id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
3
62.8k
title
stringlengths
1
382
comments
stringlengths
1
1.15k
journal-ref
stringlengths
1
557
doi
stringlengths
7
153
report-no
stringlengths
1
509
categories
stringlengths
5
125
license
stringclasses
9 values
abstract
stringlengths
6
6.09k
versions
listlengths
1
187
update_date
timestamp[s]date
2007-05-23 00:00:00
2025-04-25 00:00:00
authors_parsed
sequencelengths
1
2.83k
cs/0701010
Ahmed Sidky Ahmed Sidky
Ahmed Sidky, James Arthur
Determining the Applicability of Agile Practices to Mission and Life-critical Systems
null
null
null
null
cs.SE
null
Adopting agile practices brings about many benefits and improvements to the system being developed. However, in mission and life-critical systems, adopting an inappropriate agile practice has detrimental impacts on the system in various phases of its lifecycle as well as precludes desired qualities from being actualized. This paper presents a three-stage process that provides guidance to organizations on how to identify the agile practices they can benefit from without causing any impact to the mission and life critical system being developed.
[ { "version": "v1", "created": "Mon, 1 Jan 2007 05:08:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Sidky", "Ahmed", "" ], [ "Arthur", "James", "" ] ]
cs/0701013
Zengyou He
Zengyou He, Xaiofei Xu, Shengchun Deng
Attribute Value Weighting in K-Modes Clustering
15 pages
null
null
Tr-06-0615
cs.AI
null
In this paper, the traditional k-modes clustering algorithm is extended by weighting attribute value matches in dissimilarity computation. The use of attribute value weighting technique makes it possible to generate clusters with stronger intra-similarities, and therefore achieve better clustering performance. Experimental results on real life datasets show that these value weighting based k-modes algorithms are superior to the standard k-modes algorithm with respect to clustering accuracy.
[ { "version": "v1", "created": "Wed, 3 Jan 2007 09:06:03 GMT" } ]
2007-05-23T00:00:00
[ [ "He", "Zengyou", "" ], [ "Xu", "Xaiofei", "" ], [ "Deng", "Shengchun", "" ] ]
cs/0701014
Moustapha Diaby
Moustapha Diaby
A Reply to Hofman On: "Why LP cannot solve large instances of NP-complete problems in polynomial time"
2 page; 1 table; clarification of some unclear statements
null
null
null
cs.CC
null
Using an approach that seems to be patterned after that of Yannakakis, Hofman argues that an NP-complete problem cannot be formulated as a polynomial bounded-sized linear programming problem. He then goes on to propose a "construct" that he claims to be a counter-example to recently published linear programming formulations of the Traveling Salesman Problem (TSP) and the Quadratic Assignment Problems (QAP), respectively. In this paper, we show that Hofman's construct is flawed, and provide further proof that his "counter-example" is invalid.
[ { "version": "v1", "created": "Wed, 3 Jan 2007 11:26:26 GMT" }, { "version": "v2", "created": "Fri, 5 Jan 2007 00:39:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Diaby", "Moustapha", "" ] ]
cs/0701020
Sumit Ganguly
Sumit Ganguly
A nearly optimal and deterministic summary structure for update data streams
Withdrawn
null
null
null
cs.DS
null
The paper has been withdrawn due to an error in Lemma 1.
[ { "version": "v1", "created": "Thu, 4 Jan 2007 09:03:08 GMT" }, { "version": "v2", "created": "Fri, 5 Jan 2007 15:11:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Ganguly", "Sumit", "" ] ]
cs/0701022
Mateusz Zakrzewski
Mateusz Zakrzewski
Definable functions in the simply typed lambda-calculus
Submitted to TLCA 2007
null
null
null
cs.LO
null
It is a common knowledge that the integer functions definable in simply typed lambda-calculus are exactly the extended polynomials. This is indeed the case when one interprets integers over the type (p->p)->p->p where p is a base type and/or equality is taken as beta-conversion. It is commonly believed that the same holds for beta-eta equality and for integers represented over any fixed type of the form (t->t)->t->t. In this paper we show that this opinion is not quite true. We prove that the class of functions strictly definable in simply typed lambda-calculus is considerably larger than the extended polynomials. Namely, we define F as the class of strictly definable functions and G as a class that contains extended polynomials and two additional functions, or more precisely, two function schemas, and is closed under composition. We prove that G is a subset of F. We conjecture that G exactly characterizes strictly definable functions, i.e. G=F, and we gather some evidence for this conjecture proving, for example, that every skewly representable finite range function is strictly representable over (t->t)->t->t for some t.
[ { "version": "v1", "created": "Thu, 4 Jan 2007 17:50:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Zakrzewski", "Mateusz", "" ] ]
cs/0701029
Dariusz Ku\'smierek
Dariusz Kusmierek
The Inhabitation Problem for Rank Two Intersection Types
15 pages
null
null
null
cs.LO
null
We prove that the inhabitation problem for rank two intersection types is decidable, but (contrary to common belief) EXPTIME-hard. The exponential time hardness is shown by reduction from the in-place acceptance problem for alternating Turing machines.
[ { "version": "v1", "created": "Fri, 5 Jan 2007 08:38:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Kusmierek", "Dariusz", "" ] ]
cs/0701033
Blake Hegerle
Blake Hegerle
A Counterexample to a Proposed Proof of P=NP by S. Gubin
2 pages
null
null
null
cs.CC
null
In a recent paper by S. Gubin [cs/0701023v1], a polynomial-time solution to the 3SAT problem was presented as proof that P=NP. The proposed algorithm cannot be made to work, which I shall demonstrate.
[ { "version": "v1", "created": "Fri, 5 Jan 2007 19:16:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Hegerle", "Blake", "" ] ]
cs/0701035
Edwin Henneken
Edwin A. Henneken, Michael J. Kurtz, Guenther Eichhorn, Alberto Accomazzi, Carolyn S. Grant, Donna Thompson, Elizabeth Bohlen, Stephen S. Murray
Finding Astronomical Communities Through Co-readership Analysis
poster presented at the 209th AAS Meeting, 7 pages, 4 figures
null
null
null
cs.DL astro-ph
null
Whenever a large group of people are engaged in an activity, communities will form. The nature of these communities depends on the relationship considered. In the group of people who regularly use scholarly literature, a relationship like ``person i and person j have cited the same paper'' might reveal communities of people working in a particular field. On this poster, we will investigate the relationship ``person i and person j have read the same paper''. Using the data logs of the NASA/Smithsonian Astrophysics Data System (ADS), we first determine the population that will participate by requiring that a user queries the ADS at a certain rate. Next, we apply the relationship to this population. The result of this will be an abstract ``relationship space'', which we will describe in terms of various ``representations''. Examples of such ``representations'' are the projection of co-read vectors onto Principal Components and the spectral density of the co-read network. We will show that the co-read relationship results in structure, we will describe this structure and we will provide a first attempt in the classification of this structure in terms of astronomical communities. The ADS is funded by NASA Grant NNG06GG68G.
[ { "version": "v1", "created": "Sat, 6 Jan 2007 00:02:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Henneken", "Edwin A.", "" ], [ "Kurtz", "Michael J.", "" ], [ "Eichhorn", "Guenther", "" ], [ "Accomazzi", "Alberto", "" ], [ "Grant", "Carolyn S.", "" ], [ "Thompson", "Donna", "" ], [ "Bohlen", "Elizabeth", "" ], [ "Murray", "Stephen S.", "" ] ]
cs/0701040
Fumin Zhang
F. Zhang
Curve Tracking Control for Legged Locomotion in Horizontal Plane
10 pages, 11 figures, Submitted to IEEE Transactions on Automatic Control
null
null
null
cs.RO
null
We derive a hybrid feedback control law for the lateral leg spring (LLS) model so that the center of mass of a legged runner follows a curved path in horizontal plane. The control law enables the runner to change the placement and the elasticity of its legs to move in a desired direction. Stable motion along a curved path is achieved using curvature, bearing and relative distance between the runner and the curve as feedback. Constraints on leg parameters determine the class of curves that can be followed. We also derive an optimal control law that stabilizes the orientation of the runner's body relative to the velocity of the runner's center of mass.
[ { "version": "v1", "created": "Sat, 6 Jan 2007 20:55:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Zhang", "F.", "" ] ]
cs/0701044
Tej Singh
Sunder Lal and Tej Singh
New ID Based Multi-Proxy Multi-Signcryption Scheme from Pairings
9 pages
null
null
null
cs.CR
null
This paper presents an identity based multi-proxy multi-signcryption scheme from pairings. In this scheme a proxy signcrypter group could authorized as a proxy agent by the coopration of all members in the original signcryption group. Then the proxy signcryption can be generated by the cooperation of all the signcrypters in the authorized proxy signcrypter group on the behalf of the original signcrypter group. As compared to the scheme of Liu and Xiao, the proposed scheme provides public verifiability of the signature along with simplified key management.
[ { "version": "v1", "created": "Mon, 8 Jan 2007 18:02:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Lal", "Sunder", "" ], [ "Singh", "Tej", "" ] ]
cs/0701045
Iosif Pinelis
Iosif Pinelis
Polygon Convexity: Another O(n) Test
14 pages; changes: (i) a test for non-strict convexity is added; (ii) the proofs are gathered in a separate section; (iii) a more detailed abstract is given
null
null
null
cs.CG cs.DS
null
An n-gon is defined as a sequence \P=(V_0,...,V_{n-1}) of n points on the plane. An n-gon \P is said to be convex if the boundary of the convex hull of the set {V_0,...,V_{n-1}} of the vertices of \P coincides with the union of the edges [V_0,V_1],...,[V_{n-1},V_0]; if at that no three vertices of \P are collinear then \P is called strictly convex. We prove that an n-gon \P with n\ge3 is strictly convex if and only if a cyclic shift of the sequence (\al_0,...,\al_{n-1})\in[0,2\pi)^n of the angles between the x-axis and the vectors V_1-V_0,...,V_0-V_{n-1} is strictly monotone. A ``non-strict'' version of this result is also proved.
[ { "version": "v1", "created": "Mon, 8 Jan 2007 18:51:37 GMT" }, { "version": "v2", "created": "Tue, 16 Jan 2007 22:57:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Pinelis", "Iosif", "" ] ]
cs/0701046
Andrea Forte
Andrea G. Forte, Henning Schulzrinne
Cooperation Between Stations in Wireless Networks
16 pages, 49 references, 12 figures, 3 tables
null
null
cucs-044-06
cs.NI
null
In a wireless network, mobile nodes (MNs) repeatedly perform tasks such as layer 2 (L2) handoff, layer 3 (L3) handoff and authentication. These tasks are critical, particularly for real-time applications such as VoIP. We propose a novel approach, namely Cooperative Roaming (CR), in which MNs can collaborate with each other and share useful information about the network in which they move. We show how we can achieve seamless L2 and L3 handoffs regardless of the authentication mechanism used and without any changes to either the infrastructure or the protocol. In particular, we provide a working implementation of CR and show how, with CR, MNs can achieve a total L2+L3 handoff time of less than 16 ms in an open network and of about 21 ms in an IEEE 802.11i network. We consider behaviors typical of IEEE 802.11 networks, although many of the concepts and problems addressed here apply to any kind of mobile network.
[ { "version": "v1", "created": "Mon, 8 Jan 2007 20:01:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Forte", "Andrea G.", "" ], [ "Schulzrinne", "Henning", "" ] ]
cs/0701049
Barnaby Martin
Barnaby Martin
On the Complexity of a Derivative Chess Problem
null
null
null
null
cs.CC
null
We introduce QUEENS, a derivative chess problem based on the classical n-queens problem. We prove that QUEENS is NP-complete, with respect to polynomial-time reductions.
[ { "version": "v1", "created": "Mon, 8 Jan 2007 16:45:55 GMT" }, { "version": "v2", "created": "Mon, 26 Mar 2007 15:40:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Martin", "Barnaby", "" ] ]
cs/0701054
Nathan Segerlind
Nathan Segerlind
Nearly-Exponential Size Lower Bounds for Symbolic Quantifier Elimination Algorithms and OBDD-Based Proofs of Unsatisfiability
40 pages, 3 figures. First public draft, comments welcome. Also submitted at ECCC
null
null
null
cs.CC cs.LO
null
We demonstrate a family of propositional formulas in conjunctive normal form so that a formula of size $N$ requires size $2^{\Omega(\sqrt[7]{N/logN})}$ to refute using the tree-like OBDD refutation system of Atserias, Kolaitis and Vardi with respect to all variable orderings. All known symbolic quantifier elimination algorithms for satisfiability generate tree-like proofs when run on unsatisfiable CNFs, so this lower bound applies to the run-times of these algorithms. Furthermore, the lower bound generalizes earlier results on OBDD-based proofs of unsatisfiability in that it applies for all variable orderings, it applies when the clauses are processed according to an arbitrary schedule, and it applies when variables are eliminated via quantification.
[ { "version": "v1", "created": "Tue, 9 Jan 2007 01:16:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Segerlind", "Nathan", "" ] ]
cs/0701057
Xiaofei Huang
Xiaofei Huang
Cooperative Optimization for Energy Minimization: A Case Study of Stereo Matching
null
null
null
null
cs.CV cs.AI
null
Often times, individuals working together as a team can solve hard problems beyond the capability of any individual in the team. Cooperative optimization is a newly proposed general method for attacking hard optimization problems inspired by cooperation principles in team playing. It has an established theoretical foundation and has demonstrated outstanding performances in solving real-world optimization problems. With some general settings, a cooperative optimization algorithm has a unique equilibrium and converges to it with an exponential rate regardless initial conditions and insensitive to perturbations. It also possesses a number of global optimality conditions for identifying global optima so that it can terminate its search process efficiently. This paper offers a general description of cooperative optimization, addresses a number of design issues, and presents a case study to demonstrate its power.
