
they can be goal-dependent or goal-independent. We describe a prototype tool
that can be accessed from a web browser, allowing various type analyses to be
run. The first goal of the tool is to allow the analysis results to be examined
conveniently by clicking on points in the original program clauses, and to
highlight ill-typed program constructs, empty types or other type anomalies.
Secondly the tool allows combination of the various styles of analysis. For
example, a descriptive regular type can be automatically inferred for a given
program, and then that type can be used to generate the minimal "domain model"
of the program with respect to the corresponding pre-interpretation, which can
give more precise information than the original descriptive type.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2007 14:35:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Henriksen",
"Kim",
""
],
[
"Gallagher",
"John",
""
]
] |
cs/0701111 | Wim Vanhoof | Elvira Albert, Puri Arenas, German Puebla | Some Issues on Incremental Abstraction-Carrying Code | Paper presented at the 16th Workshop on Logic-based Methods in
Programming Environments (WLPE2006) | null | null | null | cs.PL | null | Abstraction-Carrying Code (ACC) has recently been proposed as a framework for
proof-carrying code (PCC) in which the code supplier provides a program
together with an abstraction (or abstract model of the program) whose validity
entails compliance with a predefined safety policy. The abstraction thus plays
the role of safety certificate and its generation (and validation) is carried
out automatically by a fixed-point analyzer. Existing approaches for PCC are
developed under the assumption that the consumer reads and validates the entire
program w.r.t. the full certificate at once, in a non incremental way. In this
abstract, we overview the main issues on incremental ACC. In particular, in the
context of logic programming, we discuss both the generation of incremental
certificates and the design of an incremental checking algorithm for untrusted
updates of a (trusted) program, i.e., when a producer provides a modified
version of a previously validated program. By update, we refer to any arbitrary
change on a program, i.e., the extension of the program with new predicates,
the deletion of existing predicates and the replacement of existing predicates
by new versions for them. We also discuss how each kind of update affects the
incremental extension in terms of accuracy and correctness.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2007 14:44:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Albert",
"Elvira",
""
],
[
"Arenas",
"Puri",
""
],
[
"Puebla",
"German",
""
]
] |
cs/0701113 | Thomas Colcombet | Thomas Colcombet (GALION) | On factorisation forests | 27 pages | null | null | null | cs.LO | null | The theorem of factorisation forests shows the existence of nested
factorisations -- a la Ramsey -- for finite words. This theorem has important
applications in semigroup theory, and beyond. The purpose of this paper is to
illustrate the importance of this approach in the context of automata over
infinite words and trees. We extend the theorem of factorisation forest in two
directions: we show that it is still valid for any word indexed by a linear
ordering; and we show that it admits a deterministic variant for words indexed
by well-orderings. A byproduct of this work is also an improvement on the known
bounds for the original result. We apply the first variant for giving a
simplified proof of the closure under complementation of rational sets of words
indexed by countable scattered linear orderings. We apply the second variant in
the analysis of monadic second-order logic over trees, yielding new results on
monadic interpretations over trees. Consequences of it are new caracterisations
of prefix-recognizable structures and of the Caucal hierarchy.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2007 16:48:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Colcombet",
"Thomas",
"",
"GALION"
]
] |
cs/0701115 | Juan J. Merelo Pr. | J.J. Merelo, Antonio Mora-Garcia, J.L.J. Laredo, Juan Lupion, Fernando
Tricas | Browser-based distributed evolutionary computation: performance and
scaling behavior | Submitted to GECCO 2007 | null | null | null | cs.DC cs.NE | null | The challenge of ad-hoc computing is to find the way of taking advantage of
spare cycles in an efficient way that takes into account all capabilities of
the devices and interconnections available to them. In this paper we explore
distributed evolutionary computation based on the Ruby on Rails framework,
which overlays a Model-View-Controller on evolutionary computation. It allows
anybody with a web browser (that is, mostly everybody connected to the
Internet) to participate in an evolutionary computation experiment. Using a
straightforward farming model, we consider different factors, such as the size
of the population used. We are mostly interested in how they impact on
performance, but also the scaling behavior when a non-trivial number of
computers is applied to the problem. Experiments show the impact of different
packet sizes on performance, as well as a quite limited scaling behavior, due
to the characteristics of the server. Several solutions for that problem are
proposed.
| [
{
"version": "v1",
"created": "Thu, 18 Jan 2007 09:23:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Merelo",
"J. J.",
""
],
[
"Mora-Garcia",
"Antonio",
""
],
[
"Laredo",
"J. L. J.",
""
],
[
"Lupion",
"Juan",
""
],
[
"Tricas",
"Fernando",
""
]
] |
cs/0701119 | Petr Ivankov | Petr R. Ivankov, Nikolay P. Ivankov | The framework for simulation of dynamics of mechanical aggregates | 7 pages, 4 figures | null | null | null | cs.CE | null | A framework for simulation of dynamics of mechanical aggregates has been
developed. This framework enables us to build model of aggregate from models of
its parts. Framework is a part of universal framework for science and
engineering.
| [
{
"version": "v1",
"created": "Fri, 19 Jan 2007 12:18:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ivankov",
"Petr R.",
""
],
[
"Ivankov",
"Nikolay P.",
""
]
] |
cs/0701121 | Bernard Mourrain | Changhe Tu (Shandong University), Wenping Wang (University of Hong
Kong), Bernard Mourrain (INRIA Sophia Antipolis), Jiaye Wang (Shandong
University) | Signature Sequence of Intersection Curve of Two Quadrics for Exact
Morphological Classification | null | null | null | null | cs.CG cs.SC | null | We present an efficient method for classifying the morphology of the
intersection curve of two quadrics (QSIC) in PR3, 3D real projective space;
here, the term morphology is used in a broad sense to mean the shape,
topological, and algebraic properties of a QSIC, including singularity,
reducibility, the number of connected components, and the degree of each
irreducible component, etc. There are in total 35 different QSIC morphologies
with non-degenerate quadric pencils. For each of these 35 QSIC morphologies,
through a detailed study of the eigenvalue curve and the index function jump we
establish a characterizing algebraic condition expressed in terms of the Segre
characteristics and the signature sequence of a quadric pencil. We show how to
compute a signature sequence with rational arithmetic so as to determine the
morphology of the intersection curve of any two given quadrics. Two immediate
applications of our results are the robust topological classification of QSIC
in computing B-rep surface representation in solid modeling and the derivation
of algebraic conditions for collision detection of quadric primitives.
| [
{
"version": "v1",
"created": "Fri, 19 Jan 2007 08:08:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Tu",
"Changhe",
"",
"Shandong University"
],
[
"Wang",
"Wenping",
"",
"University of Hong\n Kong"
],
[
"Mourrain",
"Bernard",
"",
"INRIA Sophia Antipolis"
],
[
"Wang",
"Jiaye",
"",
"Shandong\n University"
]
] |
cs/0701125 | Marcus Hutter | Marcus Hutter | Universal Algorithmic Intelligence: A mathematical top->down approach | 70 pages | In Artificial General Intelligence, Springer (2007) 227-290 | null | IDSIA-01-03 | cs.AI cs.LG | null | Sequential decision theory formally solves the problem of rational agents in
uncertain worlds if the true environmental prior probability distribution is
known. Solomonoff's theory of universal induction formally solves the problem
of sequence prediction for unknown prior distribution. We combine both ideas
and get a parameter-free theory of universal Artificial Intelligence. We give
strong arguments that the resulting AIXI model is the most intelligent unbiased
agent possible. We outline how the AIXI model can formally solve a number of
problem classes, including sequence prediction, strategic games, function
minimization, reinforcement and supervised learning. The major drawback of the
AIXI model is that it is uncomputable. To overcome this problem, we construct a
modified algorithm AIXItl that is still effectively more intelligent than any
other time t and length l bounded agent. The computation time of AIXItl is of
the order t x 2^l. The discussion includes formal definitions of intelligence
order relations, the horizon problem and relations of the AIXI theory to other
AI approaches.
| [
{
"version": "v1",
"created": "Sat, 20 Jan 2007 00:18:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hutter",
"Marcus",
""
]
] |
cs/0701128 | M. V. Panduranga Rao | M. V. Panduranga Rao | Interference Automata | 19 pages. A preliminary version appears under the title "On a Model
of Computation based on Optical Interference" in Proc. of the 16-th
Australasian Workshop on Combinatorial Algorithms (AWOCA'05), pp. 249-261 | null | null | null | cs.CC | null | We propose a computing model, the Two-Way Optical Interference Automata
(2OIA), that makes use of the phenomenon of optical interference. We introduce
this model to investigate the increase in power, in terms of language
recognition, of a classical Deterministic Finite Automaton (DFA) when endowed
with the facility of optical interference. The question is in the spirit of
Two-Way Finite Automata With Quantum and Classical States (2QCFA) [A. Ambainis
and J. Watrous, Two-way Finite Automata With Quantum and Classical States,
Theoretical Computer Science, 287 (1), 299-311, (2002)] wherein the classical
DFA is augmented with a quantum component of constant size. We test the power
of 2OIA against the languages mentioned in the above paper. We give efficient
2OIA algorithms to recognize languages for which 2QCFA machines have been shown
to exist, as well as languages whose status vis-a-vis 2QCFA has been posed as
open questions. Finally we show the existence of a language that cannot be
recognized by a 2OIA but can be recognized by an $O(n^3)$ space Turing machine.
| [
{
"version": "v1",
"created": "Mon, 22 Jan 2007 09:14:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rao",
"M. V. Panduranga",
""
]
] |
cs/0701130 | Thomas C. Schmidt | Thomas C. Schmidt and Matthias W\"ahlisch and Ying Zhang | On the Correlation of Geographic and Network Proximity at Internet Edges
and its Implications for Mobile Unicast and Multicast Routing | 6 pages including 6 figures | in Proceedings of the IEEE ICN'07, IEEE Computer Society Press,
Washington, DC, USA, April 2007 | null | null | cs.NI cs.AR cs.PF | null | Significant effort has been invested recently to accelerate handover
operations in a next generation mobile Internet. Corresponding works for
developing efficient mobile multicast management are emergent. Both problems
simultaneously expose routing complexity between subsequent points of
attachment as a characteristic parameter for handover performance in access
networks.
