id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 3
62.8k
| title
stringlengths 1
382
| comments
stringlengths 1
1.15k
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 7
153
⌀ | report-no
stringlengths 1
509
⌀ | categories
stringlengths 5
125
| license
stringclasses 9
values | abstract
stringlengths 6
6.09k
| versions
listlengths 1
187
| update_date
timestamp[s]date 2007-05-23 00:00:00
2025-04-25 00:00:00
| authors_parsed
sequencelengths 1
2.83k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0702054 | Christoph Durr | Christoph Durr and Nguyen Kim Thang | Nash equilibria in Voronoi games on graphs | null | null | null | null | cs.GT cs.DS | null | In this paper we study a game where every player is to choose a vertex
(facility) in a given undirected graph. All vertices (customers) are then
assigned to closest facilities and a player's payoff is the number of customers
assigned to it. We show that deciding the existence of a Nash equilibrium for a
given graph is NP-hard which to our knowledge is the first result of this kind
for a zero-sum game. We also introduce a new measure, the social cost
discrepancy, defined as the ratio of the costs between the worst and the best
Nash equilibria. We show that the social cost discrepancy in our game is
Omega(sqrt(n/k)) and O(sqrt(kn)), where n is the number of vertices and k the
number of players.
| [
{
"version": "v1",
"created": "Fri, 9 Feb 2007 12:12:17 GMT"
},
{
"version": "v2",
"created": "Fri, 13 Apr 2007 14:11:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Durr",
"Christoph",
""
],
[
"Thang",
"Nguyen Kim",
""
]
] |
cs/0702055 | Alexander Paraskevov | A.V. Paraskevov | On the possibility of making the complete computer model of a human
brain | null | null | null | null | cs.NE | null | The development of the algorithm of a neural network building by the
corresponding parts of a DNA code is discussed.
| [
{
"version": "v1",
"created": "Fri, 9 Feb 2007 13:16:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Paraskevov",
"A. V.",
""
]
] |
cs/0702056 | Hanene Mohamed | Hanene Mohamed (INRIA Rocquencourt) | A probabilistic analysis of a leader election algorithm | null | Fourth Colloquium on Mathematics and Computer Science Algorithms,
Trees, Combinatorics and Probabilities (2006) 225-236 | null | null | cs.DS | null | A {\em leader election} algorithm is an elimination process that divides
recursively into tow subgroups an initial group of n items, eliminates one
subgroup and continues the procedure until a subgroup is of size 1. In this
paper the biased case is analyzed. We are interested in the {\em cost} of the
algorithm, i.e. the number of operations needed until the algorithm stops.
Using a probabilistic approach, the asymptotic behavior of the algorithm is
shown to be related to the behavior of a hitting time of two random sequences
on [0,1].
| [
{
"version": "v1",
"created": "Fri, 9 Feb 2007 15:16:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mohamed",
"Hanene",
"",
"INRIA Rocquencourt"
]
] |
cs/0702058 | Kia Kai Li | Kia Kai Li | Exploring k-Colorability | null | null | null | null | cs.CC | null | An introductory paper to the graph k-colorability problem.
| [
{
"version": "v1",
"created": "Fri, 9 Feb 2007 23:07:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Li",
"Kia Kai",
""
]
] |
cs/0702067 | Fionn Murtagh | Fionn Murtagh | The Haar Wavelet Transform of a Dendrogram: Additional Notes | 37 pp, 1 fig. Supplementary material to "The Haar Wavelet Transform
of a Dendrogram", http://arxiv.org/abs/cs.IR/0608107 | null | null | null | cs.IR | null | We consider the wavelet transform of a finite, rooted, node-ranked, $p$-way
tree, focusing on the case of binary ($p = 2$) trees. We study a Haar wavelet
transform on this tree. Wavelet transforms allow for multiresolution analysis
through translation and dilation of a wavelet function. We explore how this
works in our tree context.
| [
{
"version": "v1",
"created": "Sat, 10 Feb 2007 21:26:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Murtagh",
"Fionn",
""
]
] |
cs/0702074 | Xavier P\'erez-Gim\'enez | Josep Diaz, Dieter Mitsche, Xavier Perez | Dynamic Random Geometric Graphs | null | null | null | null | cs.DM | null | In this work we introduce Dynamic Random Geometric Graphs as a basic rough
model for mobile wireless sensor networks, where communication distances are
set to the known threshold for connectivity of static random geometric graphs.
We provide precise asymptotic results for the expected length of the
connectivity and disconnectivity periods of the network. We believe the formal
tools developed in this work could be of use in future studies in more concrete
settings. In addition, for static random geometric graphs at the threshold for
connectivity, we provide asymptotic expressions on the probability of existence
of components according to their sizes.
| [
{
"version": "v1",
"created": "Tue, 13 Feb 2007 09:00:34 GMT"
},
{
"version": "v2",
"created": "Fri, 20 Apr 2007 09:15:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Diaz",
"Josep",
""
],
[
"Mitsche",
"Dieter",
""
],
[
"Perez",
"Xavier",
""
]
] |
cs/0702075 | Maurice H. T. Ling | Maurice HT Ling | Firebird Database Backup by Serialized Database Table Dump | 5 pages | Ling, Maurice HT. 2007. Firebird Database Backup by Serialized
Database Table Dump. The Python Papers 2 (1): 10-14 | null | null | cs.DB | null | This paper presents a simple data dump and load utility for Firebird
databases which mimics mysqldump in MySQL. This utility, fb_dump and fb_load,
for dumping and loading respectively, retrieves each database table using
kinterbasdb and serializes the data using marshal module. This utility has two
advantages over the standard Firebird database backup utility, gbak. Firstly,
it is able to backup and restore single database tables which might help to
recover corrupted databases. Secondly, the output is in text-coded format (from
marshal module) making it more resilient than a compressed text backup, as in
the case of using gbak.
| [
{
"version": "v1",
"created": "Tue, 13 Feb 2007 11:13:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ling",
"Maurice HT",
""
]
] |
cs/0702078 | Reid Andersen | Reid Andersen | A Local Algorithm for Finding Dense Subgraphs | 14 pages, no figures | null | null | null | cs.DS cs.CC | null | We present a local algorithm for finding dense subgraphs of bipartite graphs,
according to the definition of density proposed by Kannan and Vinay. Our
algorithm takes as input a bipartite graph with a specified starting vertex,
and attempts to find a dense subgraph near that vertex. We prove that for any
subgraph S with k vertices and density theta, there are a significant number of
starting vertices within S for which our algorithm produces a subgraph S' with
density theta / O(log n) on at most O(D k^2) vertices, where D is the maximum
degree. The running time of the algorithm is O(D k^2), independent of the
number of vertices in the graph.
| [
{
"version": "v1",
"created": "Tue, 13 Feb 2007 23:41:46 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Andersen",
"Reid",
""
]
] |
cs/0702081 | Rick Dale | Rick Dale | Random Sentences from a Generalized Phrase-Structure Grammar Interpreter | Brief paper with source code and examples | null | null | null | cs.CL | null | In numerous domains in cognitive science it is often useful to have a source
for randomly generated corpora. These corpora may serve as a foundation for
artificial stimuli in a learning experiment (e.g., Ellefson & Christiansen,
2000), or as input into computational models (e.g., Christiansen & Dale, 2001).
The following compact and general C program interprets a phrase-structure
grammar specified in a text file. It follows parameters set at a Unix or
Unix-based command-line and generates a corpus of random sentences from that
grammar.
| [
{
"version": "v1",
"created": "Wed, 14 Feb 2007 06:05:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dale",
"Rick",
""
]
] |
cs/0702083 | Serebrenik Alexander | Alexander Serebrenik, Tom Schrijvers, Bart Demoen | Improving Prolog programs: Refactoring for Prolog | To appear in Theory and Practice of Logic Programming (TPLP) | null | null | 2006-1 | cs.SE | null | Refactoring is an established technique from the object-oriented (OO)
programming community to restructure code: it aims at improving software
readability, maintainability and extensibility. Although refactoring is not
tied to the OO-paradigm in particular, its ideas have not been applied to Logic
Programming until now.
This paper applies the ideas of refactoring to Prolog programs. A catalogue
is presented listing refactorings classified according to scope. Some of the
refactorings have been adapted from the OO-paradigm, while others have been
specifically designed for Prolog. The discrepancy between intended and
operational semantics in Prolog is also addressed by some of the refactorings.
In addition, ViPReSS, a semi-automatic refactoring browser, is discussed and
the experience with applying ViPReSS to a large Prolog legacy system is
reported. The main conclusion is that refactoring is both a viable technique in
Prolog and a rather desirable one.
| [
{
"version": "v1",
"created": "Wed, 14 Feb 2007 09:53:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Serebrenik",
"Alexander",
""
],
[
"Schrijvers",
"Tom",
""
],
[
"Demoen",
"Bart",
""
]
] |
cs/0702085 | Vincenzo Nicosia | V. Carchiolo, M. Malgeri, G. Mangioni and V. Nicosia | Social Behaviours Applied to P2P Systems: An efficient Algorithm for
Resource Organisation | 5 Pages; 8 Figures; Presented at COPS 2006 -- WETICE -- Manchester
(UK) | 15th IEEE International Workshops on Enabling Technologies:
Infrastructure for Collaborative Enterprises, 2006. WETICE '06. June 2006
Page(s):65 - 72 | null | null | cs.DC cs.IR | null | P2P systems are a great solution to the problem of distributing resources.
The main issue of P2P networks is that searching and retrieving resources
shared by peers is usually expensive and does not take into account
similarities among peers. In this paper we present preliminary simulations of
PROSA, a novel algorithm for P2P network structuring, inspired by social
behaviours. Peers in PROSA self--organise in social groups of similar peers,
called ``semantic--groups'', depending on the resources they are sharing. Such
a network smoothly evolves to a small--world graph, where queries for resources
are efficiently and effectively routed.
| [
{
"version": "v1",
"created": "Wed, 14 Feb 2007 11:53:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Carchiolo",
"V.",
""
],
[
"Malgeri",
"M.",
""
],
[
"Mangioni",
"G.",
""
],
[
"Nicosia",
"V.",
""
]
] |
cs/0702086 | Andreas U. Schmidt | Nicolai Kuntze and Andreas U. Schmidt | Protection of DVB Systems by Trusted Computing | Accepted contribution to the IEEE International Symposium on
Broadband Multimedia Systems and Broadcasting 2007, 28-29 March 2007 at the
Orange County Convention Center, Orlando, FL, USA; 7 pages, 4 figures | null | null | null | cs.CR | null | We describe a concept to employ Trusted Computing technology to secure
Conditional Access Systems (CAS) for DVB. Central is the embedding of a trusted
platform module (TPM) into the set-top-box or residential home gateway. Various
deployment scenarios exhibit possibilities of charging co-operation with mobile
network operators (MNO), or other payment providers.
| [
{
"version": "v1",
"created": "Wed, 14 Feb 2007 11:58:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kuntze",
"Nicolai",
""
],
[
"Schmidt",
"Andreas U.",
""
]
] |
cs/0702088 | Shanghua Teng | Xi Chen and Shang-Hua Teng | Paths Beyond Local Search: A Nearly Tight Bound for Randomized
Fixed-Point Computation | null | null | null | null | cs.GT | null | In 1983, Aldous proved that randomization can speedup local search. For
example, it reduces the query complexity of local search over [1:n]^d from
Theta (n^{d-1}) to O (d^{1/2}n^{d/2}). It remains open whether randomization
helps fixed-point computation. Inspired by this open problem and recent
advances on equilibrium computation, we have been fascinated by the following
question:
Is a fixed-point or an equilibrium fundamentally harder to find than a local
optimum? In this paper, we give a nearly-tight bound of Omega(n)^{d-1} on the
randomized query complexity for computing a fixed point of a discrete Brouwer
function over [1:n]^d. Since the randomized query complexity of global
optimization over [1:n]^d is Theta (n^{d}), the randomized query model over
[1:n]^d strictly separates these three important search problems: Global
optimization is harder than fixed-point computation, and fixed-point
computation is harder than local search. Our result indeed demonstrates that
randomization does not help much in fixed-point computation in the query model;
the deterministic complexity of this problem is Theta (n^{d-1}).
| [
{
"version": "v1",
"created": "Fri, 16 Feb 2007 07:32:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chen",
"Xi",
""
],
[
"Teng",
"Shang-Hua",
""
]
] |
cs/0702091 | raphael M. Jungers | Raphael M. Jungers and Vincent D. Blondel | Observable Graphs | 15 pages, 8 figures | null | null | null | cs.MA | null | An edge-colored directed graph is \emph{observable} if an agent that moves
along its edges is able to determine his position in the graph after a
sufficiently long observation of the edge colors. When the agent is able to
determine his position only from time to time, the graph is said to be
\emph{partly observable}. Observability in graphs is desirable in situations
where autonomous agents are moving on a network and one wants to localize them
(or the agent wants to localize himself) with limited information. In this
paper, we completely characterize observable and partly observable graphs and
show how these concepts relate to observable discrete event systems and to
local automata. Based on these characterizations, we provide polynomial time
algorithms to decide observability, to decide partial observability, and to
compute the minimal number of observations necessary for finding the position
of an agent. In particular we prove that in the worst case this minimal number
of observations increases quadratically with the number of nodes in the graph.