[ { "version": "v1", "created": "Tue, 9 Jan 2007 01:03:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Huang", "Xiaofei", "" ] ]
cs/0701072
Jakob Vo{\ss}
Jakob Voss
Tagging, Folksonomy & Co - Renaissance of Manual Indexing?
Preprint. 12 pages, 1 figure, 54 references
null
null
null
cs.IR
null
This paper gives an overview of current trends in manual indexing on the Web. Along with a general rise of user generated content there are more and more tagging systems that allow users to annotate digital resources with tags (keywords) and share their annotations with other users. Tagging is frequently seen in contrast to traditional knowledge organization systems or as something completely new. This paper shows that tagging should better be seen as a popular form of manual indexing on the Web. Difference between controlled and free indexing blurs with sufficient feedback mechanisms. A revised typology of tagging systems is presented that includes different user roles and knowledge organization systems with hierarchical relationships and vocabulary control. A detailed bibliography of current research in collaborative tagging is included.
[ { "version": "v1", "created": "Wed, 10 Jan 2007 18:18:28 GMT" }, { "version": "v2", "created": "Fri, 26 Jan 2007 14:36:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Voss", "Jakob", "" ] ]
cs/0701073
Jeremy Avigad
Jeremy Avigad and Kevin Donnelly
A decision procedure for linear "big O" equations
null
null
null
null
cs.LO
null
Let $F$ be the set of functions from an infinite set, $S$, to an ordered ring, $R$. For $f$, $g$, and $h$ in $F$, the assertion $f = g + O(h)$ means that for some constant $C$, $|f(x) - g(x)| \leq C |h(x)|$ for every $x$ in $S$. Let $L$ be the first-order language with variables ranging over such functions, symbols for $0, +, -, \min, \max$, and absolute value, and a ternary relation $f = g + O(h)$. We show that the set of quantifier-free formulas in this language that are valid in the intended class of interpretations is decidable, and does not depend on the underlying set, $S$, or the ordered ring, $R$. If $R$ is a subfield of the real numbers, we can add a constant 1 function, as well as multiplication by constants from any computable subfield. We obtain further decidability results for certain situations in which one adds symbols denoting the elements of a fixed sequence of functions of strictly increasing rates of growth.
[ { "version": "v1", "created": "Wed, 10 Jan 2007 19:46:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Avigad", "Jeremy", "" ], [ "Donnelly", "Kevin", "" ] ]
cs/0701075
Toshiya Takami
Toshiya Takami, Jun Maki, Jun-ichi Ooba, Yuichi Inadomi, Hiroaki Honda, Taizo Kobayashi, Rie Nogita, and Mutsumi Aoyagi
Open-architecture Implementation of Fragment Molecular Orbital Method for Peta-scale Computing
6 pages, 9 figures, proceedings of the 2nd IEEE/ACM international workshop on high performance computing for nano-science and technology (HPCNano06)
null
null
null
cs.DC physics.comp-ph
null
We present our perspective and goals on highperformance computing for nanoscience in accordance with the global trend toward "peta-scale computing." After reviewing our results obtained through the grid-enabled version of the fragment molecular orbital method (FMO) on the grid testbed by the Japanese Grid Project, National Research Grid Initiative (NAREGI), we show that FMO is one of the best candidates for peta-scale applications by predicting its effective performance in peta-scale computers. Finally, we introduce our new project constructing a peta-scale application in an open-architecture implementation of FMO in order to realize both goals of highperformance in peta-scale computers and extendibility to multiphysics simulations.
[ { "version": "v1", "created": "Thu, 11 Jan 2007 04:49:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Takami", "Toshiya", "" ], [ "Maki", "Jun", "" ], [ "Ooba", "Jun-ichi", "" ], [ "Inadomi", "Yuichi", "" ], [ "Honda", "Hiroaki", "" ], [ "Kobayashi", "Taizo", "" ], [ "Nogita", "Rie", "" ], [ "Aoyagi", "Mutsumi", "" ] ]
cs/0701076
Norman Danner
Norman Danner and James S. Royer
Time-complexity semantics for feasible affine recursions (extended abstract)
Typographical fixes; some rearrangement of material. A shortened version is to appear in S.B. Cooper, B. Lowe, A. Sorbi (eds.),_Computation in the Real World_ (Proceedings Computation in Europe 2007, Sienna), Springer-Verlag, Berlin, 2007
null
null
null
cs.LO
null
The authors' ATR programming formalism is a version of call-by-value PCF under a complexity-theoretically motivated type system. ATR programs run in type-2 polynomial-time and all standard type-2 basic feasible functionals are ATR-definable (ATR types are confined to levels 0, 1, and 2). A limitation of the original version of ATR is that the only directly expressible recursions are tail-recursions. Here we extend ATR so that a broad range of affine recursions are directly expressible. In particular, the revised ATR can fairly naturally express the classic insertion- and selection-sort algorithms, thus overcoming a sticking point of most prior implicit-complexity-based formalisms. The paper's main work is in extending and simplifying the original time-complexity semantics for ATR to develop a set of tools for extracting and solving the higher-type recurrences arising from feasible affine recursions.
[ { "version": "v1", "created": "Thu, 11 Jan 2007 16:22:11 GMT" }, { "version": "v2", "created": "Tue, 20 Mar 2007 16:50:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Danner", "Norman", "" ], [ "Royer", "James S.", "" ] ]
cs/0701081
Wim Vanhoof
Alexander Serebrenik and Wim Vanhoof
Fingerprinting Logic Programs
Paper presented at the 16th Workshop on Logic-based methods in Programming Languages (WLPE2006)
null
null
null
cs.PL cs.SE
null
In this work we present work in progress on functionality duplication detection in logic programs. Eliminating duplicated functionality recently became prominent in context of refactoring. We describe a quantitative approach that allows to measure the ``similarity'' between two predicate definitions. Moreover, we show how to compute a so-called ``fingerprint'' for every predicate. Fingerprints capture those characteristics of the predicate that are significant when searching for duplicated functionality. Since reasoning on fingerprints is much easier than reasoning on predicate definitions, comparing the fingerprints is a promising direction in automated code duplication in logic programs.
[ { "version": "v1", "created": "Fri, 12 Jan 2007 15:39:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Serebrenik", "Alexander", "" ], [ "Vanhoof", "Wim", "" ] ]
cs/0701082
Serebrenik Alexander
Fred Mesnard, Alexander Serebrenik
Recurrence with affine level mappings is P-time decidable for CLP(R)
To appear in Theory and Practice of Logic Programming (TPLP)
null
null
null
cs.PL cs.LO
null
In this paper we introduce a class of constraint logic programs such that their termination can be proved by using affine level mappings. We show that membership to this class is decidable in polynomial time.
[ { "version": "v1", "created": "Fri, 12 Jan 2007 18:43:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Mesnard", "Fred", "" ], [ "Serebrenik", "Alexander", "" ] ]
cs/0701087
Jean-Philippe Rennard
Jean-Philippe Rennard
Artificiality in Social Sciences
14 pages
Rennard, J.-P., Artificiality in Social Sciences, in Rennard, J.-P. (Ed.), Handbook of Research on Nature Inspired Computing for Economics and Management, p.1-15, IGR, 2006
null
null
cs.MA
null
This text provides with an introduction to the modern approach of artificiality and simulation in social sciences. It presents the relationship between complexity and artificiality, before introducing the field of artificial societies which greatly benefited from the computer power fast increase, gifting social sciences with formalization and experimentation tools previously owned by "hard" sciences alone. It shows that as "a new way of doing social sciences", artificial societies should undoubtedly contribute to a renewed approach in the study of sociality and should play a significant part in the elaboration of original theories of social phenomena.
[ { "version": "v1", "created": "Sat, 13 Jan 2007 16:50:37 GMT" }, { "version": "v2", "created": "Fri, 27 Apr 2007 18:00:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Rennard", "Jean-Philippe", "" ] ]
cs/0701088
Frederick Furtek
Frederick Furtek
A Theory and Calculus for Reasoning about Sequential Behavior
102 double-spaced pages, 17 figures. Abstract and introduction revised 29 March 2007 to improve readability
null
null
null
cs.LO cs.DM
null
Basic results in combinatorial mathematics provide the foundation for a theory and calculus for reasoning about sequential behavior. A key concept of the theory is a generalization of Boolean implicant which deals with statements of the form: A sequence of Boolean expressions alpha is an implicant of a set of sequences of Boolean expressions A This notion of a generalized implicant takes on special significance when each of the sequences in the set A describes a disallowed pattern of behavior. That is because a disallowed sequence of Boolean expressions represents a logical/temporal dependency, and because the implicants of a set of disallowed Boolean sequences A are themselves disallowed and represent precisely those dependencies that follow as a logical consequence from the dependencies represented by A. The main result of the theory is a necessary and sufficient condition for a sequence of Boolean expressions to be an implicant of a regular set of sequences of Boolean expressions. This result is the foundation for two new proof methods. Sequential resolution is a generalization of Boolean resolution which allows new logical/temporal dependencies to be inferred from existing dependencies. Normalization starts with a model (system) and a set of logical/temporal dependencies and determines which of those dependencies are satisfied by the model.
[ { "version": "v1", "created": "Mon, 15 Jan 2007 18:57:14 GMT" }, { "version": "v2", "created": "Thu, 29 Mar 2007 15:46:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Furtek", "Frederick", "" ] ]
cs/0701094
Francois Ingelrest
Fran\c{c}ois Ingelrest (LIFL, INRIA Futurs), David Simplot-Ryl (LIFL, INRIA Futurs)
Maximizing the Probability of Delivery of Multipoint Relay Broadcast Protocol in Wireless Ad Hoc Networks with a Realistic Physical Layer
null
Proceedings of the 2nd International Conference on Mobile Ad-hoc and Sensor Networks (MSN 2006) (2006) 143
null
null
cs.NI
null
It is now commonly accepted that the unit disk graph used to model the physical layer in wireless networks does not reflect real radio transmissions, and that the lognormal shadowing model better suits to experimental simulations. Previous work on realistic scenarios focused on unicast, while broadcast requirements are fundamentally different and cannot be derived from unicast case. Therefore, broadcast protocols must be adapted in order to still be efficient under realistic assumptions. In this paper, we study the well-known multipoint relay protocol (MPR). In the latter, each node has to choose a set of neighbors to act as relays in order to cover the whole 2-hop neighborhood. We give experimental results showing that the original method provided to select the set of relays does not give good results with the realistic model. We also provide three new heuristics in replacement and their performances which demonstrate that they better suit to the considered model. The first one maximizes the probability of correct reception between the node and the considered relays multiplied by their coverage in the 2-hop neighborhood. The second one replaces the coverage by the average of the probabilities of correct reception between the considered neighbor and the 2-hop neighbors it covers. Finally, the third heuristic keeps the same concept as the second one, but tries to maximize the coverage level of the 2-hop neighborhood: 2-hop neighbors are still being considered as uncovered while their coverage level is not higher than a given coverage threshold, many neighbors may thus be selected to cover the same 2-hop neighbors.
[ { "version": "v1", "created": "Tue, 16 Jan 2007 10:01:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Ingelrest", "François", "", "LIFL, INRIA Futurs" ], [ "Simplot-Ryl", "David", "", "LIFL,\n INRIA Futurs" ] ]
cs/0701095
Pedro Cabalar
Pedro Cabalar and Paolo Ferraris
Propositional theories are strongly equivalent to logic programs
15 pages
null
null
null
cs.AI cs.LO
null
This paper presents a property of propositional theories under the answer sets semantics (called Equilibrium Logic for this general syntax): any theory can always be reexpressed as a strongly equivalent disjunctive logic program, possibly with negation in the head. We provide two different proofs for this result: one involving a syntactic transformation, and one that constructs a program starting from the countermodels of the theory in the intermediate logic of here-and-there.
[ { "version": "v1", "created": "Tue, 16 Jan 2007 12:29:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Cabalar", "Pedro", "" ], [ "Ferraris", "Paolo", "" ] ]
cs/0701096
Maurice Margenstern
Margenstern Maurice
About the domino problem in the hyperbolic plane, a new solution
60 pages, 16 figures
null
null
null
cs.CG
null
In this paper we improve the approach of a previous paper about the domino problem in the hyperbolic plane, see arXiv.cs.CG/0603093. This time, we prove that the general problem of the hyperbolic plane with \`a la Wang tiles is undecidable.
[ { "version": "v1", "created": "Tue, 16 Jan 2007 18:19:22 GMT" }, { "version": "v2", "created": "Mon, 22 Jan 2007 19:11:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Maurice", "Margenstern", "" ] ]
cs/0701104
Philipp Mayr
Philipp Mayr, Walther Umstaetter
Why is a new Journal of Informetrics needed?
9 pages, 3 figures
null
null
null
cs.DL cs.DB
null
In our study we analysed 3.889 records which were indexed in the Library and Information Science Abstracts (LISA) database in the research field of informetrics. We can show the core journals of the field via a Bradford (power law) distribution and corroborate on the basis of the restricted LISA data set that it was the appropriate time to found a new specialized journal dedicated to informetrics. According to Bradford's Law of scattering (pure quantitative calculation), Egghe's Journal of Informetrics (JOI) first issue to appear in 2007, comes most probable at the right time.
