id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
3
62.8k
title
stringlengths
1
382
comments
stringlengths
1
1.15k
journal-ref
stringlengths
1
557
doi
stringlengths
7
153
report-no
stringlengths
1
509
categories
stringlengths
5
125
license
stringclasses
9 values
abstract
stringlengths
6
6.09k
versions
listlengths
1
187
update_date
timestamp[s]date
2007-05-23 00:00:00
2025-04-25 00:00:00
authors_parsed
sequencelengths
1
2.83k
cs/0702054
Christoph Durr
Christoph Durr and Nguyen Kim Thang
Nash equilibria in Voronoi games on graphs
null
null
null
null
cs.GT cs.DS
null
In this paper we study a game where every player is to choose a vertex (facility) in a given undirected graph. All vertices (customers) are then assigned to closest facilities and a player's payoff is the number of customers assigned to it. We show that deciding the existence of a Nash equilibrium for a given graph is NP-hard which to our knowledge is the first result of this kind for a zero-sum game. We also introduce a new measure, the social cost discrepancy, defined as the ratio of the costs between the worst and the best Nash equilibria. We show that the social cost discrepancy in our game is Omega(sqrt(n/k)) and O(sqrt(kn)), where n is the number of vertices and k the number of players.
[ { "version": "v1", "created": "Fri, 9 Feb 2007 12:12:17 GMT" }, { "version": "v2", "created": "Fri, 13 Apr 2007 14:11:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Durr", "Christoph", "" ], [ "Thang", "Nguyen Kim", "" ] ]
cs/0702055
Alexander Paraskevov
A.V. Paraskevov
On the possibility of making the complete computer model of a human brain
null
null
null
null
cs.NE
null
The development of the algorithm of a neural network building by the corresponding parts of a DNA code is discussed.
[ { "version": "v1", "created": "Fri, 9 Feb 2007 13:16:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Paraskevov", "A. V.", "" ] ]
cs/0702056
Hanene Mohamed
Hanene Mohamed (INRIA Rocquencourt)
A probabilistic analysis of a leader election algorithm
null
Fourth Colloquium on Mathematics and Computer Science Algorithms, Trees, Combinatorics and Probabilities (2006) 225-236
null
null
cs.DS
null
A {\em leader election} algorithm is an elimination process that divides recursively into tow subgroups an initial group of n items, eliminates one subgroup and continues the procedure until a subgroup is of size 1. In this paper the biased case is analyzed. We are interested in the {\em cost} of the algorithm, i.e. the number of operations needed until the algorithm stops. Using a probabilistic approach, the asymptotic behavior of the algorithm is shown to be related to the behavior of a hitting time of two random sequences on [0,1].
[ { "version": "v1", "created": "Fri, 9 Feb 2007 15:16:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Mohamed", "Hanene", "", "INRIA Rocquencourt" ] ]
cs/0702058
Kia Kai Li
Kia Kai Li
Exploring k-Colorability
null
null
null
null
cs.CC
null
An introductory paper to the graph k-colorability problem.
[ { "version": "v1", "created": "Fri, 9 Feb 2007 23:07:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Li", "Kia Kai", "" ] ]
cs/0702067
Fionn Murtagh
Fionn Murtagh
The Haar Wavelet Transform of a Dendrogram: Additional Notes
37 pp, 1 fig. Supplementary material to "The Haar Wavelet Transform of a Dendrogram", http://arxiv.org/abs/cs.IR/0608107
null
null
null
cs.IR
null
We consider the wavelet transform of a finite, rooted, node-ranked, $p$-way tree, focusing on the case of binary ($p = 2$) trees. We study a Haar wavelet transform on this tree. Wavelet transforms allow for multiresolution analysis through translation and dilation of a wavelet function. We explore how this works in our tree context.
[ { "version": "v1", "created": "Sat, 10 Feb 2007 21:26:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Murtagh", "Fionn", "" ] ]
cs/0702074
Xavier P\'erez-Gim\'enez
Josep Diaz, Dieter Mitsche, Xavier Perez
Dynamic Random Geometric Graphs
null
null
null
null
cs.DM
null
In this work we introduce Dynamic Random Geometric Graphs as a basic rough model for mobile wireless sensor networks, where communication distances are set to the known threshold for connectivity of static random geometric graphs. We provide precise asymptotic results for the expected length of the connectivity and disconnectivity periods of the network. We believe the formal tools developed in this work could be of use in future studies in more concrete settings. In addition, for static random geometric graphs at the threshold for connectivity, we provide asymptotic expressions on the probability of existence of components according to their sizes.
[ { "version": "v1", "created": "Tue, 13 Feb 2007 09:00:34 GMT" }, { "version": "v2", "created": "Fri, 20 Apr 2007 09:15:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Diaz", "Josep", "" ], [ "Mitsche", "Dieter", "" ], [ "Perez", "Xavier", "" ] ]
cs/0702075
Maurice H. T. Ling
Maurice HT Ling
Firebird Database Backup by Serialized Database Table Dump
5 pages
Ling, Maurice HT. 2007. Firebird Database Backup by Serialized Database Table Dump. The Python Papers 2 (1): 10-14
null
null
cs.DB
null
This paper presents a simple data dump and load utility for Firebird databases which mimics mysqldump in MySQL. This utility, fb_dump and fb_load, for dumping and loading respectively, retrieves each database table using kinterbasdb and serializes the data using marshal module. This utility has two advantages over the standard Firebird database backup utility, gbak. Firstly, it is able to backup and restore single database tables which might help to recover corrupted databases. Secondly, the output is in text-coded format (from marshal module) making it more resilient than a compressed text backup, as in the case of using gbak.
[ { "version": "v1", "created": "Tue, 13 Feb 2007 11:13:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Ling", "Maurice HT", "" ] ]
cs/0702078
Reid Andersen
Reid Andersen
A Local Algorithm for Finding Dense Subgraphs
14 pages, no figures
null
null
null
cs.DS cs.CC
null
We present a local algorithm for finding dense subgraphs of bipartite graphs, according to the definition of density proposed by Kannan and Vinay. Our algorithm takes as input a bipartite graph with a specified starting vertex, and attempts to find a dense subgraph near that vertex. We prove that for any subgraph S with k vertices and density theta, there are a significant number of starting vertices within S for which our algorithm produces a subgraph S' with density theta / O(log n) on at most O(D k^2) vertices, where D is the maximum degree. The running time of the algorithm is O(D k^2), independent of the number of vertices in the graph.
[ { "version": "v1", "created": "Tue, 13 Feb 2007 23:41:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Andersen", "Reid", "" ] ]
cs/0702081
Rick Dale
Rick Dale
Random Sentences from a Generalized Phrase-Structure Grammar Interpreter
Brief paper with source code and examples
null
null
null
cs.CL
null
In numerous domains in cognitive science it is often useful to have a source for randomly generated corpora. These corpora may serve as a foundation for artificial stimuli in a learning experiment (e.g., Ellefson & Christiansen, 2000), or as input into computational models (e.g., Christiansen & Dale, 2001). The following compact and general C program interprets a phrase-structure grammar specified in a text file. It follows parameters set at a Unix or Unix-based command-line and generates a corpus of random sentences from that grammar.
[ { "version": "v1", "created": "Wed, 14 Feb 2007 06:05:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Dale", "Rick", "" ] ]
cs/0702083
Serebrenik Alexander
Alexander Serebrenik, Tom Schrijvers, Bart Demoen
Improving Prolog programs: Refactoring for Prolog
To appear in Theory and Practice of Logic Programming (TPLP)
null
null
2006-1
cs.SE
null
Refactoring is an established technique from the object-oriented (OO) programming community to restructure code: it aims at improving software readability, maintainability and extensibility. Although refactoring is not tied to the OO-paradigm in particular, its ideas have not been applied to Logic Programming until now. This paper applies the ideas of refactoring to Prolog programs. A catalogue is presented listing refactorings classified according to scope. Some of the refactorings have been adapted from the OO-paradigm, while others have been specifically designed for Prolog. The discrepancy between intended and operational semantics in Prolog is also addressed by some of the refactorings. In addition, ViPReSS, a semi-automatic refactoring browser, is discussed and the experience with applying ViPReSS to a large Prolog legacy system is reported. The main conclusion is that refactoring is both a viable technique in Prolog and a rather desirable one.
[ { "version": "v1", "created": "Wed, 14 Feb 2007 09:53:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Serebrenik", "Alexander", "" ], [ "Schrijvers", "Tom", "" ], [ "Demoen", "Bart", "" ] ]
cs/0702085
Vincenzo Nicosia
V. Carchiolo, M. Malgeri, G. Mangioni and V. Nicosia
Social Behaviours Applied to P2P Systems: An efficient Algorithm for Resource Organisation
5 Pages; 8 Figures; Presented at COPS 2006 -- WETICE -- Manchester (UK)
15th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2006. WETICE '06. June 2006 Page(s):65 - 72
null
null
cs.DC cs.IR
null
P2P systems are a great solution to the problem of distributing resources. The main issue of P2P networks is that searching and retrieving resources shared by peers is usually expensive and does not take into account similarities among peers. In this paper we present preliminary simulations of PROSA, a novel algorithm for P2P network structuring, inspired by social behaviours. Peers in PROSA self--organise in social groups of similar peers, called ``semantic--groups'', depending on the resources they are sharing. Such a network smoothly evolves to a small--world graph, where queries for resources are efficiently and effectively routed.
[ { "version": "v1", "created": "Wed, 14 Feb 2007 11:53:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Carchiolo", "V.", "" ], [ "Malgeri", "M.", "" ], [ "Mangioni", "G.", "" ], [ "Nicosia", "V.", "" ] ]
cs/0702086
Andreas U. Schmidt
Nicolai Kuntze and Andreas U. Schmidt
Protection of DVB Systems by Trusted Computing
Accepted contribution to the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting 2007, 28-29 March 2007 at the Orange County Convention Center, Orlando, FL, USA; 7 pages, 4 figures
null
null
null
cs.CR
null
We describe a concept to employ Trusted Computing technology to secure Conditional Access Systems (CAS) for DVB. Central is the embedding of a trusted platform module (TPM) into the set-top-box or residential home gateway. Various deployment scenarios exhibit possibilities of charging co-operation with mobile network operators (MNO), or other payment providers.
[ { "version": "v1", "created": "Wed, 14 Feb 2007 11:58:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Kuntze", "Nicolai", "" ], [ "Schmidt", "Andreas U.", "" ] ]
cs/0702088
Shanghua Teng
Xi Chen and Shang-Hua Teng
Paths Beyond Local Search: A Nearly Tight Bound for Randomized Fixed-Point Computation
null
null
null
null
cs.GT
null
In 1983, Aldous proved that randomization can speedup local search. For example, it reduces the query complexity of local search over [1:n]^d from Theta (n^{d-1}) to O (d^{1/2}n^{d/2}). It remains open whether randomization helps fixed-point computation. Inspired by this open problem and recent advances on equilibrium computation, we have been fascinated by the following question: Is a fixed-point or an equilibrium fundamentally harder to find than a local optimum? In this paper, we give a nearly-tight bound of Omega(n)^{d-1} on the randomized query complexity for computing a fixed point of a discrete Brouwer function over [1:n]^d. Since the randomized query complexity of global optimization over [1:n]^d is Theta (n^{d}), the randomized query model over [1:n]^d strictly separates these three important search problems: Global optimization is harder than fixed-point computation, and fixed-point computation is harder than local search. Our result indeed demonstrates that randomization does not help much in fixed-point computation in the query model; the deterministic complexity of this problem is Theta (n^{d-1}).