From this it follows that it may be necessary for an agent to pass through
the same node several times before he is finally able to determine his position
in the graph. We then consider the more difficult question of assigning colors
to a graph so as to make it observable and we prove that two different versions
of this problem are NP-complete.
| [
{
"version": "v1",
"created": "Fri, 16 Feb 2007 16:16:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Jungers",
"Raphael M.",
""
],
[
"Blondel",
"Vincent D.",
""
]
] |
cs/0702094 | Marko Horvat B.Sc.CS-Dipl.Ing. | Darko Fuduric, Marko Horvat and Mario Zagar | Authentication via wireless networks | 5 pages, 6 figures, 1 table, MIPRO Conference in Opatija, Croatia,
2006 | MIPRO, 2006 | null | null | cs.OH | null | Personal authentication is an important process we encounter almost every
day; when we are logging on a computer, entering a company where we work, or a
restricted area, when we are using our plastic credit cards to pay for a
service or to complete some other financial transaction, etc. In each of these
processes of personal authentication some kind of magnetic or optical token is
required. But by using novel technologies like mobile computing and wireless
networking, it is possible to avoid carrying multitude of ID cards or
remembering a number of PIN codes. Article shows how to efficiently
authenticate users via Personal Area Networks (PAN) like Bluetooth or IrDA
using commonplace AES (Rijndel) or MD5 encryption. This method can be
implemented on many types of mobile devices like Pocket PC PDA with Windows CE
(Windows Mobile 2003) real-time operating system, or any other customized OS,
so we will explain all components and key features of such basic system.
| [
{
"version": "v1",
"created": "Fri, 16 Feb 2007 16:46:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fuduric",
"Darko",
""
],
[
"Horvat",
"Marko",
""
],
[
"Zagar",
"Mario",
""
]
] |
cs/0702095 | Ayan Mahalanobis | Ayan Mahalanobis | A note on using finite non-abelian $p$-groups in the MOR cryptosystem | null | null | null | null | cs.CR math.GR | null | The MOR cryptosystem is a natural generalization of the El-Gamal cryptosystem
to non-abelian groups. Using a $p$-group, a cryptosystem was built by this
author in 'A simple generalization of El-Gamal cryptosystem to non-abelian
groups'. It seems reasonable to assume the cryptosystem is as secure as the
El-Gamal cryptosystem over finite fields. A natural question arises can one
make a better cryptosystem using $p$-groups? In this paper we show that the
answer is no.
| [
{
"version": "v1",
"created": "Fri, 16 Feb 2007 19:04:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mahalanobis",
"Ayan",
""
]
] |
cs/0702096 | David Iclanzan Mr | David Iclanzan, Dan Dumitrescu | Overcoming Hierarchical Difficulty by Hill-Climbing the Building Block
Structure | submited to GECCO 2007 (jan 31) | null | null | null | cs.NE cs.AI | null | The Building Block Hypothesis suggests that Genetic Algorithms (GAs) are
well-suited for hierarchical problems, where efficient solving requires proper
problem decomposition and assembly of solution from sub-solution with strong
non-linear interdependencies. The paper proposes a hill-climber operating over
the building block (BB) space that can efficiently address hierarchical
problems. The new Building Block Hill-Climber (BBHC) uses past hill-climb
experience to extract BB information and adapts its neighborhood structure
accordingly. The perpetual adaptation of the neighborhood structure allows the
method to climb the hierarchical structure solving successively the
hierarchical levels. It is expected that for fully non deceptive hierarchical
BB structures the BBHC can solve hierarchical problems in linearithmic time.
Empirical results confirm that the proposed method scales almost linearly with
the problem size thus clearly outperforms population based recombinative
methods.
| [
{
"version": "v1",
"created": "Fri, 16 Feb 2007 21:47:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Iclanzan",
"David",
""
],
[
"Dumitrescu",
"Dan",
""
]
] |
cs/0702098 | Jari Salo | Jari Salo | A Sum-Product Model as a Physical Basis for Shadow Fading | 23 pages, 9 figs. To be revised and maybe submitted | null | null | null | cs.OH | null | Shadow fading (slow fading) effects play a central role in mobile
communication system design and analysis. Experimental evidence indicates that
shadow fading exhibits log-normal power distribution almost universally, and
yet it is still not well understood what causes this. In this paper, we propose
a versatile sum-product signal model as a physical basis for shadow fading.
Simulation results imply that the proposed model results in log-normally
distributed local mean power regardless of the distributions of the
interactions in the radio channel, and hence it is capable of explaining the
log-normality in a wide variety of propagation scenarios. The sum-product model
also includes as its special cases the conventional product model as well as
the recently proposed sum model, and improves upon these by: a) being
applicable in both global and local distance scales; b) being more plausible
from physical point of view; c) providing better goodness-of-fit to log-normal
distribution than either of these models.
| [
{
"version": "v1",
"created": "Sun, 18 Feb 2007 21:54:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Salo",
"Jari",
""
]
] |
cs/0702106 | Charles Robert | Charles Robert (LORIA), Ranmi Adigun (YABATECH) | Wild, Wild Wikis: A way forward | null | Dans The Fifth International Conference on Creating, Connecting
and Collaborating through Computing, C5 2007 (2007) | null | null | cs.IR | null | Wikis can be considered as public domain knowledge sharing system. They
provide opportunity for those who may not have the privilege to publish their
thoughts through the traditional methods. They are one of the fastest growing
systems of online encyclopaedia. In this study, we consider the importance of
wikis as a way of creating, sharing and improving public knowledge. We identify
some of the problems associated with wikis to include, (a) identification of
the identities of information and its creator (b) accuracy of information (c)
justification of the credibility of authors (d) vandalism of quality of
information (e) weak control over the contents. A solution to some of these
problems is sought through the use of an annotation model. The model assumes
that contributions in wikis can be seen as annotation to the initial document.
It proposed a systematic control of contributors and contributions to the
initiative and the keeping of records of what existed and what was done to
initial documents. We believe that with this model, analysis can be done on the
progress of wiki initiatives. We assumed that using this model, wikis can be
better used for creation and sharing of knowledge for public use.
| [
{
"version": "v1",
"created": "Mon, 19 Feb 2007 15:12:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Robert",
"Charles",
"",
"LORIA"
],
[
"Adigun",
"Ranmi",
"",
"YABATECH"
]
] |
cs/0702107 | Charles Robert | Charles A. Robert (LORIA) | AMIEDoT: An annotation model for document tracking and recommendation
service | null | Dans International Joint Conferences on Computer, Information, and
Systems Sciences, and Engineering, (CIS2E 06) (2007) | null | null | cs.IR | null | The primary objective of document annotation in whatever form, manual or
electronic is to allow those who may not have control to original document to
provide personal view on information source. Beyond providing personal
assessment to original information sources, we are looking at a situation where
annotation made can be used as additional source of information for document
tracking and recommendation service. Most of the annotation tools existing
today were conceived for their independent use with no reference to the creator
of the annotation. We propose AMIEDoT (Annotation Model for Information
Exchange and Document Tracking) an annotation model that can assist in document
tracking and recommendation service. The model is based on three parameters in
the acts of annotation. We believe that introducing document parameters, time
and the parameters of the creator of annotation into an annotation process can
be a dependable source to know, who used a document, when a document was used
and for what a document was used for. Beyond document tracking, our model can
be used in not only for selective dissemination of information but for
recommendation services. AMIEDoT can also be used for information sharing and
information reuse.
| [
{
"version": "v1",
"created": "Mon, 19 Feb 2007 15:18:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Robert",
"Charles A.",
"",
"LORIA"
]
] |
cs/0702109 | Charles Robert | Charles A. Robert (LORIA), David Amos (LORIA) | AMIE: An annotation model for information research | null | Dans International Conference on Computers in Education, (2006) | null | null | cs.IR | null | The objective of most users for consulting any information database,
information warehouse or the internet is to resolve one problem or the other.
Available online or offline annotation tools were not conceived with the
objective of assisting users in their bid to resolve a decisional problem.
Apart from the objective and usage of annotation tools, how these tools are
conceived and classified has implication on their usage. Several criteria have
been used to categorize annotation concepts. Typically annotation are conceived
based on how it affect the organization of document been considered for
annotation or the organization of the resulting annotation. Our approach is
annotation that will assist in information research for decision making.
Annotation model for information exchange (AMIE) was conceived with the
objective of information sharing and reuse.
| [
{
"version": "v1",
"created": "Mon, 19 Feb 2007 15:26:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Robert",
"Charles A.",
"",
"LORIA"
],
[
"Amos",
"David",
"",
"LORIA"
]
] |
cs/0702110 | Saltuk Aksahin | Saltuk Aksahin | Security Implications of Converged Networks and Protecting Them, without
Compromising Efficiency | 64 pages | null | null | null | cs.NI | null | This dissertation has extensively looked into all aspects of VoIP
commu-nications technology, and information presented in preceding chapters,
which build up a solid framework to discuss the conceptual design model, and
investigate features that could be incorporated for actual Pro-jects, with
parameters that are tested on field values. The dissertation follows a
five-course model, for answering different questions, both tech-nical and
businesslike, around central issues, that have been crucial to explanation of
the topic; starting with a general overview of VoIP tech-nology, analyzing
current VoIP encryption methods, identifying security threats, designing a
robust VoIP system based on particulars discussed in preceding chapters, and
finally, a VoIP simulation.
| [
{
"version": "v1",
"created": "Mon, 19 Feb 2007 20:51:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Aksahin",
"Saltuk",
""
]
] |
cs/0702114 | David Pritchard | David Pritchard | Nearest Neighbor Network Traversal | null | null | null | null | cs.DC | null | A mobile agent in a network wants to visit every node of an n-node network,
using a small number of steps. We investigate the performance of the following
``nearest neighbor'' heuristic: always go to the nearest unvisited node. If the
network graph never changes, then from (Rosenkrantz, Stearns and Lewis, 1977)
and (Hurkens and Woeginger, 2004) it follows that Theta(n log n) steps are
necessary and sufficient in the worst case. We give a simpler proof of the
upper bound and an example that improves the best known lower bound.
We investigate how the performance of this heuristic changes when it is
distributively implemented in a network. Even if network edges are allow to
fail over time, we show that the nearest neighbor strategy never runs for more
than O(n^2) iterations. We also show that any strategy can be forced to take at
least n(n-1)/2 steps before all nodes are visited, if the edges of the network
are deleted in an adversarial way.
| [
{
"version": "v1",
"created": "Tue, 20 Feb 2007 03:54:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pritchard",
"David",
""
]
] |
cs/0702117 | Mathieu Couture | Prosenjit Bose and Paz Carmi and Mathieu Couture and Michiel Smid and
Daming Xu | On a family of strong geometric spanners that admit local routing
strategies | null | null | null | null | cs.CG | null | We introduce a family of directed geometric graphs, denoted $\paz$, that
depend on two parameters $\lambda$ and $\theta$. For $0\leq
\theta<\frac{\pi}{2}$ and ${1/2} < \lambda < 1$, the $\paz$ graph is a strong
$t$-spanner, with $t=\frac{1}{(1-\lambda)\cos\theta}$. The out-degree of a node
in the $\paz$ graph is at most $\lfloor2\pi/\min(\theta,
\arccos\frac{1}{2\lambda})\rfloor$. Moreover, we show that routing can be
achieved locally on $\paz$. Next, we show that all strong $t$-spanners are also
$t$-spanners of the unit disk graph. Simulations for various values of the
parameters $\lambda$ and $\theta$ indicate that for random point sets, the
spanning ratio of $\paz$ is better than the proven theoretical bounds.
| [
{
"version": "v1",
"created": "Tue, 20 Feb 2007 20:54:16 GMT"
},
{
"version": "v2",
"created": "Wed, 21 Feb 2007 14:57:44 GMT"
},
{
"version": "v3",
"created": "Thu, 22 Feb 2007 21:17:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bose",
"Prosenjit",
""
],
[
"Carmi",
"Paz",
""
],
[
"Couture",
"Mathieu",
""
],
[
"Smid",
"Michiel",
""
],
[
"Xu",
"Daming",
""
]
] |
cs/0702123 | Slavcho Shtrakov | Slavcho Shtrakov and Vladimir Shtrakov | Tree automata and separable sets of input variables | 8 pages, 2 figures | J. FILOMAT, v. 15, 2001, University of Nis, 61-71 p., ISSN
0354-5180 (http://www.pmf.ni.ac.yu/sajt/publikacije/filomat_15.html) | null | null | cs.CC cs.DM | null | We consider the computational complexity of tree transducers, depending on
their separable sets of input variables.
| [
{
"version": "v1",
"created": "Thu, 22 Feb 2007 15:16:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Shtrakov",
"Slavcho",
""
],
[
"Shtrakov",
"Vladimir",
""
]
] |
cs/0702125 | Philipp Pluch | Philipp Pluch, Samo Wakounig | Bayesian Network Tomography and Inference | null | null | null | null | cs.NI | null | The aim of this technical report is to give a short overview of known
techniques for network tomography (introduced in the paper of Vardi (1996)),
extended by a Bayesian approach originating Tebaldi and West (1998). Since the
studies of A.K. Erlang (1878-1929) on telephone networks in the last
millennium, lots of needs are seen in todays applications of networks and
network tomography, so for instance networks are a critical component of the
information structure supporting finance, commerce and even civil and national
defence. An attack on a network can be performed as an intrusion in the network
or as sending a lot of fault information and disturbing the network flow. Such
attacks can be detected by modelling the traffic flows in a network, by
counting the source destination packets and even by measuring counts over time
and by drawing a comparison with this 'time series' for instance.
| [
{
"version": "v1",
"created": "Thu, 22 Feb 2007 09:43:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pluch",
"Philipp",
""
],
[
"Wakounig",
"Samo",
""
]
] |
cs/0702126 | Vincenzo Nicosia | V. Nicosia, G. Mangioni, V. Carchiolo, M. Malgeri | Efficient Searching and Retrieval of Documents in PROSA | 12 pages, 3 figures | null | null | null | cs.DC cs.IR | null | Retrieving resources in a distributed environment is more difficult than
finding data in centralised databases. In the last decade P2P system arise as
new and effective distributed architectures for resource sharing, but searching
in such environments could be difficult and time-consuming. In this paper we
discuss efficiency of resource discovery in PROSA, a self-organising P2P system
heavily inspired by social networks. All routing choices in PROSA are made
locally, looking only at the relevance of the next peer to each query. We show
that PROSA is able to effectively answer queries for rare documents, forwarding
them through the most convenient path to nodes that much probably share
matching resources. This result is heavily related to the small-world structure
that naturally emerges in PROSA.