As continuous mobility handovers necessarily occur between access routers
located in geographic vicinity, this paper investigates on the hypothesis that
geographically adjacent edge networks attain a reduced network distances as
compared to arbitrary Internet nodes. We therefore evaluate and analyze edge
distance distributions in various regions for clustered IP ranges on their
geographic location such as a city. We use traceroute to collect packet
forwarding path and round-trip-time of each intermediate node to scan-wise
derive an upper bound of the node distances. Results of different scanning
origins are compared to obtain the best estimation of network distance of each
pair. Our results are compared with corresponding analysis of CAIDA Skitter
data, overall leading to fairly stable, reproducible edge distance
distributions. As a first conclusion on expected impact on handover performance
measures, our results indicate a general optimum for handover anticipation time
in 802.11 networks of 25 ms.
| [
{
"version": "v1",
"created": "Sat, 20 Jan 2007 23:06:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Schmidt",
"Thomas C.",
""
],
[
"Wählisch",
"Matthias",
""
],
[
"Zhang",
"Ying",
""
]
] |
cs/0701132 | Mardavij Roozbehani | Eric Feron (School of Aerospace Engineering, Georgia Institute of
Technology) Mardavij Roozbehani (Department of Aeronautics and Astronautics,
Massachusetts Institue of Technology) | Certifying controls and systems software | 12 pages, 2 figures, 1 Matlab Code. To be submitted to AIAA journal
of guidance and control. In this revised version, support and funding
resources were added to the acknowledgement section. LIDS Publication #: 2745 | null | null | LIDS # 2745 | cs.SE | null | Software system certification presents itself with many challenges, including
the necessity to certify the system at the level of functional requirements,
code and binary levels, the need to chase down run-time errors, and the need
for proving timing properties of the eventual, compiled system. This paper
illustrates possible approaches for certifying code that arises from control
systems requirements as far as stability properties are concerned. The relative
simplicity of the certification process should encourage the development of
systematic procedures for certifying control system codes for more complex
environments.
| [
{
"version": "v1",
"created": "Sun, 21 Jan 2007 19:34:45 GMT"
},
{
"version": "v2",
"created": "Tue, 23 Jan 2007 16:12:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Feron",
"Eric",
"",
"School of Aerospace Engineering, Georgia Institute of\n Technology"
],
[
"Roozbehani",
"Mardavij",
"",
"Department of Aeronautics and Astronautics,\n Massachusetts Institue of Technology"
]
] |
cs/0701133 | Athina Markopoulou | Athina Markopoulou and David Cheriton | The Case for Redundant Arrays of Internet Links (RAIL) | null | null | null | null | cs.NI | null | It is well-known that wide-area networks face today several performance and
reliability problems. In this work, we propose to solve these problems by
connecting two or more local-area networks together via a Redundant Array of
Internet Links (or RAIL) and by proactively replicating each packet over these
links. In that sense, RAIL is for networks what RAID (Redundant Array of
Inexpensive Disks) was for disks. In this paper, we describe the RAIL approach,
present our prototype (called the RAILedge), and evaluate its performance.
First, we demonstrate that using multiple Internet links significantly improves
the end-to-end performance in terms of network-level as well as
application-level metrics for Voice-over-IP and TCP. Second, we show that a
delay padding mechanism is needed to complement RAIL when there is significant
delay disparity between the paths. Third, we show that two paths provide most
of the benefit, if carefully managed. Finally, we discuss a RAIL-network
architecture, where RAILedges make use of path redundancy, route control and
application-specific mechanisms, to improve WAN performance.
| [
{
"version": "v1",
"created": "Sun, 21 Jan 2007 19:59:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Markopoulou",
"Athina",
""
],
[
"Cheriton",
"David",
""
]
] |
cs/0701135 | Jinyun Ke | Jinyun KE | Complex networks and human language | null | null | null | null | cs.CL | null | This paper introduces how human languages can be studied in light of recent
development of network theories. There are two directions of exploration. One
is to study networks existing in the language system. Various lexical networks
can be built based on different relationships between words, being semantic or
syntactic. Recent studies have shown that these lexical networks exhibit
small-world and scale-free features. The other direction of exploration is to
study networks of language users (i.e. social networks of people in the
linguistic community), and their role in language evolution. Social networks
also show small-world and scale-free features, which cannot be captured by
random or regular network models. In the past, computational models of language
change and language emergence often assume a population to have a random or
regular structure, and there has been little discussion how network structures
may affect the dynamics. In the second part of the paper, a series of
simulation models of diffusion of linguistic innovation are used to illustrate
the importance of choosing realistic conditions of population structure for
modeling language change. Four types of social networks are compared, which
exhibit two categories of diffusion dynamics. While the questions about which
type of networks are more appropriate for modeling still remains, we give some
preliminary suggestions for choosing the type of social networks for modeling.
| [
{
"version": "v1",
"created": "Mon, 22 Jan 2007 00:45:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"KE",
"Jinyun",
""
]
] |
cs/0701136 | Stevan Harnad | Chawki Hajjem, Stevan Harnad | Citation Advantage For OA Self-Archiving Is Independent of Journal
Impact Factor, Article Age, and Number of Co-Authors | null | null | null | null | cs.IR cs.DL | null | Eysenbach has suggested that the OA (Green) self-archiving advantage might
just be an artifact of potential uncontrolled confounding factors such as
article age (older articles may be both more cited and more likely to be
self-archived), number of authors (articles with more authors might be more
cited and more self-archived), subject matter (the subjects that are cited
more, self-archive more), country (same thing), number of authors, citation
counts of authors, etc. Chawki Hajjem (doctoral candidate, UQaM) had already
shown that the OA advantage was present in all cases when articles were
analysed separately by age, subject matter or country. He has now done a
multiple regression analysis jointly testing (1) article age, (2) journal
impact factor, (3) number of authors, and (4) OA self-archiving as separate
factors for 442,750 articles in 576 (biomedical) journals across 11 years, and
has shown that each of the four factors contributes an independent,
statistically significant increment to the citation counts. The
OA-self-archiving advantage remains a robust, independent factor. Having
successfully responded to his challenge, we now challenge Eysenbach to
demonstrate -- by testing a sufficiently broad and representative sample of
journals at all levels of the journal quality, visibility and prestige
hierarchy -- that his finding of a citation advantage for Gold OA (articles
published OA on the high-profile website of the only journal he tested (PNAS)
over Green OA articles in the same journal (self-archived on the author's
website) was not just an artifact of having tested only one very high-profile
journal.
| [
{
"version": "v1",
"created": "Mon, 22 Jan 2007 02:14:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hajjem",
"Chawki",
""
],
[
"Harnad",
"Stevan",
""
]
] |
cs/0701137 | Stevan Harnad | Chawki Hajjem, Stevan Harnad | The Open Access Citation Advantage: Quality Advantage Or Quality Bias? | null | null | null | null | cs.IR cs.DL | null | Many studies have now reported the positive correlation between Open Access
(OA) self-archiving and citation counts ("OA Advantage," OAA). But does this
OAA occur because (QB) authors are more likely to self-selectively self-archive
articles that are more likely to be cited (self-selection "Quality Bias": QB)?
or because (QA) articles that are self-archived are more likely to be cited
("Quality Advantage": QA)? The probable answer is both. Three studies [by (i)
Kurtz and co-workers in astrophysics, (ii) Moed in condensed matter physics,
and (iii) Davis & Fromerth in mathematics] had reported the OAA to be due to QB
[plus Early Advantage, EA, from self-archiving the preprint before publication,
in (i) and (ii)] rather than QA. These three fields, however, (1) have less of
a postprint access problem than most other fields and (i) and (ii) also happen
to be among the minority of fields that (2) make heavy use of prepublication
preprints. Chawki Hajjem has now analyzed preliminary evidence based on over
100,000 articles from multiple fields, comparing self-selected self-archiving
with mandated self-archiving to estimate the contributions of QB and QA to the
OAA. Both factors contribute, and the contribution of QA is greater.
| [
{
"version": "v1",
"created": "Mon, 22 Jan 2007 02:19:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hajjem",
"Chawki",
""
],
[
"Harnad",
"Stevan",
""
]
] |
cs/0701139 | Yishay Mor | Yishay Mor and Jeffrey S. Rosenschein | Time and the Prisoner's Dilemma | Proceedings of the First International Conference on Multiagent
Systems (ICMAS95), : 276-282, 1995 | null | null | null | cs.GT cs.AI | null | This paper examines the integration of computational complexity into game
theoretic models. The example focused on is the Prisoner's Dilemma, repeated
for a finite length of time. We show that a minimal bound on the players'
computational ability is sufficient to enable cooperative behavior.
In addition, a variant of the repeated Prisoner's Dilemma game is suggested,
in which players have the choice of opting out. This modification enriches the
game and suggests dominance of cooperative strategies.