[ { "version": "v1", "created": "Wed, 17 Jan 2007 12:17:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Mayr", "Philipp", "" ], [ "Umstaetter", "Walther", "" ] ]
cs/0701105
Wim Vanhoof
Remko Troncon, Gerda Janssens
A Delta Debugger for ILP Query Execution
Paper presented at the 16th Workshop on Logic-based Methods in Programming Environments (WLPE2006)
null
null
null
cs.PL cs.LG
null
Because query execution is the most crucial part of Inductive Logic Programming (ILP) algorithms, a lot of effort is invested in developing faster execution mechanisms. These execution mechanisms typically have a low-level implementation, making them hard to debug. Moreover, other factors such as the complexity of the problems handled by ILP algorithms and size of the code base of ILP data mining systems make debugging at this level a very difficult job. In this work, we present the trace-based debugging approach currently used in the development of new execution mechanisms in hipP, the engine underlying the ACE Data Mining system. This debugger uses the delta debugging algorithm to automatically reduce the total time needed to expose bugs in ILP execution, thus making manual debugging step much lighter.
[ { "version": "v1", "created": "Wed, 17 Jan 2007 13:35:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Troncon", "Remko", "" ], [ "Janssens", "Gerda", "" ] ]
cs/0701106
Wim Vanhoof
Pierre Deransart
On using Tracer Driver for External Dynamic Process Observation
Paper presented at the 16th Workshop on Logic-based Methods in Programming Environments
null
null
null
cs.PL
null
One is interested here in the observation of dynamic processes starting from the traces which they leave or those that one makes them produce. It is considered here that it should be possible to make several observations simultaneously, using a large variety of independently developed analyzers. For this purpose, we introduce the original notion of ``full trace'' to capture the idea that a process can be instrumented in such a way that it may broadcast all information which could ever be requested by any kind of observer. Each analyzer can then find in the full trace the data elements which it needs. This approach uses what has been called a "tracer driver" which completes the tracer and drives it to answer the requests of the analyzers. A tracer driver allows to restrict the flow of information and makes this approach tractable. On the other side, the potential size of a full trace seems to make the idea of full trace unrealistic. In this work we explore the consequences of this notion in term of potential efficiency, by analyzing the respective workloads between the (full) tracer and many different analyzers, all being likely run in true parallel environments. To illustrate this study, we use the example of the observation of the resolution of constraints systems (proof-tree, search-tree and propagation) using sophisticated visualization tools, as developed in the project OADymPPaC (2001-2004). The processes considered here are computer programs, but we believe the approach can be extended to many other kinds of processes.
[ { "version": "v1", "created": "Wed, 17 Jan 2007 13:43:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Deransart", "Pierre", "" ] ]
cs/0701107
Wim Vanhoof
Hani Girgis, Bharat Jayaraman
JavaTA: A Logic-based Debugger for Java
Paper presented at the 16th Workshop on Logic-based Methods in Programming Environments (WLPE2006)
null
null
null
cs.PL
null
This paper presents a logic based approach to debugging Java programs. In contrast with traditional debugging we propose a debugging methodology for Java programs using logical queries on individual execution states and also over the history of execution. These queries were arrived at by a systematic study of errors in object-oriented programs in our earlier research. We represent the salient events during the execution of a Java program by a logic database, and implement the queries as logic programs. Such an approach allows us to answer a number of useful and interesting queries about a Java program, such as the calling sequence that results in a certain outcome, the state of an object at a particular execution point, etc. Our system also provides the ability to compose new queries during a debugging session. We believe that logic programming offers a significant contribution to the art of object-oriented programs debugging.
[ { "version": "v1", "created": "Wed, 17 Jan 2007 13:48:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Girgis", "Hani", "" ], [ "Jayaraman", "Bharat", "" ] ]
cs/0701108
Wim Vanhoof
Edison Mera, Pedro Lopez-Garcia, German Puebla, Manuel Carro, Manuel Hermenegildo
Towards Execution Time Estimation for Logic Programs via Static Analysis and Profiling
Paper presented at the 16th Workshop on Logic-based Methods in Programming Environments
null
null
null
cs.PL
null
Effective static analyses have been proposed which infer bounds on the number of resolutions or reductions. These have the advantage of being independent from the platform on which the programs are executed and have been shown to be useful in a number of applications, such as granularity control in parallel execution. On the other hand, in distributed computation scenarios where platforms with different capabilities come into play, it is necessary to express costs in metrics that include the characteristics of the platform. In particular, it is specially interesting to be able to infer upper and lower bounds on actual execution times. With this objective in mind, we propose an approach which combines compile-time analysis for cost bounds with a one-time profiling of the platform in order to determine the values of certain parameters for a given platform. These parameters calibrate a cost model which, from then on, is able to compute statically time bound functions for procedures and to predict with a significant degree of accuracy the execution times of such procedures in the given platform. The approach has been implemented and integrated in the CiaoPP system.
[ { "version": "v1", "created": "Wed, 17 Jan 2007 14:22:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Mera", "Edison", "" ], [ "Lopez-Garcia", "Pedro", "" ], [ "Puebla", "German", "" ], [ "Carro", "Manuel", "" ], [ "Hermenegildo", "Manuel", "" ] ]
cs/0701109
Wim Vanhoof
Siddharth Chitnis, Madhu Yennamani, Gopal Gupta
ExSched: Solving Constraint Satisfaction Problems with the Spreadsheet Paradigm
Paper presented at the 16th Workshop on Logic-based Methods in Programming Environments (WLPE2006)
null
null
null
cs.PL
null
We report on the development of a general tool called ExSched, implemented as a plug-in for Microsoft Excel, for solving a class of constraint satisfaction problems. The traditional spreadsheet paradigm is based on attaching arithmetic expressions to individual cells and then evaluating them. The ExSched interface generalizes the spreadsheet paradigm to allow finite domain constraints to be attached to the individual cells that are then solved to get a solution. This extension provides a user-friendly interface for solving constraint satisfaction problems that can be modeled as 2D tables, such as scheduling problems, timetabling problems, product configuration, etc. ExSched can be regarded as a spreadsheet interface to CLP(FD) that hides the syntactic and semantic complexity of CLP(FD) and enables novice users to solve many scheduling and timetabling problems interactively.
[ { "version": "v1", "created": "Wed, 17 Jan 2007 14:26:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Chitnis", "Siddharth", "" ], [ "Yennamani", "Madhu", "" ], [ "Gupta", "Gopal", "" ] ]
cs/0701110
Wim Vanhoof
Kim Henriksen, John Gallagher
A Web-based Tool Combining Different Type Analyses
Paper presented at the 16th Workshop on Logic-based Methods in Programming Environments (WLPE2006)
null
null
null
cs.PL
null
There are various kinds of type analysis of logic programs. These include for example inference of types that describe an over-approximation of the success set of a program, inference of well-typings, and abstractions based on given types. Analyses can be descriptive or prescriptive or a mixture of both, and they can be goal-dependent or goal-independent. We describe a prototype tool that can be accessed from a web browser, allowing various type analyses to be run. The first goal of the tool is to allow the analysis results to be examined conveniently by clicking on points in the original program clauses, and to highlight ill-typed program constructs, empty types or other type anomalies. Secondly the tool allows combination of the various styles of analysis. For example, a descriptive regular type can be automatically inferred for a given program, and then that type can be used to generate the minimal "domain model" of the program with respect to the corresponding pre-interpretation, which can give more precise information than the original descriptive type.
[ { "version": "v1", "created": "Wed, 17 Jan 2007 14:35:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Henriksen", "Kim", "" ], [ "Gallagher", "John", "" ] ]
cs/0701111
Wim Vanhoof
Elvira Albert, Puri Arenas, German Puebla
Some Issues on Incremental Abstraction-Carrying Code
Paper presented at the 16th Workshop on Logic-based Methods in Programming Environments (WLPE2006)
null
null
null
cs.PL
null
Abstraction-Carrying Code (ACC) has recently been proposed as a framework for proof-carrying code (PCC) in which the code supplier provides a program together with an abstraction (or abstract model of the program) whose validity entails compliance with a predefined safety policy. The abstraction thus plays the role of safety certificate and its generation (and validation) is carried out automatically by a fixed-point analyzer. Existing approaches for PCC are developed under the assumption that the consumer reads and validates the entire program w.r.t. the full certificate at once, in a non incremental way. In this abstract, we overview the main issues on incremental ACC. In particular, in the context of logic programming, we discuss both the generation of incremental certificates and the design of an incremental checking algorithm for untrusted updates of a (trusted) program, i.e., when a producer provides a modified version of a previously validated program. By update, we refer to any arbitrary change on a program, i.e., the extension of the program with new predicates, the deletion of existing predicates and the replacement of existing predicates by new versions for them. We also discuss how each kind of update affects the incremental extension in terms of accuracy and correctness.
[ { "version": "v1", "created": "Wed, 17 Jan 2007 14:44:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Albert", "Elvira", "" ], [ "Arenas", "Puri", "" ], [ "Puebla", "German", "" ] ]
cs/0701113
Thomas Colcombet
Thomas Colcombet (GALION)
On factorisation forests
27 pages
null
null
null
cs.LO
null
The theorem of factorisation forests shows the existence of nested factorisations -- a la Ramsey -- for finite words. This theorem has important applications in semigroup theory, and beyond. The purpose of this paper is to illustrate the importance of this approach in the context of automata over infinite words and trees. We extend the theorem of factorisation forest in two directions: we show that it is still valid for any word indexed by a linear ordering; and we show that it admits a deterministic variant for words indexed by well-orderings. A byproduct of this work is also an improvement on the known bounds for the original result. We apply the first variant for giving a simplified proof of the closure under complementation of rational sets of words indexed by countable scattered linear orderings. We apply the second variant in the analysis of monadic second-order logic over trees, yielding new results on monadic interpretations over trees. Consequences of it are new caracterisations of prefix-recognizable structures and of the Caucal hierarchy.
[ { "version": "v1", "created": "Wed, 17 Jan 2007 16:48:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Colcombet", "Thomas", "", "GALION" ] ]
cs/0701115
Juan J. Merelo Pr.
J.J. Merelo, Antonio Mora-Garcia, J.L.J. Laredo, Juan Lupion, Fernando Tricas
Browser-based distributed evolutionary computation: performance and scaling behavior
Submitted to GECCO 2007
null
null
null
cs.DC cs.NE
null
The challenge of ad-hoc computing is to find the way of taking advantage of spare cycles in an efficient way that takes into account all capabilities of the devices and interconnections available to them. In this paper we explore distributed evolutionary computation based on the Ruby on Rails framework, which overlays a Model-View-Controller on evolutionary computation. It allows anybody with a web browser (that is, mostly everybody connected to the Internet) to participate in an evolutionary computation experiment. Using a straightforward farming model, we consider different factors, such as the size of the population used. We are mostly interested in how they impact on performance, but also the scaling behavior when a non-trivial number of computers is applied to the problem. Experiments show the impact of different packet sizes on performance, as well as a quite limited scaling behavior, due to the characteristics of the server. Several solutions for that problem are proposed.
[ { "version": "v1", "created": "Thu, 18 Jan 2007 09:23:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Merelo", "J. J.", "" ], [ "Mora-Garcia", "Antonio", "" ], [ "Laredo", "J. L. J.", "" ], [ "Lupion", "Juan", "" ], [ "Tricas", "Fernando", "" ] ]
cs/0701119
Petr Ivankov
Petr R. Ivankov, Nikolay P. Ivankov
The framework for simulation of dynamics of mechanical aggregates
7 pages, 4 figures
null
null
null
cs.CE
null
A framework for simulation of dynamics of mechanical aggregates has been developed. This framework enables us to build model of aggregate from models of its parts. Framework is a part of universal framework for science and engineering.
[ { "version": "v1", "created": "Fri, 19 Jan 2007 12:18:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Ivankov", "Petr R.", "" ], [ "Ivankov", "Nikolay P.", "" ] ]
cs/0701121
Bernard Mourrain
Changhe Tu (Shandong University), Wenping Wang (University of Hong Kong), Bernard Mourrain (INRIA Sophia Antipolis), Jiaye Wang (Shandong University)
Signature Sequence of Intersection Curve of Two Quadrics for Exact Morphological Classification
null
null
null
null
cs.CG cs.SC
null
We present an efficient method for classifying the morphology of the intersection curve of two quadrics (QSIC) in PR3, 3D real projective space; here, the term morphology is used in a broad sense to mean the shape, topological, and algebraic properties of a QSIC, including singularity, reducibility, the number of connected components, and the degree of each irreducible component, etc. There are in total 35 different QSIC morphologies with non-degenerate quadric pencils. For each of these 35 QSIC morphologies, through a detailed study of the eigenvalue curve and the index function jump we establish a characterizing algebraic condition expressed in terms of the Segre characteristics and the signature sequence of a quadric pencil. We show how to compute a signature sequence with rational arithmetic so as to determine the morphology of the intersection curve of any two given quadrics. Two immediate applications of our results are the robust topological classification of QSIC in computing B-rep surface representation in solid modeling and the derivation of algebraic conditions for collision detection of quadric primitives.
[ { "version": "v1", "created": "Fri, 19 Jan 2007 08:08:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Tu", "Changhe", "", "Shandong University" ], [ "Wang", "Wenping", "", "University of Hong\n Kong" ], [ "Mourrain", "Bernard", "", "INRIA Sophia Antipolis" ], [ "Wang", "Jiaye", "", "Shandong\n University" ] ]
cs/0701125
Marcus Hutter
Marcus Hutter
Universal Algorithmic Intelligence: A mathematical top->down approach
70 pages
In Artificial General Intelligence, Springer (2007) 227-290
null
IDSIA-01-03
cs.AI cs.LG
null
Sequential decision theory formally solves the problem of rational agents in uncertain worlds if the true environmental prior probability distribution is known. Solomonoff's theory of universal induction formally solves the problem of sequence prediction for unknown prior distribution. We combine both ideas and get a parameter-free theory of universal Artificial Intelligence. We give strong arguments that the resulting AIXI model is the most intelligent unbiased agent possible. We outline how the AIXI model can formally solve a number of problem classes, including sequence prediction, strategic games, function minimization, reinforcement and supervised learning. The major drawback of the AIXI model is that it is uncomputable. To overcome this problem, we construct a modified algorithm AIXItl that is still effectively more intelligent than any other time t and length l bounded agent. The computation time of AIXItl is of the order t x 2^l. The discussion includes formal definitions of intelligence order relations, the horizon problem and relations of the AIXI theory to other AI approaches.