| [
{
"version": "v1",
"created": "Thu, 22 Feb 2007 10:22:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Nicosia",
"V.",
""
],
[
"Mangioni",
"G.",
""
],
[
"Carchiolo",
"V.",
""
],
[
"Malgeri",
"M.",
""
]
] |
cs/0702127 | Vincenzo Nicosia | V. Nicosia, G. Mangioni, V. Carchiolo, M. Malgeri | Exploiting social networks dynamics for P2P resource organisation | 9 pages, 4 figures | Lecture Notes on Computer Science (LNCS) 4263 (2006) | null | null | cs.DC cs.IR | null | In this paper we present a formal description of PROSA, a P2P resource
management system heavily inspired by social networks. Social networks have
been deeply studied in the last two decades in order to understand how
communities of people arise and grow. It is a widely known result that networks
of social relationships usually evolves to small-worlds, i.e. networks where
nodes are strongly connected to neighbours and separated from all other nodes
by a small amount of hops. This work shows that algorithms implemented into
PROSA allow to obtain an efficient small-world P2P network.
| [
{
"version": "v1",
"created": "Thu, 22 Feb 2007 10:35:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Nicosia",
"V.",
""
],
[
"Mangioni",
"G.",
""
],
[
"Carchiolo",
"V.",
""
],
[
"Malgeri",
"M.",
""
]
] |
cs/0702128 | Huang Xiangao | Xiangao Huang and Wei Huang and Xiaozhou Liu and Chao Wang and Zhu
jing Wang and Tao Wang | Reconstructing the Nonlinear Filter Function of LILI-128 Stream Cipher
Based on Complexity | 6 pages, 1 figure | null | null | null | cs.CR | null | In this letter we assert that we have reconstructed the nonlinear filter
function of LILI-128 stream cipher on IBM notebook PC using MATLAB. Our
reconstruction need approximately 2^12~2^13 and the attack consumes 5825.016
sec (using tic and toc sentences of MATLAB) or 5825.016/3600=1.6181hours. We
got the expression of the nonlinear filter function fd of Lili-128 which has 46
items from liner items to nonlinear items based on complexity, the phase space
reconstruction, Clustering and nonlinear prediction. We have verified our
reconstruction result correctness by simulating the overview of Lili-128
keystream generators using our getting fd and implement designers reference
module of the Lili-128 stream cipher, and two methods produce the same
synchronous keystream sequence on same initial state, so that our research work
proves that the nonlinear filter function of LILI-128 stream cipher is
successfully reconstructed.
| [
{
"version": "v1",
"created": "Thu, 22 Feb 2007 14:03:51 GMT"
},
{
"version": "v2",
"created": "Thu, 19 Apr 2007 01:53:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Huang",
"Xiangao",
""
],
[
"Huang",
"Wei",
""
],
[
"Liu",
"Xiaozhou",
""
],
[
"Wang",
"Chao",
""
],
[
"Wang",
"Zhu jing",
""
],
[
"Wang",
"Tao",
""
]
] |
cs/0702129 | Slavcho Shtrakov | Slavcho Shtrakov | Tree Automata and Essential Input Variables | 10 pages, 2 figures, 60th Workshop on General Algebra, June 22-25,
2000, TU Dresden | J. Contributions to General Algebra, v.13, Verlag Johannes Heyn,
Klagenfurt, 2001, 309-319 p | null | null | cs.CC cs.DM | null | We introduce and study the essential inputs (variables) for terms (trees) and
tree automata.
| [
{
"version": "v1",
"created": "Thu, 22 Feb 2007 15:12:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Shtrakov",
"Slavcho",
""
]
] |
cs/0702131 | Jason Reese | Graham B. Macpherson and Jason M. Reese | AICA: a New Pair Force Evaluation Method for Parallel Molecular Dynamics
in Arbitrary Geometries | null | null | null | null | cs.CE cs.DC | null | A new algorithm for calculating intermolecular pair forces in Molecular
Dynamics (MD) simulations on a distributed parallel computer is presented. The
Arbitrary Interacting Cells Algorithm (AICA) is designed to operate on
geometrical domains defined by an unstructured, arbitrary polyhedral mesh,
which has been spatially decomposed into irregular portions for
parallelisation. It is intended for nano scale fluid mechanics simulation by MD
in complex geometries, and to provide the MD component of a hybrid MD/continuum
simulation. AICA has been implemented in the open-source computational toolbox
OpenFOAM, and verified against a published MD code.
| [
{
"version": "v1",
"created": "Thu, 22 Feb 2007 17:27:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Macpherson",
"Graham B.",
""
],
[
"Reese",
"Jason M.",
""
]
] |
cs/0702133 | Vadim Yatsenko | Vadim Yatsenko | Fast Exact Method for Solving the Travelling Salesman Problem | 4 pages, 4 figures | null | null | null | cs.CC | null | This paper describes TSP exact solution of polynomial complexity. It is
considered properties of proposed method. Effectiveness of proposed solution is
illustrated by outcomes of computer modeling.
| [
{
"version": "v1",
"created": "Fri, 23 Feb 2007 02:39:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Yatsenko",
"Vadim",
""
]
] |
cs/0702136 | Slavcho Shtrakov | Ivo Damyanov and Slavcho Shtrakov | Essential Inputs and Minimal Tree Automata | 7 pages, 1 figure, Sixth International Conference on Discrete
Mathematics and Applications, 31.08-02.09.2001, Bansko | Proc. of ICDMA, 31.08-02.09.2001, Bansko, v.6, 77-85 p | null | null | cs.CC cs.DM | null | We continue studying essential inputs of trees and automata. Strongly
essential inputs of trees are introduced and studied. Various examples for
application in Computer Science are shown.
| [
{
"version": "v1",
"created": "Fri, 23 Feb 2007 12:48:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Damyanov",
"Ivo",
""
],
[
"Shtrakov",
"Slavcho",
""
]
] |
cs/0702137 | Slavcho Shtrakov | Slavcho Shtrakov | Tree Automata and Essential Subtrees | 9 pages, 2 figures, Sixth International Conference on Discrete
Mathematics and Applications, Bansko, 2001 | Proc. of ICDMA, 31.08-02.09.2001, Bansko, v.6, 51-60 p | null | null | cs.CC cs.DM | null | We introduce essential subtrees for terms (trees) and tree automata . There
are some results concerning independent sets of subtrees and separable sets for
a tree and an automaton.
| [
{
"version": "v1",
"created": "Fri, 23 Feb 2007 13:20:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Shtrakov",
"Slavcho",
""
]
] |
cs/0702139 | Alexander Kholosha | Tor Helleseth and Alexander Kholosha and Geir Jarle Ness | Characterization of $m$-Sequences of Lengths $2^{2k}-1$ and $2^k-1$ with
Three-Valued Crosscorrelation | 23 pages | null | null | null | cs.CR cs.DM | null | Considered is the distribution of the crosscorrelation between $m$-sequences
of length $2^m-1$, where $m=2k$, and $m$-sequences of shorter length $2^k-1$.
New pairs of $m$-sequences with three-valued crosscorrelation are found and the
complete correlation distribution is determined. Finally, we conjecture that
there are no more cases with a three-valued crosscorrelation apart from the
ones proven here.
| [
{
"version": "v1",
"created": "Fri, 23 Feb 2007 16:01:38 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Helleseth",
"Tor",
""
],
[
"Kholosha",
"Alexander",
""
],
[
"Ness",
"Geir Jarle",
""
]
] |
cs/0702140 | Bernardo Huberman | Dennis M. Wilkinson and Bernardo A. Huberman | Assessing the Value of Coooperation in Wikipedia | null | null | null | null | cs.DL cs.CY physics.soc-ph | null | Since its inception six years ago, the online encyclopedia Wikipedia has
accumulated 6.40 million articles and 250 million edits, contributed in a
predominantly undirected and haphazard fashion by 5.77 million unvetted
volunteers. Despite the apparent lack of order, the 50 million edits by 4.8
million contributors to the 1.5 million articles in the English-language
Wikipedia follow strong certain overall regularities. We show that the
accretion of edits to an article is described by a simple stochastic mechanism,
resulting in a heavy tail of highly visible articles with a large number of
edits. We also demonstrate a crucial correlation between article quality and
number of edits, which validates Wikipedia as a successful collaborative
effort.
| [
{
"version": "v1",
"created": "Fri, 23 Feb 2007 17:59:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wilkinson",
"Dennis M.",
""
],
[
"Huberman",
"Bernardo A.",
""
]
] |
cs/0702141 | Tanya Crenshaw | Tanya L. Crenshaw and Erin Wolf Chambers and Heather Metcalf and Umesh
Thakkar | Recruitment, Preparation, Retention: A case study of computing culture
at the University of Illinois at Urbana-Champaign | 37 pages, 13 figures. For better quality figures, please download the
.pdf from
http://www.cs.uiuc.edu/research/techreports.php?report=UIUCDCS-R-2007-2811 | null | null | UIUCDCS-R-2007-2811 | cs.GL | null | Computer science is seeing a decline in enrollment at all levels of
education, including undergraduate and graduate study. This paper reports on
the results of a study conducted at the University of Illinois at
Urbana-Champaign which evaluated students attitudes regarding three areas which
can contribute to improved enrollment in the Department of Computer Science:
Recruitment, preparation and retention. The results of our study saw two
themes. First, the department's tight research focus appears to draw
significant attention from other activities -- such as teaching, service, and
other community-building activities -- that are necessary for a department's
excellence. Yet, as demonstrated by our second theme, one partial solution is
to better promote such activities already employed by the department to its
students and faculty. Based on our results, we make recommendations for
improvements and enhancements based on the current state of practice at peer
institutions.
| [
{
"version": "v1",
"created": "Sat, 24 Feb 2007 00:34:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Crenshaw",
"Tanya L.",
""
],
[
"Chambers",
"Erin Wolf",
""
],
[
"Metcalf",
"Heather",
""
],
[
"Thakkar",
"Umesh",
""
]
] |
cs/0702142 | Daniel Lemire | Daniel Lemire, Martin Brooks, Yuhong Yan | An Optimal Linear Time Algorithm for Quasi-Monotonic Segmentation | Appeared in ICDM 2005 | null | null | null | cs.DS cs.DB | null | Monotonicity is a simple yet significant qualitative characteristic. We
consider the problem of segmenting an array in up to K segments. We want
segments to be as monotonic as possible and to alternate signs. We propose a
quality metric for this problem, present an optimal linear time algorithm based
on novel formalism, and compare experimentally its performance to a linear time
top-down regression algorithm. We show that our algorithm is faster and more
accurate. Applications include pattern recognition and qualitative modeling.
| [
{
"version": "v1",
"created": "Sat, 24 Feb 2007 02:29:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lemire",
"Daniel",
""
],
[
"Brooks",
"Martin",
""
],
[
"Yan",
"Yuhong",
""
]
] |
cs/0702145 | Srikumar Venugopal | Srikumar Venugopal, Krishna Nadiminti, Hussein Gibbins and Rajkumar
Buyya | Designing a Resource Broker for Heterogeneous Grids | 26 pages, 15 figures | null | null | GRIDS-TR-2007-2 | cs.DC cs.SE | null | Grids provide uniform access to aggregations of heterogeneous resources and
services such as computers, networks and storage owned by multiple
organizations. However, such a dynamic environment poses many challenges for
application composition and deployment. In this paper, we present the design of
the Gridbus Grid resource broker that allows users to create applications and
specify different objectives through different interfaces without having to
deal with the complexity of Grid infrastructure. We present the unique
requirements that motivated our design and discuss how these provide
flexibility in extending the functionality of the broker to support different
low-level middlewares and user interfaces. We evaluate the broker with
different job profiles and Grid middleware and conclude with the lessons learnt
from our development experience.
| [
{
"version": "v1",
"created": "Sat, 24 Feb 2007 08:35:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Venugopal",
"Srikumar",
""
],
[
"Nadiminti",
"Krishna",
""
],
[
"Gibbins",
"Hussein",
""
],
[
"Buyya",
"Rajkumar",
""
]
] |
cs/0702152 | Andrew Gacek | Andrew Gacek and Gopalan Nadathur | A Simplified Suspension Calculus and its Relationship to Other Explicit
Substitution Calculi | 38 pages | null | null | null | cs.LO | null | This paper concerns the explicit treatment of substitutions in the lambda
calculus. One of its contributions is the simplification and rationalization of
the suspension calculus that embodies such a treatment. The earlier version of
this calculus provides a cumbersome encoding of substitution composition, an
operation that is important to the efficient realization of reduction. This
encoding is simplified here, resulting in a treatment that is easy to use
directly in applications. The rationalization consists of the elimination of a
practically inconsequential flexibility in the unravelling of substitutions
that has the inadvertent side effect of losing contextual information in terms;
the modified calculus now has a structure that naturally supports logical
analyses, such as ones related to the assignment of types, over lambda terms.
The overall calculus is shown to have pleasing theoretical properties such as a
strongly terminating sub-calculus for substitution and confluence even in the
presence of term meta variables that are accorded a grafting interpretation.
Another contribution of the paper is the identification of a broad set of
properties that are desirable for explicit substitution calculi to support and
a classification of a variety of proposed systems based on these. The
suspension calculus is used as a tool in this study. In particular, mappings
are described between it and the other calculi towards understanding the
characteristics of the latter.
| [
{
"version": "v1",
"created": "Mon, 26 Feb 2007 02:16:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gacek",
"Andrew",
""
],
[
"Nadathur",
"Gopalan",
""
]
] |
cs/0702153 | Kyle Burke | Kyle Burke and Shang-Hua Teng | Games on the Sperner Triangle | 18 pages, 19 figures. Uses paithan.sty | null | null | null | cs.GT cs.CC | null | We create a new two-player game on the Sperner Triangle based on Sperner's
lemma. Our game has simple rules and several desirable properties. First, the
game is always certain to have a winner. Second, like many other interesting
games such as Hex and Geography, we prove that deciding whether one can win our
game is a PSPACE-complete problem. Third, there is an elegant balance in the
game such that neither the first nor the second player always has a decisive
advantage. We provide a web-based version of the game, playable at:
http://cs-people.bu.edu/paithan/spernerGame/ . In addition we propose other
games, also based on fixed-point theorems.
| [
{
"version": "v1",
"created": "Mon, 26 Feb 2007 05:00:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Burke",
"Kyle",
""
],
[
"Teng",
"Shang-Hua",
""
]
] |
cs/0702157 | Matei Ripeanu | Matei Ripeanu, Adriana Iamnitchi, Ian Foster, Anne Rogers | In Search of Simplicity: A Self-Organizing Multi-Source Multicast
Overlay | null | null | null | DSL-TR-2007-02 | cs.DC cs.NI cs.PF | null | Multicast communication primitives have broad utility as building blocks for
distributed applications. The challenge is to create and maintain the
distributed structures that support these primitives while accounting for
volatile end nodes and variable network characteristics. Most solutions
proposed to date rely on complex algorithms or global information, thus
limiting the scale of deployments and acceptance outside the academic realm.