Competitive analysis is suggested as a tool for investigating sub-optimal
(but computationally tractable) strategies and game theoretic models in
general. Using competitive analysis, it is shown that for bounded players, a
sub-optimal strategy might be the optimal choice, given resource limitations.
| [
{
"version": "v1",
"created": "Mon, 22 Jan 2007 15:23:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mor",
"Yishay",
""
],
[
"Rosenschein",
"Jeffrey S.",
""
]
] |
cs/0701142 | Wolfgang Bein | Wolfgang Bein, Lawrence L. Larmore, R\"udiger Reischuk | Knowledge State Algorithms: Randomization with Limited Information | 17 pages, 2 figures | null | null | null | cs.DS | null | We introduce the concept of knowledge states; many well-known algorithms can
be viewed as knowledge state algorithms. The knowledge state approach can be
used to to construct competitive randomized online algorithms and study the
tradeoff between competitiveness and memory. A knowledge state simply states
conditional obligations of an adversary, by fixing a work function, and gives a
distribution for the algorithm. When a knowledge state algorithm receives a
request, it then calculates one or more "subsequent" knowledge states, together
with a probability of transition to each. The algorithm then uses randomization
to select one of those subsequents to be the new knowledge state. We apply the
method to the paging problem. We present optimally competitive algorithm for
paging for the cases where the cache sizes are k=2 and k=3. These algorithms
use only a very limited number of bookmarks.
| [
{
"version": "v1",
"created": "Tue, 23 Jan 2007 00:54:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bein",
"Wolfgang",
""
],
[
"Larmore",
"Lawrence L.",
""
],
[
"Reischuk",
"Rüdiger",
""
]
] |
cs/0701144 | Andreas U. Schmidt | Nicolai Kuntze and Andreas U. Schmidt | Trusted Ticket Systems and Applications | Accepted full research paper at IFIP sec2007, Sandton, South Africa,
14-16 May 2007 | null | null | null | cs.CR | null | Trusted Computing is a security base technology that will perhaps be
ubiquitous in a few years in personal computers and mobile devices alike.
Despite its neutrality with respect to applications, it has raised some privacy
concerns. We show that trusted computing can be applied for service access
control in a manner protecting users' privacy. We construct a ticket system --
a concept which is at the heart of Identity Management -- relying solely on the
capabilities of the trusted platform module and the standards specified by the
Trusted Computing Group. Two examples show how it can be used for pseudonymous
and protected service access.
| [
{
"version": "v1",
"created": "Tue, 23 Jan 2007 14:26:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kuntze",
"Nicolai",
""
],
[
"Schmidt",
"Andreas U.",
""
]
] |
cs/0701145 | Andreas U. Schmidt | Nicolai Kuntze, Andreas U. Schmidt, and Christian Hett | Non-Repudiation in Internet Telephony | Accepted full research paper at IFIP sec2007, Sandton, South Africa,
14-16 May 2007 | null | null | null | cs.CR | null | We present a concept to achieve non-repudiation for natural language
conversations over the Internet. The method rests on chained electronic
signatures applied to pieces of packet-based, digital, voice communication. It
establishes the integrity and authenticity of the bidirectional data stream and
its temporal sequence and thus the security context of a conversation. The
concept is close to the protocols for Voice over the Internet (VoIP), provides
a high level of inherent security, and extends naturally to multilateral
non-repudiation, e.g., for conferences. Signatures over conversations can
become true declarations of will in analogy to electronically signed, digital
documents. This enables binding verbal contracts, in principle between
unacquainted speakers, and in particular without witnesses. A reference
implementation of a secure VoIP archive is exhibited.
| [
{
"version": "v1",
"created": "Tue, 23 Jan 2007 15:23:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kuntze",
"Nicolai",
""
],
[
"Schmidt",
"Andreas U.",
""
],
[
"Hett",
"Christian",
""
]
] |
cs/0701147 | Wim Vanhoof | Michael Hanus | A Generic Analysis Environment for Curry Programs | Paper presented at the 16th Workshop on Logic-based Methods in
Programming Environments | null | null | null | cs.PL | null | We present CurryBrowser, a generic analysis environment for the declarative
multi-paradigm language Curry. CurryBrowser supports browsing through the
program code of an application written in Curry, i.e., the main module and all
directly or indirectly imported modules. Each module can be shown in different
formats (e.g., source code, interface, intermediate code) and, inside each
module, various properties of functions defined in this module can be analyzed.
In order to support the integration of various program analyses, CurryBrowser
has a generic interface to connect local and global analyses implemented in
Curry. CurryBrowser is completely implemented in Curry using libraries for GUI
programming and meta-programming.
| [
{
"version": "v1",
"created": "Wed, 24 Jan 2007 06:55:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hanus",
"Michael",
""
]
] |
cs/0701148 | Wim Vanhoof | Wim Vanhoof and Susana Munoz-Hernandez | Proceedings of the 16th Workshop in Logic-based Methods in Programming
Environments (WLPE2006) | null | null | null | null | cs.PL | null | This volume contains the papers presented at WLPE'06: the 16th Workshop on
Logic-based Methods in Programming Environments held on August 16, 2006 in the
Seattle Sheraton Hotel and Towers, Seattle, Washington (USA). It was organised
as a satellite workshop of ICLP'06, the 22th International Conference on Logic
Programming.
| [
{
"version": "v1",
"created": "Wed, 24 Jan 2007 07:03:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vanhoof",
"Wim",
""
],
[
"Munoz-Hernandez",
"Susana",
""
]
] |
cs/0701150 | Luc Brun | Luc Brun (GREYC), Walter G. Kropatsch (PRIP) | Contains and Inside relationships within combinatorial Pyramids | 35 pages | Pattern Recognition 39 (01/04/2006) 515-526 | null | null | cs.CV | null | Irregular pyramids are made of a stack of successively reduced graphs
embedded in the plane. Such pyramids are used within the segmentation framework
to encode a hierarchy of partitions. The different graph models used within the
irregular pyramid framework encode different types of relationships between
regions. This paper compares different graph models used within the irregular
pyramid framework according to a set of relationships between regions. We also
define a new algorithm based on a pyramid of combinatorial maps which allows to
determine if one region contains the other using only local calculus.
| [
{
"version": "v1",
"created": "Wed, 24 Jan 2007 15:13:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Brun",
"Luc",
"",
"GREYC"
],
[
"Kropatsch",
"Walter G.",
"",
"PRIP"
]
] |
cs/0701153 | Richard Kr\'alovi\v{c} | Michal Fori\v{s}ek, Branislav Katreniak, Jana Katreniakov\'a,
Rastislav Kr\'alovi\v{c}, Richard Kr\'alovi\v{c}, Vladim\'ir Koutn\'y, Dana
Pardubsk\'a, Tom\'a\v{s} Plachetka, Branislav Rovan | Online Bandwidth Allocation | null | null | null | null | cs.DS cs.NI | null | The paper investigates a version of the resource allocation problem arising
in the wireless networking, namely in the OVSF code reallocation process. In
this setting a complete binary tree of a given height $n$ is considered,
together with a sequence of requests which have to be served in an online
manner. The requests are of two types: an insertion request requires to
allocate a complete subtree of a given height, and a deletion request frees a
given allocated subtree. In order to serve an insertion request it might be
necessary to move some already allocated subtrees to other locations in order
to free a large enough subtree. We are interested in the worst case average
number of such reallocations needed to serve a request.
It was proved in previous work that the competitive ratio of the optimal
online algorithm solving this problem is between 1.5 and O(n). We partially
answer the question about its exact value by giving an O(1)-competitive online
algorithm.
Same model has been used in the context of memory management systems, and
analyzed for the number of reallocations needed to serve a request in the worst
case. In this setting, our result is a corresponding amortized analysis.
| [
{
"version": "v1",
"created": "Thu, 25 Jan 2007 11:52:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Forišek",
"Michal",
""
],
[
"Katreniak",
"Branislav",
""
],
[
"Katreniaková",
"Jana",
""
],
[
"Královič",
"Rastislav",
""
],
[
"Královič",
"Richard",
""
],
[
"Koutný",
"Vladimír",
""
],
[
"Pardubská",
"Dana",
""
],
[
"Plachetka",
"Tomáš",
""
],
[
"Rovan",
"Branislav",
""
]
] |
cs/0701155 | Jim Gray | Jim Gray, Surajit Chaudhuri, Adam Bosworth, Andrew Layman, Don
Reichart, Murali Venkatrao, Frank Pellow, Hamid Pirahesh | Data Cube: A Relational Aggregation Operator Generalizing Group-By,
Cross-Tab, and Sub-Totals | null | Data Mining and Knowledge Discovery 1(1): 29-53 (1997) | null | null | cs.DB | null | Data analysis applications typically aggregate data across many dimensions
looking for anomalies or unusual patterns. The SQL aggregate functions and the
GROUP BY operator produce zero-dimensional or one-dimensional aggregates.
Applications need the N-dimensional generalization of these operators. This
paper defines that operator, called the data cube or simply cube. The cube
operator generalizes the histogram, cross-tabulation, roll-up, drill-down, and
sub-total constructs found in most report writers. The novelty is that cubes
are relations. Consequently, the cube operator can be imbedded in more complex
non-procedural data analysis programs. The cube operator treats each of the N
aggregation attributes as a dimension of N-space. The aggregate of a particular
set of attribute values is a point in this space. The set of points forms an
N-dimensional cube. Super-aggregates are computed by aggregating the N-cube to
lower dimensional spaces. This paper (1) explains the cube and roll-up
operators, (2) shows how they fit in SQL, (3) explains how users can define new
aggregate functions for cubes, and (4) discusses efficient techniques to
compute the cube. Many of these features are being added to the SQL Standard.
| [
{
"version": "v1",
"created": "Thu, 25 Jan 2007 22:39:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gray",
"Jim",
""
],
[
"Chaudhuri",
"Surajit",
""
],
[
"Bosworth",
"Adam",
""
],
[
"Layman",
"Andrew",
""
],
[
"Reichart",
"Don",
""
],
[
"Venkatrao",
"Murali",
""
],
[
"Pellow",
"Frank",
""
],
[
"Pirahesh",
"Hamid",
""
]
] |
cs/0701156 | Jim Gray | Jim Gray | Data Management: Past, Present, and Future | null | IEEE Computer 29(10): 38-46 (1996) | null | MSR-TR-96-18 | cs.DB | null | Soon most information will be available at your fingertips, anytime,
anywhere. Rapid advances in storage, communications, and processing allow us
move all information into Cyberspace. Software to define, search, and visualize
online information is also a key to creating and accessing online information.