[ { "version": "v1", "created": "Sat, 20 Jan 2007 00:18:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Hutter", "Marcus", "" ] ]
cs/0701128
M. V. Panduranga Rao
M. V. Panduranga Rao
Interference Automata
19 pages. A preliminary version appears under the title "On a Model of Computation based on Optical Interference" in Proc. of the 16-th Australasian Workshop on Combinatorial Algorithms (AWOCA'05), pp. 249-261
null
null
null
cs.CC
null
We propose a computing model, the Two-Way Optical Interference Automata (2OIA), that makes use of the phenomenon of optical interference. We introduce this model to investigate the increase in power, in terms of language recognition, of a classical Deterministic Finite Automaton (DFA) when endowed with the facility of optical interference. The question is in the spirit of Two-Way Finite Automata With Quantum and Classical States (2QCFA) [A. Ambainis and J. Watrous, Two-way Finite Automata With Quantum and Classical States, Theoretical Computer Science, 287 (1), 299-311, (2002)] wherein the classical DFA is augmented with a quantum component of constant size. We test the power of 2OIA against the languages mentioned in the above paper. We give efficient 2OIA algorithms to recognize languages for which 2QCFA machines have been shown to exist, as well as languages whose status vis-a-vis 2QCFA has been posed as open questions. Finally we show the existence of a language that cannot be recognized by a 2OIA but can be recognized by an $O(n^3)$ space Turing machine.
[ { "version": "v1", "created": "Mon, 22 Jan 2007 09:14:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Rao", "M. V. Panduranga", "" ] ]
cs/0701130
Thomas C. Schmidt
Thomas C. Schmidt and Matthias W\"ahlisch and Ying Zhang
On the Correlation of Geographic and Network Proximity at Internet Edges and its Implications for Mobile Unicast and Multicast Routing
6 pages including 6 figures
in Proceedings of the IEEE ICN'07, IEEE Computer Society Press, Washington, DC, USA, April 2007
null
null
cs.NI cs.AR cs.PF
null
Significant effort has been invested recently to accelerate handover operations in a next generation mobile Internet. Corresponding works for developing efficient mobile multicast management are emergent. Both problems simultaneously expose routing complexity between subsequent points of attachment as a characteristic parameter for handover performance in access networks. As continuous mobility handovers necessarily occur between access routers located in geographic vicinity, this paper investigates on the hypothesis that geographically adjacent edge networks attain a reduced network distances as compared to arbitrary Internet nodes. We therefore evaluate and analyze edge distance distributions in various regions for clustered IP ranges on their geographic location such as a city. We use traceroute to collect packet forwarding path and round-trip-time of each intermediate node to scan-wise derive an upper bound of the node distances. Results of different scanning origins are compared to obtain the best estimation of network distance of each pair. Our results are compared with corresponding analysis of CAIDA Skitter data, overall leading to fairly stable, reproducible edge distance distributions. As a first conclusion on expected impact on handover performance measures, our results indicate a general optimum for handover anticipation time in 802.11 networks of 25 ms.
[ { "version": "v1", "created": "Sat, 20 Jan 2007 23:06:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Schmidt", "Thomas C.", "" ], [ "Wählisch", "Matthias", "" ], [ "Zhang", "Ying", "" ] ]
cs/0701132
Mardavij Roozbehani
Eric Feron (School of Aerospace Engineering, Georgia Institute of Technology) Mardavij Roozbehani (Department of Aeronautics and Astronautics, Massachusetts Institue of Technology)
Certifying controls and systems software
12 pages, 2 figures, 1 Matlab Code. To be submitted to AIAA journal of guidance and control. In this revised version, support and funding resources were added to the acknowledgement section. LIDS Publication #: 2745
null
null
LIDS # 2745
cs.SE
null
Software system certification presents itself with many challenges, including the necessity to certify the system at the level of functional requirements, code and binary levels, the need to chase down run-time errors, and the need for proving timing properties of the eventual, compiled system. This paper illustrates possible approaches for certifying code that arises from control systems requirements as far as stability properties are concerned. The relative simplicity of the certification process should encourage the development of systematic procedures for certifying control system codes for more complex environments.
[ { "version": "v1", "created": "Sun, 21 Jan 2007 19:34:45 GMT" }, { "version": "v2", "created": "Tue, 23 Jan 2007 16:12:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Feron", "Eric", "", "School of Aerospace Engineering, Georgia Institute of\n Technology" ], [ "Roozbehani", "Mardavij", "", "Department of Aeronautics and Astronautics,\n Massachusetts Institue of Technology" ] ]
cs/0701133
Athina Markopoulou
Athina Markopoulou and David Cheriton
The Case for Redundant Arrays of Internet Links (RAIL)
null
null
null
null
cs.NI
null
It is well-known that wide-area networks face today several performance and reliability problems. In this work, we propose to solve these problems by connecting two or more local-area networks together via a Redundant Array of Internet Links (or RAIL) and by proactively replicating each packet over these links. In that sense, RAIL is for networks what RAID (Redundant Array of Inexpensive Disks) was for disks. In this paper, we describe the RAIL approach, present our prototype (called the RAILedge), and evaluate its performance. First, we demonstrate that using multiple Internet links significantly improves the end-to-end performance in terms of network-level as well as application-level metrics for Voice-over-IP and TCP. Second, we show that a delay padding mechanism is needed to complement RAIL when there is significant delay disparity between the paths. Third, we show that two paths provide most of the benefit, if carefully managed. Finally, we discuss a RAIL-network architecture, where RAILedges make use of path redundancy, route control and application-specific mechanisms, to improve WAN performance.
[ { "version": "v1", "created": "Sun, 21 Jan 2007 19:59:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Markopoulou", "Athina", "" ], [ "Cheriton", "David", "" ] ]
cs/0701135
Jinyun Ke
Jinyun KE
Complex networks and human language
null
null
null
null
cs.CL
null
This paper introduces how human languages can be studied in light of recent development of network theories. There are two directions of exploration. One is to study networks existing in the language system. Various lexical networks can be built based on different relationships between words, being semantic or syntactic. Recent studies have shown that these lexical networks exhibit small-world and scale-free features. The other direction of exploration is to study networks of language users (i.e. social networks of people in the linguistic community), and their role in language evolution. Social networks also show small-world and scale-free features, which cannot be captured by random or regular network models. In the past, computational models of language change and language emergence often assume a population to have a random or regular structure, and there has been little discussion how network structures may affect the dynamics. In the second part of the paper, a series of simulation models of diffusion of linguistic innovation are used to illustrate the importance of choosing realistic conditions of population structure for modeling language change. Four types of social networks are compared, which exhibit two categories of diffusion dynamics. While the questions about which type of networks are more appropriate for modeling still remains, we give some preliminary suggestions for choosing the type of social networks for modeling.
[ { "version": "v1", "created": "Mon, 22 Jan 2007 00:45:31 GMT" } ]
2007-05-23T00:00:00
[ [ "KE", "Jinyun", "" ] ]
cs/0701136
Stevan Harnad
Chawki Hajjem, Stevan Harnad
Citation Advantage For OA Self-Archiving Is Independent of Journal Impact Factor, Article Age, and Number of Co-Authors
null
null
null
null
cs.IR cs.DL
null
Eysenbach has suggested that the OA (Green) self-archiving advantage might just be an artifact of potential uncontrolled confounding factors such as article age (older articles may be both more cited and more likely to be self-archived), number of authors (articles with more authors might be more cited and more self-archived), subject matter (the subjects that are cited more, self-archive more), country (same thing), number of authors, citation counts of authors, etc. Chawki Hajjem (doctoral candidate, UQaM) had already shown that the OA advantage was present in all cases when articles were analysed separately by age, subject matter or country. He has now done a multiple regression analysis jointly testing (1) article age, (2) journal impact factor, (3) number of authors, and (4) OA self-archiving as separate factors for 442,750 articles in 576 (biomedical) journals across 11 years, and has shown that each of the four factors contributes an independent, statistically significant increment to the citation counts. The OA-self-archiving advantage remains a robust, independent factor. Having successfully responded to his challenge, we now challenge Eysenbach to demonstrate -- by testing a sufficiently broad and representative sample of journals at all levels of the journal quality, visibility and prestige hierarchy -- that his finding of a citation advantage for Gold OA (articles published OA on the high-profile website of the only journal he tested (PNAS) over Green OA articles in the same journal (self-archived on the author's website) was not just an artifact of having tested only one very high-profile journal.
[ { "version": "v1", "created": "Mon, 22 Jan 2007 02:14:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Hajjem", "Chawki", "" ], [ "Harnad", "Stevan", "" ] ]
cs/0701137
Stevan Harnad
Chawki Hajjem, Stevan Harnad
The Open Access Citation Advantage: Quality Advantage Or Quality Bias?
null
null
null
null
cs.IR cs.DL
null
Many studies have now reported the positive correlation between Open Access (OA) self-archiving and citation counts ("OA Advantage," OAA). But does this OAA occur because (QB) authors are more likely to self-selectively self-archive articles that are more likely to be cited (self-selection "Quality Bias": QB)? or because (QA) articles that are self-archived are more likely to be cited ("Quality Advantage": QA)? The probable answer is both. Three studies [by (i) Kurtz and co-workers in astrophysics, (ii) Moed in condensed matter physics, and (iii) Davis & Fromerth in mathematics] had reported the OAA to be due to QB [plus Early Advantage, EA, from self-archiving the preprint before publication, in (i) and (ii)] rather than QA. These three fields, however, (1) have less of a postprint access problem than most other fields and (i) and (ii) also happen to be among the minority of fields that (2) make heavy use of prepublication preprints. Chawki Hajjem has now analyzed preliminary evidence based on over 100,000 articles from multiple fields, comparing self-selected self-archiving with mandated self-archiving to estimate the contributions of QB and QA to the OAA. Both factors contribute, and the contribution of QA is greater.
[ { "version": "v1", "created": "Mon, 22 Jan 2007 02:19:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Hajjem", "Chawki", "" ], [ "Harnad", "Stevan", "" ] ]
cs/0701139
Yishay Mor
Yishay Mor and Jeffrey S. Rosenschein
Time and the Prisoner's Dilemma
Proceedings of the First International Conference on Multiagent Systems (ICMAS95), : 276-282, 1995
null
null
null
cs.GT cs.AI
null
This paper examines the integration of computational complexity into game theoretic models. The example focused on is the Prisoner's Dilemma, repeated for a finite length of time. We show that a minimal bound on the players' computational ability is sufficient to enable cooperative behavior. In addition, a variant of the repeated Prisoner's Dilemma game is suggested, in which players have the choice of opting out. This modification enriches the game and suggests dominance of cooperative strategies. Competitive analysis is suggested as a tool for investigating sub-optimal (but computationally tractable) strategies and game theoretic models in general. Using competitive analysis, it is shown that for bounded players, a sub-optimal strategy might be the optimal choice, given resource limitations.
[ { "version": "v1", "created": "Mon, 22 Jan 2007 15:23:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Mor", "Yishay", "" ], [ "Rosenschein", "Jeffrey S.", "" ] ]
cs/0701142
Wolfgang Bein
Wolfgang Bein, Lawrence L. Larmore, R\"udiger Reischuk
Knowledge State Algorithms: Randomization with Limited Information
17 pages, 2 figures
null
null
null
cs.DS
null
We introduce the concept of knowledge states; many well-known algorithms can be viewed as knowledge state algorithms. The knowledge state approach can be used to to construct competitive randomized online algorithms and study the tradeoff between competitiveness and memory. A knowledge state simply states conditional obligations of an adversary, by fixing a work function, and gives a distribution for the algorithm. When a knowledge state algorithm receives a request, it then calculates one or more "subsequent" knowledge states, together with a probability of transition to each. The algorithm then uses randomization to select one of those subsequents to be the new knowledge state. We apply the method to the paging problem. We present optimally competitive algorithm for paging for the cases where the cache sizes are k=2 and k=3. These algorithms use only a very limited number of bookmarks.
[ { "version": "v1", "created": "Tue, 23 Jan 2007 00:54:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Bein", "Wolfgang", "" ], [ "Larmore", "Lawrence L.", "" ], [ "Reischuk", "Rüdiger", "" ] ]
cs/0701144
Andreas U. Schmidt
Nicolai Kuntze and Andreas U. Schmidt
Trusted Ticket Systems and Applications
Accepted full research paper at IFIP sec2007, Sandton, South Africa, 14-16 May 2007
null
null
null
cs.CR
null
Trusted Computing is a security base technology that will perhaps be ubiquitous in a few years in personal computers and mobile devices alike. Despite its neutrality with respect to applications, it has raised some privacy concerns. We show that trusted computing can be applied for service access control in a manner protecting users' privacy. We construct a ticket system -- a concept which is at the heart of Identity Management -- relying solely on the capabilities of the trusted platform module and the standards specified by the Trusted Computing Group. Two examples show how it can be used for pseudonymous and protected service access.