[ { "version": "v1", "created": "Fri, 16 Feb 2007 07:32:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Chen", "Xi", "" ], [ "Teng", "Shang-Hua", "" ] ]
cs/0702091
raphael M. Jungers
Raphael M. Jungers and Vincent D. Blondel
Observable Graphs
15 pages, 8 figures
null
null
null
cs.MA
null
An edge-colored directed graph is \emph{observable} if an agent that moves along its edges is able to determine his position in the graph after a sufficiently long observation of the edge colors. When the agent is able to determine his position only from time to time, the graph is said to be \emph{partly observable}. Observability in graphs is desirable in situations where autonomous agents are moving on a network and one wants to localize them (or the agent wants to localize himself) with limited information. In this paper, we completely characterize observable and partly observable graphs and show how these concepts relate to observable discrete event systems and to local automata. Based on these characterizations, we provide polynomial time algorithms to decide observability, to decide partial observability, and to compute the minimal number of observations necessary for finding the position of an agent. In particular we prove that in the worst case this minimal number of observations increases quadratically with the number of nodes in the graph. From this it follows that it may be necessary for an agent to pass through the same node several times before he is finally able to determine his position in the graph. We then consider the more difficult question of assigning colors to a graph so as to make it observable and we prove that two different versions of this problem are NP-complete.
[ { "version": "v1", "created": "Fri, 16 Feb 2007 16:16:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Jungers", "Raphael M.", "" ], [ "Blondel", "Vincent D.", "" ] ]
cs/0702094
Marko Horvat B.Sc.CS-Dipl.Ing.
Darko Fuduric, Marko Horvat and Mario Zagar
Authentication via wireless networks
5 pages, 6 figures, 1 table, MIPRO Conference in Opatija, Croatia, 2006
MIPRO, 2006
null
null
cs.OH
null
Personal authentication is an important process we encounter almost every day; when we are logging on a computer, entering a company where we work, or a restricted area, when we are using our plastic credit cards to pay for a service or to complete some other financial transaction, etc. In each of these processes of personal authentication some kind of magnetic or optical token is required. But by using novel technologies like mobile computing and wireless networking, it is possible to avoid carrying multitude of ID cards or remembering a number of PIN codes. Article shows how to efficiently authenticate users via Personal Area Networks (PAN) like Bluetooth or IrDA using commonplace AES (Rijndel) or MD5 encryption. This method can be implemented on many types of mobile devices like Pocket PC PDA with Windows CE (Windows Mobile 2003) real-time operating system, or any other customized OS, so we will explain all components and key features of such basic system.
[ { "version": "v1", "created": "Fri, 16 Feb 2007 16:46:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Fuduric", "Darko", "" ], [ "Horvat", "Marko", "" ], [ "Zagar", "Mario", "" ] ]
cs/0702095
Ayan Mahalanobis
Ayan Mahalanobis
A note on using finite non-abelian $p$-groups in the MOR cryptosystem
null
null
null
null
cs.CR math.GR
null
The MOR cryptosystem is a natural generalization of the El-Gamal cryptosystem to non-abelian groups. Using a $p$-group, a cryptosystem was built by this author in 'A simple generalization of El-Gamal cryptosystem to non-abelian groups'. It seems reasonable to assume the cryptosystem is as secure as the El-Gamal cryptosystem over finite fields. A natural question arises can one make a better cryptosystem using $p$-groups? In this paper we show that the answer is no.
[ { "version": "v1", "created": "Fri, 16 Feb 2007 19:04:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Mahalanobis", "Ayan", "" ] ]
cs/0702096
David Iclanzan Mr
David Iclanzan, Dan Dumitrescu
Overcoming Hierarchical Difficulty by Hill-Climbing the Building Block Structure
submited to GECCO 2007 (jan 31)
null
null
null
cs.NE cs.AI
null
The Building Block Hypothesis suggests that Genetic Algorithms (GAs) are well-suited for hierarchical problems, where efficient solving requires proper problem decomposition and assembly of solution from sub-solution with strong non-linear interdependencies. The paper proposes a hill-climber operating over the building block (BB) space that can efficiently address hierarchical problems. The new Building Block Hill-Climber (BBHC) uses past hill-climb experience to extract BB information and adapts its neighborhood structure accordingly. The perpetual adaptation of the neighborhood structure allows the method to climb the hierarchical structure solving successively the hierarchical levels. It is expected that for fully non deceptive hierarchical BB structures the BBHC can solve hierarchical problems in linearithmic time. Empirical results confirm that the proposed method scales almost linearly with the problem size thus clearly outperforms population based recombinative methods.
[ { "version": "v1", "created": "Fri, 16 Feb 2007 21:47:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Iclanzan", "David", "" ], [ "Dumitrescu", "Dan", "" ] ]
cs/0702098
Jari Salo
Jari Salo
A Sum-Product Model as a Physical Basis for Shadow Fading
23 pages, 9 figs. To be revised and maybe submitted
null
null
null
cs.OH
null
Shadow fading (slow fading) effects play a central role in mobile communication system design and analysis. Experimental evidence indicates that shadow fading exhibits log-normal power distribution almost universally, and yet it is still not well understood what causes this. In this paper, we propose a versatile sum-product signal model as a physical basis for shadow fading. Simulation results imply that the proposed model results in log-normally distributed local mean power regardless of the distributions of the interactions in the radio channel, and hence it is capable of explaining the log-normality in a wide variety of propagation scenarios. The sum-product model also includes as its special cases the conventional product model as well as the recently proposed sum model, and improves upon these by: a) being applicable in both global and local distance scales; b) being more plausible from physical point of view; c) providing better goodness-of-fit to log-normal distribution than either of these models.
[ { "version": "v1", "created": "Sun, 18 Feb 2007 21:54:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Salo", "Jari", "" ] ]
cs/0702106
Charles Robert
Charles Robert (LORIA), Ranmi Adigun (YABATECH)
Wild, Wild Wikis: A way forward
null
Dans The Fifth International Conference on Creating, Connecting and Collaborating through Computing, C5 2007 (2007)
null
null
cs.IR
null
Wikis can be considered as public domain knowledge sharing system. They provide opportunity for those who may not have the privilege to publish their thoughts through the traditional methods. They are one of the fastest growing systems of online encyclopaedia. In this study, we consider the importance of wikis as a way of creating, sharing and improving public knowledge. We identify some of the problems associated with wikis to include, (a) identification of the identities of information and its creator (b) accuracy of information (c) justification of the credibility of authors (d) vandalism of quality of information (e) weak control over the contents. A solution to some of these problems is sought through the use of an annotation model. The model assumes that contributions in wikis can be seen as annotation to the initial document. It proposed a systematic control of contributors and contributions to the initiative and the keeping of records of what existed and what was done to initial documents. We believe that with this model, analysis can be done on the progress of wiki initiatives. We assumed that using this model, wikis can be better used for creation and sharing of knowledge for public use.
[ { "version": "v1", "created": "Mon, 19 Feb 2007 15:12:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Robert", "Charles", "", "LORIA" ], [ "Adigun", "Ranmi", "", "YABATECH" ] ]
cs/0702107
Charles Robert
Charles A. Robert (LORIA)
AMIEDoT: An annotation model for document tracking and recommendation service
null
Dans International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering, (CIS2E 06) (2007)
null
null
cs.IR
null
The primary objective of document annotation in whatever form, manual or electronic is to allow those who may not have control to original document to provide personal view on information source. Beyond providing personal assessment to original information sources, we are looking at a situation where annotation made can be used as additional source of information for document tracking and recommendation service. Most of the annotation tools existing today were conceived for their independent use with no reference to the creator of the annotation. We propose AMIEDoT (Annotation Model for Information Exchange and Document Tracking) an annotation model that can assist in document tracking and recommendation service. The model is based on three parameters in the acts of annotation. We believe that introducing document parameters, time and the parameters of the creator of annotation into an annotation process can be a dependable source to know, who used a document, when a document was used and for what a document was used for. Beyond document tracking, our model can be used in not only for selective dissemination of information but for recommendation services. AMIEDoT can also be used for information sharing and information reuse.
[ { "version": "v1", "created": "Mon, 19 Feb 2007 15:18:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Robert", "Charles A.", "", "LORIA" ] ]
cs/0702109
Charles Robert
Charles A. Robert (LORIA), David Amos (LORIA)
AMIE: An annotation model for information research
null
Dans International Conference on Computers in Education, (2006)
null
null
cs.IR
null
The objective of most users for consulting any information database, information warehouse or the internet is to resolve one problem or the other. Available online or offline annotation tools were not conceived with the objective of assisting users in their bid to resolve a decisional problem. Apart from the objective and usage of annotation tools, how these tools are conceived and classified has implication on their usage. Several criteria have been used to categorize annotation concepts. Typically annotation are conceived based on how it affect the organization of document been considered for annotation or the organization of the resulting annotation. Our approach is annotation that will assist in information research for decision making. Annotation model for information exchange (AMIE) was conceived with the objective of information sharing and reuse.
[ { "version": "v1", "created": "Mon, 19 Feb 2007 15:26:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Robert", "Charles A.", "", "LORIA" ], [ "Amos", "David", "", "LORIA" ] ]
cs/0702110
Saltuk Aksahin
Saltuk Aksahin
Security Implications of Converged Networks and Protecting Them, without Compromising Efficiency
64 pages
null
null
null
cs.NI
null
This dissertation has extensively looked into all aspects of VoIP commu-nications technology, and information presented in preceding chapters, which build up a solid framework to discuss the conceptual design model, and investigate features that could be incorporated for actual Pro-jects, with parameters that are tested on field values. The dissertation follows a five-course model, for answering different questions, both tech-nical and businesslike, around central issues, that have been crucial to explanation of the topic; starting with a general overview of VoIP tech-nology, analyzing current VoIP encryption methods, identifying security threats, designing a robust VoIP system based on particulars discussed in preceding chapters, and finally, a VoIP simulation.
[ { "version": "v1", "created": "Mon, 19 Feb 2007 20:51:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Aksahin", "Saltuk", "" ] ]
cs/0702114
David Pritchard
David Pritchard
Nearest Neighbor Network Traversal
null
null
null
null
cs.DC
null
A mobile agent in a network wants to visit every node of an n-node network, using a small number of steps. We investigate the performance of the following ``nearest neighbor'' heuristic: always go to the nearest unvisited node. If the network graph never changes, then from (Rosenkrantz, Stearns and Lewis, 1977) and (Hurkens and Woeginger, 2004) it follows that Theta(n log n) steps are necessary and sufficient in the worst case. We give a simpler proof of the upper bound and an example that improves the best known lower bound. We investigate how the performance of this heuristic changes when it is distributively implemented in a network. Even if network edges are allow to fail over time, we show that the nearest neighbor strategy never runs for more than O(n^2) iterations. We also show that any strategy can be forced to take at least n(n-1)/2 steps before all nodes are visited, if the edges of the network are deleted in an adversarial way.
[ { "version": "v1", "created": "Tue, 20 Feb 2007 03:54:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Pritchard", "David", "" ] ]
cs/0702117
Mathieu Couture
Prosenjit Bose and Paz Carmi and Mathieu Couture and Michiel Smid and Daming Xu
On a family of strong geometric spanners that admit local routing strategies
null
null
null
null
cs.CG
null
We introduce a family of directed geometric graphs, denoted $\paz$, that depend on two parameters $\lambda$ and $\theta$. For $0\leq \theta<\frac{\pi}{2}$ and ${1/2} < \lambda < 1$, the $\paz$ graph is a strong $t$-spanner, with $t=\frac{1}{(1-\lambda)\cos\theta}$. The out-degree of a node in the $\paz$ graph is at most $\lfloor2\pi/\min(\theta, \arccos\frac{1}{2\lambda})\rfloor$. Moreover, we show that routing can be achieved locally on $\paz$. Next, we show that all strong $t$-spanners are also $t$-spanners of the unit disk graph. Simulations for various values of the parameters $\lambda$ and $\theta$ indicate that for random point sets, the spanning ratio of $\paz$ is better than the proven theoretical bounds.