This article traces the evolution of data management systems and outlines
current trends. Data management systems began by automating traditional tasks:
recording transactions in business, science, and commerce. This data consisted
primarily of numbers and character strings. Today these systems provide the
infrastructure for much of our society, allowing fast, reliable, secure, and
automatic access to data distributed throughout the world. Increasingly these
systems automatically design and manage access to the data. The next steps are
to automate access to richer forms of data: images, sound, video, maps, and
other media. A second major challenge is automatically summarizing and
abstracting data in anticipation of user requests. These multi-media databases
and tools to access them will be a cornerstone of our move to Cyberspace.
| [
{
"version": "v1",
"created": "Thu, 25 Jan 2007 22:42:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gray",
"Jim",
""
]
] |
cs/0701157 | Jim Gray | Hal Berenson, Phil Bernstein, Jim Gray, Jim Melton, Elizabeth O'Neil,
Patrick O'Neil | A Critique of ANSI SQL Isolation Levels | null | Proc. ACM SIGMOD 95, pp. 1-10, San Jose CA, June 1995 | null | MSR-TR-95-51 | cs.DB | null | ANSI SQL-92 defines Isolation Levels in terms of phenomena: Dirty Reads,
Non-Repeatable Reads, and Phantoms. This paper shows that these phenomena and
the ANSI SQL definitions fail to characterize several popular isolation levels,
including the standard locking implementations of the levels. Investigating the
ambiguities of the phenomena leads to clearer definitions; in addition new
phenomena that better characterize isolation types are introduced. An important
multiversion isolation type, Snapshot Isolation, is defined.
| [
{
"version": "v1",
"created": "Thu, 25 Jan 2007 22:53:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Berenson",
"Hal",
""
],
[
"Bernstein",
"Phil",
""
],
[
"Gray",
"Jim",
""
],
[
"Melton",
"Jim",
""
],
[
"O'Neil",
"Elizabeth",
""
],
[
"O'Neil",
"Patrick",
""
]
] |
cs/0701158 | Jim Gray | Jim Gray | Queues Are Databases | null | null | null | MSR-TR-95-56 | cs.DB | null | Message-oriented-middleware (MOM) has become an small industry. MOM offers
queued transaction processing as an advance over pure client-server transaction
processing. This note makes four points: Queued transaction processing is less
general than direct transaction processing. Queued systems are built on top of
direct systems. You cannot build a direct system atop a queued system. It is
difficult to build direct, conversational, or distributed transactions atop a
queued system. Queues are interesting databases with interesting concurrency
control. It is best to build these mechanisms into a standard database system
so other applications can use these interesting features. Queue systems need
DBMS functionality. Queues need security, configuration, performance
monitoring, recovery, and reorganization utilities. Database systems already
have these features. A full-function MOM system duplicates these database
features. Queue managers are simple TP-monitors managing server pools driven by
queues. Database systems are encompassing many server pool features as they
evolve to TP-lite systems.
| [
{
"version": "v1",
"created": "Thu, 25 Jan 2007 22:56:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gray",
"Jim",
""
]
] |
cs/0701159 | Jim Gray | Gerd Heber, Jim Gray | Supporting Finite Element Analysis with a Relational Database Backend,
Part I: There is Life beyond Files | null | null | null | MSR-TR-2005-49 | cs.DB cs.CE | null | In this paper, we show how to use a Relational Database Management System in
support of Finite Element Analysis. We believe it is a new way of thinking
about data management in well-understood applications to prepare them for two
major challenges, - size and integration (globalization). Neither extreme size
nor integration (with other applications over the Web) was a design concern 30
years ago when the paradigm for FEA implementation first was formed. On the
other hand, database technology has come a long way since its inception and it
is past time to highlight its usefulness to the field of scientific computing
and computer based engineering. This series aims to widen the list of
applications for database designers and for FEA users and application
developers to reap some of the benefits of database development.
| [
{
"version": "v1",
"created": "Thu, 25 Jan 2007 23:02:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Heber",
"Gerd",
""
],
[
"Gray",
"Jim",
""
]
] |
cs/0701160 | Jim Gray | Gerd Heber, Jim Gray | Supporting Finite Element Analysis with a Relational Database Backend,
Part II: Database Design and Access | null | null | null | MSR-TR-2006-21 | cs.DB cs.CE | null | This is Part II of a three article series on using databases for Finite
Element Analysis (FEA). It discusses (1) db design, (2) data loading, (3)
typical use cases during grid building, (4) typical use cases during simulation
(get and put), (5) typical use cases during analysis (also done in Part III)
and some performance measures of these cases. It argues that using a database
is simpler to implement than custom data schemas, has better performance
because it can use data parallelism, and better supports FEA modularity and
tool evolution because database schema evolution, data independence, and
self-defining data.
| [
{
"version": "v1",
"created": "Thu, 25 Jan 2007 23:05:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Heber",
"Gerd",
""
],
[
"Gray",
"Jim",
""
]
] |
cs/0701161 | Jim Gray | Jim Gray, Charles Levine | Thousands of DebitCredit Transactions-Per-Second: Easy and Inexpensive | null | null | null | MSR-TR-2005-39 | cs.DB cs.PF | null | A $2k computer can execute about 8k transactions per second. This is 80x more
than one of the largest US bank's 1970's traffic - it approximates the total US
1970's financial transaction volume. Very modest modern computers can easily
solve yesterday's problems.
| [
{
"version": "v1",
"created": "Thu, 25 Jan 2007 23:51:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gray",
"Jim",
""
],
[
"Levine",
"Charles",
""
]
] |
cs/0701162 | Jim Gray | Jim Gray | A Measure of Transaction Processing 20 Years Later | This article appeared in the IEEE Data Engineering, Fall 2005 | null | null | MSR-TR-2005-57 | cs.DB cs.PF | null | This provides a retrospective of the paper "A Measure of Transaction
Processing" published in 1985. It shows that transaction processing peak
performance and price-peformance have improved about 100,000x respectively and
that sort/sequential performance has approximately doubled each year (so a
million fold improvement) even though processor performance plateaued in 1995.
| [
{
"version": "v1",
"created": "Thu, 25 Jan 2007 23:57:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gray",
"Jim",
""
]
] |
cs/0701163 | Jim Gray | Jim Gray, Alex Szalay, Gyorgy Fekete | Using Table Valued Functions in SQL Server 2005 To Implement a Spatial
Data Library | null | null | null | MSR-TR-2005-122 | cs.DB cs.CE | null | This article explains how to add spatial search functions (point-near-point
and point in polygon) to Microsoft SQL Server 2005 using C# and table-valued
functions. It is possible to use this library to add spatial search to your
application without writing any special code. The library implements the
public-domain C# Hierarchical Triangular Mesh (HTM) algorithms from Johns
Hopkins University. That C# library is connected to SQL Server 2005 via a set
of scalar-valued and table-valued functions. These functions act as a spatial
index.
| [
{
"version": "v1",
"created": "Fri, 26 Jan 2007 00:00:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gray",
"Jim",
""
],
[
"Szalay",
"Alex",
""
],
[
"Fekete",
"Gyorgy",
""
]
] |
cs/0701164 | Jim Gray | Alexander S. Szalay, Jim Gray, George Fekete, Peter Z. Kunszt, Peter
Kukol, Ani Thakar | Indexing the Sphere with the Hierarchical Triangular Mesh | null | null | null | MSR-TR-2005-123 | cs.DB cs.DS | null | We describe a method to subdivide the surface of a sphere into spherical
triangles of similar, but not identical, shapes and sizes. The Hierarchical
Triangular Mesh (HTM) is a quad-tree that is particularly good at supporting
searches at different resolutions, from arc seconds to hemispheres. The
subdivision scheme is universal, providing the basis for addressing and for
fast lookups. The HTM provides the basis for an efficient geospatial indexing
scheme in relational databases where the data have an inherent location on
either the celestial sphere or the Earth. The HTM index is superior to
cartographical methods using coordinates with singularities at the poles. We
also describe a way to specify surface regions that efficiently represent
spherical query areas. This article presents the algorithms used to identify
the HTM triangles covering such regions.
| [
{
"version": "v1",
"created": "Fri, 26 Jan 2007 00:04:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Szalay",
"Alexander S.",
""
],
[
"Gray",
"Jim",
""
],
[
"Fekete",
"George",
""
],
[
"Kunszt",
"Peter Z.",
""
],
[
"Kukol",
"Peter",
""
],
[
"Thakar",
"Ani",
""
]
] |
cs/0701165 | Jim Gray | Gordon Bell, Jim Gray, Alex Szalay | Petascale Computational Systems | null | null | null | null | cs.DB cs.AR | null | Computational science is changing to be data intensive. Super-Computers must
be balanced systems; not just CPU farms but also petascale IO and networking
arrays. Anyone building CyberInfrastructure should allocate resources to
support a balanced Tier-1 through Tier-3 design.
| [
{
"version": "v1",
"created": "Fri, 26 Jan 2007 00:23:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bell",
"Gordon",
""
],
[
"Gray",
"Jim",
""
],
[
"Szalay",
"Alex",
""
]
] |
cs/0701166 | Jim Gray | Jim Gray, Catharine van Ingen | Empirical Measurements of Disk Failure Rates and Error Rates | null | null | null | MSR-TR-2005-166 | cs.DB cs.AR | null | The SATA advertised bit error rate of one error in 10 terabytes is
frightening. We moved 2 PB through low-cost hardware and saw five disk read
error events, several controller failures, and many system reboots caused by
security patches. We conclude that SATA uncorrectable read errors are not yet a
dominant system-fault source - they happen, but are rare compared to other
problems. We also conclude that UER (uncorrectable error rate) is not the
relevant metric for our needs. When an uncorrectable read error happens, there
are typically several damaged storage blocks (and many uncorrectable read
errors.) Also, some uncorrectable read errors may be masked by the operating
system. The more meaningful metric for data architects is Mean Time To Data
Loss (MTTDL.)
| [
{
"version": "v1",
"created": "Fri, 26 Jan 2007 00:29:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gray",
"Jim",
""
],
[
"van Ingen",
"Catharine",
""
]
] |
cs/0701167 | Jim Gray | Maria A. Nieto-Santisteban, Aniruddha R. Thakar, Alexander S. Szalay,
Jim Gray | Large-Scale Query and XMatch, Entering the Parallel Zone | Astronomical Data Analysis Software and Systems XV in San Lorenzo de
El Escorial, Madrid, Spain, October 2005, to appear in the ASP Conference
Series | null | null | MSR-TR-2005- 169 | cs.DB cs.CE | null | Current and future astronomical surveys are producing catalogs with millions
and billions of objects. On-line access to such big datasets for data mining
and cross-correlation is usually as highly desired as unfeasible. Providing
these capabilities is becoming critical for the Virtual Observatory framework.