[ { "version": "v1", "created": "Tue, 23 Jan 2007 14:26:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Kuntze", "Nicolai", "" ], [ "Schmidt", "Andreas U.", "" ] ]
cs/0701145
Andreas U. Schmidt
Nicolai Kuntze, Andreas U. Schmidt, and Christian Hett
Non-Repudiation in Internet Telephony
Accepted full research paper at IFIP sec2007, Sandton, South Africa, 14-16 May 2007
null
null
null
cs.CR
null
We present a concept to achieve non-repudiation for natural language conversations over the Internet. The method rests on chained electronic signatures applied to pieces of packet-based, digital, voice communication. It establishes the integrity and authenticity of the bidirectional data stream and its temporal sequence and thus the security context of a conversation. The concept is close to the protocols for Voice over the Internet (VoIP), provides a high level of inherent security, and extends naturally to multilateral non-repudiation, e.g., for conferences. Signatures over conversations can become true declarations of will in analogy to electronically signed, digital documents. This enables binding verbal contracts, in principle between unacquainted speakers, and in particular without witnesses. A reference implementation of a secure VoIP archive is exhibited.
[ { "version": "v1", "created": "Tue, 23 Jan 2007 15:23:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Kuntze", "Nicolai", "" ], [ "Schmidt", "Andreas U.", "" ], [ "Hett", "Christian", "" ] ]
cs/0701147
Wim Vanhoof
Michael Hanus
A Generic Analysis Environment for Curry Programs
Paper presented at the 16th Workshop on Logic-based Methods in Programming Environments
null
null
null
cs.PL
null
We present CurryBrowser, a generic analysis environment for the declarative multi-paradigm language Curry. CurryBrowser supports browsing through the program code of an application written in Curry, i.e., the main module and all directly or indirectly imported modules. Each module can be shown in different formats (e.g., source code, interface, intermediate code) and, inside each module, various properties of functions defined in this module can be analyzed. In order to support the integration of various program analyses, CurryBrowser has a generic interface to connect local and global analyses implemented in Curry. CurryBrowser is completely implemented in Curry using libraries for GUI programming and meta-programming.
[ { "version": "v1", "created": "Wed, 24 Jan 2007 06:55:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Hanus", "Michael", "" ] ]
cs/0701148
Wim Vanhoof
Wim Vanhoof and Susana Munoz-Hernandez
Proceedings of the 16th Workshop in Logic-based Methods in Programming Environments (WLPE2006)
null
null
null
null
cs.PL
null
This volume contains the papers presented at WLPE'06: the 16th Workshop on Logic-based Methods in Programming Environments held on August 16, 2006 in the Seattle Sheraton Hotel and Towers, Seattle, Washington (USA). It was organised as a satellite workshop of ICLP'06, the 22th International Conference on Logic Programming.
[ { "version": "v1", "created": "Wed, 24 Jan 2007 07:03:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Vanhoof", "Wim", "" ], [ "Munoz-Hernandez", "Susana", "" ] ]
cs/0701150
Luc Brun
Luc Brun (GREYC), Walter G. Kropatsch (PRIP)
Contains and Inside relationships within combinatorial Pyramids
35 pages
Pattern Recognition 39 (01/04/2006) 515-526
null
null
cs.CV
null
Irregular pyramids are made of a stack of successively reduced graphs embedded in the plane. Such pyramids are used within the segmentation framework to encode a hierarchy of partitions. The different graph models used within the irregular pyramid framework encode different types of relationships between regions. This paper compares different graph models used within the irregular pyramid framework according to a set of relationships between regions. We also define a new algorithm based on a pyramid of combinatorial maps which allows to determine if one region contains the other using only local calculus.
[ { "version": "v1", "created": "Wed, 24 Jan 2007 15:13:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Brun", "Luc", "", "GREYC" ], [ "Kropatsch", "Walter G.", "", "PRIP" ] ]
cs/0701153
Richard Kr\'alovi\v{c}
Michal Fori\v{s}ek, Branislav Katreniak, Jana Katreniakov\'a, Rastislav Kr\'alovi\v{c}, Richard Kr\'alovi\v{c}, Vladim\'ir Koutn\'y, Dana Pardubsk\'a, Tom\'a\v{s} Plachetka, Branislav Rovan
Online Bandwidth Allocation
null
null
null
null
cs.DS cs.NI
null
The paper investigates a version of the resource allocation problem arising in the wireless networking, namely in the OVSF code reallocation process. In this setting a complete binary tree of a given height $n$ is considered, together with a sequence of requests which have to be served in an online manner. The requests are of two types: an insertion request requires to allocate a complete subtree of a given height, and a deletion request frees a given allocated subtree. In order to serve an insertion request it might be necessary to move some already allocated subtrees to other locations in order to free a large enough subtree. We are interested in the worst case average number of such reallocations needed to serve a request. It was proved in previous work that the competitive ratio of the optimal online algorithm solving this problem is between 1.5 and O(n). We partially answer the question about its exact value by giving an O(1)-competitive online algorithm. Same model has been used in the context of memory management systems, and analyzed for the number of reallocations needed to serve a request in the worst case. In this setting, our result is a corresponding amortized analysis.
[ { "version": "v1", "created": "Thu, 25 Jan 2007 11:52:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Forišek", "Michal", "" ], [ "Katreniak", "Branislav", "" ], [ "Katreniaková", "Jana", "" ], [ "Královič", "Rastislav", "" ], [ "Královič", "Richard", "" ], [ "Koutný", "Vladimír", "" ], [ "Pardubská", "Dana", "" ], [ "Plachetka", "Tomáš", "" ], [ "Rovan", "Branislav", "" ] ]
cs/0701155
Jim Gray
Jim Gray, Surajit Chaudhuri, Adam Bosworth, Andrew Layman, Don Reichart, Murali Venkatrao, Frank Pellow, Hamid Pirahesh
Data Cube: A Relational Aggregation Operator Generalizing Group-By, Cross-Tab, and Sub-Totals
null
Data Mining and Knowledge Discovery 1(1): 29-53 (1997)
null
null
cs.DB
null
Data analysis applications typically aggregate data across many dimensions looking for anomalies or unusual patterns. The SQL aggregate functions and the GROUP BY operator produce zero-dimensional or one-dimensional aggregates. Applications need the N-dimensional generalization of these operators. This paper defines that operator, called the data cube or simply cube. The cube operator generalizes the histogram, cross-tabulation, roll-up, drill-down, and sub-total constructs found in most report writers. The novelty is that cubes are relations. Consequently, the cube operator can be imbedded in more complex non-procedural data analysis programs. The cube operator treats each of the N aggregation attributes as a dimension of N-space. The aggregate of a particular set of attribute values is a point in this space. The set of points forms an N-dimensional cube. Super-aggregates are computed by aggregating the N-cube to lower dimensional spaces. This paper (1) explains the cube and roll-up operators, (2) shows how they fit in SQL, (3) explains how users can define new aggregate functions for cubes, and (4) discusses efficient techniques to compute the cube. Many of these features are being added to the SQL Standard.
[ { "version": "v1", "created": "Thu, 25 Jan 2007 22:39:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Gray", "Jim", "" ], [ "Chaudhuri", "Surajit", "" ], [ "Bosworth", "Adam", "" ], [ "Layman", "Andrew", "" ], [ "Reichart", "Don", "" ], [ "Venkatrao", "Murali", "" ], [ "Pellow", "Frank", "" ], [ "Pirahesh", "Hamid", "" ] ]
cs/0701156
Jim Gray
Jim Gray
Data Management: Past, Present, and Future
null
IEEE Computer 29(10): 38-46 (1996)
null
MSR-TR-96-18
cs.DB
null
Soon most information will be available at your fingertips, anytime, anywhere. Rapid advances in storage, communications, and processing allow us move all information into Cyberspace. Software to define, search, and visualize online information is also a key to creating and accessing online information. This article traces the evolution of data management systems and outlines current trends. Data management systems began by automating traditional tasks: recording transactions in business, science, and commerce. This data consisted primarily of numbers and character strings. Today these systems provide the infrastructure for much of our society, allowing fast, reliable, secure, and automatic access to data distributed throughout the world. Increasingly these systems automatically design and manage access to the data. The next steps are to automate access to richer forms of data: images, sound, video, maps, and other media. A second major challenge is automatically summarizing and abstracting data in anticipation of user requests. These multi-media databases and tools to access them will be a cornerstone of our move to Cyberspace.
[ { "version": "v1", "created": "Thu, 25 Jan 2007 22:42:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Gray", "Jim", "" ] ]
cs/0701157
Jim Gray
Hal Berenson, Phil Bernstein, Jim Gray, Jim Melton, Elizabeth O'Neil, Patrick O'Neil
A Critique of ANSI SQL Isolation Levels
null
Proc. ACM SIGMOD 95, pp. 1-10, San Jose CA, June 1995
null
MSR-TR-95-51
cs.DB
null
ANSI SQL-92 defines Isolation Levels in terms of phenomena: Dirty Reads, Non-Repeatable Reads, and Phantoms. This paper shows that these phenomena and the ANSI SQL definitions fail to characterize several popular isolation levels, including the standard locking implementations of the levels. Investigating the ambiguities of the phenomena leads to clearer definitions; in addition new phenomena that better characterize isolation types are introduced. An important multiversion isolation type, Snapshot Isolation, is defined.
[ { "version": "v1", "created": "Thu, 25 Jan 2007 22:53:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Berenson", "Hal", "" ], [ "Bernstein", "Phil", "" ], [ "Gray", "Jim", "" ], [ "Melton", "Jim", "" ], [ "O'Neil", "Elizabeth", "" ], [ "O'Neil", "Patrick", "" ] ]
cs/0701158
Jim Gray
Jim Gray
Queues Are Databases
null
null
null
MSR-TR-95-56
cs.DB
null
Message-oriented-middleware (MOM) has become an small industry. MOM offers queued transaction processing as an advance over pure client-server transaction processing. This note makes four points: Queued transaction processing is less general than direct transaction processing. Queued systems are built on top of direct systems. You cannot build a direct system atop a queued system. It is difficult to build direct, conversational, or distributed transactions atop a queued system. Queues are interesting databases with interesting concurrency control. It is best to build these mechanisms into a standard database system so other applications can use these interesting features. Queue systems need DBMS functionality. Queues need security, configuration, performance monitoring, recovery, and reorganization utilities. Database systems already have these features. A full-function MOM system duplicates these database features. Queue managers are simple TP-monitors managing server pools driven by queues. Database systems are encompassing many server pool features as they evolve to TP-lite systems.
[ { "version": "v1", "created": "Thu, 25 Jan 2007 22:56:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Gray", "Jim", "" ] ]
cs/0701159
Jim Gray
Gerd Heber, Jim Gray
Supporting Finite Element Analysis with a Relational Database Backend, Part I: There is Life beyond Files
null
null
null
MSR-TR-2005-49
cs.DB cs.CE
null
In this paper, we show how to use a Relational Database Management System in support of Finite Element Analysis. We believe it is a new way of thinking about data management in well-understood applications to prepare them for two major challenges, - size and integration (globalization). Neither extreme size nor integration (with other applications over the Web) was a design concern 30 years ago when the paradigm for FEA implementation first was formed. On the other hand, database technology has come a long way since its inception and it is past time to highlight its usefulness to the field of scientific computing and computer based engineering. This series aims to widen the list of applications for database designers and for FEA users and application developers to reap some of the benefits of database development.
[ { "version": "v1", "created": "Thu, 25 Jan 2007 23:02:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Heber", "Gerd", "" ], [ "Gray", "Jim", "" ] ]
cs/0701160
Jim Gray
Gerd Heber, Jim Gray
Supporting Finite Element Analysis with a Relational Database Backend, Part II: Database Design and Access
null
null
null
MSR-TR-2006-21
cs.DB cs.CE
null
This is Part II of a three article series on using databases for Finite Element Analysis (FEA). It discusses (1) db design, (2) data loading, (3) typical use cases during grid building, (4) typical use cases during simulation (get and put), (5) typical use cases during analysis (also done in Part III) and some performance measures of these cases. It argues that using a database is simpler to implement than custom data schemas, has better performance because it can use data parallelism, and better supports FEA modularity and tool evolution because database schema evolution, data independence, and self-defining data.
[ { "version": "v1", "created": "Thu, 25 Jan 2007 23:05:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Heber", "Gerd", "" ], [ "Gray", "Jim", "" ] ]
cs/0701161
Jim Gray
Jim Gray, Charles Levine
Thousands of DebitCredit Transactions-Per-Second: Easy and Inexpensive
null
null
null
MSR-TR-2005-39
cs.DB cs.PF
null
A $2k computer can execute about 8k transactions per second. This is 80x more than one of the largest US bank's 1970's traffic - it approximates the total US 1970's financial transaction volume. Very modest modern computers can easily solve yesterday's problems.
[ { "version": "v1", "created": "Thu, 25 Jan 2007 23:51:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Gray", "Jim", "" ], [ "Levine", "Charles", "" ] ]
cs/0701162
Jim Gray
Jim Gray
A Measure of Transaction Processing 20 Years Later
This article appeared in the IEEE Data Engineering, Fall 2005
null
null
MSR-TR-2005-57
cs.DB cs.PF
null
This provides a retrospective of the paper "A Measure of Transaction Processing" published in 1985. It shows that transaction processing peak performance and price-peformance have improved about 100,000x respectively and that sort/sequential performance has approximately doubled each year (so a million fold improvement) even though processor performance plateaued in 1995.