[ { "version": "v1", "created": "Tue, 20 Feb 2007 20:54:16 GMT" }, { "version": "v2", "created": "Wed, 21 Feb 2007 14:57:44 GMT" }, { "version": "v3", "created": "Thu, 22 Feb 2007 21:17:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Bose", "Prosenjit", "" ], [ "Carmi", "Paz", "" ], [ "Couture", "Mathieu", "" ], [ "Smid", "Michiel", "" ], [ "Xu", "Daming", "" ] ]
cs/0702123
Slavcho Shtrakov
Slavcho Shtrakov and Vladimir Shtrakov
Tree automata and separable sets of input variables
8 pages, 2 figures
J. FILOMAT, v. 15, 2001, University of Nis, 61-71 p., ISSN 0354-5180 (http://www.pmf.ni.ac.yu/sajt/publikacije/filomat_15.html)
null
null
cs.CC cs.DM
null
We consider the computational complexity of tree transducers, depending on their separable sets of input variables.
[ { "version": "v1", "created": "Thu, 22 Feb 2007 15:16:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Shtrakov", "Slavcho", "" ], [ "Shtrakov", "Vladimir", "" ] ]
cs/0702125
Philipp Pluch
Philipp Pluch, Samo Wakounig
Bayesian Network Tomography and Inference
null
null
null
null
cs.NI
null
The aim of this technical report is to give a short overview of known techniques for network tomography (introduced in the paper of Vardi (1996)), extended by a Bayesian approach originating Tebaldi and West (1998). Since the studies of A.K. Erlang (1878-1929) on telephone networks in the last millennium, lots of needs are seen in todays applications of networks and network tomography, so for instance networks are a critical component of the information structure supporting finance, commerce and even civil and national defence. An attack on a network can be performed as an intrusion in the network or as sending a lot of fault information and disturbing the network flow. Such attacks can be detected by modelling the traffic flows in a network, by counting the source destination packets and even by measuring counts over time and by drawing a comparison with this 'time series' for instance.
[ { "version": "v1", "created": "Thu, 22 Feb 2007 09:43:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Pluch", "Philipp", "" ], [ "Wakounig", "Samo", "" ] ]
cs/0702126
Vincenzo Nicosia
V. Nicosia, G. Mangioni, V. Carchiolo, M. Malgeri
Efficient Searching and Retrieval of Documents in PROSA
12 pages, 3 figures
null
null
null
cs.DC cs.IR
null
Retrieving resources in a distributed environment is more difficult than finding data in centralised databases. In the last decade P2P system arise as new and effective distributed architectures for resource sharing, but searching in such environments could be difficult and time-consuming. In this paper we discuss efficiency of resource discovery in PROSA, a self-organising P2P system heavily inspired by social networks. All routing choices in PROSA are made locally, looking only at the relevance of the next peer to each query. We show that PROSA is able to effectively answer queries for rare documents, forwarding them through the most convenient path to nodes that much probably share matching resources. This result is heavily related to the small-world structure that naturally emerges in PROSA.
[ { "version": "v1", "created": "Thu, 22 Feb 2007 10:22:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Nicosia", "V.", "" ], [ "Mangioni", "G.", "" ], [ "Carchiolo", "V.", "" ], [ "Malgeri", "M.", "" ] ]
cs/0702127
Vincenzo Nicosia
V. Nicosia, G. Mangioni, V. Carchiolo, M. Malgeri
Exploiting social networks dynamics for P2P resource organisation
9 pages, 4 figures
Lecture Notes on Computer Science (LNCS) 4263 (2006)
null
null
cs.DC cs.IR
null
In this paper we present a formal description of PROSA, a P2P resource management system heavily inspired by social networks. Social networks have been deeply studied in the last two decades in order to understand how communities of people arise and grow. It is a widely known result that networks of social relationships usually evolves to small-worlds, i.e. networks where nodes are strongly connected to neighbours and separated from all other nodes by a small amount of hops. This work shows that algorithms implemented into PROSA allow to obtain an efficient small-world P2P network.
[ { "version": "v1", "created": "Thu, 22 Feb 2007 10:35:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Nicosia", "V.", "" ], [ "Mangioni", "G.", "" ], [ "Carchiolo", "V.", "" ], [ "Malgeri", "M.", "" ] ]
cs/0702128
Huang Xiangao
Xiangao Huang and Wei Huang and Xiaozhou Liu and Chao Wang and Zhu jing Wang and Tao Wang
Reconstructing the Nonlinear Filter Function of LILI-128 Stream Cipher Based on Complexity
6 pages, 1 figure
null
null
null
cs.CR
null
In this letter we assert that we have reconstructed the nonlinear filter function of LILI-128 stream cipher on IBM notebook PC using MATLAB. Our reconstruction need approximately 2^12~2^13 and the attack consumes 5825.016 sec (using tic and toc sentences of MATLAB) or 5825.016/3600=1.6181hours. We got the expression of the nonlinear filter function fd of Lili-128 which has 46 items from liner items to nonlinear items based on complexity, the phase space reconstruction, Clustering and nonlinear prediction. We have verified our reconstruction result correctness by simulating the overview of Lili-128 keystream generators using our getting fd and implement designers reference module of the Lili-128 stream cipher, and two methods produce the same synchronous keystream sequence on same initial state, so that our research work proves that the nonlinear filter function of LILI-128 stream cipher is successfully reconstructed.
[ { "version": "v1", "created": "Thu, 22 Feb 2007 14:03:51 GMT" }, { "version": "v2", "created": "Thu, 19 Apr 2007 01:53:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Huang", "Xiangao", "" ], [ "Huang", "Wei", "" ], [ "Liu", "Xiaozhou", "" ], [ "Wang", "Chao", "" ], [ "Wang", "Zhu jing", "" ], [ "Wang", "Tao", "" ] ]
cs/0702129
Slavcho Shtrakov
Slavcho Shtrakov
Tree Automata and Essential Input Variables
10 pages, 2 figures, 60th Workshop on General Algebra, June 22-25, 2000, TU Dresden
J. Contributions to General Algebra, v.13, Verlag Johannes Heyn, Klagenfurt, 2001, 309-319 p
null
null
cs.CC cs.DM
null
We introduce and study the essential inputs (variables) for terms (trees) and tree automata.
[ { "version": "v1", "created": "Thu, 22 Feb 2007 15:12:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Shtrakov", "Slavcho", "" ] ]
cs/0702131
Jason Reese
Graham B. Macpherson and Jason M. Reese
AICA: a New Pair Force Evaluation Method for Parallel Molecular Dynamics in Arbitrary Geometries
null
null
null
null
cs.CE cs.DC
null
A new algorithm for calculating intermolecular pair forces in Molecular Dynamics (MD) simulations on a distributed parallel computer is presented. The Arbitrary Interacting Cells Algorithm (AICA) is designed to operate on geometrical domains defined by an unstructured, arbitrary polyhedral mesh, which has been spatially decomposed into irregular portions for parallelisation. It is intended for nano scale fluid mechanics simulation by MD in complex geometries, and to provide the MD component of a hybrid MD/continuum simulation. AICA has been implemented in the open-source computational toolbox OpenFOAM, and verified against a published MD code.
[ { "version": "v1", "created": "Thu, 22 Feb 2007 17:27:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Macpherson", "Graham B.", "" ], [ "Reese", "Jason M.", "" ] ]
cs/0702133
Vadim Yatsenko
Vadim Yatsenko
Fast Exact Method for Solving the Travelling Salesman Problem
4 pages, 4 figures
null
null
null
cs.CC
null
This paper describes TSP exact solution of polynomial complexity. It is considered properties of proposed method. Effectiveness of proposed solution is illustrated by outcomes of computer modeling.
[ { "version": "v1", "created": "Fri, 23 Feb 2007 02:39:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Yatsenko", "Vadim", "" ] ]
cs/0702136
Slavcho Shtrakov
Ivo Damyanov and Slavcho Shtrakov
Essential Inputs and Minimal Tree Automata
7 pages, 1 figure, Sixth International Conference on Discrete Mathematics and Applications, 31.08-02.09.2001, Bansko
Proc. of ICDMA, 31.08-02.09.2001, Bansko, v.6, 77-85 p
null
null
cs.CC cs.DM
null
We continue studying essential inputs of trees and automata. Strongly essential inputs of trees are introduced and studied. Various examples for application in Computer Science are shown.
[ { "version": "v1", "created": "Fri, 23 Feb 2007 12:48:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Damyanov", "Ivo", "" ], [ "Shtrakov", "Slavcho", "" ] ]
cs/0702137
Slavcho Shtrakov
Slavcho Shtrakov
Tree Automata and Essential Subtrees
9 pages, 2 figures, Sixth International Conference on Discrete Mathematics and Applications, Bansko, 2001
Proc. of ICDMA, 31.08-02.09.2001, Bansko, v.6, 51-60 p
null
null
cs.CC cs.DM
null
We introduce essential subtrees for terms (trees) and tree automata . There are some results concerning independent sets of subtrees and separable sets for a tree and an automaton.
[ { "version": "v1", "created": "Fri, 23 Feb 2007 13:20:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Shtrakov", "Slavcho", "" ] ]
cs/0702139
Alexander Kholosha
Tor Helleseth and Alexander Kholosha and Geir Jarle Ness
Characterization of $m$-Sequences of Lengths $2^{2k}-1$ and $2^k-1$ with Three-Valued Crosscorrelation
23 pages
null
null
null
cs.CR cs.DM
null
Considered is the distribution of the crosscorrelation between $m$-sequences of length $2^m-1$, where $m=2k$, and $m$-sequences of shorter length $2^k-1$. New pairs of $m$-sequences with three-valued crosscorrelation are found and the complete correlation distribution is determined. Finally, we conjecture that there are no more cases with a three-valued crosscorrelation apart from the ones proven here.
[ { "version": "v1", "created": "Fri, 23 Feb 2007 16:01:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Helleseth", "Tor", "" ], [ "Kholosha", "Alexander", "" ], [ "Ness", "Geir Jarle", "" ] ]
cs/0702140
Bernardo Huberman
Dennis M. Wilkinson and Bernardo A. Huberman
Assessing the Value of Coooperation in Wikipedia
null
null
null
null
cs.DL cs.CY physics.soc-ph
null
Since its inception six years ago, the online encyclopedia Wikipedia has accumulated 6.40 million articles and 250 million edits, contributed in a predominantly undirected and haphazard fashion by 5.77 million unvetted volunteers. Despite the apparent lack of order, the 50 million edits by 4.8 million contributors to the 1.5 million articles in the English-language Wikipedia follow strong certain overall regularities. We show that the accretion of edits to an article is described by a simple stochastic mechanism, resulting in a heavy tail of highly visible articles with a large number of edits. We also demonstrate a crucial correlation between article quality and number of edits, which validates Wikipedia as a successful collaborative effort.
[ { "version": "v1", "created": "Fri, 23 Feb 2007 17:59:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Wilkinson", "Dennis M.", "" ], [ "Huberman", "Bernardo A.", "" ] ]
cs/0702141
Tanya Crenshaw
Tanya L. Crenshaw and Erin Wolf Chambers and Heather Metcalf and Umesh Thakkar
Recruitment, Preparation, Retention: A case study of computing culture at the University of Illinois at Urbana-Champaign
37 pages, 13 figures. For better quality figures, please download the .pdf from http://www.cs.uiuc.edu/research/techreports.php?report=UIUCDCS-R-2007-2811
null
null
UIUCDCS-R-2007-2811
cs.GL
null
Computer science is seeing a decline in enrollment at all levels of education, including undergraduate and graduate study. This paper reports on the results of a study conducted at the University of Illinois at Urbana-Champaign which evaluated students attitudes regarding three areas which can contribute to improved enrollment in the Department of Computer Science: Recruitment, preparation and retention. The results of our study saw two themes. First, the department's tight research focus appears to draw significant attention from other activities -- such as teaching, service, and other community-building activities -- that are necessary for a department's excellence. Yet, as demonstrated by our second theme, one partial solution is to better promote such activities already employed by the department to its students and faculty. Based on our results, we make recommendations for improvements and enhancements based on the current state of practice at peer institutions.