In this paper we present various performance tests that show how using
Relational Database Management Systems (RDBMS) and a Zoning algorithm to
partition and parallelize the computation, we can facilitate large-scale query
and cross-match.
| [
{
"version": "v1",
"created": "Fri, 26 Jan 2007 00:33:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Nieto-Santisteban",
"Maria A.",
""
],
[
"Thakar",
"Aniruddha R.",
""
],
[
"Szalay",
"Alexander S.",
""
],
[
"Gray",
"Jim",
""
]
] |
cs/0701170 | Jim Gray | Katalin Szlavecz, Andreas Terzis, Stuart Ozer, Razvan Musaloiu-E,
Joshua Cogan, Sam Small, Randal Burns, Jim Gray, Alex Szalay | Life Under Your Feet: An End-to-End Soil Ecology Sensor Network,
Database, Web Server, and Analysis Service | null | null | null | MSR TR 2006 90 | cs.DB cs.CE | null | Wireless sensor networks can revolutionize soil ecology by providing
measurements at temporal and spatial granularities previously impossible. This
paper presents a soil monitoring system we developed and deployed at an urban
forest in Baltimore as a first step towards realizing this vision. Motes in
this network measure and save soil moisture and temperature in situ every
minute. Raw measurements are periodically retrieved by a sensor gateway and
stored in a central database where calibrated versions are derived and stored.
The measurement database is published through Web Services interfaces. In
addition, analysis tools let scientists analyze current and historical data and
help manage the sensor network. The article describes the system design, what
we learned from the deployment, and initial results obtained from the sensors.
The system measures soil factors with unprecedented temporal precision.
However, the deployment required device-level programming, sensor calibration
across space and time, and cross-referencing measurements with external
sources. The database, web server, and data analysis design required
considerable innovation and expertise. So, the ratio of computer-scientists to
ecologists was 3:1. Before sensor networks can fulfill their potential as
instruments that can be easily deployed by scientists, these technical problems
must be addressed so that the ratio is one nerd per ten ecologists.
| [
{
"version": "v1",
"created": "Fri, 26 Jan 2007 05:08:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Szlavecz",
"Katalin",
""
],
[
"Terzis",
"Andreas",
""
],
[
"Ozer",
"Stuart",
""
],
[
"Musaloiu-E",
"Razvan",
""
],
[
"Cogan",
"Joshua",
""
],
[
"Small",
"Sam",
""
],
[
"Burns",
"Randal",
""
],
[
"Gray",
"Jim",
""
],
[
"Szalay",
"Alex",
""
]
] |
cs/0701171 | Jim Gray | Jim Gray, Maria A. Nieto-Santisteban, Alexander S. Szalay | The Zones Algorithm for Finding Points-Near-a-Point or Cross-Matching
Spatial Datasets | null | null | null | MSR TR 2006 52 | cs.DB cs.DS | null | Zones index an N-dimensional Euclidian or metric space to efficiently support
points-near-a-point queries either within a dataset or between two datasets.
The approach uses relational algebra and the B-Tree mechanism found in almost
all relational database systems. Hence, the Zones Algorithm gives a
portable-relational implementation of points-near-point, spatial cross-match,
and self-match queries. This article corrects some mistakes in an earlier
article we wrote on the Zones Algorithm and describes some algorithmic
improvements. The Appendix includes an implementation of point-near-point,
self-match, and cross-match using the USGS city and stream gauge database.
| [
{
"version": "v1",
"created": "Fri, 26 Jan 2007 05:11:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gray",
"Jim",
""
],
[
"Nieto-Santisteban",
"Maria A.",
""
],
[
"Szalay",
"Alexander S.",
""
]
] |
cs/0701172 | Jim Gray | Jim Gray, Alex Szalay, Tamas Budavari, Robert Lupton, Maria
Nieto-Santisteban, Ani Thakar | Cross-Matching Multiple Spatial Observations and Dealing with Missing
Data | null | null | null | MSR TR 2006-175 | cs.DB cs.CE | null | Cross-match spatially clusters and organizes several astronomical
point-source measurements from one or more surveys. Ideally, each object would
be found in each survey. Unfortunately, the observation conditions and the
objects themselves change continually. Even some stationary objects are missing
in some observations; sometimes objects have a variable light flux and
sometimes the seeing is worse. In most cases we are faced with a substantial
number of differences in object detections between surveys and between
observations taken at different times within the same survey or instrument.
Dealing with such missing observations is a difficult problem. The first step
is to classify misses as ephemeral - when the object moved or simply
disappeared, masked - when noise hid or corrupted the object observation, or
edge - when the object was near the edge of the observational field. This
classification and a spatial library to represent and manipulate observational
footprints help construct a Match table recording both hits and misses.
Transitive closure clusters friends-of-friends into object bundles. The bundle
summary statistics are recorded in a Bundle table. This design is an evolution
of the Sloan Digital Sky Survey cross-match design that compared overlapping
observations taken at different times. Cross-Matching Multiple Spatial
Observations and Dealing with Missing Data.
| [
{
"version": "v1",
"created": "Fri, 26 Jan 2007 05:18:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gray",
"Jim",
""
],
[
"Szalay",
"Alex",
""
],
[
"Budavari",
"Tamas",
""
],
[
"Lupton",
"Robert",
""
],
[
"Nieto-Santisteban",
"Maria",
""
],
[
"Thakar",
"Ani",
""
]
] |
cs/0701173 | Jim Gray | Vik Singh, Jim Gray, Ani Thakar, Alexander S. Szalay, Jordan Raddick,
Bill Boroski, Svetlana Lebedeva, Brian Yanny | SkyServer Traffic Report - The First Five Years | null | null | null | MSR TR-2006-190 | cs.DB cs.CE | null | The SkyServer is an Internet portal to the Sloan Digital Sky Survey Catalog
Archive Server. From 2001 to 2006, there were a million visitors in 3 million
sessions generating 170 million Web hits, 16 million ad-hoc SQL queries, and 62
million page views. The site currently averages 35 thousand visitors and 400
thousand sessions per month. The Web and SQL logs are public. We analyzed
traffic and sessions by duration, usage pattern, data product, and client type
(mortal or bot) over time. The analysis shows (1) the site's popularity, (2)
the educational website that delivered nearly fifty thousand hours of
interactive instruction, (3) the relative use of interactive, programmatic, and
batch-local access, (4) the success of offering ad-hoc SQL, personal database,
and batch job access to scientists as part of the data publication, (5) the
continuing interest in "old" datasets, (6) the usage of SQL constructs, and (7)
a novel approach of using the corpus of correct SQL queries to suggest similar
but correct statements when a user presents an incorrect SQL statement.
| [
{
"version": "v1",
"created": "Fri, 26 Jan 2007 05:22:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Singh",
"Vik",
""
],
[
"Gray",
"Jim",
""
],
[
"Thakar",
"Ani",
""
],
[
"Szalay",
"Alexander S.",
""
],
[
"Raddick",
"Jordan",
""
],
[
"Boroski",
"Bill",
""
],
[
"Lebedeva",
"Svetlana",
""
],
[
"Yanny",
"Brian",
""
]
] |
cs/0701175 | Dimitris Kalles | Th. Hadzilacos, D. Kalles, M. Pouliopoulou | On the Software and Knowledge Engineering Aspects of the Educational
Process | Contains 21 sparse pages, 8 figures. Accepted for publication in
International Journal of Software Engineering and Knowledge Engineering
(IJSEKE). Keywords: Tools for interactive learning and teaching, Modelling,
Distance Learning | null | null | null | cs.SE cs.DL | null | The Hellenic Open University has embarked on a large-scale effort to enhance
its textbook-based material with content that demonstrably supports the basic
tenets of distance learning. The challenge is to set up a framework that allows
for the production-level creation, distribution and consumption of content, and
at the same time, evaluate the effort in terms of technological, educational
and organizational knowledge gained. This paper presents a model of the
educational process that is used as a development backbone and argues about its
conceptual and technical practicality at large.
| [
{
"version": "v1",
"created": "Fri, 26 Jan 2007 14:51:38 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hadzilacos",
"Th.",
""
],
[
"Kalles",
"D.",
""
],
[
"Pouliopoulou",
"M.",
""
]
] |
cs/0701176 | Alain Frisch | Alain Frisch (INRIA Rocquencourt), Haruo Hosoya (CST) | Towards Practical Typechecking for Macro Tree Transducers | null | null | null | null | cs.PL | null | Macro tree transducers (mtt) are an important model that both covers many
useful XML transformations and allows decidable exact typechecking. This paper
reports our first step toward an implementation of mtt typechecker that has a
practical efficiency. Our approach is to represent an input type obtained from
a backward inference as an alternating tree automaton, in a style similar to
Tozawa's XSLT0 typechecking. In this approach, typechecking reduces to checking
emptiness of an alternating tree automaton. We propose several optimizations
(Cartesian factorization, state partitioning) on the backward inference process
in order to produce much smaller alternating tree automata than the naive
algorithm, and we present our efficient algorithm for checking emptiness of
alternating tree automata, where we exploit the explicit representation of
alternation for local optimizations. Our preliminary experiments confirm that
our algorithm has a practical performance that can typecheck simple
transformations with respect to the full XHTML in a reasonable time.