[ { "version": "v1", "created": "Thu, 25 Jan 2007 23:57:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Gray", "Jim", "" ] ]
cs/0701163
Jim Gray
Jim Gray, Alex Szalay, Gyorgy Fekete
Using Table Valued Functions in SQL Server 2005 To Implement a Spatial Data Library
null
null
null
MSR-TR-2005-122
cs.DB cs.CE
null
This article explains how to add spatial search functions (point-near-point and point in polygon) to Microsoft SQL Server 2005 using C# and table-valued functions. It is possible to use this library to add spatial search to your application without writing any special code. The library implements the public-domain C# Hierarchical Triangular Mesh (HTM) algorithms from Johns Hopkins University. That C# library is connected to SQL Server 2005 via a set of scalar-valued and table-valued functions. These functions act as a spatial index.
[ { "version": "v1", "created": "Fri, 26 Jan 2007 00:00:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Gray", "Jim", "" ], [ "Szalay", "Alex", "" ], [ "Fekete", "Gyorgy", "" ] ]
cs/0701164
Jim Gray
Alexander S. Szalay, Jim Gray, George Fekete, Peter Z. Kunszt, Peter Kukol, Ani Thakar
Indexing the Sphere with the Hierarchical Triangular Mesh
null
null
null
MSR-TR-2005-123
cs.DB cs.DS
null
We describe a method to subdivide the surface of a sphere into spherical triangles of similar, but not identical, shapes and sizes. The Hierarchical Triangular Mesh (HTM) is a quad-tree that is particularly good at supporting searches at different resolutions, from arc seconds to hemispheres. The subdivision scheme is universal, providing the basis for addressing and for fast lookups. The HTM provides the basis for an efficient geospatial indexing scheme in relational databases where the data have an inherent location on either the celestial sphere or the Earth. The HTM index is superior to cartographical methods using coordinates with singularities at the poles. We also describe a way to specify surface regions that efficiently represent spherical query areas. This article presents the algorithms used to identify the HTM triangles covering such regions.
[ { "version": "v1", "created": "Fri, 26 Jan 2007 00:04:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Szalay", "Alexander S.", "" ], [ "Gray", "Jim", "" ], [ "Fekete", "George", "" ], [ "Kunszt", "Peter Z.", "" ], [ "Kukol", "Peter", "" ], [ "Thakar", "Ani", "" ] ]
cs/0701165
Jim Gray
Gordon Bell, Jim Gray, Alex Szalay
Petascale Computational Systems
null
null
null
null
cs.DB cs.AR
null
Computational science is changing to be data intensive. Super-Computers must be balanced systems; not just CPU farms but also petascale IO and networking arrays. Anyone building CyberInfrastructure should allocate resources to support a balanced Tier-1 through Tier-3 design.
[ { "version": "v1", "created": "Fri, 26 Jan 2007 00:23:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Bell", "Gordon", "" ], [ "Gray", "Jim", "" ], [ "Szalay", "Alex", "" ] ]
cs/0701166
Jim Gray
Jim Gray, Catharine van Ingen
Empirical Measurements of Disk Failure Rates and Error Rates
null
null
null
MSR-TR-2005-166
cs.DB cs.AR
null
The SATA advertised bit error rate of one error in 10 terabytes is frightening. We moved 2 PB through low-cost hardware and saw five disk read error events, several controller failures, and many system reboots caused by security patches. We conclude that SATA uncorrectable read errors are not yet a dominant system-fault source - they happen, but are rare compared to other problems. We also conclude that UER (uncorrectable error rate) is not the relevant metric for our needs. When an uncorrectable read error happens, there are typically several damaged storage blocks (and many uncorrectable read errors.) Also, some uncorrectable read errors may be masked by the operating system. The more meaningful metric for data architects is Mean Time To Data Loss (MTTDL.)
[ { "version": "v1", "created": "Fri, 26 Jan 2007 00:29:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Gray", "Jim", "" ], [ "van Ingen", "Catharine", "" ] ]
cs/0701167
Jim Gray
Maria A. Nieto-Santisteban, Aniruddha R. Thakar, Alexander S. Szalay, Jim Gray
Large-Scale Query and XMatch, Entering the Parallel Zone
Astronomical Data Analysis Software and Systems XV in San Lorenzo de El Escorial, Madrid, Spain, October 2005, to appear in the ASP Conference Series
null
null
MSR-TR-2005- 169
cs.DB cs.CE
null
Current and future astronomical surveys are producing catalogs with millions and billions of objects. On-line access to such big datasets for data mining and cross-correlation is usually as highly desired as unfeasible. Providing these capabilities is becoming critical for the Virtual Observatory framework. In this paper we present various performance tests that show how using Relational Database Management Systems (RDBMS) and a Zoning algorithm to partition and parallelize the computation, we can facilitate large-scale query and cross-match.
[ { "version": "v1", "created": "Fri, 26 Jan 2007 00:33:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Nieto-Santisteban", "Maria A.", "" ], [ "Thakar", "Aniruddha R.", "" ], [ "Szalay", "Alexander S.", "" ], [ "Gray", "Jim", "" ] ]
cs/0701170
Jim Gray
Katalin Szlavecz, Andreas Terzis, Stuart Ozer, Razvan Musaloiu-E, Joshua Cogan, Sam Small, Randal Burns, Jim Gray, Alex Szalay
Life Under Your Feet: An End-to-End Soil Ecology Sensor Network, Database, Web Server, and Analysis Service
null
null
null
MSR TR 2006 90
cs.DB cs.CE
null
Wireless sensor networks can revolutionize soil ecology by providing measurements at temporal and spatial granularities previously impossible. This paper presents a soil monitoring system we developed and deployed at an urban forest in Baltimore as a first step towards realizing this vision. Motes in this network measure and save soil moisture and temperature in situ every minute. Raw measurements are periodically retrieved by a sensor gateway and stored in a central database where calibrated versions are derived and stored. The measurement database is published through Web Services interfaces. In addition, analysis tools let scientists analyze current and historical data and help manage the sensor network. The article describes the system design, what we learned from the deployment, and initial results obtained from the sensors. The system measures soil factors with unprecedented temporal precision. However, the deployment required device-level programming, sensor calibration across space and time, and cross-referencing measurements with external sources. The database, web server, and data analysis design required considerable innovation and expertise. So, the ratio of computer-scientists to ecologists was 3:1. Before sensor networks can fulfill their potential as instruments that can be easily deployed by scientists, these technical problems must be addressed so that the ratio is one nerd per ten ecologists.
[ { "version": "v1", "created": "Fri, 26 Jan 2007 05:08:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Szlavecz", "Katalin", "" ], [ "Terzis", "Andreas", "" ], [ "Ozer", "Stuart", "" ], [ "Musaloiu-E", "Razvan", "" ], [ "Cogan", "Joshua", "" ], [ "Small", "Sam", "" ], [ "Burns", "Randal", "" ], [ "Gray", "Jim", "" ], [ "Szalay", "Alex", "" ] ]
cs/0701171
Jim Gray
Jim Gray, Maria A. Nieto-Santisteban, Alexander S. Szalay
The Zones Algorithm for Finding Points-Near-a-Point or Cross-Matching Spatial Datasets
null
null
null
MSR TR 2006 52
cs.DB cs.DS
null
Zones index an N-dimensional Euclidian or metric space to efficiently support points-near-a-point queries either within a dataset or between two datasets. The approach uses relational algebra and the B-Tree mechanism found in almost all relational database systems. Hence, the Zones Algorithm gives a portable-relational implementation of points-near-point, spatial cross-match, and self-match queries. This article corrects some mistakes in an earlier article we wrote on the Zones Algorithm and describes some algorithmic improvements. The Appendix includes an implementation of point-near-point, self-match, and cross-match using the USGS city and stream gauge database.
[ { "version": "v1", "created": "Fri, 26 Jan 2007 05:11:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Gray", "Jim", "" ], [ "Nieto-Santisteban", "Maria A.", "" ], [ "Szalay", "Alexander S.", "" ] ]
cs/0701172
Jim Gray
Jim Gray, Alex Szalay, Tamas Budavari, Robert Lupton, Maria Nieto-Santisteban, Ani Thakar
Cross-Matching Multiple Spatial Observations and Dealing with Missing Data
null
null
null
MSR TR 2006-175
cs.DB cs.CE
null
Cross-match spatially clusters and organizes several astronomical point-source measurements from one or more surveys. Ideally, each object would be found in each survey. Unfortunately, the observation conditions and the objects themselves change continually. Even some stationary objects are missing in some observations; sometimes objects have a variable light flux and sometimes the seeing is worse. In most cases we are faced with a substantial number of differences in object detections between surveys and between observations taken at different times within the same survey or instrument. Dealing with such missing observations is a difficult problem. The first step is to classify misses as ephemeral - when the object moved or simply disappeared, masked - when noise hid or corrupted the object observation, or edge - when the object was near the edge of the observational field. This classification and a spatial library to represent and manipulate observational footprints help construct a Match table recording both hits and misses. Transitive closure clusters friends-of-friends into object bundles. The bundle summary statistics are recorded in a Bundle table. This design is an evolution of the Sloan Digital Sky Survey cross-match design that compared overlapping observations taken at different times. Cross-Matching Multiple Spatial Observations and Dealing with Missing Data.
[ { "version": "v1", "created": "Fri, 26 Jan 2007 05:18:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Gray", "Jim", "" ], [ "Szalay", "Alex", "" ], [ "Budavari", "Tamas", "" ], [ "Lupton", "Robert", "" ], [ "Nieto-Santisteban", "Maria", "" ], [ "Thakar", "Ani", "" ] ]
cs/0701173
Jim Gray
Vik Singh, Jim Gray, Ani Thakar, Alexander S. Szalay, Jordan Raddick, Bill Boroski, Svetlana Lebedeva, Brian Yanny
SkyServer Traffic Report - The First Five Years
null
null
null
MSR TR-2006-190
cs.DB cs.CE
null
The SkyServer is an Internet portal to the Sloan Digital Sky Survey Catalog Archive Server. From 2001 to 2006, there were a million visitors in 3 million sessions generating 170 million Web hits, 16 million ad-hoc SQL queries, and 62 million page views. The site currently averages 35 thousand visitors and 400 thousand sessions per month. The Web and SQL logs are public. We analyzed traffic and sessions by duration, usage pattern, data product, and client type (mortal or bot) over time. The analysis shows (1) the site's popularity, (2) the educational website that delivered nearly fifty thousand hours of interactive instruction, (3) the relative use of interactive, programmatic, and batch-local access, (4) the success of offering ad-hoc SQL, personal database, and batch job access to scientists as part of the data publication, (5) the continuing interest in "old" datasets, (6) the usage of SQL constructs, and (7) a novel approach of using the corpus of correct SQL queries to suggest similar but correct statements when a user presents an incorrect SQL statement.
[ { "version": "v1", "created": "Fri, 26 Jan 2007 05:22:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Singh", "Vik", "" ], [ "Gray", "Jim", "" ], [ "Thakar", "Ani", "" ], [ "Szalay", "Alexander S.", "" ], [ "Raddick", "Jordan", "" ], [ "Boroski", "Bill", "" ], [ "Lebedeva", "Svetlana", "" ], [ "Yanny", "Brian", "" ] ]
cs/0701175
Dimitris Kalles
Th. Hadzilacos, D. Kalles, M. Pouliopoulou
On the Software and Knowledge Engineering Aspects of the Educational Process
Contains 21 sparse pages, 8 figures. Accepted for publication in International Journal of Software Engineering and Knowledge Engineering (IJSEKE). Keywords: Tools for interactive learning and teaching, Modelling, Distance Learning
null
null
null
cs.SE cs.DL
null
The Hellenic Open University has embarked on a large-scale effort to enhance its textbook-based material with content that demonstrably supports the basic tenets of distance learning. The challenge is to set up a framework that allows for the production-level creation, distribution and consumption of content, and at the same time, evaluate the effort in terms of technological, educational and organizational knowledge gained. This paper presents a model of the educational process that is used as a development backbone and argues about its conceptual and technical practicality at large.
[ { "version": "v1", "created": "Fri, 26 Jan 2007 14:51:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Hadzilacos", "Th.", "" ], [ "Kalles", "D.", "" ], [ "Pouliopoulou", "M.", "" ] ]
cs/0701176
Alain Frisch
Alain Frisch (INRIA Rocquencourt), Haruo Hosoya (CST)
Towards Practical Typechecking for Macro Tree Transducers
null
null
null
null
cs.PL
null
Macro tree transducers (mtt) are an important model that both covers many useful XML transformations and allows decidable exact typechecking. This paper reports our first step toward an implementation of mtt typechecker that has a practical efficiency. Our approach is to represent an input type obtained from a backward inference as an alternating tree automaton, in a style similar to Tozawa's XSLT0 typechecking. In this approach, typechecking reduces to checking emptiness of an alternating tree automaton. We propose several optimizations (Cartesian factorization, state partitioning) on the backward inference process in order to produce much smaller alternating tree automata than the naive algorithm, and we present our efficient algorithm for checking emptiness of alternating tree automata, where we exploit the explicit representation of alternation for local optimizations. Our preliminary experiments confirm that our algorithm has a practical performance that can typecheck simple transformations with respect to the full XHTML in a reasonable time.
[ { "version": "v1", "created": "Fri, 26 Jan 2007 15:16:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Frisch", "Alain", "", "INRIA Rocquencourt" ], [ "Hosoya", "Haruo", "", "CST" ] ]
cs/0701180
Fionn Murtagh
F. Murtagh, J. Mothe and K. Englmeier
Ontology from Local Hierarchical Structure in Text
35 pp., 12 figures
null
null
null
cs.IR
null
We study the notion of hierarchy in the context of visualizing textual data and navigating text collections. A formal framework for ``hierarchy'' is given by an ultrametric topology. This provides us with a theoretical foundation for concept hierarchy creation. A major objective is {\em scalable} annotation or labeling of concept maps. Serendipitously we pursue other objectives such as deriving common word pair (and triplet) phrases, i.e., word 2- and 3-grams. We evaluate our approach using (i) a collection of texts, (ii) a single text subdivided into successive parts (for which we provide an interactive demonstrator), and (iii) a text subdivided at the sentence or line level. While detailing a generic framework, a distinguishing feature of our work is that we focus on {\em locality} of hierarchic structure in order to extract semantic information.