[ { "version": "v1", "created": "Sat, 24 Feb 2007 00:34:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Crenshaw", "Tanya L.", "" ], [ "Chambers", "Erin Wolf", "" ], [ "Metcalf", "Heather", "" ], [ "Thakkar", "Umesh", "" ] ]
cs/0702142
Daniel Lemire
Daniel Lemire, Martin Brooks, Yuhong Yan
An Optimal Linear Time Algorithm for Quasi-Monotonic Segmentation
Appeared in ICDM 2005
null
null
null
cs.DS cs.DB
null
Monotonicity is a simple yet significant qualitative characteristic. We consider the problem of segmenting an array in up to K segments. We want segments to be as monotonic as possible and to alternate signs. We propose a quality metric for this problem, present an optimal linear time algorithm based on novel formalism, and compare experimentally its performance to a linear time top-down regression algorithm. We show that our algorithm is faster and more accurate. Applications include pattern recognition and qualitative modeling.
[ { "version": "v1", "created": "Sat, 24 Feb 2007 02:29:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Lemire", "Daniel", "" ], [ "Brooks", "Martin", "" ], [ "Yan", "Yuhong", "" ] ]
cs/0702145
Srikumar Venugopal
Srikumar Venugopal, Krishna Nadiminti, Hussein Gibbins and Rajkumar Buyya
Designing a Resource Broker for Heterogeneous Grids
26 pages, 15 figures
null
null
GRIDS-TR-2007-2
cs.DC cs.SE
null
Grids provide uniform access to aggregations of heterogeneous resources and services such as computers, networks and storage owned by multiple organizations. However, such a dynamic environment poses many challenges for application composition and deployment. In this paper, we present the design of the Gridbus Grid resource broker that allows users to create applications and specify different objectives through different interfaces without having to deal with the complexity of Grid infrastructure. We present the unique requirements that motivated our design and discuss how these provide flexibility in extending the functionality of the broker to support different low-level middlewares and user interfaces. We evaluate the broker with different job profiles and Grid middleware and conclude with the lessons learnt from our development experience.
[ { "version": "v1", "created": "Sat, 24 Feb 2007 08:35:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Venugopal", "Srikumar", "" ], [ "Nadiminti", "Krishna", "" ], [ "Gibbins", "Hussein", "" ], [ "Buyya", "Rajkumar", "" ] ]
cs/0702152
Andrew Gacek
Andrew Gacek and Gopalan Nadathur
A Simplified Suspension Calculus and its Relationship to Other Explicit Substitution Calculi
38 pages
null
null
null
cs.LO
null
This paper concerns the explicit treatment of substitutions in the lambda calculus. One of its contributions is the simplification and rationalization of the suspension calculus that embodies such a treatment. The earlier version of this calculus provides a cumbersome encoding of substitution composition, an operation that is important to the efficient realization of reduction. This encoding is simplified here, resulting in a treatment that is easy to use directly in applications. The rationalization consists of the elimination of a practically inconsequential flexibility in the unravelling of substitutions that has the inadvertent side effect of losing contextual information in terms; the modified calculus now has a structure that naturally supports logical analyses, such as ones related to the assignment of types, over lambda terms. The overall calculus is shown to have pleasing theoretical properties such as a strongly terminating sub-calculus for substitution and confluence even in the presence of term meta variables that are accorded a grafting interpretation. Another contribution of the paper is the identification of a broad set of properties that are desirable for explicit substitution calculi to support and a classification of a variety of proposed systems based on these. The suspension calculus is used as a tool in this study. In particular, mappings are described between it and the other calculi towards understanding the characteristics of the latter.
[ { "version": "v1", "created": "Mon, 26 Feb 2007 02:16:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Gacek", "Andrew", "" ], [ "Nadathur", "Gopalan", "" ] ]
cs/0702153
Kyle Burke
Kyle Burke and Shang-Hua Teng
Games on the Sperner Triangle
18 pages, 19 figures. Uses paithan.sty
null
null
null
cs.GT cs.CC
null
We create a new two-player game on the Sperner Triangle based on Sperner's lemma. Our game has simple rules and several desirable properties. First, the game is always certain to have a winner. Second, like many other interesting games such as Hex and Geography, we prove that deciding whether one can win our game is a PSPACE-complete problem. Third, there is an elegant balance in the game such that neither the first nor the second player always has a decisive advantage. We provide a web-based version of the game, playable at: http://cs-people.bu.edu/paithan/spernerGame/ . In addition we propose other games, also based on fixed-point theorems.
[ { "version": "v1", "created": "Mon, 26 Feb 2007 05:00:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Burke", "Kyle", "" ], [ "Teng", "Shang-Hua", "" ] ]
cs/0702157
Matei Ripeanu
Matei Ripeanu, Adriana Iamnitchi, Ian Foster, Anne Rogers
In Search of Simplicity: A Self-Organizing Multi-Source Multicast Overlay
null
null
null
DSL-TR-2007-02
cs.DC cs.NI cs.PF
null
Multicast communication primitives have broad utility as building blocks for distributed applications. The challenge is to create and maintain the distributed structures that support these primitives while accounting for volatile end nodes and variable network characteristics. Most solutions proposed to date rely on complex algorithms or global information, thus limiting the scale of deployments and acceptance outside the academic realm. This article introduces a low-complexity, self organizing solution for maintaining multicast trees, that we refer to as UMM (Unstructured Multi-source Multicast). UMM uses traditional distributed systems techniques: layering, soft-state, and passive data collection to adapt to the dynamics of the physical network and maintain data dissemination trees. The result is a simple, adaptive system with lower overheads than more complex alternatives. We have implemented UMM and evaluated it on a 100-node PlanetLab testbed and on up to 1024-node emulated ModelNet networks Extensive experimental evaluations demonstrate UMM's low overhead, efficient network usage compared to alternative solutions, and ability to quickly adapt to network changes and to recover from failures.
[ { "version": "v1", "created": "Tue, 27 Feb 2007 19:42:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Ripeanu", "Matei", "" ], [ "Iamnitchi", "Adriana", "" ], [ "Foster", "Ian", "" ], [ "Rogers", "Anne", "" ] ]
cs/0702159
Fabiano C. Botelho
Fabiano C. Botelho, Rasmus Pagh, Nivio Ziviani
Perfect Hashing for Data Management Applications
12 pages
null
null
RT.DCC.002/2007
cs.DS cs.DB
null
Perfect hash functions can potentially be used to compress data in connection with a variety of data management tasks. Though there has been considerable work on how to construct good perfect hash functions, there is a gap between theory and practice among all previous methods on minimal perfect hashing. On one side, there are good theoretical results without experimentally proven practicality for large key sets. On the other side, there are the theoretically analyzed time and space usage algorithms that assume that truly random hash functions are available for free, which is an unrealistic assumption. In this paper we attempt to bridge this gap between theory and practice, using a number of techniques from the literature to obtain a novel scheme that is theoretically well-understood and at the same time achieves an order-of-magnitude increase in performance compared to previous ``practical'' methods. This improvement comes from a combination of a novel, theoretically optimal perfect hashing scheme that greatly simplifies previous methods, and the fact that our algorithm is designed to make good use of the memory hierarchy. We demonstrate the scalability of our algorithm by considering a set of over one billion URLs from the World Wide Web of average length 64, for which we construct a minimal perfect hash function on a commodity PC in a little more than 1 hour. Our scheme produces minimal perfect hash functions using slightly more than 3 bits per key. For perfect hash functions in the range $\{0,...,2n-1\}$ the space usage drops to just over 2 bits per key (i.e., one bit more than optimal for representing the key). This is significantly below of what has been achieved previously for very large values of $n$.
[ { "version": "v1", "created": "Tue, 27 Feb 2007 20:56:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Botelho", "Fabiano C.", "" ], [ "Pagh", "Rasmus", "" ], [ "Ziviani", "Nivio", "" ] ]
cs/0702160
Fran\c{c}ois Pitt
Fran\c{c}ois Pitt
A Quantifier-Free String Theory for ALOGTIME Reasoning
147 pages, PhD thesis (completed in 2000)
null
null
null
cs.CC
null
The main contribution of this work is the definition of a quantifier-free string theory T_1 suitable for formalizing ALOGTIME reasoning. After describing L_1 -- a new, simple, algebraic characterization of the complexity class ALOGTIME based on strings instead of numbers -- the theory T_1 is defined (based on L_1), and a detailed formal development of T_1 is given. Then, theorems of T_1 are shown to translate into families of propositional tautologies that have uniform polysize Frege proofs, T_1 is shown to prove the soundness of a particular Frege system F, and F is shown to provably p-simulate any proof system whose soundness can be proved in T_1. Finally, T_1 is compared with other theories for ALOGTIME reasoning in the literature. To our knowledge, this is the first formal theory for ALOGTIME reasoning whose basic objects are strings instead of numbers, and the first quantifier-free theory formalizing ALOGTIME reasoning in which a direct proof of the soundness of some Frege system has been given (in the case of first-order theories, such a proof was first given by Arai for his theory AID). Also, the polysize Frege proofs we give for the propositional translations of theorems of T_1 are considerably simpler than those for other theories, and so is our proof of the soundness of a particular F-system in T_1. Together with the simplicity of T_1's recursion schemes, axioms, and rules these facts suggest that T_1 is one of the most natural theories available for ALOGTIME reasoning.
[ { "version": "v1", "created": "Wed, 28 Feb 2007 02:59:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Pitt", "François", "" ] ]
cs/0702163
Roderick Melnik
Di Zhang and Roderick V.N. Melnik
First Passage Time for Multivariate Jump-diffusion Stochastic Models With Applications in Finance
Keywords: Monte-Carlo simulations, first passage time, multivariate jump-diffusion process; 10 pages, 3 figures
null
null
null
cs.CE cs.NA
null
The ``first passage-time'' (FPT) problem is an important problem with a wide range of applications in mathematics, physics, biology and finance. Mathematically, such a problem can be reduced to estimating the probability of a (stochastic) process first to reach a critical level or threshold. While in other areas of applications the FPT problem can often be solved analytically, in finance we usually have to resort to the application of numerical procedures, in particular when we deal with jump-diffusion stochastic processes (JDP). In this paper, we develop a Monte-Carlo-based methodology for the solution of the FPT problem in the context of a multivariate jump-diffusion stochastic process. The developed methodology is tested by using different parameters, the simulation results indicate that the developed methodology is much more efficient than the conventional Monte Carlo method. It is an efficient tool for further practical applications, such as the analysis of default correlation and predicting barrier options in finance.
[ { "version": "v1", "created": "Wed, 28 Feb 2007 10:39:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Zhang", "Di", "" ], [ "Melnik", "Roderick V. N.", "" ] ]
cs/0702164
Roderick Melnik
Di Zhang and Roderick V.N. Melnik
Monte-Carlo Simulations of the First Passage Time for Multivariate Jump-Diffusion Processes in Financial Applications
Keywords: First passage time; Monte Carlo simulation; Multivariate jump-diffusion processes; Credit risk
null
null
null
cs.CE cs.NA
null
Many problems in finance require the information on the first passage time (FPT) of a stochastic process. Mathematically, such problems are often reduced to the evaluation of the probability density of the time for such a process to cross a certain level, a boundary, or to enter a certain region. While in other areas of applications the FPT problem can often be solved analytically, in finance we usually have to resort to the application of numerical procedures, in particular when we deal with jump-diffusion stochastic processes (JDP). In this paper, we propose a Monte-Carlo-based methodology for the solution of the first passage time problem in the context of multivariate (and correlated) jump-diffusion processes. The developed technique provide an efficient tool for a number of applications, including credit risk and option pricing. We demonstrate its applicability to the analysis of the default rates and default correlations of several different, but correlated firms via a set of empirical data.