This article introduces a low-complexity, self organizing solution for
maintaining multicast trees, that we refer to as UMM (Unstructured Multi-source
Multicast). UMM uses traditional distributed systems techniques: layering,
soft-state, and passive data collection to adapt to the dynamics of the
physical network and maintain data dissemination trees. The result is a simple,
adaptive system with lower overheads than more complex alternatives. We have
implemented UMM and evaluated it on a 100-node PlanetLab testbed and on up to
1024-node emulated ModelNet networks Extensive experimental evaluations
demonstrate UMM's low overhead, efficient network usage compared to alternative
solutions, and ability to quickly adapt to network changes and to recover from
failures.
| [
{
"version": "v1",
"created": "Tue, 27 Feb 2007 19:42:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ripeanu",
"Matei",
""
],
[
"Iamnitchi",
"Adriana",
""
],
[
"Foster",
"Ian",
""
],
[
"Rogers",
"Anne",
""
]
] |
cs/0702159 | Fabiano C. Botelho | Fabiano C. Botelho, Rasmus Pagh, Nivio Ziviani | Perfect Hashing for Data Management Applications | 12 pages | null | null | RT.DCC.002/2007 | cs.DS cs.DB | null | Perfect hash functions can potentially be used to compress data in connection
with a variety of data management tasks. Though there has been considerable
work on how to construct good perfect hash functions, there is a gap between
theory and practice among all previous methods on minimal perfect hashing. On
one side, there are good theoretical results without experimentally proven
practicality for large key sets. On the other side, there are the theoretically
analyzed time and space usage algorithms that assume that truly random hash
functions are available for free, which is an unrealistic assumption. In this
paper we attempt to bridge this gap between theory and practice, using a number
of techniques from the literature to obtain a novel scheme that is
theoretically well-understood and at the same time achieves an
order-of-magnitude increase in performance compared to previous ``practical''
methods. This improvement comes from a combination of a novel, theoretically
optimal perfect hashing scheme that greatly simplifies previous methods, and
the fact that our algorithm is designed to make good use of the memory
hierarchy. We demonstrate the scalability of our algorithm by considering a set
of over one billion URLs from the World Wide Web of average length 64, for
which we construct a minimal perfect hash function on a commodity PC in a
little more than 1 hour. Our scheme produces minimal perfect hash functions
using slightly more than 3 bits per key. For perfect hash functions in the
range $\{0,...,2n-1\}$ the space usage drops to just over 2 bits per key (i.e.,
one bit more than optimal for representing the key). This is significantly
below of what has been achieved previously for very large values of $n$.
| [
{
"version": "v1",
"created": "Tue, 27 Feb 2007 20:56:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Botelho",
"Fabiano C.",
""
],
[
"Pagh",
"Rasmus",
""
],
[
"Ziviani",
"Nivio",
""
]
] |
cs/0702160 | Fran\c{c}ois Pitt | Fran\c{c}ois Pitt | A Quantifier-Free String Theory for ALOGTIME Reasoning | 147 pages, PhD thesis (completed in 2000) | null | null | null | cs.CC | null | The main contribution of this work is the definition of a quantifier-free
string theory T_1 suitable for formalizing ALOGTIME reasoning. After describing
L_1 -- a new, simple, algebraic characterization of the complexity class
ALOGTIME based on strings instead of numbers -- the theory T_1 is defined
(based on L_1), and a detailed formal development of T_1 is given.
Then, theorems of T_1 are shown to translate into families of propositional
tautologies that have uniform polysize Frege proofs, T_1 is shown to prove the
soundness of a particular Frege system F, and F is shown to provably p-simulate
any proof system whose soundness can be proved in T_1. Finally, T_1 is compared
with other theories for ALOGTIME reasoning in the literature.
To our knowledge, this is the first formal theory for ALOGTIME reasoning
whose basic objects are strings instead of numbers, and the first
quantifier-free theory formalizing ALOGTIME reasoning in which a direct proof
of the soundness of some Frege system has been given (in the case of
first-order theories, such a proof was first given by Arai for his theory AID).
Also, the polysize Frege proofs we give for the propositional translations of
theorems of T_1 are considerably simpler than those for other theories, and so
is our proof of the soundness of a particular F-system in T_1. Together with
the simplicity of T_1's recursion schemes, axioms, and rules these facts
suggest that T_1 is one of the most natural theories available for ALOGTIME
reasoning.
| [
{
"version": "v1",
"created": "Wed, 28 Feb 2007 02:59:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pitt",
"François",
""
]
] |
cs/0702163 | Roderick Melnik | Di Zhang and Roderick V.N. Melnik | First Passage Time for Multivariate Jump-diffusion Stochastic Models
With Applications in Finance | Keywords: Monte-Carlo simulations, first passage time, multivariate
jump-diffusion process; 10 pages, 3 figures | null | null | null | cs.CE cs.NA | null | The ``first passage-time'' (FPT) problem is an important problem with a wide
range of applications in mathematics, physics, biology and finance.
Mathematically, such a problem can be reduced to estimating the probability of
a (stochastic) process first to reach a critical level or threshold. While in
other areas of applications the FPT problem can often be solved analytically,
in finance we usually have to resort to the application of numerical
procedures, in particular when we deal with jump-diffusion stochastic processes
(JDP). In this paper, we develop a Monte-Carlo-based methodology for the
solution of the FPT problem in the context of a multivariate jump-diffusion
stochastic process. The developed methodology is tested by using different
parameters, the simulation results indicate that the developed methodology is
much more efficient than the conventional Monte Carlo method. It is an
efficient tool for further practical applications, such as the analysis of
default correlation and predicting barrier options in finance.
| [
{
"version": "v1",
"created": "Wed, 28 Feb 2007 10:39:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zhang",
"Di",
""
],
[
"Melnik",
"Roderick V. N.",
""
]
] |
cs/0702164 | Roderick Melnik | Di Zhang and Roderick V.N. Melnik | Monte-Carlo Simulations of the First Passage Time for Multivariate
Jump-Diffusion Processes in Financial Applications | Keywords: First passage time; Monte Carlo simulation; Multivariate
jump-diffusion processes; Credit risk | null | null | null | cs.CE cs.NA | null | Many problems in finance require the information on the first passage time
(FPT) of a stochastic process. Mathematically, such problems are often reduced
to the evaluation of the probability density of the time for such a process to
cross a certain level, a boundary, or to enter a certain region. While in other
areas of applications the FPT problem can often be solved analytically, in
finance we usually have to resort to the application of numerical procedures,
in particular when we deal with jump-diffusion stochastic processes (JDP). In
this paper, we propose a Monte-Carlo-based methodology for the solution of the
first passage time problem in the context of multivariate (and correlated)
jump-diffusion processes. The developed technique provide an efficient tool for
a number of applications, including credit risk and option pricing. We
demonstrate its applicability to the analysis of the default rates and default
correlations of several different, but correlated firms via a set of empirical
data.
| [
{
"version": "v1",
"created": "Wed, 28 Feb 2007 10:51:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zhang",
"Di",
""
],
[
"Melnik",
"Roderick V. N.",
""
]
] |
cs/0702165 | Roderick Melnik | Di Zhang and Roderick V.N. Melnik | Efficient estimation of default correlation for multivariate
jump-diffusion processes | Keywords: Default correlation, First passage time problem, Monte
Carlo simulation | null | null | null | cs.CE cs.NA | null | Evaluation of default correlation is an important task in credit risk
analysis. In many practical situations, it concerns the joint defaults of
several correlated firms, the task that is reducible to a first passage time
(FPT) problem. This task represents a great challenge for jump-diffusion
processes (JDP), where except for very basic cases, there are no analytical
solutions for such problems. In this contribution, we generalize our previous
fast Monte-Carlo method (non-correlated jump-diffusion cases) for multivariate
(and correlated) jump-diffusion processes. This generalization allows us, among
other things, to evaluate the default events of several correlated assets based
on a set of empirical data. The developed technique is an efficient tool for a
number of other applications, including credit risk and option pricing.
| [
{
"version": "v1",
"created": "Wed, 28 Feb 2007 11:22:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zhang",
"Di",
""
],
[
"Melnik",
"Roderick V. N.",
""
]
] |
cs/0702166 | Roderick Melnik | Di Zhang and Roderick V.N. Melnik | Solving Stochastic Differential Equations with Jump-Diffusion
Efficiently: Applications to FPT Problems in Credit Risk | Keywords: Default Correlation, First Passage Time, Multivariate
Jump-Diffusion Processes, Monte-Carlo Simulation, Multivariate Uniform
Sampling Method | null | null | null | cs.CE cs.NA | null | The first passage time (FPT) problem is ubiquitous in many applications. In
finance, we often have to deal with stochastic processes with jump-diffusion,
so that the FTP problem is reducible to a stochastic differential equation with
jump-diffusion. While the application of the conventional Monte-Carlo procedure
is possible for the solution of the resulting model, it becomes computationally
inefficient which severely restricts its applicability in many practically
interesting cases. In this contribution, we focus on the development of
efficient Monte-Carlo-based computational procedures for solving the FPT
problem under the multivariate (and correlated) jump-diffusion processes. We
also discuss the implementation of the developed Monte-Carlo-based technique
for multivariate jump-diffusion processes driving by several compound Poisson
shocks. Finally, we demonstrate the application of the developed methodologies
for analyzing the default rates and default correlations of differently rated
firms via historical data.
| [
{
"version": "v1",
"created": "Wed, 28 Feb 2007 11:48:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zhang",
"Di",
""
],
[
"Melnik",
"Roderick V. N.",
""
]
] |
cs/0702167 | Roderick Melnik | Linxiang X. Wang and Roderick V.N. Melnik | Finite Volume Analysis of Nonlinear Thermo-mechanical Dynamics of Shape
Memory Alloys | Keywords: shape memory alloys, phase transformations, nonlinear
thermo-elasticity, finite volume method | null | null | null | cs.CE cs.NA | null | In this paper, the finite volume method is developed to analyze coupled
dynamic problems of nonlinear thermoelasticity. The major focus is given to the
description of martensitic phase transformations essential in the modelling of
shape memory alloys. Computational experiments are carried out to study the
thermo-mechanical wave interactions in a shape memory alloy rod, and a patch.
Both mechanically and thermally induced phase transformations, as well as
hysteresis effects, in a one-dimensional structure are successfully simulated
with the developed methodology. In the two-dimensional case, the main focus is
given to square-to-rectangular transformations and examples of martensitic
combinations under different mechanical loadings are provided.
| [
{
"version": "v1",
"created": "Wed, 28 Feb 2007 13:00:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wang",
"Linxiang X.",
""
],
[
"Melnik",
"Roderick V. N.",
""
]
] |
cs/0702168 | Roderick Melnik | Linxiang X. Wang and Roderick V.N. Melnik | Simulation of Phase Combinations in Shape Memory Alloys Patches by
Hybrid Optimization Methods | Keywords: phase combinations, shape memory alloys, variational
problem, genetic algorithm, quasi-Newton methods | null | null | null | cs.CE cs.NA | null | In this paper, phase combinations among martensitic variants in shape memory
alloys patches and bars are simulated by a hybrid optimization methodology. The
mathematical model is based on the Landau theory of phase transformations. Each
stable phase is associated with a local minimum of the free energy function,
and the phase combinations are simulated by minimizing the bulk energy. At low
temperature, the free energy function has double potential wells leading to
non-convexity of the optimization problem. The methodology proposed in the
present paper is based on an initial estimate of the global solution by a
genetic algorithm, followed by a refined quasi-Newton procedure to locally
refine the optimum. By combining the local and global search algorithms, the
phase combinations are successfully simulated. Numerical experiments are
presented for the phase combinations in a SMA patch under several typical
mechanical loadings.
| [
{
"version": "v1",
"created": "Wed, 28 Feb 2007 14:09:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wang",
"Linxiang X.",
""
],
[
"Melnik",
"Roderick V. N.",
""
]
] |
cs/0702170 | Peter Tiedemann | Peter Tiedemann, Henrik Reif Andersen, Rasmus Pagh | Generic Global Constraints based on MDDs | Preliminary 15 pages version of the tech-report cs.AI/0611141 | null | null | null | cs.AI | null | Constraint Programming (CP) has been successfully applied to both constraint
satisfaction and constraint optimization problems. A wide variety of
specialized global constraints provide critical assistance in achieving a good
model that can take advantage of the structure of the problem in the search for
a solution. However, a key outstanding issue is the representation of 'ad-hoc'
constraints that do not have an inherent combinatorial nature, and hence are
not modeled well using narrowly specialized global constraints. We attempt to
address this issue by considering a hybrid of search and compilation.
Specifically we suggest the use of Reduced Ordered Multi-Valued Decision
Diagrams (ROMDDs) as the supporting data structure for a generic global
constraint. We give an algorithm for maintaining generalized arc consistency
(GAC) on this constraint that amortizes the cost of the GAC computation over a
root-to-leaf path in the search tree without requiring asymptotically more
space than used for the MDD. Furthermore we present an approach for
incrementally maintaining the reduced property of the MDD during the search,
and show how this can be used for providing domain entailment detection.