[ { "version": "v1", "created": "Sat, 27 Jan 2007 18:31:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Murtagh", "F.", "" ], [ "Mothe", "J.", "" ], [ "Englmeier", "K.", "" ] ]
cs/0701181
Fionn Murtagh
Fionn Murtagh
A Note on Local Ultrametricity in Text
18 pp
null
null
null
cs.CL
null
High dimensional, sparsely populated data spaces have been characterized in terms of ultrametric topology. This implies that there are natural, not necessarily unique, tree or hierarchy structures defined by the ultrametric topology. In this note we study the extent of local ultrametric topology in texts, with the aim of finding unique ``fingerprints'' for a text or corpus, discriminating between texts from different domains, and opening up the possibility of exploiting hierarchical structures in the data. We use coherent and meaningful collections of over 1000 texts, comprising over 1.3 million words.
[ { "version": "v1", "created": "Sat, 27 Jan 2007 19:09:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Murtagh", "Fionn", "" ] ]
cs/0701183
Gilles Villard
Gilles Villard (LIP)
Certification of the QR factor R, and of lattice basis reducedness
null
null
null
Vil06-1
cs.SC cs.NA
null
Given a lattice basis of n vectors in Z^n, we propose an algorithm using 12n^3+O(n^2) floating point operations for checking whether the basis is LLL-reduced. If the basis is reduced then the algorithm will hopefully answer ''yes''. If the basis is not reduced, or if the precision used is not sufficient with respect to n, and to the numerical properties of the basis, the algorithm will answer ''failed''. Hence a positive answer is a rigorous certificate. For implementing the certificate itself, we propose a floating point algorithm for computing (certified) error bounds for the entries of the R factor of the QR matrix factorization. This algorithm takes into account all possible approximation and rounding errors. The cost 12n^3+O(n^2) of the certificate is only six times more than the cost of numerical algorithms for computing the QR factorization itself, and the certificate may be implemented using matrix library routines only. We report experiments that show that for a reduced basis of adequate dimension and quality the certificate succeeds, and establish the effectiveness of the certificate. This effectiveness is applied for certifying the output of fastest existing floating point heuristics of LLL reduction, without slowing down the whole process.
[ { "version": "v1", "created": "Mon, 29 Jan 2007 09:15:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Villard", "Gilles", "", "LIP" ] ]
cs/0701188
Gilles Villard
Wayne Eberly (UCALGARY), Mark Giesbrecht (UWO), Pascal Giorgi (LP2A), Arne Storjohann (UWO), Gilles Villard (LIP)
Faster Inversion and Other Black Box Matrix Computations Using Efficient Block Projections
null
null
null
EGGSV07-1
cs.SC cs.NA
null
Block projections have been used, in [Eberly et al. 2006], to obtain an efficient algorithm to find solutions for sparse systems of linear equations. A bound of softO(n^(2.5)) machine operations is obtained assuming that the input matrix can be multiplied by a vector with constant-sized entries in softO(n) machine operations. Unfortunately, the correctness of this algorithm depends on the existence of efficient block projections, and this has been conjectured. In this paper we establish the correctness of the algorithm from [Eberly et al. 2006] by proving the existence of efficient block projections over sufficiently large fields. We demonstrate the usefulness of these projections by deriving improved bounds for the cost of several matrix problems, considering, in particular, ``sparse'' matrices that can be be multiplied by a vector using softO(n) field operations. We show how to compute the inverse of a sparse matrix over a field F using an expected number of softO(n^(2.27)) operations in F. A basis for the null space of a sparse matrix, and a certification of its rank, are obtained at the same cost. An application to Kaltofen and Villard's Baby-Steps/Giant-Steps algorithms for the determinant and Smith Form of an integer matrix yields algorithms requiring softO(n^(2.66)) machine operations. The derived algorithms are all probabilistic of the Las Vegas type.
[ { "version": "v1", "created": "Mon, 29 Jan 2007 18:20:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Eberly", "Wayne", "", "UCALGARY" ], [ "Giesbrecht", "Mark", "", "UWO" ], [ "Giorgi", "Pascal", "", "LP2A" ], [ "Storjohann", "Arne", "", "UWO" ], [ "Villard", "Gilles", "", "LIP" ] ]
cs/0701190
Aaron Harwood
Thomas Jacobs and Aaron Harwood
A Peer-to-Peer Browsable File Index using a Popularity Based Global Namespace
null
null
null
null
cs.DC cs.NI
null
The distribution of files using decentralized, peer-to-peer (P2P) systems, has significant advantages over centralized approaches. It is however more difficult to settle on the best approach for file sharing. Most file sharing systems are based on query string searches, leading to a relatively simple but inefficient broadcast or to an efficient but relatively complicated index in a structured environment. In this paper we use a browsable peer-to-peer file index consisting of files which serve as directory nodes, interconnecting to form a directory network. We implemented the system based on BitTorrent and Kademlia. The directory network inherits all of the advantages of decentralization and provides browsable, efficient searching. To avoid conflict between users in the P2P system while also imposing no additional restrictions, we allow multiple versions of each directory node to simultaneously exist -- using popularity as the basis for default browsing behavior. Users can freely add files and directory nodes to the network. We show, using a simulation of user behavior and file quality, that the popularity based system consistently leads users to a high quality directory network; above the average quality of user updates. Q
[ { "version": "v1", "created": "Tue, 30 Jan 2007 04:00:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Jacobs", "Thomas", "" ], [ "Harwood", "Aaron", "" ] ]
cs/0701191
David Monniaux
David Monniaux (LIENS)
The parallel implementation of the Astr\'{e}e static analyzer
null
APLAS: Programming languages and systems (2005) 86-96
10.1007/11575467_7
null
cs.PL cs.PF
null
The Astr\'{e}e static analyzer is a specialized tool that can prove the absence of runtime errors, including arithmetic overflows, in large critical programs. Keeping analysis times reasonable for industrial use is one of the design objectives. In this paper, we discuss the parallel implementation of the analysis.
[ { "version": "v1", "created": "Tue, 30 Jan 2007 15:20:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Monniaux", "David", "", "LIENS" ] ]
cs/0701195
David Monniaux
David Monniaux (LIENS)
An Abstract Monte-Carlo Method for the Analysis of Probabilistic Programs
null
POPL: Annual Symposium on Principles of Programming Languages (2001) 93 - 101
10.1145/360204.360211
null
cs.PL cs.PF
null
We introduce a new method, combination of random testing and abstract interpretation, for the analysis of programs featuring both probabilistic and non-probabilistic nondeterminism. After introducing "ordinary" testing, we show how to combine testing and abstract interpretation and give formulas linking the precision of the results to the number of iterations. We then discuss complexity and optimization issues and end with some experimental results.
[ { "version": "v1", "created": "Tue, 30 Jan 2007 17:14:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Monniaux", "David", "", "LIENS" ] ]
cs/0701198
Raissa M. D'Souza
R. M. D'Souza, C. Borgs, J. T. Chayes, N. Berger and R. D. Kleinberg
Fitting the WHOIS Internet data
Supplemental information for "Emergence of Tempered Preferential Attachment From Optimization", to appear (open access) PNAS USA, 2007
null
null
null
cs.NI
null
We consider the RIPE WHOIS Internet data as characterized by the Cooperative Association for Internet Data Analysis (CAIDA), and show that the Tempered Preferential Attachment model [1] provides an excellent fit to this data. [1] D'Souza, Borgs, Chayes, Berger and Kleinberg, to appear PNAS USA, 2007.
[ { "version": "v1", "created": "Wed, 31 Jan 2007 02:51:45 GMT" } ]
2007-05-23T00:00:00
[ [ "D'Souza", "R. M.", "" ], [ "Borgs", "C.", "" ], [ "Chayes", "J. T.", "" ], [ "Berger", "N.", "" ], [ "Kleinberg", "R. D.", "" ] ]
cs/0701200
Francoise Detienne
Fran\c{c}oise Detienne (INRIA)
Reasoning from a schema and from an analog in software code reuse
null
Dans Fourth Workshop on Empirical Studies of Programmers, ESP91 (1991) 5-22
null
null
cs.SE
null
The activity of design involves the decomposition of problems into subproblems and the development and evaluation of solutions. In many cases, solution development is not done from scratch. Designers often evoke and adapt solutions developed in the past. These solutions may come from an internal source, i.e. the memory of the designers, and/or from an external source. The goal of this paper is to analyse the characteristics of the cognitive mechanisms, the knowledge and the representations involved in the code reuse activity performed by experienced programmers. More generally, the focus is the control structure of the reuse activity. Data collected in an experiment in which programmers had to design programs are analyzed. Two code reuse situations are distinguished depending on whether or not the processes involved in reuse start before the elaboration of what acts as a source-solution. Our analysis highlights the use of reasoning from a schema and from an analog in the code reuse activity.
[ { "version": "v1", "created": "Wed, 31 Jan 2007 16:41:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Detienne", "Françoise", "", "INRIA" ] ]
cs/0702010
Jacques Carette
Jacques Carette
A canonical form for some piecewise defined functions
submitted to ISSAC 2007
null
null
null
cs.SC cs.MS
null
We define a canonical form for piecewise defined functions. We show that this has a wider range of application as well as better complexity properties than previous work.
[ { "version": "v1", "created": "Thu, 1 Feb 2007 17:54:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Carette", "Jacques", "" ] ]
cs/0702011
Riccardo Pucella
Joseph Y. Halpern, Riccardo Pucella
Dealing With Logical Omniscience: Expressiveness and Pragmatics
24 pages. Submitted for publication
null
null
null
cs.LO cs.AI
null
We examine four approaches for dealing with the logical omniscience problem and their potential applicability: the syntactic approach, awareness, algorithmic knowledge, and impossible possible worlds. Although in some settings these approaches are equi-expressive and can capture all epistemic states, in other settings of interest (especially with probability in the picture), we show that they are not equi-expressive. We then consider the pragmatics of dealing with logical omniscience-- how to choose an approach and construct an appropriate model.
[ { "version": "v1", "created": "Thu, 1 Feb 2007 20:06:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Halpern", "Joseph Y.", "" ], [ "Pucella", "Riccardo", "" ] ]
cs/0702012
Daria Sorokina
Daria Sorokina, Johannes Gehrke, Simeon Warner, Paul Ginsparg
Plagiarism Detection in arXiv
Sixth International Conference on Data Mining (ICDM'06), Dec 2006
null
10.1109/ICDM.2006.126
null
cs.DB cs.DL cs.IR
null
We describe a large-scale application of methods for finding plagiarism in research document collections. The methods are applied to a collection of 284,834 documents collected by arXiv.org over a 14 year period, covering a few different research disciplines. The methodology efficiently detects a variety of problematic author behaviors, and heuristics are developed to reduce the number of false positives. The methods are also efficient enough to implement as a real-time submission screen for a collection many times larger.
[ { "version": "v1", "created": "Thu, 1 Feb 2007 20:52:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Sorokina", "Daria", "" ], [ "Gehrke", "Johannes", "" ], [ "Warner", "Simeon", "" ], [ "Ginsparg", "Paul", "" ] ]
cs/0702019
Maxime Gariel
Maxime Gariel, John-Paul Clarke and Eric Feron
A Dynamic I/O Model for TRACON Traffic Management
16 pages, 19 figures eps
null
null
null
cs.OH
null
This work investigates the TRACON flow management around a major airport. Aircraft flows are analyzed through a study of TRACON trajectories records. Rerouting and queuing processes are highlighted and airport characteristics are shown as function of the number of planes in the TRACON. Then, a simple input-output TRACON queuing and landing model is proposed. This model is calibrated and validated using available TRACON data. It reproduces the same phenomenon as the real system. This model is used to show the impact of limiting the number of aircrafts in the TRACON. A limited number of aircraft does not increase delays but reduces the controller's workload and increases safety.
[ { "version": "v1", "created": "Fri, 2 Feb 2007 22:55:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Gariel", "Maxime", "" ], [ "Clarke", "John-Paul", "" ], [ "Feron", "Eric", "" ] ]
cs/0702022
Changjia Chen
Chunxi Li and Changjia Chen
Gnutella: Topology Dynamics On Phase Space
11 pages, 14 figures
null
null
null
cs.NI
null
In this paper, the topology dynamic of Gnutella is studied through phase space. The dynamic changes in peer degree are studied as a time series in two dimensional phase space which is defined as the number of connected leaves and the number of connected ultras. The reported degrees are concentrated in three special Software related regions that we named as Ultra Stable Region, Leaf Stable Region and Transition Belt. A method is proposed to classify degree traces in phase space into different classes. Connection churn then is studied along with the churn in degree. It shows that the topological structure of Gnutella is rather stable in its connection degree but not the topology itself. The connection drop rate is estimated and the live time of connections is inferred afterwards. M/M/m/m loss queue system is introduced to model the degree keeping process in Gnutella. This model revealed that the degree stable is ensured by large new connection efforts. In other words the stable in topological structure of Gnutella is a results of essential unstable in its topology. That opens a challenge to the basic design philosophy of this network.