[ { "version": "v1", "created": "Wed, 28 Feb 2007 10:51:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Zhang", "Di", "" ], [ "Melnik", "Roderick V. N.", "" ] ]
cs/0702165
Roderick Melnik
Di Zhang and Roderick V.N. Melnik
Efficient estimation of default correlation for multivariate jump-diffusion processes
Keywords: Default correlation, First passage time problem, Monte Carlo simulation
null
null
null
cs.CE cs.NA
null
Evaluation of default correlation is an important task in credit risk analysis. In many practical situations, it concerns the joint defaults of several correlated firms, the task that is reducible to a first passage time (FPT) problem. This task represents a great challenge for jump-diffusion processes (JDP), where except for very basic cases, there are no analytical solutions for such problems. In this contribution, we generalize our previous fast Monte-Carlo method (non-correlated jump-diffusion cases) for multivariate (and correlated) jump-diffusion processes. This generalization allows us, among other things, to evaluate the default events of several correlated assets based on a set of empirical data. The developed technique is an efficient tool for a number of other applications, including credit risk and option pricing.
[ { "version": "v1", "created": "Wed, 28 Feb 2007 11:22:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Zhang", "Di", "" ], [ "Melnik", "Roderick V. N.", "" ] ]
cs/0702166
Roderick Melnik
Di Zhang and Roderick V.N. Melnik
Solving Stochastic Differential Equations with Jump-Diffusion Efficiently: Applications to FPT Problems in Credit Risk
Keywords: Default Correlation, First Passage Time, Multivariate Jump-Diffusion Processes, Monte-Carlo Simulation, Multivariate Uniform Sampling Method
null
null
null
cs.CE cs.NA
null
The first passage time (FPT) problem is ubiquitous in many applications. In finance, we often have to deal with stochastic processes with jump-diffusion, so that the FTP problem is reducible to a stochastic differential equation with jump-diffusion. While the application of the conventional Monte-Carlo procedure is possible for the solution of the resulting model, it becomes computationally inefficient which severely restricts its applicability in many practically interesting cases. In this contribution, we focus on the development of efficient Monte-Carlo-based computational procedures for solving the FPT problem under the multivariate (and correlated) jump-diffusion processes. We also discuss the implementation of the developed Monte-Carlo-based technique for multivariate jump-diffusion processes driving by several compound Poisson shocks. Finally, we demonstrate the application of the developed methodologies for analyzing the default rates and default correlations of differently rated firms via historical data.
[ { "version": "v1", "created": "Wed, 28 Feb 2007 11:48:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Zhang", "Di", "" ], [ "Melnik", "Roderick V. N.", "" ] ]
cs/0702167
Roderick Melnik
Linxiang X. Wang and Roderick V.N. Melnik
Finite Volume Analysis of Nonlinear Thermo-mechanical Dynamics of Shape Memory Alloys
Keywords: shape memory alloys, phase transformations, nonlinear thermo-elasticity, finite volume method
null
null
null
cs.CE cs.NA
null
In this paper, the finite volume method is developed to analyze coupled dynamic problems of nonlinear thermoelasticity. The major focus is given to the description of martensitic phase transformations essential in the modelling of shape memory alloys. Computational experiments are carried out to study the thermo-mechanical wave interactions in a shape memory alloy rod, and a patch. Both mechanically and thermally induced phase transformations, as well as hysteresis effects, in a one-dimensional structure are successfully simulated with the developed methodology. In the two-dimensional case, the main focus is given to square-to-rectangular transformations and examples of martensitic combinations under different mechanical loadings are provided.
[ { "version": "v1", "created": "Wed, 28 Feb 2007 13:00:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Wang", "Linxiang X.", "" ], [ "Melnik", "Roderick V. N.", "" ] ]
cs/0702168
Roderick Melnik
Linxiang X. Wang and Roderick V.N. Melnik
Simulation of Phase Combinations in Shape Memory Alloys Patches by Hybrid Optimization Methods
Keywords: phase combinations, shape memory alloys, variational problem, genetic algorithm, quasi-Newton methods
null
null
null
cs.CE cs.NA
null
In this paper, phase combinations among martensitic variants in shape memory alloys patches and bars are simulated by a hybrid optimization methodology. The mathematical model is based on the Landau theory of phase transformations. Each stable phase is associated with a local minimum of the free energy function, and the phase combinations are simulated by minimizing the bulk energy. At low temperature, the free energy function has double potential wells leading to non-convexity of the optimization problem. The methodology proposed in the present paper is based on an initial estimate of the global solution by a genetic algorithm, followed by a refined quasi-Newton procedure to locally refine the optimum. By combining the local and global search algorithms, the phase combinations are successfully simulated. Numerical experiments are presented for the phase combinations in a SMA patch under several typical mechanical loadings.
[ { "version": "v1", "created": "Wed, 28 Feb 2007 14:09:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Wang", "Linxiang X.", "" ], [ "Melnik", "Roderick V. N.", "" ] ]
cs/0702170
Peter Tiedemann
Peter Tiedemann, Henrik Reif Andersen, Rasmus Pagh
Generic Global Constraints based on MDDs
Preliminary 15 pages version of the tech-report cs.AI/0611141
null
null
null
cs.AI
null
Constraint Programming (CP) has been successfully applied to both constraint satisfaction and constraint optimization problems. A wide variety of specialized global constraints provide critical assistance in achieving a good model that can take advantage of the structure of the problem in the search for a solution. However, a key outstanding issue is the representation of 'ad-hoc' constraints that do not have an inherent combinatorial nature, and hence are not modeled well using narrowly specialized global constraints. We attempt to address this issue by considering a hybrid of search and compilation. Specifically we suggest the use of Reduced Ordered Multi-Valued Decision Diagrams (ROMDDs) as the supporting data structure for a generic global constraint. We give an algorithm for maintaining generalized arc consistency (GAC) on this constraint that amortizes the cost of the GAC computation over a root-to-leaf path in the search tree without requiring asymptotically more space than used for the MDD. Furthermore we present an approach for incrementally maintaining the reduced property of the MDD during the search, and show how this can be used for providing domain entailment detection. Finally we discuss how to apply our approach to other similar data structures such as AOMDDs and Case DAGs. The technique used can be seen as an extension of the GAC algorithm for the regular language constraint on finite length input.
[ { "version": "v1", "created": "Wed, 28 Feb 2007 15:32:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Tiedemann", "Peter", "" ], [ "Andersen", "Henrik Reif", "" ], [ "Pagh", "Rasmus", "" ] ]
cs/0702171
Robert Brijder
Robert Brijder, Hendrik Jan Hoogeboom, Grzegorz Rozenberg
How Overlap Determines the Macronuclear Genes in Ciliates
22 pages, 14 figures
null
null
LIACS Technical Report 2007-02
cs.LO
null
Formal models for gene assembly in ciliates have been developed, in particular the string pointer reduction system (SPRS) and the graph pointer reduction system (GPRS). The reduction graph is a valuable tool within the SPRS, revealing much information about how gene assembly is performed for a given gene. The GPRS is more abstract than the SPRS and not all information present in the SPRS is retained in the GPRS. As a consequence the reduction graph cannot be defined for the GPRS in general, but we show that it can be defined (in an equivalent manner as defined for the SPRS) if we restrict ourselves to so-called realistic overlap graphs. Fortunately, only these graphs correspond to genes occurring in nature. Defining the reduction graph within the GPRS allows one to carry over several results within the SPRS that rely on the reduction graph.
[ { "version": "v1", "created": "Wed, 28 Feb 2007 15:51:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Brijder", "Robert", "" ], [ "Hoogeboom", "Hendrik Jan", "" ], [ "Rozenberg", "Grzegorz", "" ] ]
cs/0702172
Roderick Melnik
Linxiang X. Wang and Roderick V.N. Melnik
Numerical Model For Vibration Damping Resulting From the First Order Phase Transformations
Keywords: martensite transformation, thermo-mechanical coupling, vibration damping, Ginzburg-Landau theory
null
null
null
cs.CE cs.NA
null
A numerical model is constructed for modelling macroscale damping effects induced by the first order martensite phase transformations in a shape memory alloy rod. The model is constructed on the basis of the modified Landau-Ginzburg theory that couples nonlinear mechanical and thermal fields. The free energy function for the model is constructed as a double well function at low temperature, such that the external energy can be absorbed during the phase transformation and converted into thermal form. The Chebyshev spectral methods are employed together with backward differentiation for the numerical analysis of the problem. Computational experiments performed for different vibration energies demonstrate the importance of taking into account damping effects induced by phase transformations.
[ { "version": "v1", "created": "Wed, 28 Feb 2007 18:31:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Wang", "Linxiang X.", "" ], [ "Melnik", "Roderick V. N.", "" ] ]
cs/0703001
Michael Coury
Michael D. Coury
Embedding Graphs into the Extended Grid
4 pages, 2 figures
null
null
null
cs.DM cs.DS
null
Let $G=(V,E)$ be an arbitrary undirected source graph to be embedded in a target graph $EM$, the extended grid with vertices on integer grid points and edges to nearest and next-nearest neighbours. We present an algorithm showing how to embed $G$ into $EM$ in both time and space $O(|V|^2)$ using the new notions of islands and bridges. An island is a connected subgraph in the target graph which is mapped from exactly one vertex in the source graph while a bridge is an edge between two islands which is mapped from exactly one edge in the source graph. This work is motivated by real industrial applications in the field of quantum computing and a need to efficiently embed source graphs in the extended grid.
[ { "version": "v1", "created": "Wed, 28 Feb 2007 22:37:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Coury", "Michael D.", "" ] ]
cs/0703003
M. H. van Emden
M.H. van Emden, B. Moa, and S.C. Somosan
Functions to Support Input and Output of Intervals
16 pages, 13 figures with listings
null
null
DCS-311-IR
cs.NA
null
Interval arithmetic is hardly feasible without directed rounding as provided, for example, by the IEEE floating-point standard. Equally essential for interval methods is directed rounding for conversion between the external decimal and internal binary numerals. This is not provided by the standard I/O libraries. Conversion algorithms exist that guarantee identity upon conversion followed by its inverse. Although it may be possible to adapt these algorithms for use in decimal interval I/O, we argue that outward rounding in radix conversion is computationally a simpler problem than guaranteeing identity. Hence it is preferable to develop decimal interval I/O ab initio, which is what we do in this paper.
[ { "version": "v1", "created": "Wed, 28 Feb 2007 23:13:23 GMT" } ]
2007-05-23T00:00:00
[ [ "van Emden", "M. H.", "" ], [ "Moa", "B.", "" ], [ "Somosan", "S. C.", "" ] ]
cs/0703004
Francis Heylighen
Francis Heylighen
Accelerating Socio-Technological Evolution: from ephemeralization and stigmergy to the global brain
To appear in: "Globalization as an Evolutionary Process: Modeling Global Change", edited by George Modelski, Tessaleno Devezas, and William Thompson, London: Routledge
null
null
null
cs.CY cs.NI
null
Evolution is presented as a trial-and-error process that produces a progressive accumulation of knowledge. At the level of technology, this leads to ephemeralization, i.e. ever increasing productivity, or decreasing of the friction that normally dissipates resources. As a result, flows of matter, energy and information circulate ever more easily across the planet. This global connectivity increases the interactions between agents, and thus the possibilities for conflict. However, evolutionary progress also reduces social friction, via the creation of institutions. The emergence of such "mediators" is facilitated by stigmergy: the unintended collaboration between agents resulting from their actions on a shared environment. The Internet is a near ideal medium for stigmergic interaction. Quantitative stigmergy allows the web to learn from the activities of its users, thus becoming ever better at helping them to answer their queries. Qualitative stigmergy stimulates agents to collectively develop novel knowledge. Both mechanisms have direct analogues in the functioning of the human brain. This leads us to envision the future, super-intelligent web as a "global brain" for humanity. The feedback between social and technological advances leads to an extreme acceleration of innovation. An extrapolation of the corresponding hyperbolic growth model would forecast a singularity around 2040. This can be interpreted as the evolutionary transition to the Global Brain regime.