Finally we discuss how to apply our approach to other similar data structures
such as AOMDDs and Case DAGs. The technique used can be seen as an extension of
the GAC algorithm for the regular language constraint on finite length input.
| [
{
"version": "v1",
"created": "Wed, 28 Feb 2007 15:32:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Tiedemann",
"Peter",
""
],
[
"Andersen",
"Henrik Reif",
""
],
[
"Pagh",
"Rasmus",
""
]
] |
cs/0702171 | Robert Brijder | Robert Brijder, Hendrik Jan Hoogeboom, Grzegorz Rozenberg | How Overlap Determines the Macronuclear Genes in Ciliates | 22 pages, 14 figures | null | null | LIACS Technical Report 2007-02 | cs.LO | null | Formal models for gene assembly in ciliates have been developed, in
particular the string pointer reduction system (SPRS) and the graph pointer
reduction system (GPRS). The reduction graph is a valuable tool within the
SPRS, revealing much information about how gene assembly is performed for a
given gene. The GPRS is more abstract than the SPRS and not all information
present in the SPRS is retained in the GPRS. As a consequence the reduction
graph cannot be defined for the GPRS in general, but we show that it can be
defined (in an equivalent manner as defined for the SPRS) if we restrict
ourselves to so-called realistic overlap graphs. Fortunately, only these graphs
correspond to genes occurring in nature. Defining the reduction graph within
the GPRS allows one to carry over several results within the SPRS that rely on
the reduction graph.
| [
{
"version": "v1",
"created": "Wed, 28 Feb 2007 15:51:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Brijder",
"Robert",
""
],
[
"Hoogeboom",
"Hendrik Jan",
""
],
[
"Rozenberg",
"Grzegorz",
""
]
] |
cs/0702172 | Roderick Melnik | Linxiang X. Wang and Roderick V.N. Melnik | Numerical Model For Vibration Damping Resulting From the First Order
Phase Transformations | Keywords: martensite transformation, thermo-mechanical coupling,
vibration damping, Ginzburg-Landau theory | null | null | null | cs.CE cs.NA | null | A numerical model is constructed for modelling macroscale damping effects
induced by the first order martensite phase transformations in a shape memory
alloy rod. The model is constructed on the basis of the modified
Landau-Ginzburg theory that couples nonlinear mechanical and thermal fields.
The free energy function for the model is constructed as a double well function
at low temperature, such that the external energy can be absorbed during the
phase transformation and converted into thermal form. The Chebyshev spectral
methods are employed together with backward differentiation for the numerical
analysis of the problem. Computational experiments performed for different
vibration energies demonstrate the importance of taking into account damping
effects induced by phase transformations.
| [
{
"version": "v1",
"created": "Wed, 28 Feb 2007 18:31:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wang",
"Linxiang X.",
""
],
[
"Melnik",
"Roderick V. N.",
""
]
] |
cs/0703001 | Michael Coury | Michael D. Coury | Embedding Graphs into the Extended Grid | 4 pages, 2 figures | null | null | null | cs.DM cs.DS | null | Let $G=(V,E)$ be an arbitrary undirected source graph to be embedded in a
target graph $EM$, the extended grid with vertices on integer grid points and
edges to nearest and next-nearest neighbours. We present an algorithm showing
how to embed $G$ into $EM$ in both time and space $O(|V|^2)$ using the new
notions of islands and bridges. An island is a connected subgraph in the target
graph which is mapped from exactly one vertex in the source graph while a
bridge is an edge between two islands which is mapped from exactly one edge in
the source graph. This work is motivated by real industrial applications in the
field of quantum computing and a need to efficiently embed source graphs in the
extended grid.
| [
{
"version": "v1",
"created": "Wed, 28 Feb 2007 22:37:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Coury",
"Michael D.",
""
]
] |
cs/0703003 | M. H. van Emden | M.H. van Emden, B. Moa, and S.C. Somosan | Functions to Support Input and Output of Intervals | 16 pages, 13 figures with listings | null | null | DCS-311-IR | cs.NA | null | Interval arithmetic is hardly feasible without directed rounding as provided,
for example, by the IEEE floating-point standard. Equally essential for
interval methods is directed rounding for conversion between the external
decimal and internal binary numerals. This is not provided by the standard I/O
libraries. Conversion algorithms exist that guarantee identity upon conversion
followed by its inverse. Although it may be possible to adapt these algorithms
for use in decimal interval I/O, we argue that outward rounding in radix
conversion is computationally a simpler problem than guaranteeing identity.
Hence it is preferable to develop decimal interval I/O ab initio, which is what
we do in this paper.
| [
{
"version": "v1",
"created": "Wed, 28 Feb 2007 23:13:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"van Emden",
"M. H.",
""
],
[
"Moa",
"B.",
""
],
[
"Somosan",
"S. C.",
""
]
] |
cs/0703004 | Francis Heylighen | Francis Heylighen | Accelerating Socio-Technological Evolution: from ephemeralization and
stigmergy to the global brain | To appear in: "Globalization as an Evolutionary Process: Modeling
Global Change", edited by George Modelski, Tessaleno Devezas, and William
Thompson, London: Routledge | null | null | null | cs.CY cs.NI | null | Evolution is presented as a trial-and-error process that produces a
progressive accumulation of knowledge. At the level of technology, this leads
to ephemeralization, i.e. ever increasing productivity, or decreasing of the
friction that normally dissipates resources. As a result, flows of matter,
energy and information circulate ever more easily across the planet. This
global connectivity increases the interactions between agents, and thus the
possibilities for conflict. However, evolutionary progress also reduces social
friction, via the creation of institutions. The emergence of such "mediators"
is facilitated by stigmergy: the unintended collaboration between agents
resulting from their actions on a shared environment. The Internet is a near
ideal medium for stigmergic interaction. Quantitative stigmergy allows the web
to learn from the activities of its users, thus becoming ever better at helping
them to answer their queries. Qualitative stigmergy stimulates agents to
collectively develop novel knowledge. Both mechanisms have direct analogues in
the functioning of the human brain. This leads us to envision the future,
super-intelligent web as a "global brain" for humanity. The feedback between
social and technological advances leads to an extreme acceleration of
innovation. An extrapolation of the corresponding hyperbolic growth model would
forecast a singularity around 2040. This can be interpreted as the evolutionary
transition to the Global Brain regime.
| [
{
"version": "v1",
"created": "Thu, 1 Mar 2007 15:46:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Heylighen",
"Francis",
""
]
] |
cs/0703006 | Jingchao Chen | Jing-Chao Chen | XORSAT: An Efficient Algorithm for the DIMACS 32-bit Parity Problem | null | null | null | null | cs.DS | null | The DIMACS 32-bit parity problem is a satisfiability (SAT) problem hard to
solve. So far, EqSatz by Li is the only solver which can solve this problem.
However, This solver is very slow. It is reported that it spent 11855 seconds
to solve a par32-5 instance on a Maxintosh G3 300 MHz. The paper introduces a
new solver, XORSAT, which splits the original problem into two parts:
structured part and random part, and then solves separately them with WalkSAT
and an XOR equation solver. Based our empirical observation, XORSAT is
surprisingly fast, which is approximately 1000 times faster than EqSatz. For a
par32-5 instance, XORSAT took 2.9 seconds, while EqSatz took 2844 seconds on
Intel Pentium IV 2.66GHz CPU. We believe that this method significantly
different from traditional methods is also useful beyond this domain.
| [
{
"version": "v1",
"created": "Fri, 2 Mar 2007 01:38:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chen",
"Jing-Chao",
""
]
] |
cs/0703011 | Helmut Alt | Helmut Alt, Maike Buchin | Can we Compute the Similarity Between Surfaces? | null | null | null | null | cs.CG cs.CC | null | A suitable measure for the similarity of shapes represented by parameterized
curves or surfaces is the Fr\'echet distance. Whereas efficient algorithms are
known for computing the Fr\'echet distance of polygonal curves, the same
problem for triangulated surfaces is NP-hard. Furthermore, it remained open
whether it is computable at all. Here, using a discrete approximation we show
that it is {\em upper semi-computable}, i.e., there is a non-halting Turing
machine which produces a monotone decreasing sequence of rationals converging
to the result. It follows that the decision problem, whether the Fr\'echet
distance of two given surfaces lies below some specified value, is recursively
enumerable.
Furthermore, we show that a relaxed version of the problem, the computation
of the {\em weak Fr\'echet distance} can be solved in polynomial time. For
this, we give a computable characterization of the weak Fr\'echet distance in a
geometric data structure called the {\em free space diagram}.
| [
{
"version": "v1",
"created": "Fri, 2 Mar 2007 17:00:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Alt",
"Helmut",
""
],
[
"Buchin",
"Maike",
""
]
] |
cs/0703012 | Ramya Ravichandar | Ramya Ravichandar, James D. Arthur, Manuel P\'erez-Qui\~nones | Pre-Requirement Specification Traceability: Bridging the Complexity Gap
through Capabilities | This paper appears in International Symposium on Grand Challenges in
Traceability, TEFSE/GCT 2007. 10 pages, 7 Figures | null | null | null | cs.SE | null | Pre-Requirement Specification traceability is the activity of capturing
relations between requirements and their sources, in particular user needs.
Requirements are formal technical specifications in the solution space; needs
are natural language expressions codifying user expectations in the problem
space. Current traceability techniques are challenged by the complexity gap
that results from the disparity between the spaces, and thereby, often neglect
traceability to and from requirements. We identify the existence of an
intermediary region -- the transition space -- which structures the progression
from needs to requirements. More specifically, our approach to developing
change-tolerant systems, termed Capabilities Engineering, identifies highly
cohesive, minimally coupled, optimized functional abstractions called
Capabilities in the transition space. These Capabilities link the problem and
solution spaces through directives (entities derived from user needs).
Directives connect the problem and transition spaces; Capabilities link the
transition and solution spaces. Furthermore, the process of Capabilities
Engineering addresses specific traceability challenges. It supports the
evolution of traces, provides semantic and structural information about
dependencies, incorporates human factors, generates traceability relations with
negligible overhead, and thereby, fosters pre-Requirement Specification
traceability.
| [
{
"version": "v1",
"created": "Fri, 2 Mar 2007 20:46:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ravichandar",
"Ramya",
""
],
[
"Arthur",
"James D.",
""
],
[
"Pérez-Quiñones",
"Manuel",
""
]
] |
cs/0703015 | Alexander Shkotin | Alex Shkotin | Graph representation of context-free grammars | 4 pages, 3 figures | null | null | null | cs.LO | null | In modern mathematics, graphs figure as one of the better-investigated class
of mathematical objects. Various properties of graphs, as well as
graph-processing algorithms, can be useful if graphs of a certain kind are used
as denotations for CF-grammars. Furthermore, graph are well adapted to various
extensions (one kind of such extensions being attributes).
| [
{
"version": "v1",
"created": "Sat, 3 Mar 2007 13:12:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Shkotin",
"Alex",
""
]
] |
cs/0703021 | Wen-Li Wang | Wen-Li Wang and Mei-Huei Tang | Addressing Components' Evolvement and Execution Behavior to Measure
Component-Based Software Reliability | null | null | null | null | cs.SE | null | Software reliability is an important quality attrib-ute, often evaluated as
either a function of time or of system structures. The goal of this study is to
have this metric cover both for component-based software, be-cause its
reliability strongly depends on the quality of constituent components and their
interactions. To achieve this, we apply a convolution modeling ap-proach, based
on components' execution behavior, to integrate their individual reliability
evolvement and simultaneously address failure fixes in the time do-main.
Modeling at the component level can be more economical to accommodate software
evolution, be-cause the reliability metric can be evaluated by reus-ing the
quality measures of unaffected components and adapting only to the affected
ones to save cost. The adaptation capability also supports the incremental
software development processes that constantly add in new components over time.
Experiments were con-ducted to discuss the usefulness of this approach.
| [
{
"version": "v1",
"created": "Mon, 5 Mar 2007 20:58:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wang",
"Wen-Li",
""
],
[
"Tang",
"Mei-Huei",
""
]
] |
cs/0703023 | Otfried Cheong | Otfried Cheong, Herman Haverkort, Mira Lee | Computing a Minimum-Dilation Spanning Tree is NP-hard | null | null | null | null | cs.CG | null | In a geometric network G = (S, E), the graph distance between two vertices u,
v in S is the length of the shortest path in G connecting u to v. The dilation
of G is the maximum factor by which the graph distance of a pair of vertices
differs from their Euclidean distance. We show that given a set S of n points
with integer coordinates in the plane and a rational dilation delta > 1, it is
NP-hard to determine whether a spanning tree of S with dilation at most delta
exists.
| [
{
"version": "v1",
"created": "Tue, 6 Mar 2007 01:53:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cheong",
"Otfried",
""
],
[
"Haverkort",
"Herman",
""
],
[
"Lee",
"Mira",
""
]
] |
cs/0703025 | Jean Charles Gilbert | Jean Charles Gilbert (INRIA Rocquencourt), Xavier Jonsson | LIBOPT - An environment for testing solvers on heterogeneous collections
of problems - Version 1.0 | null | null | null | null | cs.MS cs.NA math.OC | null | The Libopt environment is both a methodology and a set of tools that can be
used for testing, comparing, and profiling solvers on problems belonging to
various collections. These collections can be heterogeneous in the sense that
their problems can have common features that differ from one collection to the
other. Libopt brings a unified view on this composite world by offering, for
example, the possibility to run any solver on any problem compatible with it,
using the same Unix/Linux command. The environment also provides tools for
comparing the results obtained by solvers on a specified set of problems. Most
of the scripts going with the Libopt environment have been written in Perl.
| [
{
"version": "v1",
"created": "Tue, 6 Mar 2007 14:05:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gilbert",
"Jean Charles",
"",
"INRIA Rocquencourt"
],
[
"Jonsson",
"Xavier",
""
]
] |
cs/0703029 | Shmuel Friedland | Shmuel Friedland | FPRAS for computing a lower bound for weighted matching polynomial of
graphs | 16 pages | null | null | null | cs.CC cs.DM | null | We give a fully polynomial randomized approximation scheme to compute a lower
bound for the matching polynomial of any weighted graph at a positive argument.