| [
{
"version": "v1",
"created": "Fri, 26 Jan 2007 15:16:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Frisch",
"Alain",
"",
"INRIA Rocquencourt"
],
[
"Hosoya",
"Haruo",
"",
"CST"
]
] |
cs/0701180 | Fionn Murtagh | F. Murtagh, J. Mothe and K. Englmeier | Ontology from Local Hierarchical Structure in Text | 35 pp., 12 figures | null | null | null | cs.IR | null | We study the notion of hierarchy in the context of visualizing textual data
and navigating text collections. A formal framework for ``hierarchy'' is given
by an ultrametric topology. This provides us with a theoretical foundation for
concept hierarchy creation. A major objective is {\em scalable} annotation or
labeling of concept maps. Serendipitously we pursue other objectives such as
deriving common word pair (and triplet) phrases, i.e., word 2- and 3-grams. We
evaluate our approach using (i) a collection of texts, (ii) a single text
subdivided into successive parts (for which we provide an interactive
demonstrator), and (iii) a text subdivided at the sentence or line level. While
detailing a generic framework, a distinguishing feature of our work is that we
focus on {\em locality} of hierarchic structure in order to extract semantic
information.
| [
{
"version": "v1",
"created": "Sat, 27 Jan 2007 18:31:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Murtagh",
"F.",
""
],
[
"Mothe",
"J.",
""
],
[
"Englmeier",
"K.",
""
]
] |
cs/0701181 | Fionn Murtagh | Fionn Murtagh | A Note on Local Ultrametricity in Text | 18 pp | null | null | null | cs.CL | null | High dimensional, sparsely populated data spaces have been characterized in
terms of ultrametric topology. This implies that there are natural, not
necessarily unique, tree or hierarchy structures defined by the ultrametric
topology. In this note we study the extent of local ultrametric topology in
texts, with the aim of finding unique ``fingerprints'' for a text or corpus,
discriminating between texts from different domains, and opening up the
possibility of exploiting hierarchical structures in the data. We use coherent
and meaningful collections of over 1000 texts, comprising over 1.3 million
words.
| [
{
"version": "v1",
"created": "Sat, 27 Jan 2007 19:09:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Murtagh",
"Fionn",
""
]
] |
cs/0701183 | Gilles Villard | Gilles Villard (LIP) | Certification of the QR factor R, and of lattice basis reducedness | null | null | null | Vil06-1 | cs.SC cs.NA | null | Given a lattice basis of n vectors in Z^n, we propose an algorithm using
12n^3+O(n^2) floating point operations for checking whether the basis is
LLL-reduced. If the basis is reduced then the algorithm will hopefully answer
''yes''. If the basis is not reduced, or if the precision used is not
sufficient with respect to n, and to the numerical properties of the basis, the
algorithm will answer ''failed''. Hence a positive answer is a rigorous
certificate. For implementing the certificate itself, we propose a floating
point algorithm for computing (certified) error bounds for the entries of the R
factor of the QR matrix factorization. This algorithm takes into account all
possible approximation and rounding errors. The cost 12n^3+O(n^2) of the
certificate is only six times more than the cost of numerical algorithms for
computing the QR factorization itself, and the certificate may be implemented
using matrix library routines only. We report experiments that show that for a
reduced basis of adequate dimension and quality the certificate succeeds, and
establish the effectiveness of the certificate. This effectiveness is applied
for certifying the output of fastest existing floating point heuristics of LLL
reduction, without slowing down the whole process.
| [
{
"version": "v1",
"created": "Mon, 29 Jan 2007 09:15:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Villard",
"Gilles",
"",
"LIP"
]
] |
cs/0701188 | Gilles Villard | Wayne Eberly (UCALGARY), Mark Giesbrecht (UWO), Pascal Giorgi (LP2A),
Arne Storjohann (UWO), Gilles Villard (LIP) | Faster Inversion and Other Black Box Matrix Computations Using Efficient
Block Projections | null | null | null | EGGSV07-1 | cs.SC cs.NA | null | Block projections have been used, in [Eberly et al. 2006], to obtain an
efficient algorithm to find solutions for sparse systems of linear equations. A
bound of softO(n^(2.5)) machine operations is obtained assuming that the input
matrix can be multiplied by a vector with constant-sized entries in softO(n)
machine operations. Unfortunately, the correctness of this algorithm depends on
the existence of efficient block projections, and this has been conjectured. In
this paper we establish the correctness of the algorithm from [Eberly et al.
2006] by proving the existence of efficient block projections over sufficiently
large fields. We demonstrate the usefulness of these projections by deriving
improved bounds for the cost of several matrix problems, considering, in
particular, ``sparse'' matrices that can be be multiplied by a vector using
softO(n) field operations. We show how to compute the inverse of a sparse
matrix over a field F using an expected number of softO(n^(2.27)) operations in
F. A basis for the null space of a sparse matrix, and a certification of its
rank, are obtained at the same cost. An application to Kaltofen and Villard's
Baby-Steps/Giant-Steps algorithms for the determinant and Smith Form of an
integer matrix yields algorithms requiring softO(n^(2.66)) machine operations.
The derived algorithms are all probabilistic of the Las Vegas type.
| [
{
"version": "v1",
"created": "Mon, 29 Jan 2007 18:20:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Eberly",
"Wayne",
"",
"UCALGARY"
],
[
"Giesbrecht",
"Mark",
"",
"UWO"
],
[
"Giorgi",
"Pascal",
"",
"LP2A"
],
[
"Storjohann",
"Arne",
"",
"UWO"
],
[
"Villard",
"Gilles",
"",
"LIP"
]
] |
cs/0701190 | Aaron Harwood | Thomas Jacobs and Aaron Harwood | A Peer-to-Peer Browsable File Index using a Popularity Based Global
Namespace | null | null | null | null | cs.DC cs.NI | null | The distribution of files using decentralized, peer-to-peer (P2P) systems,
has significant advantages over centralized approaches. It is however more
difficult to settle on the best approach for file sharing. Most file sharing
systems are based on query string searches, leading to a relatively simple but
inefficient broadcast or to an efficient but relatively complicated index in a
structured environment. In this paper we use a browsable peer-to-peer file
index consisting of files which serve as directory nodes, interconnecting to
form a directory network. We implemented the system based on BitTorrent and
Kademlia. The directory network inherits all of the advantages of
decentralization and provides browsable, efficient searching. To avoid conflict
between users in the P2P system while also imposing no additional restrictions,
we allow multiple versions of each directory node to simultaneously exist --
using popularity as the basis for default browsing behavior. Users can freely
add files and directory nodes to the network. We show, using a simulation of
user behavior and file quality, that the popularity based system consistently
leads users to a high quality directory network; above the average quality of
user updates. Q
| [
{
"version": "v1",
"created": "Tue, 30 Jan 2007 04:00:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Jacobs",
"Thomas",
""
],
[
"Harwood",
"Aaron",
""
]
] |
cs/0701191 | David Monniaux | David Monniaux (LIENS) | The parallel implementation of the Astr\'{e}e static analyzer | null | APLAS: Programming languages and systems (2005) 86-96 | 10.1007/11575467_7 | null | cs.PL cs.PF | null | The Astr\'{e}e static analyzer is a specialized tool that can prove the
absence of runtime errors, including arithmetic overflows, in large critical
programs. Keeping analysis times reasonable for industrial use is one of the
design objectives. In this paper, we discuss the parallel implementation of the
analysis.
| [
{
"version": "v1",
"created": "Tue, 30 Jan 2007 15:20:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Monniaux",
"David",
"",
"LIENS"
]
] |
cs/0701195 | David Monniaux | David Monniaux (LIENS) | An Abstract Monte-Carlo Method for the Analysis of Probabilistic
Programs | null | POPL: Annual Symposium on Principles of Programming Languages
(2001) 93 - 101 | 10.1145/360204.360211 | null | cs.PL cs.PF | null | We introduce a new method, combination of random testing and abstract
interpretation, for the analysis of programs featuring both probabilistic and
non-probabilistic nondeterminism. After introducing "ordinary" testing, we show
how to combine testing and abstract interpretation and give formulas linking
the precision of the results to the number of iterations. We then discuss
complexity and optimization issues and end with some experimental results.
| [
{
"version": "v1",
"created": "Tue, 30 Jan 2007 17:14:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Monniaux",
"David",
"",
"LIENS"
]
] |
cs/0701198 | Raissa M. D'Souza | R. M. D'Souza, C. Borgs, J. T. Chayes, N. Berger and R. D. Kleinberg | Fitting the WHOIS Internet data | Supplemental information for "Emergence of Tempered Preferential
Attachment From Optimization", to appear (open access) PNAS USA, 2007 | null | null | null | cs.NI | null | We consider the RIPE WHOIS Internet data as characterized by the Cooperative
Association for Internet Data Analysis (CAIDA), and show that the Tempered
Preferential Attachment model [1] provides an excellent fit to this data.