[ { "version": "v1", "created": "Sun, 4 Feb 2007 08:12:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Li", "Chunxi", "" ], [ "Chen", "Changjia", "" ] ]
cs/0702027
Andrew Gacek
Andrew Gacek
The Suspension Calculus and its Relationship to Other Explicit Treatments of Substitution in Lambda Calculi
84 pages
null
null
null
cs.LO cs.PL
null
The intrinsic treatment of binding in the lambda calculus makes it an ideal data structure for representing syntactic objects with binding such as formulas, proofs, types, and programs. Supporting such a data structure in an implementation is made difficult by the complexity of the substitution operation relative to lambda terms. In this paper we present the suspension calculus, an explicit treatment of meta level binding in the lambda calculus. We prove properties of this calculus which make it a suitable replacement for the lambda calculus in implementation. Finally, we compare the suspension calculus with other explicit treatments of substitution.
[ { "version": "v1", "created": "Mon, 5 Feb 2007 14:35:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Gacek", "Andrew", "" ] ]
cs/0702029
Mikkel Thorup
Mario Szegedy and Mikkel Thorup
On the variance of subset sum estimation
20 pages, 1 figure
null
null
null
cs.DS
null
For high volume data streams and large data warehouses, sampling is used for efficient approximate answers to aggregate queries over selected subsets. Mathematically, we are dealing with a set of weighted items and want to support queries to arbitrary subset sums. With unit weights, we can compute subset sizes which together with the previous sums provide the subset averages. The question addressed here is which sampling scheme we should use to get the most accurate subset sum estimates. We present a simple theorem on the variance of subset sum estimation and use it to prove variance optimality and near-optimality of subset sum estimation with different known sampling schemes. This variance is measured as the average over all subsets of any given size. By optimal we mean there is no set of input weights for which any sampling scheme can have a better average variance. Such powerful results can never be established experimentally. The results of this paper are derived mathematically. For example, we show that appropriately weighted systematic sampling is simultaneously optimal for all subset sizes. More standard schemes such as uniform sampling and probability-proportional-to-size sampling with replacement can be arbitrarily bad. Knowing the variance optimality of different sampling schemes can help deciding which sampling scheme to apply in a given context.
[ { "version": "v1", "created": "Mon, 5 Feb 2007 15:55:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Szegedy", "Mario", "" ], [ "Thorup", "Mikkel", "" ] ]
cs/0702032
Reid Andersen
Reid Andersen
Finding large and small dense subgraphs
12 pages, no figures
null
null
null
cs.DS
null
We consider two optimization problems related to finding dense subgraphs. The densest at-least-k-subgraph problem (DalkS) is to find an induced subgraph of highest average degree among all subgraphs with at least k vertices, and the densest at-most-k-subgraph problem (DamkS) is defined similarly. These problems are related to the well-known densest k-subgraph problem (DkS), which is to find the densest subgraph on exactly k vertices. We show that DalkS can be approximated efficiently, while DamkS is nearly as hard to approximate as the densest k-subgraph problem.
[ { "version": "v1", "created": "Mon, 5 Feb 2007 19:29:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Andersen", "Reid", "" ] ]
cs/0702034
Rama Raghavan
L.Jeganathan and R.Rama
Graph Splicing System
13 pages,5 figures
null
null
null
cs.DM
null
The string splicing was introduced by Tom Head which stands as an abstract model for the DNA recombination under the influence of restriction enzymes. The complex chemical process of three dimensional molecules in three dimensional space can be modeled using graphs. The graph splicing systems which were studied so far, can only be applied to a particular type of graphs which could be interpreted as linear or circular graphs. In this paper, we take a different and a novel approach to splice two graphs and introduce a splicing system for graphs that can be applied to all types of graphs. Splicing two graphs can be thought of as a new operation, among the graphs, that generates many new graphs from the given two graphs. Taking a different line of thinking, some of the graph theoretical results of the splicing are studied.
[ { "version": "v1", "created": "Tue, 6 Feb 2007 05:46:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Jeganathan", "L.", "" ], [ "Rama", "R.", "" ] ]
cs/0702036
Michael Fisher
Clare Dixon, Michael Fisher, Boris Konev, Alexei Lisitsa
Efficient First-Order Temporal Logic for Infinite-State Systems
16 pages, 2 figures
null
null
null
cs.LO
null
In this paper we consider the specification and verification of infinite-state systems using temporal logic. In particular, we describe parameterised systems using a new variety of first-order temporal logic that is both powerful enough for this form of specification and tractable enough for practical deductive verification. Importantly, the power of the temporal language allows us to describe (and verify) asynchronous systems, communication delays and more complex properties such as liveness and fairness properties. These aspects appear difficult for many other approaches to infinite-state verification.
[ { "version": "v1", "created": "Tue, 6 Feb 2007 15:10:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Dixon", "Clare", "" ], [ "Fisher", "Michael", "" ], [ "Konev", "Boris", "" ], [ "Lisitsa", "Alexei", "" ] ]
cs/0702038
Minkyu Kim
Minkyu Kim, Varun Aggarwal, Una-May O'Reilly, Muriel Medard, Wonsik Kim
Genetic Representations for Evolutionary Minimization of Network Coding Resources
10 pages, 3 figures, accepted to the 4th European Workshop on the Application of Nature-Inspired Techniques to Telecommunication Networks and Other Connected Systems (EvoCOMNET 2007)
null
null
null
cs.NE cs.NI
null
We demonstrate how a genetic algorithm solves the problem of minimizing the resources used for network coding, subject to a throughput constraint, in a multicast scenario. A genetic algorithm avoids the computational complexity that makes the problem NP-hard and, for our experiments, greatly improves on sub-optimal solutions of established methods. We compare two different genotype encodings, which tradeoff search space size with fitness landscape, as well as the associated genetic operators. Our finding favors a smaller encoding despite its fewer intermediate solutions and demonstrates the impact of the modularity enforced by genetic operators on the performance of the algorithm.
[ { "version": "v1", "created": "Wed, 7 Feb 2007 05:54:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Kim", "Minkyu", "" ], [ "Aggarwal", "Varun", "" ], [ "O'Reilly", "Una-May", "" ], [ "Medard", "Muriel", "" ], [ "Kim", "Wonsik", "" ] ]
cs/0702039
Xavier Goaoc
Otfried Cheong, Xavier Goaoc (INRIA Lorraine - LORIA), Andreas Holmsen, Sylvain Petitjean (INRIA Lorraine - LORIA)
Hadwiger and Helly-type theorems for disjoint unit spheres
null
Discrete and Computational Geometry (2006)
null
null
cs.CG
null
We prove Helly-type theorems for line transversals to disjoint unit balls in $\R^{d}$. In particular, we show that a family of $n \geq 2d$ disjoint unit balls in $\R^d$ has a line transversal if, for some ordering $\prec$ of the balls, any subfamily of 2d balls admits a line transversal consistent with $\prec$. We also prove that a family of $n \geq 4d-1$ disjoint unit balls in $\R^d$ admits a line transversal if any subfamily of size $4d-1$ admits a transversal.
[ { "version": "v1", "created": "Wed, 7 Feb 2007 08:29:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Cheong", "Otfried", "", "INRIA Lorraine - LORIA" ], [ "Goaoc", "Xavier", "", "INRIA Lorraine - LORIA" ], [ "Holmsen", "Andreas", "", "INRIA Lorraine - LORIA" ], [ "Petitjean", "Sylvain", "", "INRIA Lorraine - LORIA" ] ]
cs/0702040
Yves Guiraud
Yves Guiraud
Polygraphs for termination of left-linear term rewriting systems
15 pages
null
null
null
cs.LO math.CT
null
We present a methodology for proving termination of left-linear term rewriting systems (TRSs) by using Albert Burroni's polygraphs, a kind of rewriting systems on algebraic circuits. We translate the considered TRS into a polygraph of minimal size whose termination is proven with a polygraphic interpretation, then we get back the property on the TRS. We recall Yves Lafont's general translation of TRSs into polygraphs and known links between their termination properties. We give several conditions on the original TRS, including being a first-order functional program, that ensure that we can reduce the size of the polygraphic translation. We also prove sufficient conditions on the polygraphic interpretations of a minimal translation to imply termination of the original TRS. Examples are given to compare this method with usual polynomial interpretations.
[ { "version": "v1", "created": "Wed, 7 Feb 2007 10:18:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Guiraud", "Yves", "" ] ]
cs/0702042
Jo\~ao Barros
Luis Lopes, Francisco Martins, Miguel S. Silva, Joao Barros
A Formal Model for Programming Wireless Sensor Networks
14 pages, 0 figures, Submitted for Publication
null
null
null
cs.DC cs.PL
null
In this paper we present new developments in the expressiveness and in the theory of a Calculus for Sensor Networks (CSN). We combine a network layer of sensor devices with a local object model to describe sensor devices with state. The resulting calculus is quite small and yet very expressive. We also present a type system and a type invariance result for the calculus. These results provide the fundamental framework for the development of programming languages and run-time environments.
[ { "version": "v1", "created": "Wed, 7 Feb 2007 14:17:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Lopes", "Luis", "" ], [ "Martins", "Francisco", "" ], [ "Silva", "Miguel S.", "" ], [ "Barros", "Joao", "" ] ]
cs/0702047
Holger Spakowski
Holger Spakowski and Rahul Tripathi
Hierarchical Unambiguity
null
null
null
null
cs.CC
null
We develop techniques to investigate relativized hierarchical unambiguous computation. We apply our techniques to generalize known constructs involving relativized unambiguity based complexity classes (UP and \mathcal{UP}) to new constructs involving arbitrary higher levels of the relativized unambiguous polynomial hierarchy (UPH). Our techniques are developed on constraints imposed by hierarchical arrangement of unambiguous nondeterministic polynomial-time Turing machines, and so they differ substantially, in applicability and in nature, from standard methods (such as the switching lemma [Hastad, Computational Limitations of Small-Depth Circuits, MIT Press, 1987]), which play roles in carrying out similar generalizations. Aside from achieving these generalizations, we resolve a question posed by Cai, Hemachandra, and Vyskoc [J. Cai, L. Hemachandra, and J. Vyskoc, Promises and fault-tolerant database access, In K. Ambos-Spies, S. Homer, and U. Schoening, editors, Complexity Theory, pages 101-146. Cambridge University Press, 1993] on an issue related to nonadaptive Turing access to UP and adaptive smart Turing access to \mathcal{UP}.
[ { "version": "v1", "created": "Thu, 8 Feb 2007 16:00:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Spakowski", "Holger", "" ], [ "Tripathi", "Rahul", "" ] ]
cs/0702048
Ken Wakita
Ken Wakita and Toshiyuki Tsurumi
Finding Community Structure in Mega-scale Social Networks
9 pages, 15 figures
null
null
null
cs.CY physics.soc-ph
null
Community analysis algorithm proposed by Clauset, Newman, and Moore (CNM algorithm) finds community structure in social networks. Unfortunately, CNM algorithm does not scale well and its use is practically limited to networks whose sizes are up to 500,000 nodes. The paper identifies that this inefficiency is caused from merging communities in unbalanced manner. The paper introduces three kinds of metrics (consolidation ratio) to control the process of community analysis trying to balance the sizes of the communities being merged. Three flavors of CNM algorithms are built incorporating those metrics. The proposed techniques are tested using data sets obtained from existing social networking service that hosts 5.5 million users. All the methods exhibit dramatic improvement of execution efficiency in comparison with the original CNM algorithm and shows high scalability. The fastest method processes a network with 1 million nodes in 5 minutes and a network with 4 million nodes in 35 minutes, respectively. Another one processes a network with 500,000 nodes in 50 minutes (7 times faster than the original algorithm), finds community structures that has improved modularity, and scales to a network with 5.5 million.
[ { "version": "v1", "created": "Thu, 8 Feb 2007 16:40:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Wakita", "Ken", "" ], [ "Tsurumi", "Toshiyuki", "" ] ]
cs/0702049
Gregory Gutin
Noga Alon, Fedor Fomin, Gregory Gutin, Michael Krivelevich and Saket Saurabh
Parameterized Algorithms for Directed Maximum Leaf Problems
null
null
null
null
cs.DS cs.DM
null
We prove that finding a rooted subtree with at least $k$ leaves in a digraph is a fixed parameter tractable problem. A similar result holds for finding rooted spanning trees with many leaves in digraphs from a wide family $\cal L$ that includes all strong and acyclic digraphs. This settles completely an open question of Fellows and solves another one for digraphs in $\cal L$. Our algorithms are based on the following combinatorial result which can be viewed as a generalization of many results for a `spanning tree with many leaves' in the undirected case, and which is interesting on its own: If a digraph $D\in \cal L$ of order $n$ with minimum in-degree at least 3 contains a rooted spanning tree, then $D$ contains one with at least $(n/2)^{1/5}-1$ leaves.
[ { "version": "v1", "created": "Thu, 8 Feb 2007 18:25:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Alon", "Noga", "" ], [ "Fomin", "Fedor", "" ], [ "Gutin", "Gregory", "" ], [ "Krivelevich", "Michael", "" ], [ "Saurabh", "Saket", "" ] ]
cs/0702053
Andrew Badr
Andrew Badr, Ian Shipman
The DFAs of Finitely Different Languages
null
null
null
null
cs.CC
null
Two languages are "finitely different" if their symmetric difference is finite. We consider the DFAs of finitely different regular languages and find major structural similarities. We proceed to consider the smallest DFAs that recognize a language finitely different from some given DFA. Such "f-minimal" DFAs are not unique, and this non-uniqueness is characterized. Finally, we offer a solution to the minimization problem of finding such f-minimal DFAs.
[ { "version": "v1", "created": "Fri, 9 Feb 2007 03:42:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Badr", "Andrew", "" ], [ "Shipman", "Ian", "" ] ]