For the matching polynomial of complete bipartite graphs with bounded weights
these lower bounds are asymptotically optimal.
| [
{
"version": "v1",
"created": "Tue, 6 Mar 2007 22:59:30 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Apr 2007 16:09:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Friedland",
"Shmuel",
""
]
] |
cs/0703030 | Konstantin Rybnikov | Konstantin Rybnikov | An Efficient Local Approach to Convexity Testing of Piecewise-Linear
Hypersurfaces | 3 figures | null | null | null | cs.CG | null | We show that a closed piecewise-linear hypersurface immersed in $R^n$ ($n\ge
3$) is the boundary of a convex body if and only if every point in the interior
of each $(n-3)$-face has a neighborhood that lies on the boundary of some
convex body; no assumptions about the hypersurface's topology are needed. We
derive this criterion from our generalization of Van Heijenoort's (1952)
theorem on locally convex hypersurfaces in $R^n$ to spherical spaces. We also
give an easy-to-implement convexity testing algorithm, which is based on our
criterion. For $R^3$ the number of arithmetic operations used by the algorithm
is at most linear in the number of vertices, while in general it is at most
linear in the number of incidences between the $(n-2)$-faces and $(n-3)$-faces.
When the dimension $n$ is not fixed and only ring arithmetic is allowed, the
algorithm still remains polynomial. Our method works in more general situations
than the convexity verification algorithms developed by Mehlhorn et al. (1996)
and Devillers et al. (1998) -- for example, our method does not require the
input surface to be orientable, nor it requires the input data to include
normal vectors to the facets that are oriented "in a coherent way". For $R^3$
the complexity of our algorithm is the same as that of previous algorithms; for
higher dimensions there seems to be no clear winner, but our approach is the
only one that easily handles inputs in which the facet normals are not known to
be coherently oriented or are not given at all. Furthermore, our method can be
extended to piecewise-polynomial surfaces of small degree.
| [
{
"version": "v1",
"created": "Wed, 7 Mar 2007 07:33:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rybnikov",
"Konstantin",
""
]
] |
cs/0703031 | P\'aid\'i Creed | Paidi Creed | Sampling Eulerian orientations of triangular lattice graphs | 23 pages | null | null | null | cs.DM cs.DS | null | We consider the problem of sampling from the uniform distribution on the set
of Eulerian orientations of subgraphs of the triangular lattice. Although it is
known that this can be achieved in polynomial time for any graph, the algorithm
studied here is more natural in the context of planar Eulerian graphs. We
analyse the mixing time of a Markov chain on the Eulerian orientations of a
planar graph which moves between orientations by reversing the edges of
directed faces. Using path coupling and the comparison method we obtain a
polynomial upper bound on the mixing time of this chain for any solid subgraph
of the triangular lattice. By considering the conductance of the chain we show
that there exist subgraphs with holes for which the chain will always take an
exponential amount of time to converge. Finally, as an additional justification
for studying a Markov chain on the set of Eulerian orientations of planar
graphs, we show that the problem of counting Eulerian orientations remains
#P-complete when restricted to planar graphs.
A preliminary version of this work appeared as an extended abstract in the
2nd Algorithms and Complexity in Durham workshop.
| [
{
"version": "v1",
"created": "Wed, 7 Mar 2007 12:34:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Creed",
"Paidi",
""
]
] |
cs/0703040 | Yefim Bakman | Yefim Bakman (Tel-Aviv University) | Why the Standard Data Processing should be changed | null | null | null | null | cs.MS | null | The basic statistical methods of data representation did not change since
their emergence. Their simplicity was dictated by the intricacies of
computations in the before computers epoch. It turns out that such approach is
not uniquely possible in the presence of quick computers. The suggested here
method improves significantly the reliability of data processing and their
graphical representation. In this paper we show problems of the standard data
processing which can bring to incorrect results. A method solving these
problems is proposed. It is based on modification of data representation. The
method was implemented in a computer program Consensus5. The program
performances are illustrated through varied examples.
| [
{
"version": "v1",
"created": "Thu, 8 Mar 2007 19:49:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bakman",
"Yefim",
"",
"Tel-Aviv University"
]
] |
cs/0703041 | Marko Horvat B.Sc.CS-Dipl.Ing. | Kresimir Fertalj, Marko Horvat | Comparing Architectures of Mobile Applications | 8 pages, 7 figures, 6 tables. Proceedings of the 5th WSEAS
International Conference on Automation & Information in Venice, Italy | WSEAS Trans. on COMMUNICATIONS, Issue 4, Volume 3, October 2004,
pp. 946-952 | null | null | cs.OH | null | This article describes various advantages and disadvantages of SMS, WAP, J2ME
and Windows CE technologies in designing mobile applications. In defining the
architecture of any software application it is important to get the best
trade-off between platform's possibilities and design requirements. Achieving
optimum software design is even more important with mobile applications where
all computer resources are limited. Therefore, it is important to have a
comparative analysis of all relevant contemporary approaches in designing
mobile applications. As always, the choice between these technologies is
determined by application requirements and system capabilities.
| [
{
"version": "v1",
"created": "Thu, 8 Mar 2007 19:16:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fertalj",
"Kresimir",
""
],
[
"Horvat",
"Marko",
""
]
] |
cs/0703042 | Vaclav Petricek | Lukas Brozovsky, Vaclav Petricek | Recommender System for Online Dating Service | Accepted for Znalosti 2007 | null | null | null | cs.IR cs.SE | null | Users of online dating sites are facing information overload that requires
them to manually construct queries and browse huge amount of matching user
profiles. This becomes even more problematic for multimedia profiles. Although
matchmaking is frequently cited as a typical application for recommender
systems, there is a surprising lack of work published in this area. In this
paper we describe a recommender system we implemented and perform a
quantitative comparison of two collaborative filtering (CF) and two global
algorithms. Results show that collaborative filtering recommenders
significantly outperform global algorithms that are currently used by dating
sites. A blind experiment with real users also confirmed that users prefer CF
based recommendations to global popularity recommendations. Recommender systems
show a great potential for online dating where they could improve the value of
the service to users and improve monetization of the service.
| [
{
"version": "v1",
"created": "Fri, 9 Mar 2007 15:38:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Brozovsky",
"Lukas",
""
],
[
"Petricek",
"Vaclav",
""
]
] |
cs/0703043 | Vaclav Petricek | Vaclav Petricek, Ingemar J. Cox, Hui Han, Isaac G. Councill, C. Lee
Giles | A Comparison of On-Line Computer Science Citation Databases | ECDL 2005 | null | null | null | cs.DL | null | This paper examines the difference and similarities between the two on-line
computer science citation databases DBLP and CiteSeer. The database entries in
DBLP are inserted manually while the CiteSeer entries are obtained autonomously
via a crawl of the Web and automatic processing of user submissions. CiteSeer's
autonomous citation database can be considered a form of self-selected on-line
survey. It is important to understand the limitations of such databases,
particularly when citation information is used to assess the performance of
authors, institutions and funding bodies.
We show that the CiteSeer database contains considerably fewer single author
papers. This bias can be modeled by an exponential process with intuitive
explanation. The model permits us to predict that the DBLP database covers
approximately 24% of the entire literature of Computer Science. CiteSeer is
also biased against low-cited papers.
Despite their difference, both databases exhibit similar and significantly
different citation distributions compared with previous analysis of the Physics
community. In both databases, we also observe that the number of authors per
paper has been increasing over time.
| [
{
"version": "v1",
"created": "Fri, 9 Mar 2007 16:00:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Petricek",
"Vaclav",
""
],
[
"Cox",
"Ingemar J.",
""
],
[
"Han",
"Hui",
""
],
[
"Councill",
"Isaac G.",
""
],
[
"Giles",
"C. Lee",
""
]
] |
cs/0703044 | Samuel Thibault | Samuel Thibault (INRIA Futurs), Sebastien Hinderer (INRIA Lorraine -
LORIA) | BrlAPI: Simple, Portable, Concurrent, Application-level Control of
Braille Terminals | null | Dans International Conference on Information and Communication
Technology Accessibility (ICTA) (2007) | null | null | cs.HC | null | Screen readers can drive braille devices for allowing visually impaired users
to access computer environments, by providing them the same information as
sighted users. But in some cases, this view is not easy to use on a braille
device. In such cases, it would be much more useful to let applications provide
their own braille feedback, specially adapted to visually impaired users. Such
applications would then need the ability to output braille ; however, allowing
both screen readers and applications access a wide panel of braille devices is
not a trivial task. We present an abstraction layer that applications may use
to communicate with braille devices. They do not need to deal with the
specificities of each device, but can do so if necessary. We show how several
applications can communicate with one braille device concurrently, with BrlAPI
making sensible choices about which application eventually gets access to the
device. The description of a widely used implementation of BrlAPI is included.
| [
{
"version": "v1",
"created": "Fri, 9 Mar 2007 16:55:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Thibault",
"Samuel",
"",
"INRIA Futurs"
],
[
"Hinderer",
"Sebastien",
"",
"INRIA Lorraine -\n LORIA"
]
] |
cs/0703049 | Olga Savenkova | Oleg N. Karpov, Olga A. Savenkova | Algorithm of Segment-Syllabic Synthesis in Speech Recognition Problem | 11 pages, 4 figures | null | null | null | cs.SD cs.CL | null | Speech recognition based on the syllable segment is discussed in this paper.
The principal search methods in space of states for the speech recognition
problem by segment-syllabic parameters trajectory synthesis are investigated.
Recognition as comparison the parameters trajectories in chosen speech units on
the sections of the segmented speech is realized. Some experimental results are
given and discussed.
| [
{
"version": "v1",
"created": "Sat, 10 Mar 2007 23:59:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Karpov",
"Oleg N.",
""
],
[
"Savenkova",
"Olga A.",
""
]
] |
cs/0703051 | Yu Ding | Yu Ding | An ExpTime Procedure for Description Logic $\mathcal{ALCQI}$ (Draft) | This paper is submitted in 2007 | null | null | null | cs.LO | null | A worst-case ExpTime tableau-based decision procedure is outlined for the
satisfiability problem in $\mathcal{ALCQI}$ w.r.t. general axioms.
| [
{
"version": "v1",
"created": "Mon, 12 Mar 2007 01:55:23 GMT"
},
{
"version": "v2",
"created": "Tue, 13 Mar 2007 00:23:59 GMT"
},
{
"version": "v3",
"created": "Sun, 18 Mar 2007 19:38:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ding",
"Yu",
""
]
] |
cs/0703054 | Julien Hendrickx | Vincent D. Blondel, Julien M. Hendrickx and Raphael M. Jungers | Linear time algorithms for Clobber | null | null | null | null | cs.GT | null | We prove that the single-player game clobber is solvable in linear time when
played on a line or on a cycle. For this purpose, we show that this game is
equivalent to an optimization problem on a set of words defined by seven
classes of forbidden patterns. We also prove that, playing on the cycle, it is
always possible to remove at least 2n/3 pawns, and we give a conformation for
which it is not possible to do better, answering questions recently asked by
Faria et al.
| [
{
"version": "v1",
"created": "Mon, 12 Mar 2007 17:04:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Blondel",
"Vincent D.",
""
],
[
"Hendrickx",
"Julien M.",
""
],
[
"Jungers",
"Raphael M.",
""
]
] |
cs/0703059 | J. M. Landsberg | J.M. Landsberg | Geometry and the complexity of matrix multiplication | 34 pages, 4 figures | null | null | null | cs.CC math.AG math.RT | null | We survey results in algebraic complexity theory, focusing on matrix
multiplication. Our goals are
(i.) to show how open questions in algebraic complexity theory are naturally
posed as questions in geometry and representation theory, (ii.) to motivate
researchers to work on these questions, and (iii.) to point out relations with
more general problems in geometry. The key geometric objects for our study are
the secant varieties of Segre varieties. We explain how these varieties are
also useful for algebraic statistics, the study of phylogenetic invariants, and
quantum computing.
| [
{
"version": "v1",
"created": "Mon, 12 Mar 2007 22:11:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Landsberg",
"J. M.",
""
]
] |
cs/0703060 | Florentin Smarandache | Jose L. Salmeron, Florentin Smarandache | Redesigning Decision Matrix Method with an indeterminacy-based inference
process | 12 pages, 4 figures, one table | A short version published in Advances in Fuzzy Sets and Systems,
Vol. 1(2), 263-271, 2006 | null | null | cs.AI | null | For academics and practitioners concerned with computers, business and
mathematics, one central issue is supporting decision makers. In this paper, we
propose a generalization of Decision Matrix Method (DMM), using Neutrosophic
logic. It emerges as an alternative to the existing logics and it represents a
mathematical model of uncertainty and indeterminacy. This paper proposes the
Neutrosophic Decision Matrix Method as a more realistic tool for decision
making. In addition, a de-neutrosophication process is included.
| [
{
"version": "v1",
"created": "Tue, 13 Mar 2007 02:18:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Salmeron",
"Jose L.",
""
],
[
"Smarandache",
"Florentin",
""
]
] |
cs/0703063 | Konstantin Avrachenkov | Konstantin Avrachenkov (INRIA Sophia Antipolis), Urtzi Ayesta (LAAS),
Alexei Piunovskiy | Convergence and Optimal Buffer Sizing for Window Based AIMD Congestion
Control | null | null | null | null | cs.NI | null | We study the interaction between the AIMD (Additive Increase Multiplicative
Decrease) congestion control and a bottleneck router with Drop Tail buffer. We
consider the problem in the framework of deterministic hybrid models. First, we
show that the hybrid model of the interaction between the AIMD congestion
control and bottleneck router always converges to a cyclic behavior. We
characterize the cycles. Necessary and sufficient conditions for the absence of
multiple jumps of congestion window in the same cycle are obtained. Then, we
propose an analytical framework for the optimal choice of the router buffer
size. We formulate the problem of the optimal router buffer size as a
multi-criteria optimization problem, in which the Lagrange function corresponds
to a linear combination of the average goodput and the average delay in the
queue. The solution to the optimization problem provides further evidence that
the buffer size should be reduced in the presence of traffic aggregation. Our
analytical results are confirmed by simulations performed with Simulink and the
NS simulator.
| [
{
"version": "v1",
"created": "Tue, 13 Mar 2007 09:00:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Avrachenkov",
"Konstantin",
"",
"INRIA Sophia Antipolis"
],
[
"Ayesta",
"Urtzi",
"",
"LAAS"
],
[
"Piunovskiy",
"Alexei",
""
]
] |
cs/0703065 | Gabriel Istrate | Gabriel Istrate | Satisfying assignments of Random Boolean CSP: Clusters and Overlaps | null | null | null | null | cs.DM cond-mat.dis-nn cs.CC | null | The distribution of overlaps of solutions of a random CSP is an indicator of
the overall geometry of its solution space. For random $k$-SAT, nonrigorous
methods from Statistical Physics support the validity of the ``one step replica
symmetry breaking'' approach. Some of these predictions were rigorously
confirmed in \cite{cond-mat/0504070/prl} \cite{cond-mat/0506053}. There it is
proved that the overlap distribution of random $k$-SAT, $k\geq 9$, has
discontinuous support. Furthermore, Achlioptas and Ricci-Tersenghi proved that,
for random $k$-SAT, $k\geq 8$. and constraint densities close enough to the
phase transition there exists an exponential number of clusters of satisfying
assignments; moreover, the distance between satisfying assignments in different
clusters is linear.