[1] D'Souza, Borgs, Chayes, Berger and Kleinberg, to appear PNAS USA, 2007.
| [
{
"version": "v1",
"created": "Wed, 31 Jan 2007 02:51:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"D'Souza",
"R. M.",
""
],
[
"Borgs",
"C.",
""
],
[
"Chayes",
"J. T.",
""
],
[
"Berger",
"N.",
""
],
[
"Kleinberg",
"R. D.",
""
]
] |
cs/0701200 | Francoise Detienne | Fran\c{c}oise Detienne (INRIA) | Reasoning from a schema and from an analog in software code reuse | null | Dans Fourth Workshop on Empirical Studies of Programmers, ESP91
(1991) 5-22 | null | null | cs.SE | null | The activity of design involves the decomposition of problems into
subproblems and the development and evaluation of solutions. In many cases,
solution development is not done from scratch. Designers often evoke and adapt
solutions developed in the past. These solutions may come from an internal
source, i.e. the memory of the designers, and/or from an external source. The
goal of this paper is to analyse the characteristics of the cognitive
mechanisms, the knowledge and the representations involved in the code reuse
activity performed by experienced programmers. More generally, the focus is the
control structure of the reuse activity. Data collected in an experiment in
which programmers had to design programs are analyzed. Two code reuse
situations are distinguished depending on whether or not the processes involved
in reuse start before the elaboration of what acts as a source-solution. Our
analysis highlights the use of reasoning from a schema and from an analog in
the code reuse activity.
| [
{
"version": "v1",
"created": "Wed, 31 Jan 2007 16:41:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Detienne",
"Françoise",
"",
"INRIA"
]
] |
cs/0702010 | Jacques Carette | Jacques Carette | A canonical form for some piecewise defined functions | submitted to ISSAC 2007 | null | null | null | cs.SC cs.MS | null | We define a canonical form for piecewise defined functions. We show that this
has a wider range of application as well as better complexity properties than
previous work.
| [
{
"version": "v1",
"created": "Thu, 1 Feb 2007 17:54:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Carette",
"Jacques",
""
]
] |
cs/0702011 | Riccardo Pucella | Joseph Y. Halpern, Riccardo Pucella | Dealing With Logical Omniscience: Expressiveness and Pragmatics | 24 pages. Submitted for publication | null | null | null | cs.LO cs.AI | null | We examine four approaches for dealing with the logical omniscience problem
and their potential applicability: the syntactic approach, awareness,
algorithmic knowledge, and impossible possible worlds. Although in some
settings these approaches are equi-expressive and can capture all epistemic
states, in other settings of interest (especially with probability in the
picture), we show that they are not equi-expressive. We then consider the
pragmatics of dealing with logical omniscience-- how to choose an approach and
construct an appropriate model.
| [
{
"version": "v1",
"created": "Thu, 1 Feb 2007 20:06:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Halpern",
"Joseph Y.",
""
],
[
"Pucella",
"Riccardo",
""
]
] |
cs/0702012 | Daria Sorokina | Daria Sorokina, Johannes Gehrke, Simeon Warner, Paul Ginsparg | Plagiarism Detection in arXiv | Sixth International Conference on Data Mining (ICDM'06), Dec 2006 | null | 10.1109/ICDM.2006.126 | null | cs.DB cs.DL cs.IR | null | We describe a large-scale application of methods for finding plagiarism in
research document collections. The methods are applied to a collection of
284,834 documents collected by arXiv.org over a 14 year period, covering a few
different research disciplines. The methodology efficiently detects a variety
of problematic author behaviors, and heuristics are developed to reduce the
number of false positives. The methods are also efficient enough to implement
as a real-time submission screen for a collection many times larger.
| [
{
"version": "v1",
"created": "Thu, 1 Feb 2007 20:52:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sorokina",
"Daria",
""
],
[
"Gehrke",
"Johannes",
""
],
[
"Warner",
"Simeon",
""
],
[
"Ginsparg",
"Paul",
""
]
] |
cs/0702019 | Maxime Gariel | Maxime Gariel, John-Paul Clarke and Eric Feron | A Dynamic I/O Model for TRACON Traffic Management | 16 pages, 19 figures eps | null | null | null | cs.OH | null | This work investigates the TRACON flow management around a major airport.
Aircraft flows are analyzed through a study of TRACON trajectories records.
Rerouting and queuing processes are highlighted and airport characteristics are
shown as function of the number of planes in the TRACON. Then, a simple
input-output TRACON queuing and landing model is proposed. This model is
calibrated and validated using available TRACON data. It reproduces the same
phenomenon as the real system. This model is used to show the impact of
limiting the number of aircrafts in the TRACON. A limited number of aircraft
does not increase delays but reduces the controller's workload and increases
safety.
| [
{
"version": "v1",
"created": "Fri, 2 Feb 2007 22:55:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gariel",
"Maxime",
""
],
[
"Clarke",
"John-Paul",
""
],
[
"Feron",
"Eric",
""
]
] |
cs/0702022 | Changjia Chen | Chunxi Li and Changjia Chen | Gnutella: Topology Dynamics On Phase Space | 11 pages, 14 figures | null | null | null | cs.NI | null | In this paper, the topology dynamic of Gnutella is studied through phase
space. The dynamic changes in peer degree are studied as a time series in two
dimensional phase space which is defined as the number of connected leaves and
the number of connected ultras. The reported degrees are concentrated in three
special Software related regions that we named as Ultra Stable Region, Leaf
Stable Region and Transition Belt. A method is proposed to classify degree
traces in phase space into different classes. Connection churn then is studied
along with the churn in degree. It shows that the topological structure of
Gnutella is rather stable in its connection degree but not the topology itself.
The connection drop rate is estimated and the live time of connections is
inferred afterwards. M/M/m/m loss queue system is introduced to model the
degree keeping process in Gnutella. This model revealed that the degree stable
is ensured by large new connection efforts. In other words the stable in
topological structure of Gnutella is a results of essential unstable in its
topology. That opens a challenge to the basic design philosophy of this
network.
| [
{
"version": "v1",
"created": "Sun, 4 Feb 2007 08:12:38 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Li",
"Chunxi",
""
],
[
"Chen",
"Changjia",
""
]
] |
cs/0702027 | Andrew Gacek | Andrew Gacek | The Suspension Calculus and its Relationship to Other Explicit
Treatments of Substitution in Lambda Calculi | 84 pages | null | null | null | cs.LO cs.PL | null | The intrinsic treatment of binding in the lambda calculus makes it an ideal
data structure for representing syntactic objects with binding such as
formulas, proofs, types, and programs. Supporting such a data structure in an
implementation is made difficult by the complexity of the substitution
operation relative to lambda terms. In this paper we present the suspension
calculus, an explicit treatment of meta level binding in the lambda calculus.
We prove properties of this calculus which make it a suitable replacement for
the lambda calculus in implementation. Finally, we compare the suspension
calculus with other explicit treatments of substitution.
| [
{
"version": "v1",
"created": "Mon, 5 Feb 2007 14:35:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gacek",
"Andrew",
""
]
] |
cs/0702029 | Mikkel Thorup | Mario Szegedy and Mikkel Thorup | On the variance of subset sum estimation | 20 pages, 1 figure | null | null | null | cs.DS | null | For high volume data streams and large data warehouses, sampling is used for
efficient approximate answers to aggregate queries over selected subsets.
Mathematically, we are dealing with a set of weighted items and want to support
queries to arbitrary subset sums. With unit weights, we can compute subset
sizes which together with the previous sums provide the subset averages. The
question addressed here is which sampling scheme we should use to get the most
accurate subset sum estimates.
We present a simple theorem on the variance of subset sum estimation and use
it to prove variance optimality and near-optimality of subset sum estimation
with different known sampling schemes. This variance is measured as the average
over all subsets of any given size. By optimal we mean there is no set of input
weights for which any sampling scheme can have a better average variance. Such
powerful results can never be established experimentally. The results of this
paper are derived mathematically. For example, we show that appropriately
weighted systematic sampling is simultaneously optimal for all subset sizes.
More standard schemes such as uniform sampling and
probability-proportional-to-size sampling with replacement can be arbitrarily
bad.
Knowing the variance optimality of different sampling schemes can help
deciding which sampling scheme to apply in a given context.
| [
{
"version": "v1",
"created": "Mon, 5 Feb 2007 15:55:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Szegedy",
"Mario",
""
],
[
"Thorup",
"Mikkel",
""
]
] |
cs/0702032 | Reid Andersen | Reid Andersen | Finding large and small dense subgraphs | 12 pages, no figures | null | null | null | cs.DS | null | We consider two optimization problems related to finding dense subgraphs. The
densest at-least-k-subgraph problem (DalkS) is to find an induced subgraph of
highest average degree among all subgraphs with at least k vertices, and the
densest at-most-k-subgraph problem (DamkS) is defined similarly. These problems
are related to the well-known densest k-subgraph problem (DkS), which is to
find the densest subgraph on exactly k vertices. We show that DalkS can be
approximated efficiently, while DamkS is nearly as hard to approximate as the
densest k-subgraph problem.
| [
{
"version": "v1",
"created": "Mon, 5 Feb 2007 19:29:38 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Andersen",
"Reid",
""
]
] |
cs/0702034 | Rama Raghavan | L.Jeganathan and R.Rama | Graph Splicing System | 13 pages,5 figures | null | null | null | cs.DM | null | The string splicing was introduced by Tom Head which stands as an abstract
model for the DNA recombination under the influence of restriction enzymes. The
complex chemical process of three dimensional molecules in three dimensional
space can be modeled using graphs. The graph splicing systems which were
studied so far, can only be applied to a particular type of graphs which could
be interpreted as linear or circular graphs. In this paper, we take a different
and a novel approach to splice two graphs and introduce a splicing system for
graphs that can be applied to all types of graphs. Splicing two graphs can be
thought of as a new operation, among the graphs, that generates many new graphs
from the given two graphs. Taking a different line of thinking, some of the
graph theoretical results of the splicing are studied.
| [
{
"version": "v1",
"created": "Tue, 6 Feb 2007 05:46:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Jeganathan",
"L.",
""
],
[
"Rama",
"R.",
""
]
] |
cs/0702036 | Michael Fisher | Clare Dixon, Michael Fisher, Boris Konev, Alexei Lisitsa | Efficient First-Order Temporal Logic for Infinite-State Systems | 16 pages, 2 figures | null | null | null | cs.LO | null | In this paper we consider the specification and verification of
infinite-state systems using temporal logic. In particular, we describe
parameterised systems using a new variety of first-order temporal logic that is
both powerful enough for this form of specification and tractable enough for
practical deductive verification. Importantly, the power of the temporal
language allows us to describe (and verify) asynchronous systems, communication
delays and more complex properties such as liveness and fairness properties.