[ { "version": "v1", "created": "Thu, 1 Mar 2007 15:46:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Heylighen", "Francis", "" ] ]
cs/0703006
Jingchao Chen
Jing-Chao Chen
XORSAT: An Efficient Algorithm for the DIMACS 32-bit Parity Problem
null
null
null
null
cs.DS
null
The DIMACS 32-bit parity problem is a satisfiability (SAT) problem hard to solve. So far, EqSatz by Li is the only solver which can solve this problem. However, This solver is very slow. It is reported that it spent 11855 seconds to solve a par32-5 instance on a Maxintosh G3 300 MHz. The paper introduces a new solver, XORSAT, which splits the original problem into two parts: structured part and random part, and then solves separately them with WalkSAT and an XOR equation solver. Based our empirical observation, XORSAT is surprisingly fast, which is approximately 1000 times faster than EqSatz. For a par32-5 instance, XORSAT took 2.9 seconds, while EqSatz took 2844 seconds on Intel Pentium IV 2.66GHz CPU. We believe that this method significantly different from traditional methods is also useful beyond this domain.
[ { "version": "v1", "created": "Fri, 2 Mar 2007 01:38:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Chen", "Jing-Chao", "" ] ]
cs/0703011
Helmut Alt
Helmut Alt, Maike Buchin
Can we Compute the Similarity Between Surfaces?
null
null
null
null
cs.CG cs.CC
null
A suitable measure for the similarity of shapes represented by parameterized curves or surfaces is the Fr\'echet distance. Whereas efficient algorithms are known for computing the Fr\'echet distance of polygonal curves, the same problem for triangulated surfaces is NP-hard. Furthermore, it remained open whether it is computable at all. Here, using a discrete approximation we show that it is {\em upper semi-computable}, i.e., there is a non-halting Turing machine which produces a monotone decreasing sequence of rationals converging to the result. It follows that the decision problem, whether the Fr\'echet distance of two given surfaces lies below some specified value, is recursively enumerable. Furthermore, we show that a relaxed version of the problem, the computation of the {\em weak Fr\'echet distance} can be solved in polynomial time. For this, we give a computable characterization of the weak Fr\'echet distance in a geometric data structure called the {\em free space diagram}.
[ { "version": "v1", "created": "Fri, 2 Mar 2007 17:00:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Alt", "Helmut", "" ], [ "Buchin", "Maike", "" ] ]
cs/0703012
Ramya Ravichandar
Ramya Ravichandar, James D. Arthur, Manuel P\'erez-Qui\~nones
Pre-Requirement Specification Traceability: Bridging the Complexity Gap through Capabilities
This paper appears in International Symposium on Grand Challenges in Traceability, TEFSE/GCT 2007. 10 pages, 7 Figures
null
null
null
cs.SE
null
Pre-Requirement Specification traceability is the activity of capturing relations between requirements and their sources, in particular user needs. Requirements are formal technical specifications in the solution space; needs are natural language expressions codifying user expectations in the problem space. Current traceability techniques are challenged by the complexity gap that results from the disparity between the spaces, and thereby, often neglect traceability to and from requirements. We identify the existence of an intermediary region -- the transition space -- which structures the progression from needs to requirements. More specifically, our approach to developing change-tolerant systems, termed Capabilities Engineering, identifies highly cohesive, minimally coupled, optimized functional abstractions called Capabilities in the transition space. These Capabilities link the problem and solution spaces through directives (entities derived from user needs). Directives connect the problem and transition spaces; Capabilities link the transition and solution spaces. Furthermore, the process of Capabilities Engineering addresses specific traceability challenges. It supports the evolution of traces, provides semantic and structural information about dependencies, incorporates human factors, generates traceability relations with negligible overhead, and thereby, fosters pre-Requirement Specification traceability.
[ { "version": "v1", "created": "Fri, 2 Mar 2007 20:46:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Ravichandar", "Ramya", "" ], [ "Arthur", "James D.", "" ], [ "Pérez-Quiñones", "Manuel", "" ] ]
cs/0703015
Alexander Shkotin
Alex Shkotin
Graph representation of context-free grammars
4 pages, 3 figures
null
null
null
cs.LO
null
In modern mathematics, graphs figure as one of the better-investigated class of mathematical objects. Various properties of graphs, as well as graph-processing algorithms, can be useful if graphs of a certain kind are used as denotations for CF-grammars. Furthermore, graph are well adapted to various extensions (one kind of such extensions being attributes).
[ { "version": "v1", "created": "Sat, 3 Mar 2007 13:12:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Shkotin", "Alex", "" ] ]
cs/0703021
Wen-Li Wang
Wen-Li Wang and Mei-Huei Tang
Addressing Components' Evolvement and Execution Behavior to Measure Component-Based Software Reliability
null
null
null
null
cs.SE
null
Software reliability is an important quality attrib-ute, often evaluated as either a function of time or of system structures. The goal of this study is to have this metric cover both for component-based software, be-cause its reliability strongly depends on the quality of constituent components and their interactions. To achieve this, we apply a convolution modeling ap-proach, based on components' execution behavior, to integrate their individual reliability evolvement and simultaneously address failure fixes in the time do-main. Modeling at the component level can be more economical to accommodate software evolution, be-cause the reliability metric can be evaluated by reus-ing the quality measures of unaffected components and adapting only to the affected ones to save cost. The adaptation capability also supports the incremental software development processes that constantly add in new components over time. Experiments were con-ducted to discuss the usefulness of this approach.
[ { "version": "v1", "created": "Mon, 5 Mar 2007 20:58:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Wang", "Wen-Li", "" ], [ "Tang", "Mei-Huei", "" ] ]
cs/0703023
Otfried Cheong
Otfried Cheong, Herman Haverkort, Mira Lee
Computing a Minimum-Dilation Spanning Tree is NP-hard
null
null
null
null
cs.CG
null
In a geometric network G = (S, E), the graph distance between two vertices u, v in S is the length of the shortest path in G connecting u to v. The dilation of G is the maximum factor by which the graph distance of a pair of vertices differs from their Euclidean distance. We show that given a set S of n points with integer coordinates in the plane and a rational dilation delta > 1, it is NP-hard to determine whether a spanning tree of S with dilation at most delta exists.
[ { "version": "v1", "created": "Tue, 6 Mar 2007 01:53:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Cheong", "Otfried", "" ], [ "Haverkort", "Herman", "" ], [ "Lee", "Mira", "" ] ]
cs/0703025
Jean Charles Gilbert
Jean Charles Gilbert (INRIA Rocquencourt), Xavier Jonsson
LIBOPT - An environment for testing solvers on heterogeneous collections of problems - Version 1.0
null
null
null
null
cs.MS cs.NA math.OC
null
The Libopt environment is both a methodology and a set of tools that can be used for testing, comparing, and profiling solvers on problems belonging to various collections. These collections can be heterogeneous in the sense that their problems can have common features that differ from one collection to the other. Libopt brings a unified view on this composite world by offering, for example, the possibility to run any solver on any problem compatible with it, using the same Unix/Linux command. The environment also provides tools for comparing the results obtained by solvers on a specified set of problems. Most of the scripts going with the Libopt environment have been written in Perl.
[ { "version": "v1", "created": "Tue, 6 Mar 2007 14:05:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Gilbert", "Jean Charles", "", "INRIA Rocquencourt" ], [ "Jonsson", "Xavier", "" ] ]
cs/0703029
Shmuel Friedland
Shmuel Friedland
FPRAS for computing a lower bound for weighted matching polynomial of graphs
16 pages
null
null
null
cs.CC cs.DM
null
We give a fully polynomial randomized approximation scheme to compute a lower bound for the matching polynomial of any weighted graph at a positive argument. For the matching polynomial of complete bipartite graphs with bounded weights these lower bounds are asymptotically optimal.
[ { "version": "v1", "created": "Tue, 6 Mar 2007 22:59:30 GMT" }, { "version": "v2", "created": "Thu, 12 Apr 2007 16:09:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Friedland", "Shmuel", "" ] ]
cs/0703030
Konstantin Rybnikov
Konstantin Rybnikov
An Efficient Local Approach to Convexity Testing of Piecewise-Linear Hypersurfaces
3 figures
null
null
null
cs.CG
null
We show that a closed piecewise-linear hypersurface immersed in $R^n$ ($n\ge 3$) is the boundary of a convex body if and only if every point in the interior of each $(n-3)$-face has a neighborhood that lies on the boundary of some convex body; no assumptions about the hypersurface's topology are needed. We derive this criterion from our generalization of Van Heijenoort's (1952) theorem on locally convex hypersurfaces in $R^n$ to spherical spaces. We also give an easy-to-implement convexity testing algorithm, which is based on our criterion. For $R^3$ the number of arithmetic operations used by the algorithm is at most linear in the number of vertices, while in general it is at most linear in the number of incidences between the $(n-2)$-faces and $(n-3)$-faces. When the dimension $n$ is not fixed and only ring arithmetic is allowed, the algorithm still remains polynomial. Our method works in more general situations than the convexity verification algorithms developed by Mehlhorn et al. (1996) and Devillers et al. (1998) -- for example, our method does not require the input surface to be orientable, nor it requires the input data to include normal vectors to the facets that are oriented "in a coherent way". For $R^3$ the complexity of our algorithm is the same as that of previous algorithms; for higher dimensions there seems to be no clear winner, but our approach is the only one that easily handles inputs in which the facet normals are not known to be coherently oriented or are not given at all. Furthermore, our method can be extended to piecewise-polynomial surfaces of small degree.
[ { "version": "v1", "created": "Wed, 7 Mar 2007 07:33:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Rybnikov", "Konstantin", "" ] ]
cs/0703031
P\'aid\'i Creed
Paidi Creed
Sampling Eulerian orientations of triangular lattice graphs
23 pages
null
null
null
cs.DM cs.DS
null
We consider the problem of sampling from the uniform distribution on the set of Eulerian orientations of subgraphs of the triangular lattice. Although it is known that this can be achieved in polynomial time for any graph, the algorithm studied here is more natural in the context of planar Eulerian graphs. We analyse the mixing time of a Markov chain on the Eulerian orientations of a planar graph which moves between orientations by reversing the edges of directed faces. Using path coupling and the comparison method we obtain a polynomial upper bound on the mixing time of this chain for any solid subgraph of the triangular lattice. By considering the conductance of the chain we show that there exist subgraphs with holes for which the chain will always take an exponential amount of time to converge. Finally, as an additional justification for studying a Markov chain on the set of Eulerian orientations of planar graphs, we show that the problem of counting Eulerian orientations remains #P-complete when restricted to planar graphs. A preliminary version of this work appeared as an extended abstract in the 2nd Algorithms and Complexity in Durham workshop.
[ { "version": "v1", "created": "Wed, 7 Mar 2007 12:34:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Creed", "Paidi", "" ] ]
cs/0703040
Yefim Bakman
Yefim Bakman (Tel-Aviv University)
Why the Standard Data Processing should be changed
null
null
null
null
cs.MS
null
The basic statistical methods of data representation did not change since their emergence. Their simplicity was dictated by the intricacies of computations in the before computers epoch. It turns out that such approach is not uniquely possible in the presence of quick computers. The suggested here method improves significantly the reliability of data processing and their graphical representation. In this paper we show problems of the standard data processing which can bring to incorrect results. A method solving these problems is proposed. It is based on modification of data representation. The method was implemented in a computer program Consensus5. The program performances are illustrated through varied examples.
[ { "version": "v1", "created": "Thu, 8 Mar 2007 19:49:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Bakman", "Yefim", "", "Tel-Aviv University" ] ]
cs/0703041
Marko Horvat B.Sc.CS-Dipl.Ing.