We aim to understand the structural properties of random CSP that lead to
solution clustering. To this end, we prove two results on the cluster structure
of solutions for binary CSP under the random model from Molloy (STOC 2002)
1. For all constraint sets $S$ (described explicitly in Creignou and Daude
(2004), Istrate (2005)) s.t. $SAT(S)$ has a sharp threshold and all $q\in
(0,1]$, $q$-overlap-$SAT(S)$ has a sharp threshold (i.e. the first step of the
approach in Mora et al. works in all nontrivial cases). 2. For any constraint
density value $c<1$, the set of solutions of a random instance of 2-SAT form,
w.h.p., a single cluster. Also, for and any $q\in (0,1]$ such an instance has
w.h.p. two satisfying assignment of overlap $\sim q$. Thus, as expected from
Statistical Physics predictions, the second step of the approach in Mora et al.
fails for 2-SAT.
| [
{
"version": "v1",
"created": "Tue, 13 Mar 2007 15:45:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Istrate",
"Gabriel",
""
]
] |
cs/0703066 | Gerard Cohen | Charon Cohen, Hudry Lobstein | Discriminating and Identifying Codes in the Binary Hamming Space | null | null | null | null | cs.DM | null | Let $F^n$ be the binary $n$-cube, or binary Hamming space of dimension $n$,
endowed with the Hamming distance, and ${\cal E}^n$ (respectively, ${\cal
O}^n$) the set of vectors with even (respectively, odd) weight. For $r\geq 1$
and $x\in F^n$, we denote by $B_r(x)$ the ball of radius $r$ and centre $x$. A
code $C\subseteq F^n$ is said to be $r$-identifying if the sets $B_r(x) \cap
C$, $x\in F^n$, are all nonempty and distinct. A code $C\subseteq {\cal E}^n$
is said to be $r$-discriminating if the sets $B_r(x) \cap C$, $x\in {\cal
O}^n$, are all nonempty and distinct. We show that the two definitions, which
were given for general graphs, are equivalent in the case of the Hamming space,
in the following sense: for any odd $r$, there is a bijection between the set
of $r$-identifying codes in $F^n$ and the set of $r$-discriminating codes in
$F^{n+1}$. We then extend previous studies on constructive upper bounds for the
minimum cardinalities of identifying codes in the Hamming space.
| [
{
"version": "v1",
"created": "Wed, 14 Mar 2007 15:00:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cohen",
"Charon",
""
],
[
"Lobstein",
"Hudry",
""
]
] |
cs/0703067 | Stephen Smith | Stephen L. Smith, Francesco Bullo | Target assignment for robotic networks: asymptotic performance under
limited communication | 2007 ACC paper including proofs; Corrected typos | null | null | null | cs.RO | null | We are given an equal number of mobile robotic agents, and distinct target
locations. Each agent has simple integrator dynamics, a limited communication
range, and knowledge of the position of every target. We address the problem of
designing a distributed algorithm that allows the group of agents to divide the
targets among themselves and, simultaneously, leads each agent to reach its
unique target. We do not require connectivity of the communication graph at any
time. We introduce a novel assignment-based algorithm with the following
features: initial assignments and robot motions follow a greedy rule, and
distributed refinements of the assignment exploit an implicit circular ordering
of the targets. We prove correctness of the algorithm, and give worst-case
asymptotic bounds on the time to complete the assignment as the environment
grows with the number of agents. We show that among a certain class of
distributed algorithms, our algorithm is asymptotically optimal. The analysis
utilizes results on the Euclidean traveling salesperson problem.
| [
{
"version": "v1",
"created": "Wed, 14 Mar 2007 19:20:45 GMT"
},
{
"version": "v2",
"created": "Tue, 20 Mar 2007 19:57:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Smith",
"Stephen L.",
""
],
[
"Bullo",
"Francesco",
""
]
] |
cs/0703068 | Vladimir Surkov | Kenneth R. Jackson, Sebastian Jaimungal, Vladimir Surkov | Option Valuation using Fourier Space Time Stepping | null | null | null | null | cs.CE | null | It is well known that the Black-Scholes-Merton model suffers from several
deficiencies. Jump-diffusion and Levy models have been widely used to partially
alleviate some of the biases inherent in this classical model. Unfortunately,
the resulting pricing problem requires solving a more difficult partial-integro
differential equation (PIDE) and although several approaches for solving the
PIDE have been suggested in the literature, none are entirely satisfactory. All
treat the integral and diffusive terms asymmetrically and are difficult to
extend to higher dimensions. We present a new, efficient algorithm, based on
transform methods, which symmetrically treats the diffusive and integrals
terms, is applicable to a wide class of path-dependent options (such as
Bermudan, barrier, and shout options) and options on multiple assets, and
naturally extends to regime-switching Levy models. We present a concise study
of the precision and convergence properties of our algorithm for several
classes of options and Levy models and demonstrate that the algorithm is
second-order in space and first-order in time for path-dependent options.
| [
{
"version": "v1",
"created": "Wed, 14 Mar 2007 19:48:42 GMT"
},
{
"version": "v2",
"created": "Wed, 14 Mar 2007 20:49:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Jackson",
"Kenneth R.",
""
],
[
"Jaimungal",
"Sebastian",
""
],
[
"Surkov",
"Vladimir",
""
]
] |
cs/0703069 | Paul Fodor | Paul Fodor | Portlet Wrappers using JavaScript | null | null | null | null | cs.SE | null | In this paper we extend the classical portal (with static portlets) design
with HTML DOM Web clipping on the client browser using dynamic JavaScript
portlets: the portal server supplies the user/passwords for all services
through https and the client browser retrieves web pages and
cuts/selects/changes the desired parts using paths (XPath) in the Web page
structure. This operation brings along a set of advantages: dynamic wrapping of
existing legacy websites in the client browser, the reloading of only changed
portlets instead of whole portal, low bandwidth on the server, the elimination
of re-writing the URL links in the portal, and last but not least, a support
for Java applets in portlets by putting the login cookies on the client
browser. Our solution is compliant with JSR168 Portlet Specification allowing
portability across all vendor platforms.
| [
{
"version": "v1",
"created": "Wed, 14 Mar 2007 23:32:43 GMT"
},
{
"version": "v2",
"created": "Tue, 27 Mar 2007 15:46:21 GMT"
},
{
"version": "v3",
"created": "Wed, 2 May 2007 19:02:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fodor",
"Paul",
""
]
] |
cs/0703071 | Paul Fodor | Paul Fodor | Automatic Annotation of XHTML Pages with Audio Components | null | null | null | null | cs.OH | null | In this paper we present Deiush, a multimodal system for browsing hypertext
Web documents. The Deiush system is based on our novel approach to
automatically annotate hypertext Web documents (i.e. XHTML pages) with
browsable audio components. It combines two key technologies: (1) middleware
automatic separation of Web documents through structural and semantic analysis
which is annotated with audio components, transforming them into XHTML+VoiceXML
format to represent multimodal dialog; and (2) Opera Browser, an already
standardized browser which we adopt as an interface of the XHTML+VoiceXML
output of annotating. This paper describes the annotation technology of Deiush
and presents an initial system evaluation.
| [
{
"version": "v1",
"created": "Wed, 14 Mar 2007 23:43:30 GMT"
},
{
"version": "v2",
"created": "Tue, 27 Mar 2007 15:45:56 GMT"
},
{
"version": "v3",
"created": "Wed, 2 May 2007 19:03:46 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fodor",
"Paul",
""
]
] |
cs/0703072 | Paul Fodor | Paul Fodor | Domain Directed Dialogs for Decision Processes | null | null | null | null | cs.OH | null | The search for a standardized optimum way to communicate using natural
language dialog has involved a lot of research. However, due to the diversity
of communication domains, we think that this is extremely difficult to achieve
and different dialogue management techniques should be applied for different
situations. Our work presents the basis of a communication mechanism that
supports decision processes, is based on decision trees, and minimizes the
number of steps (turn-takes) in the dialogue. The initial dialog workflow is
automatically generated and the user's interaction with the system can also
change the decision tree and create new dialog paths with optimized cost. The
decision tree represents the chronological ordering of the actions (via the
parent-child relationship) and uses an object frame to represent the
information state (capturing the notion of context). This paper presents our
framework, the formalism for interaction and dialogue, and an evaluation of the
system compared to relevant dialog planning frameworks (i.e. finite state
diagrams, frame-based, information state and planning-based dialogue systems).
| [
{
"version": "v1",
"created": "Thu, 15 Mar 2007 00:08:50 GMT"
},
{
"version": "v2",
"created": "Thu, 22 Mar 2007 14:54:41 GMT"
},
{
"version": "v3",
"created": "Tue, 27 Mar 2007 15:41:54 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fodor",
"Paul",
""
]
] |
cs/0703080 | Paul Ioan Fodor | Joy Dutta, Paul Fodor | A Systematic Approach to Web-Application Development | null | null | null | null | cs.SE | null | Designing a web-application from a specification involves a series of
well-planned and well executed steps leading to the final product. This often
involves critical changes in design while testing the application, which itself
is slow and cumbersome. Traditional approaches either fully automate the
web-application development process, or let developers write everything from
scratch. Our approach is based on a middle-ground, with precise control on the
workflow and usage of a set of custom-made software tools to automate a
significant part of code generation.
| [
{
"version": "v1",
"created": "Thu, 15 Mar 2007 12:55:46 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dutta",
"Joy",
""
],
[
"Fodor",
"Paul",
""
]
] |
cs/0703081 | Andre Hernich | Martin Grohe, Andre Hernich, Nicole Schweikardt | Randomized Computations on Large Data Sets: Tight Lower Bounds | 29 pages, 2 figures, full version of PODS'06 paper | null | null | null | cs.DB cs.CC | null | We study the randomized version of a computation model (introduced by Grohe,
Koch, and Schweikardt (ICALP'05); Grohe and Schweikardt (PODS'05)) that
restricts random access to external memory and internal memory space.
Essentially, this model can be viewed as a powerful version of a data stream
model that puts no cost on sequential scans of external memory (as other models
for data streams) and, in addition, (like other external memory models, but
unlike streaming models), admits several large external memory devices that can
be read and written to in parallel.
We obtain tight lower bounds for the decision problems set equality, multiset
equality, and checksort. More precisely, we show that any randomized
one-sided-error bounded Monte Carlo algorithm for these problems must perform
Omega(log N) random accesses to external memory devices, provided that the
internal memory size is at most O(N^(1/4)/log N), where N denotes the size of
the input data.
From the lower bound on the set equality problem we can infer lower bounds on
the worst case data complexity of query evaluation for the languages XQuery,
XPath, and relational algebra on streaming data. More precisely, we show that
there exist queries in XQuery, XPath, and relational algebra, such that any
(randomized) Las Vegas algorithm that evaluates these queries must perform
Omega(log N) random accesses to external memory devices, provided that the
internal memory size is at most O(N^(1/4)/log N).
| [
{
"version": "v1",
"created": "Thu, 15 Mar 2007 12:58:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Grohe",
"Martin",
""
],
[
"Hernich",
"Andre",
""
],
[
"Schweikardt",
"Nicole",
""
]
] |
cs/0703082 | Christian Rasch | Christian Rasch and Thomas Satzger | Remarks on the O(N) Implementation of the Fast Marching Method | 7 pages, 2 figures | null | null | null | cs.NA | null | The fast marching algorithm computes an approximate solution to the eikonal
equation in O(N log N) time, where the factor log N is due to the
administration of a priority queue. Recently, Yatziv, Bartesaghi and Sapiro
have suggested to use an untidy priority queue, reducing the overall complexity
to O(N) at the price of a small error in the computed solution. In this paper,
we give an explicit estimate of the error introduced, which is based on a
discrete comparison principle. This estimates implies in particular that the
choice of an accuracy level that is independent of the speed function F results
in the complexity bound O(Fmax /Fmin N). A numerical experiment illustrates
this robustness problem for large ratios Fmax /Fmin .
| [
{
"version": "v1",
"created": "Thu, 15 Mar 2007 13:41:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rasch",
"Christian",
""
],
[
"Satzger",
"Thomas",
""
]
] |
cs/0703083 | Frank McCown | Frank McCown and Michael L. Nelson | Characterization of Search Engine Caches | 5 pages, 9 figures, IS&T Archiving 2007, May, 2007 | null | null | null | cs.DL cs.CY | null | Search engines provide cached copies of indexed content so users will have
something to "click on" if the remote resource is temporarily or permanently
unavailable. Depending on their proprietary caching strategies, search engines
will purge their indexes and caches of resources that exceed a threshold of
unavailability. Although search engine caches are provided only as an aid to
the interactive user, we are interested in building reliable preservation
services from the aggregate of these limited caching services. But first, we
must understand the contents of search engine caches. In this paper, we have
examined the cached contents of Ask, Google, MSN and Yahoo to profile such
things as overlap between index and cache, size, MIME type and "staleness" of
the cached resources. We also examined the overlap of the various caches with
the holdings of the Internet Archive.
| [
{
"version": "v1",
"created": "Thu, 15 Mar 2007 15:16:08 GMT"
},
{
"version": "v2",
"created": "Thu, 15 Mar 2007 20:24:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"McCown",
"Frank",
""
],
[
"Nelson",
"Michael L.",
""
]
] |
cs/0703085 | Xiaoyang Gu | Xiaoyang Gu, Jack H. Lutz | Dimension and Relative Frequencies | null | null | null | null | cs.CC | null | We show how to calculate the finite-state dimension (equivalently, the
finite-state compressibility) of a saturated sets $X$ consisting of {\em all}
infinite sequences $S$ over a finite alphabet $\Sigma_m$ satisfying some given
condition $P$ on the asymptotic frequencies with which various symbols from
$\Sigma_m$ appear in $S$. When the condition $P$ completely specifies an
empirical probability distribution $\pi$ over $\Sigma_m$, i.e., a limiting
frequency of occurrence for {\em every} symbol in $\Sigma_m$, it has been known
since 1949 that the Hausdorff dimension of $X$ is precisely $\CH(\pi)$, the
Shannon entropy of $\pi$, and the finite-state dimension was proven to have
this same value in 2001.