These aspects appear difficult for many other approaches to infinite-state
verification.
| [
{
"version": "v1",
"created": "Tue, 6 Feb 2007 15:10:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dixon",
"Clare",
""
],
[
"Fisher",
"Michael",
""
],
[
"Konev",
"Boris",
""
],
[
"Lisitsa",
"Alexei",
""
]
] |
cs/0702038 | Minkyu Kim | Minkyu Kim, Varun Aggarwal, Una-May O'Reilly, Muriel Medard, Wonsik
Kim | Genetic Representations for Evolutionary Minimization of Network Coding
Resources | 10 pages, 3 figures, accepted to the 4th European Workshop on the
Application of Nature-Inspired Techniques to Telecommunication Networks and
Other Connected Systems (EvoCOMNET 2007) | null | null | null | cs.NE cs.NI | null | We demonstrate how a genetic algorithm solves the problem of minimizing the
resources used for network coding, subject to a throughput constraint, in a
multicast scenario. A genetic algorithm avoids the computational complexity
that makes the problem NP-hard and, for our experiments, greatly improves on
sub-optimal solutions of established methods. We compare two different genotype
encodings, which tradeoff search space size with fitness landscape, as well as
the associated genetic operators. Our finding favors a smaller encoding despite
its fewer intermediate solutions and demonstrates the impact of the modularity
enforced by genetic operators on the performance of the algorithm.
| [
{
"version": "v1",
"created": "Wed, 7 Feb 2007 05:54:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kim",
"Minkyu",
""
],
[
"Aggarwal",
"Varun",
""
],
[
"O'Reilly",
"Una-May",
""
],
[
"Medard",
"Muriel",
""
],
[
"Kim",
"Wonsik",
""
]
] |
cs/0702039 | Xavier Goaoc | Otfried Cheong, Xavier Goaoc (INRIA Lorraine - LORIA), Andreas
Holmsen, Sylvain Petitjean (INRIA Lorraine - LORIA) | Hadwiger and Helly-type theorems for disjoint unit spheres | null | Discrete and Computational Geometry (2006) | null | null | cs.CG | null | We prove Helly-type theorems for line transversals to disjoint unit balls in
$\R^{d}$. In particular, we show that a family of $n \geq 2d$ disjoint unit
balls in $\R^d$ has a line transversal if, for some ordering $\prec$ of the
balls, any subfamily of 2d balls admits a line transversal consistent with
$\prec$. We also prove that a family of $n \geq 4d-1$ disjoint unit balls in
$\R^d$ admits a line transversal if any subfamily of size $4d-1$ admits a
transversal.
| [
{
"version": "v1",
"created": "Wed, 7 Feb 2007 08:29:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cheong",
"Otfried",
"",
"INRIA Lorraine - LORIA"
],
[
"Goaoc",
"Xavier",
"",
"INRIA Lorraine - LORIA"
],
[
"Holmsen",
"Andreas",
"",
"INRIA Lorraine - LORIA"
],
[
"Petitjean",
"Sylvain",
"",
"INRIA Lorraine - LORIA"
]
] |
cs/0702040 | Yves Guiraud | Yves Guiraud | Polygraphs for termination of left-linear term rewriting systems | 15 pages | null | null | null | cs.LO math.CT | null | We present a methodology for proving termination of left-linear term
rewriting systems (TRSs) by using Albert Burroni's polygraphs, a kind of
rewriting systems on algebraic circuits. We translate the considered TRS into a
polygraph of minimal size whose termination is proven with a polygraphic
interpretation, then we get back the property on the TRS. We recall Yves
Lafont's general translation of TRSs into polygraphs and known links between
their termination properties. We give several conditions on the original TRS,
including being a first-order functional program, that ensure that we can
reduce the size of the polygraphic translation. We also prove sufficient
conditions on the polygraphic interpretations of a minimal translation to imply
termination of the original TRS. Examples are given to compare this method with
usual polynomial interpretations.
| [
{
"version": "v1",
"created": "Wed, 7 Feb 2007 10:18:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Guiraud",
"Yves",
""
]
] |
cs/0702042 | Jo\~ao Barros | Luis Lopes, Francisco Martins, Miguel S. Silva, Joao Barros | A Formal Model for Programming Wireless Sensor Networks | 14 pages, 0 figures, Submitted for Publication | null | null | null | cs.DC cs.PL | null | In this paper we present new developments in the expressiveness and in the
theory of a Calculus for Sensor Networks (CSN). We combine a network layer of
sensor devices with a local object model to describe sensor devices with state.
The resulting calculus is quite small and yet very expressive. We also present
a type system and a type invariance result for the calculus. These results
provide the fundamental framework for the development of programming languages
and run-time environments.
| [
{
"version": "v1",
"created": "Wed, 7 Feb 2007 14:17:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lopes",
"Luis",
""
],
[
"Martins",
"Francisco",
""
],
[
"Silva",
"Miguel S.",
""
],
[
"Barros",
"Joao",
""
]
] |
cs/0702047 | Holger Spakowski | Holger Spakowski and Rahul Tripathi | Hierarchical Unambiguity | null | null | null | null | cs.CC | null | We develop techniques to investigate relativized hierarchical unambiguous
computation. We apply our techniques to generalize known constructs involving
relativized unambiguity based complexity classes (UP and \mathcal{UP}) to new
constructs involving arbitrary higher levels of the relativized unambiguous
polynomial hierarchy (UPH). Our techniques are developed on constraints imposed
by hierarchical arrangement of unambiguous nondeterministic polynomial-time
Turing machines, and so they differ substantially, in applicability and in
nature, from standard methods (such as the switching lemma [Hastad,
Computational Limitations of Small-Depth Circuits, MIT Press, 1987]), which
play roles in carrying out similar generalizations.
Aside from achieving these generalizations, we resolve a question posed by
Cai, Hemachandra, and Vyskoc [J. Cai, L. Hemachandra, and J. Vyskoc, Promises
and fault-tolerant database access, In K. Ambos-Spies, S. Homer, and U.
Schoening, editors, Complexity Theory, pages 101-146. Cambridge University
Press, 1993] on an issue related to nonadaptive Turing access to UP and
adaptive smart Turing access to \mathcal{UP}.
| [
{
"version": "v1",
"created": "Thu, 8 Feb 2007 16:00:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Spakowski",
"Holger",
""
],
[
"Tripathi",
"Rahul",
""
]
] |
cs/0702048 | Ken Wakita | Ken Wakita and Toshiyuki Tsurumi | Finding Community Structure in Mega-scale Social Networks | 9 pages, 15 figures | null | null | null | cs.CY physics.soc-ph | null | Community analysis algorithm proposed by Clauset, Newman, and Moore (CNM
algorithm) finds community structure in social networks. Unfortunately, CNM
algorithm does not scale well and its use is practically limited to networks
whose sizes are up to 500,000 nodes. The paper identifies that this
inefficiency is caused from merging communities in unbalanced manner. The paper
introduces three kinds of metrics (consolidation ratio) to control the process
of community analysis trying to balance the sizes of the communities being
merged. Three flavors of CNM algorithms are built incorporating those metrics.
The proposed techniques are tested using data sets obtained from existing
social networking service that hosts 5.5 million users. All the methods exhibit
dramatic improvement of execution efficiency in comparison with the original
CNM algorithm and shows high scalability. The fastest method processes a
network with 1 million nodes in 5 minutes and a network with 4 million nodes in
35 minutes, respectively. Another one processes a network with 500,000 nodes in
50 minutes (7 times faster than the original algorithm), finds community
structures that has improved modularity, and scales to a network with 5.5
million.
| [
{
"version": "v1",
"created": "Thu, 8 Feb 2007 16:40:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wakita",
"Ken",
""
],
[
"Tsurumi",
"Toshiyuki",
""
]
] |
cs/0702049 | Gregory Gutin | Noga Alon, Fedor Fomin, Gregory Gutin, Michael Krivelevich and Saket
Saurabh | Parameterized Algorithms for Directed Maximum Leaf Problems | null | null | null | null | cs.DS cs.DM | null | We prove that finding a rooted subtree with at least $k$ leaves in a digraph
is a fixed parameter tractable problem. A similar result holds for finding
rooted spanning trees with many leaves in digraphs from a wide family $\cal L$
that includes all strong and acyclic digraphs. This settles completely an open
question of Fellows and solves another one for digraphs in $\cal L$. Our
algorithms are based on the following combinatorial result which can be viewed
as a generalization of many results for a `spanning tree with many leaves' in
the undirected case, and which is interesting on its own: If a digraph $D\in
\cal L$ of order $n$ with minimum in-degree at least 3 contains a rooted
spanning tree, then $D$ contains one with at least $(n/2)^{1/5}-1$ leaves.
| [
{
"version": "v1",
"created": "Thu, 8 Feb 2007 18:25:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Alon",
"Noga",
""
],
[
"Fomin",
"Fedor",
""
],
[
"Gutin",
"Gregory",
""
],
[
"Krivelevich",
"Michael",
""
],
[
"Saurabh",
"Saket",
""
]
] |
cs/0702053 | Andrew Badr | Andrew Badr, Ian Shipman | The DFAs of Finitely Different Languages | null | null | null | null | cs.CC | null | Two languages are "finitely different" if their symmetric difference is
finite. We consider the DFAs of finitely different regular languages and find
major structural similarities. We proceed to consider the smallest DFAs that
recognize a language finitely different from some given DFA. Such "f-minimal"
DFAs are not unique, and this non-uniqueness is characterized. Finally, we
offer a solution to the minimization problem of finding such f-minimal DFAs.
| [
{
"version": "v1",
"created": "Fri, 9 Feb 2007 03:42:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Badr",
"Andrew",
""
],
[
"Shipman",
"Ian",
""
]
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.