Kresimir Fertalj, Marko Horvat
Comparing Architectures of Mobile Applications
8 pages, 7 figures, 6 tables. Proceedings of the 5th WSEAS International Conference on Automation & Information in Venice, Italy
WSEAS Trans. on COMMUNICATIONS, Issue 4, Volume 3, October 2004, pp. 946-952
null
null
cs.OH
null
This article describes various advantages and disadvantages of SMS, WAP, J2ME and Windows CE technologies in designing mobile applications. In defining the architecture of any software application it is important to get the best trade-off between platform's possibilities and design requirements. Achieving optimum software design is even more important with mobile applications where all computer resources are limited. Therefore, it is important to have a comparative analysis of all relevant contemporary approaches in designing mobile applications. As always, the choice between these technologies is determined by application requirements and system capabilities.
[ { "version": "v1", "created": "Thu, 8 Mar 2007 19:16:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Fertalj", "Kresimir", "" ], [ "Horvat", "Marko", "" ] ]
cs/0703042
Vaclav Petricek
Lukas Brozovsky, Vaclav Petricek
Recommender System for Online Dating Service
Accepted for Znalosti 2007
null
null
null
cs.IR cs.SE
null
Users of online dating sites are facing information overload that requires them to manually construct queries and browse huge amount of matching user profiles. This becomes even more problematic for multimedia profiles. Although matchmaking is frequently cited as a typical application for recommender systems, there is a surprising lack of work published in this area. In this paper we describe a recommender system we implemented and perform a quantitative comparison of two collaborative filtering (CF) and two global algorithms. Results show that collaborative filtering recommenders significantly outperform global algorithms that are currently used by dating sites. A blind experiment with real users also confirmed that users prefer CF based recommendations to global popularity recommendations. Recommender systems show a great potential for online dating where they could improve the value of the service to users and improve monetization of the service.
[ { "version": "v1", "created": "Fri, 9 Mar 2007 15:38:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Brozovsky", "Lukas", "" ], [ "Petricek", "Vaclav", "" ] ]
cs/0703043
Vaclav Petricek
Vaclav Petricek, Ingemar J. Cox, Hui Han, Isaac G. Councill, C. Lee Giles
A Comparison of On-Line Computer Science Citation Databases
ECDL 2005
null
null
null
cs.DL
null
This paper examines the difference and similarities between the two on-line computer science citation databases DBLP and CiteSeer. The database entries in DBLP are inserted manually while the CiteSeer entries are obtained autonomously via a crawl of the Web and automatic processing of user submissions. CiteSeer's autonomous citation database can be considered a form of self-selected on-line survey. It is important to understand the limitations of such databases, particularly when citation information is used to assess the performance of authors, institutions and funding bodies. We show that the CiteSeer database contains considerably fewer single author papers. This bias can be modeled by an exponential process with intuitive explanation. The model permits us to predict that the DBLP database covers approximately 24% of the entire literature of Computer Science. CiteSeer is also biased against low-cited papers. Despite their difference, both databases exhibit similar and significantly different citation distributions compared with previous analysis of the Physics community. In both databases, we also observe that the number of authors per paper has been increasing over time.
[ { "version": "v1", "created": "Fri, 9 Mar 2007 16:00:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Petricek", "Vaclav", "" ], [ "Cox", "Ingemar J.", "" ], [ "Han", "Hui", "" ], [ "Councill", "Isaac G.", "" ], [ "Giles", "C. Lee", "" ] ]
cs/0703044
Samuel Thibault
Samuel Thibault (INRIA Futurs), Sebastien Hinderer (INRIA Lorraine - LORIA)
BrlAPI: Simple, Portable, Concurrent, Application-level Control of Braille Terminals
null
Dans International Conference on Information and Communication Technology Accessibility (ICTA) (2007)
null
null
cs.HC
null
Screen readers can drive braille devices for allowing visually impaired users to access computer environments, by providing them the same information as sighted users. But in some cases, this view is not easy to use on a braille device. In such cases, it would be much more useful to let applications provide their own braille feedback, specially adapted to visually impaired users. Such applications would then need the ability to output braille ; however, allowing both screen readers and applications access a wide panel of braille devices is not a trivial task. We present an abstraction layer that applications may use to communicate with braille devices. They do not need to deal with the specificities of each device, but can do so if necessary. We show how several applications can communicate with one braille device concurrently, with BrlAPI making sensible choices about which application eventually gets access to the device. The description of a widely used implementation of BrlAPI is included.
[ { "version": "v1", "created": "Fri, 9 Mar 2007 16:55:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Thibault", "Samuel", "", "INRIA Futurs" ], [ "Hinderer", "Sebastien", "", "INRIA Lorraine -\n LORIA" ] ]
cs/0703049
Olga Savenkova
Oleg N. Karpov, Olga A. Savenkova
Algorithm of Segment-Syllabic Synthesis in Speech Recognition Problem
11 pages, 4 figures
null
null
null
cs.SD cs.CL
null
Speech recognition based on the syllable segment is discussed in this paper. The principal search methods in space of states for the speech recognition problem by segment-syllabic parameters trajectory synthesis are investigated. Recognition as comparison the parameters trajectories in chosen speech units on the sections of the segmented speech is realized. Some experimental results are given and discussed.
[ { "version": "v1", "created": "Sat, 10 Mar 2007 23:59:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Karpov", "Oleg N.", "" ], [ "Savenkova", "Olga A.", "" ] ]
cs/0703051
Yu Ding
Yu Ding
An ExpTime Procedure for Description Logic $\mathcal{ALCQI}$ (Draft)
This paper is submitted in 2007
null
null
null
cs.LO
null
A worst-case ExpTime tableau-based decision procedure is outlined for the satisfiability problem in $\mathcal{ALCQI}$ w.r.t. general axioms.
[ { "version": "v1", "created": "Mon, 12 Mar 2007 01:55:23 GMT" }, { "version": "v2", "created": "Tue, 13 Mar 2007 00:23:59 GMT" }, { "version": "v3", "created": "Sun, 18 Mar 2007 19:38:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Ding", "Yu", "" ] ]
cs/0703054
Julien Hendrickx
Vincent D. Blondel, Julien M. Hendrickx and Raphael M. Jungers
Linear time algorithms for Clobber
null
null
null
null
cs.GT
null
We prove that the single-player game clobber is solvable in linear time when played on a line or on a cycle. For this purpose, we show that this game is equivalent to an optimization problem on a set of words defined by seven classes of forbidden patterns. We also prove that, playing on the cycle, it is always possible to remove at least 2n/3 pawns, and we give a conformation for which it is not possible to do better, answering questions recently asked by Faria et al.
[ { "version": "v1", "created": "Mon, 12 Mar 2007 17:04:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Blondel", "Vincent D.", "" ], [ "Hendrickx", "Julien M.", "" ], [ "Jungers", "Raphael M.", "" ] ]
cs/0703059
J. M. Landsberg
J.M. Landsberg
Geometry and the complexity of matrix multiplication
34 pages, 4 figures
null
null
null
cs.CC math.AG math.RT
null
We survey results in algebraic complexity theory, focusing on matrix multiplication. Our goals are (i.) to show how open questions in algebraic complexity theory are naturally posed as questions in geometry and representation theory, (ii.) to motivate researchers to work on these questions, and (iii.) to point out relations with more general problems in geometry. The key geometric objects for our study are the secant varieties of Segre varieties. We explain how these varieties are also useful for algebraic statistics, the study of phylogenetic invariants, and quantum computing.
[ { "version": "v1", "created": "Mon, 12 Mar 2007 22:11:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Landsberg", "J. M.", "" ] ]
cs/0703060
Florentin Smarandache
Jose L. Salmeron, Florentin Smarandache
Redesigning Decision Matrix Method with an indeterminacy-based inference process
12 pages, 4 figures, one table
A short version published in Advances in Fuzzy Sets and Systems, Vol. 1(2), 263-271, 2006
null
null
cs.AI
null
For academics and practitioners concerned with computers, business and mathematics, one central issue is supporting decision makers. In this paper, we propose a generalization of Decision Matrix Method (DMM), using Neutrosophic logic. It emerges as an alternative to the existing logics and it represents a mathematical model of uncertainty and indeterminacy. This paper proposes the Neutrosophic Decision Matrix Method as a more realistic tool for decision making. In addition, a de-neutrosophication process is included.
[ { "version": "v1", "created": "Tue, 13 Mar 2007 02:18:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Salmeron", "Jose L.", "" ], [ "Smarandache", "Florentin", "" ] ]
cs/0703063
Konstantin Avrachenkov
Konstantin Avrachenkov (INRIA Sophia Antipolis), Urtzi Ayesta (LAAS), Alexei Piunovskiy
Convergence and Optimal Buffer Sizing for Window Based AIMD Congestion Control
null
null
null
null
cs.NI
null
We study the interaction between the AIMD (Additive Increase Multiplicative Decrease) congestion control and a bottleneck router with Drop Tail buffer. We consider the problem in the framework of deterministic hybrid models. First, we show that the hybrid model of the interaction between the AIMD congestion control and bottleneck router always converges to a cyclic behavior. We characterize the cycles. Necessary and sufficient conditions for the absence of multiple jumps of congestion window in the same cycle are obtained. Then, we propose an analytical framework for the optimal choice of the router buffer size. We formulate the problem of the optimal router buffer size as a multi-criteria optimization problem, in which the Lagrange function corresponds to a linear combination of the average goodput and the average delay in the queue. The solution to the optimization problem provides further evidence that the buffer size should be reduced in the presence of traffic aggregation. Our analytical results are confirmed by simulations performed with Simulink and the NS simulator.
[ { "version": "v1", "created": "Tue, 13 Mar 2007 09:00:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Avrachenkov", "Konstantin", "", "INRIA Sophia Antipolis" ], [ "Ayesta", "Urtzi", "", "LAAS" ], [ "Piunovskiy", "Alexei", "" ] ]
cs/0703065
Gabriel Istrate
Gabriel Istrate
Satisfying assignments of Random Boolean CSP: Clusters and Overlaps
null
null
null
null
cs.DM cond-mat.dis-nn cs.CC
null
The distribution of overlaps of solutions of a random CSP is an indicator of the overall geometry of its solution space. For random $k$-SAT, nonrigorous methods from Statistical Physics support the validity of the ``one step replica symmetry breaking'' approach. Some of these predictions were rigorously confirmed in \cite{cond-mat/0504070/prl} \cite{cond-mat/0506053}. There it is proved that the overlap distribution of random $k$-SAT, $k\geq 9$, has discontinuous support. Furthermore, Achlioptas and Ricci-Tersenghi proved that, for random $k$-SAT, $k\geq 8$. and constraint densities close enough to the phase transition there exists an exponential number of clusters of satisfying assignments; moreover, the distance between satisfying assignments in different clusters is linear. We aim to understand the structural properties of random CSP that lead to solution clustering. To this end, we prove two results on the cluster structure of solutions for binary CSP under the random model from Molloy (STOC 2002) 1. For all constraint sets $S$ (described explicitly in Creignou and Daude (2004), Istrate (2005)) s.t. $SAT(S)$ has a sharp threshold and all $q\in (0,1]$, $q$-overlap-$SAT(S)$ has a sharp threshold (i.e. the first step of the approach in Mora et al. works in all nontrivial cases). 2. For any constraint density value $c<1$, the set of solutions of a random instance of 2-SAT form, w.h.p., a single cluster. Also, for and any $q\in (0,1]$ such an instance has w.h.p. two satisfying assignment of overlap $\sim q$. Thus, as expected from Statistical Physics predictions, the second step of the approach in Mora et al. fails for 2-SAT.