The saturated sets were studied by Volkmann and Cajar decades ago. It got
attention again only with the recent developments in multifractal analysis by
Barreira, Saussol, Schmeling, and separately Olsen. However, the powerful
methods they used -- ergodic theory and multifractal analysis -- do not yield a
value for the finite-state (or even computable) dimension in an obvious manner.
We give a pointwise characterization of finite-state dimensions of saturated
sets. Simultaneously, we also show that their finite-state dimension and strong
dimension coincide with their Hausdorff and packing dimension respectively,
though the techniques we use are completely elementary. Our results
automatically extend to less restrictive effective settings (e.g.,
constructive, computable, and polynomial-time dimensions).
| [
{
"version": "v1",
"created": "Fri, 16 Mar 2007 02:42:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gu",
"Xiaoyang",
""
],
[
"Lutz",
"Jack H.",
""
]
] |
cs/0703092 | Partha Basuchowdhuri | Partha Basuchowdhuri | Comparing BB84 and Authentication-Aided Kak's Three-Stage Quantum
Protocol | 9 pages, 4 figures | null | null | null | cs.CR | null | This paper compares the popular quantum key distribution (QKD) protocol BB84
with the more recent Kak's three-stage protocol and the latter is shown to be
more secure. A theoretical representation of an authentication-aided version of
Kak's three-stage protocol is provided that makes it possible to deal with the
man-in-the-middle attack.
| [
{
"version": "v1",
"created": "Mon, 19 Mar 2007 08:13:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Basuchowdhuri",
"Partha",
""
]
] |
cs/0703094 | Olivier Powell | Olivier Powell and Sotiris Nikolesteas | Geographic Routing Around Obstacles in Wireless Sensor Networks | 37 pages, 23 figures | null | null | null | cs.DC | null | Geographic routing is becoming the protocol of choice for many sensor network
applications. The current state of the art is unsatisfactory: some algorithms
are very efficient, however they require a preliminary planarization of the
communication graph. Planarization induces overhead and is not realistic in
many scenarios. On the otherhand, georouting algorithms which do not rely on
planarization have fairly low success rates and either fail to route messages
around all but the simplest obstacles or have a high topology control overhead
(e.g. contour detection algorithms). To overcome these limitations, we propose
GRIC, the first lightweight and efficient on demand (i.e. all-to-all)
geographic routing algorithm which does not require planarization and has
almost 100% delivery rates (when no obstacles are added). Furthermore, the
excellent behavior of our algorithm is maintained even in the presence of large
convex obstacles. The case of hard concave obstacles is also studied; such
obstacles are hard instances for which performance diminishes.
| [
{
"version": "v1",
"created": "Tue, 20 Mar 2007 12:17:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Powell",
"Olivier",
""
],
[
"Nikolesteas",
"Sotiris",
""
]
] |
cs/0703095 | Jian Ma | Jian Ma and Zengqi Sun | Copula Component Analysis | null | null | null | null | cs.IR cs.AI | null | A framework named Copula Component Analysis (CCA) for blind source separation
is proposed as a generalization of Independent Component Analysis (ICA). It
differs from ICA which assumes independence of sources that the underlying
components may be dependent with certain structure which is represented by
Copula. By incorporating dependency structure, much accurate estimation can be
made in principle in the case that the assumption of independence is
invalidated. A two phrase inference method is introduced for CCA which is based
on the notion of multidimensional ICA.
| [
{
"version": "v1",
"created": "Tue, 20 Mar 2007 14:52:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ma",
"Jian",
""
],
[
"Sun",
"Zengqi",
""
]
] |
cs/0703097 | Lane A. Hemaspaandra | Gabor Erdelyi, Lane A. Hemaspaandra, Joerg Rothe, Holger Spakowski | On Approximating Optimal Weighted Lobbying, and Frequency of Correctness
versus Average-Case Polynomial Time | null | null | null | URCS-TR-2007-914 | cs.GT cs.CC cs.MA | null | We investigate issues related to two hard problems related to voting, the
optimal weighted lobbying problem and the winner problem for Dodgson elections.
Regarding the former, Christian et al. [CFRS06] showed that optimal lobbying is
intractable in the sense of parameterized complexity. We provide an efficient
greedy algorithm that achieves a logarithmic approximation ratio for this
problem and even for a more general variant--optimal weighted lobbying. We
prove that essentially no better approximation ratio than ours can be proven
for this greedy algorithm.
The problem of determining Dodgson winners is known to be complete for
parallel access to NP [HHR97]. Homan and Hemaspaandra [HH06] proposed an
efficient greedy heuristic for finding Dodgson winners with a guaranteed
frequency of success, and their heuristic is a ``frequently self-knowingly
correct algorithm.'' We prove that every distributional problem solvable in
polynomial time on the average with respect to the uniform distribution has a
frequently self-knowingly correct polynomial-time algorithm. Furthermore, we
study some features of probability weight of correctness with respect to
Procaccia and Rosenschein's junta distributions [PR07].
| [
{
"version": "v1",
"created": "Tue, 20 Mar 2007 20:35:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Erdelyi",
"Gabor",
""
],
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Rothe",
"Joerg",
""
],
[
"Spakowski",
"Holger",
""
]
] |
cs/0703098 | Sergey Gubin | Sergey Gubin | Polynomial time algorithm for 3-SAT. Examples of use | 19 pages | null | null | null | cs.CC cs.DM cs.DS cs.LO | null | The algorithm checks the propositional formulas for patterns of
unsatisfiability.
| [
{
"version": "v1",
"created": "Wed, 21 Mar 2007 06:46:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gubin",
"Sergey",
""
]
] |
cs/0703100 | Rajmohan Rajaraman | Guolong Lin and Rajmohan Rajaraman | Approximation Algorithms for Multiprocessor Scheduling under Uncertainty | 12 pages, 2 encapsulated postscript figures | null | null | null | cs.DC cs.CC cs.DS | null | Motivated by applications in grid computing and project management, we study
multiprocessor scheduling in scenarios where there is uncertainty in the
successful execution of jobs when assigned to processors. We consider the
problem of multiprocessor scheduling under uncertainty, in which we are given n
unit-time jobs and m machines, a directed acyclic graph C giving the
dependencies among the jobs, and for every job j and machine i, the probability
p_{ij} of the successful completion of job j when scheduled on machine i in any
given particular step. The goal of the problem is to find a schedule that
minimizes the expected makespan, that is, the expected completion time of all
the jobs.
The problem of multiprocessor scheduling under uncertainty was introduced by
Malewicz and was shown to be NP-hard even when all the jobs are independent. In
this paper, we present polynomial-time approximation algorithms for the
problem, for special cases of the dag C. We obtain an O(log(n))-approximation
for the case of independent jobs, an
O(log(m)log(n)log(n+m)/loglog(n+m))-approximation when C is a collection of
disjoint chains, an O(log(m)log^2(n))-approximation when C is a collection of
directed out- or in-trees, and an
O(log(m)log^2(n)log(n+m)/loglog(n+m))-approximation when C is a directed
forest.
| [
{
"version": "v1",
"created": "Wed, 21 Mar 2007 20:35:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lin",
"Guolong",
""
],
[
"Rajaraman",
"Rajmohan",
""
]
] |
cs/0703101 | Thomas M. Breuel | Thomas M. Breuel | A Note on Approximate Nearest Neighbor Methods | The report was originally written in 2005 and does not reference
information after that date | null | null | null | cs.IR cs.CC cs.CV | null | A number of authors have described randomized algorithms for solving the
epsilon-approximate nearest neighbor problem. In this note I point out that the
epsilon-approximate nearest neighbor property often fails to be a useful
approximation property, since epsilon-approximate solutions fail to satisfy the
necessary preconditions for using nearest neighbors for classification and
related tasks.
| [
{
"version": "v1",
"created": "Wed, 21 Mar 2007 20:47:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Breuel",
"Thomas M.",
""
]
] |
cs/0703106 | Paul Wang | Shengbao Wang | Practical Identity-Based Encryption (IBE) in Multiple PKG Environments
and Its Applications | A work in progress, any comment and suggestion will be highly
appreciated by the author | null | null | null | cs.CR | null | In this paper, we present a new identity-based encryption (IBE) scheme using
bilinear pairings. Our IBE scheme enjoys the same \textsf{Key Extraction} and
\textsf{Decryption} algorithms with the famous IBE scheme of Boneh and Franklin
(BF-IBE for short), while differs from the latter in that it has modified
\textsf{Setup} and \textsf{Encryption} algorithms.
Compared with BF-IBE, we show that ours are more practical in a multiple
private key generator (PKG) environment, mainly due to that the session secret
$g_{ID}$ could be pre-computed \emph{before} any interaction, and the sender
could encrypt a message using $g_{ID}$ prior to negotiating with the intended
recipient(s). As an application of our IBE scheme, we also derive an escrowed
ElGamal scheme which possesses certain good properties in practice.
| [
{
"version": "v1",
"created": "Thu, 22 Mar 2007 08:05:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wang",
"Shengbao",
""
]
] |
cs/0703108 | Sourav Dhar | Sourav Dhar, Rabindranath Bera, K.Mal | Wireless Lan to Support Multimedia Communication Using Spread Spectrum
Technology | URSI 0ctober 22-29 2005, 4pages, 6 figures | null | null | null | cs.NI | null | Wireless LAN is currently enjoying rapid deployment in University
departments, business offices, hospitals and homes. It becomes an inexpensive
technology and allows multiple numbers of the households to simultaneously
access the internet while roaming about the house. In the present work, the
design and development of a wireless LAN is highlighted which utilizes direct
sequence spread spectrum (DSSS) technology at 900MHz RF carrier frequency in
its physical layer. This provides enormous security in the physical layer and
hence it is very difficult to hack or jam the network. The installation cost is
also less due to the use of 900 MHz RF carrier frequency..
| [
{
"version": "v1",
"created": "Thu, 22 Mar 2007 11:07:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dhar",
"Sourav",
""
],
[
"Bera",
"Rabindranath",
""
],
[
"Mal",
"K.",
""
]
] |
cs/0703112 | Bharath Ramesh | Bharath Ramesh and Srinidhi Varadarajan | User-level DSM System for Modern High-Performance Interconnection
Networks | 6 pages, 5 figures | null | null | null | cs.DC | null | In this paper, we introduce a new user-level DSM system which has the ability
to directly interact with underlying interconnection networks. The DSM system
provides the application programmer a flexible API to program parallel
applications either using shared memory semantics over physically distributed
memory or to use an efficient remote memory demand paging technique. We also
introduce a new time slice based memory consistency protocol which is used by
the DSM system. We present preliminary results from our implementation on a
small Opteron Linux cluster interconnected over Myrinet.
| [
{
"version": "v1",
"created": "Thu, 22 Mar 2007 19:15:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ramesh",
"Bharath",
""
],
[
"Varadarajan",
"Srinidhi",
""
]
] |
cs/0703117 | Juan J. Merelo Pr. | J.L.J. Laredo, E.A. Eiben, M. Schoenauer, P.A. Castillo, A.M. Mora, F.
Fernandez, J.J. Merelo | Self-adaptive Gossip Policies for Distributed Population-based
Algorithms | Submitted to Europar 2007 | null | null | null | cs.DC | null | Gossipping has demonstrate to be an efficient mechanism for spreading
information among P2P networks. Within the context of P2P computing, we propose
the so-called Evolvable Agent Model for distributed population-based algorithms
which uses gossipping as communication policy, and represents every individual
as a self-scheduled single thread. The model avoids obsolete nodes in the
population by defining a self-adaptive refresh rate which depends on the
latency and bandwidth of the network. Such a mechanism balances the migration
rate to the congestion of the links pursuing global population coherence. We
perform an experimental evaluation of this model on a real parallel system and
observe how solution quality and algorithm speed scale with the number of
processors with this seamless approach.
| [
{
"version": "v1",
"created": "Fri, 23 Mar 2007 11:29:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Laredo",
"J. L. J.",
""
],
[
"Eiben",
"E. A.",
""
],
[
"Schoenauer",
"M.",
""
],
[
"Castillo",
"P. A.",
""
],
[
"Mora",
"A. M.",
""
],
[
"Fernandez",
"F.",
""
],
[
"Merelo",
"J. J.",
""
]
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.