[ { "version": "v1", "created": "Tue, 13 Mar 2007 15:45:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Istrate", "Gabriel", "" ] ]
cs/0703066
Gerard Cohen
Charon Cohen, Hudry Lobstein
Discriminating and Identifying Codes in the Binary Hamming Space
null
null
null
null
cs.DM
null
Let $F^n$ be the binary $n$-cube, or binary Hamming space of dimension $n$, endowed with the Hamming distance, and ${\cal E}^n$ (respectively, ${\cal O}^n$) the set of vectors with even (respectively, odd) weight. For $r\geq 1$ and $x\in F^n$, we denote by $B_r(x)$ the ball of radius $r$ and centre $x$. A code $C\subseteq F^n$ is said to be $r$-identifying if the sets $B_r(x) \cap C$, $x\in F^n$, are all nonempty and distinct. A code $C\subseteq {\cal E}^n$ is said to be $r$-discriminating if the sets $B_r(x) \cap C$, $x\in {\cal O}^n$, are all nonempty and distinct. We show that the two definitions, which were given for general graphs, are equivalent in the case of the Hamming space, in the following sense: for any odd $r$, there is a bijection between the set of $r$-identifying codes in $F^n$ and the set of $r$-discriminating codes in $F^{n+1}$. We then extend previous studies on constructive upper bounds for the minimum cardinalities of identifying codes in the Hamming space.
[ { "version": "v1", "created": "Wed, 14 Mar 2007 15:00:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Cohen", "Charon", "" ], [ "Lobstein", "Hudry", "" ] ]
cs/0703067
Stephen Smith
Stephen L. Smith, Francesco Bullo
Target assignment for robotic networks: asymptotic performance under limited communication
2007 ACC paper including proofs; Corrected typos
null
null
null
cs.RO
null
We are given an equal number of mobile robotic agents, and distinct target locations. Each agent has simple integrator dynamics, a limited communication range, and knowledge of the position of every target. We address the problem of designing a distributed algorithm that allows the group of agents to divide the targets among themselves and, simultaneously, leads each agent to reach its unique target. We do not require connectivity of the communication graph at any time. We introduce a novel assignment-based algorithm with the following features: initial assignments and robot motions follow a greedy rule, and distributed refinements of the assignment exploit an implicit circular ordering of the targets. We prove correctness of the algorithm, and give worst-case asymptotic bounds on the time to complete the assignment as the environment grows with the number of agents. We show that among a certain class of distributed algorithms, our algorithm is asymptotically optimal. The analysis utilizes results on the Euclidean traveling salesperson problem.
[ { "version": "v1", "created": "Wed, 14 Mar 2007 19:20:45 GMT" }, { "version": "v2", "created": "Tue, 20 Mar 2007 19:57:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Smith", "Stephen L.", "" ], [ "Bullo", "Francesco", "" ] ]
cs/0703068
Vladimir Surkov
Kenneth R. Jackson, Sebastian Jaimungal, Vladimir Surkov
Option Valuation using Fourier Space Time Stepping
null
null
null
null
cs.CE
null
It is well known that the Black-Scholes-Merton model suffers from several deficiencies. Jump-diffusion and Levy models have been widely used to partially alleviate some of the biases inherent in this classical model. Unfortunately, the resulting pricing problem requires solving a more difficult partial-integro differential equation (PIDE) and although several approaches for solving the PIDE have been suggested in the literature, none are entirely satisfactory. All treat the integral and diffusive terms asymmetrically and are difficult to extend to higher dimensions. We present a new, efficient algorithm, based on transform methods, which symmetrically treats the diffusive and integrals terms, is applicable to a wide class of path-dependent options (such as Bermudan, barrier, and shout options) and options on multiple assets, and naturally extends to regime-switching Levy models. We present a concise study of the precision and convergence properties of our algorithm for several classes of options and Levy models and demonstrate that the algorithm is second-order in space and first-order in time for path-dependent options.
[ { "version": "v1", "created": "Wed, 14 Mar 2007 19:48:42 GMT" }, { "version": "v2", "created": "Wed, 14 Mar 2007 20:49:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Jackson", "Kenneth R.", "" ], [ "Jaimungal", "Sebastian", "" ], [ "Surkov", "Vladimir", "" ] ]
cs/0703069
Paul Fodor
Paul Fodor
Portlet Wrappers using JavaScript
null
null
null
null
cs.SE
null
In this paper we extend the classical portal (with static portlets) design with HTML DOM Web clipping on the client browser using dynamic JavaScript portlets: the portal server supplies the user/passwords for all services through https and the client browser retrieves web pages and cuts/selects/changes the desired parts using paths (XPath) in the Web page structure. This operation brings along a set of advantages: dynamic wrapping of existing legacy websites in the client browser, the reloading of only changed portlets instead of whole portal, low bandwidth on the server, the elimination of re-writing the URL links in the portal, and last but not least, a support for Java applets in portlets by putting the login cookies on the client browser. Our solution is compliant with JSR168 Portlet Specification allowing portability across all vendor platforms.
[ { "version": "v1", "created": "Wed, 14 Mar 2007 23:32:43 GMT" }, { "version": "v2", "created": "Tue, 27 Mar 2007 15:46:21 GMT" }, { "version": "v3", "created": "Wed, 2 May 2007 19:02:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Fodor", "Paul", "" ] ]
cs/0703071
Paul Fodor
Paul Fodor
Automatic Annotation of XHTML Pages with Audio Components
null
null
null
null
cs.OH
null
In this paper we present Deiush, a multimodal system for browsing hypertext Web documents. The Deiush system is based on our novel approach to automatically annotate hypertext Web documents (i.e. XHTML pages) with browsable audio components. It combines two key technologies: (1) middleware automatic separation of Web documents through structural and semantic analysis which is annotated with audio components, transforming them into XHTML+VoiceXML format to represent multimodal dialog; and (2) Opera Browser, an already standardized browser which we adopt as an interface of the XHTML+VoiceXML output of annotating. This paper describes the annotation technology of Deiush and presents an initial system evaluation.
[ { "version": "v1", "created": "Wed, 14 Mar 2007 23:43:30 GMT" }, { "version": "v2", "created": "Tue, 27 Mar 2007 15:45:56 GMT" }, { "version": "v3", "created": "Wed, 2 May 2007 19:03:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Fodor", "Paul", "" ] ]
cs/0703072
Paul Fodor
Paul Fodor
Domain Directed Dialogs for Decision Processes
null
null
null
null
cs.OH
null
The search for a standardized optimum way to communicate using natural language dialog has involved a lot of research. However, due to the diversity of communication domains, we think that this is extremely difficult to achieve and different dialogue management techniques should be applied for different situations. Our work presents the basis of a communication mechanism that supports decision processes, is based on decision trees, and minimizes the number of steps (turn-takes) in the dialogue. The initial dialog workflow is automatically generated and the user's interaction with the system can also change the decision tree and create new dialog paths with optimized cost. The decision tree represents the chronological ordering of the actions (via the parent-child relationship) and uses an object frame to represent the information state (capturing the notion of context). This paper presents our framework, the formalism for interaction and dialogue, and an evaluation of the system compared to relevant dialog planning frameworks (i.e. finite state diagrams, frame-based, information state and planning-based dialogue systems).
[ { "version": "v1", "created": "Thu, 15 Mar 2007 00:08:50 GMT" }, { "version": "v2", "created": "Thu, 22 Mar 2007 14:54:41 GMT" }, { "version": "v3", "created": "Tue, 27 Mar 2007 15:41:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Fodor", "Paul", "" ] ]
cs/0703080
Paul Ioan Fodor
Joy Dutta, Paul Fodor
A Systematic Approach to Web-Application Development
null
null
null
null
cs.SE
null
Designing a web-application from a specification involves a series of well-planned and well executed steps leading to the final product. This often involves critical changes in design while testing the application, which itself is slow and cumbersome. Traditional approaches either fully automate the web-application development process, or let developers write everything from scratch. Our approach is based on a middle-ground, with precise control on the workflow and usage of a set of custom-made software tools to automate a significant part of code generation.
[ { "version": "v1", "created": "Thu, 15 Mar 2007 12:55:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Dutta", "Joy", "" ], [ "Fodor", "Paul", "" ] ]
cs/0703081
Andre Hernich
Martin Grohe, Andre Hernich, Nicole Schweikardt
Randomized Computations on Large Data Sets: Tight Lower Bounds
29 pages, 2 figures, full version of PODS'06 paper
null
null
null
cs.DB cs.CC
null
We study the randomized version of a computation model (introduced by Grohe, Koch, and Schweikardt (ICALP'05); Grohe and Schweikardt (PODS'05)) that restricts random access to external memory and internal memory space. Essentially, this model can be viewed as a powerful version of a data stream model that puts no cost on sequential scans of external memory (as other models for data streams) and, in addition, (like other external memory models, but unlike streaming models), admits several large external memory devices that can be read and written to in parallel. We obtain tight lower bounds for the decision problems set equality, multiset equality, and checksort. More precisely, we show that any randomized one-sided-error bounded Monte Carlo algorithm for these problems must perform Omega(log N) random accesses to external memory devices, provided that the internal memory size is at most O(N^(1/4)/log N), where N denotes the size of the input data. From the lower bound on the set equality problem we can infer lower bounds on the worst case data complexity of query evaluation for the languages XQuery, XPath, and relational algebra on streaming data. More precisely, we show that there exist queries in XQuery, XPath, and relational algebra, such that any (randomized) Las Vegas algorithm that evaluates these queries must perform Omega(log N) random accesses to external memory devices, provided that the internal memory size is at most O(N^(1/4)/log N).
[ { "version": "v1", "created": "Thu, 15 Mar 2007 12:58:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Grohe", "Martin", "" ], [ "Hernich", "Andre", "" ], [ "Schweikardt", "Nicole", "" ] ]
cs/0703082
Christian Rasch
Christian Rasch and Thomas Satzger
Remarks on the O(N) Implementation of the Fast Marching Method
7 pages, 2 figures
null
null
null
cs.NA
null
The fast marching algorithm computes an approximate solution to the eikonal equation in O(N log N) time, where the factor log N is due to the administration of a priority queue. Recently, Yatziv, Bartesaghi and Sapiro have suggested to use an untidy priority queue, reducing the overall complexity to O(N) at the price of a small error in the computed solution. In this paper, we give an explicit estimate of the error introduced, which is based on a discrete comparison principle. This estimates implies in particular that the choice of an accuracy level that is independent of the speed function F results in the complexity bound O(Fmax /Fmin N). A numerical experiment illustrates this robustness problem for large ratios Fmax /Fmin .
[ { "version": "v1", "created": "Thu, 15 Mar 2007 13:41:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Rasch", "Christian", "" ], [ "Satzger", "Thomas", "" ] ]
cs/0703083
Frank McCown
Frank McCown and Michael L. Nelson
Characterization of Search Engine Caches
5 pages, 9 figures, IS&T Archiving 2007, May, 2007
null
null
null
cs.DL cs.CY
null
Search engines provide cached copies of indexed content so users will have something to "click on" if the remote resource is temporarily or permanently unavailable. Depending on their proprietary caching strategies, search engines will purge their indexes and caches of resources that exceed a threshold of unavailability. Although search engine caches are provided only as an aid to the interactive user, we are interested in building reliable preservation services from the aggregate of these limited caching services. But first, we must understand the contents of search engine caches. In this paper, we have examined the cached contents of Ask, Google, MSN and Yahoo to profile such things as overlap between index and cache, size, MIME type and "staleness" of the cached resources. We also examined the overlap of the various caches with the holdings of the Internet Archive.
[ { "version": "v1", "created": "Thu, 15 Mar 2007 15:16:08 GMT" }, { "version": "v2", "created": "Thu, 15 Mar 2007 20:24:16 GMT" } ]
2007-05-23T00:00:00
[ [ "McCown", "Frank", "" ], [ "Nelson", "Michael L.", "" ] ]
cs/0703085
Xiaoyang Gu
Xiaoyang Gu, Jack H. Lutz
Dimension and Relative Frequencies
null
null
null
null
cs.CC
null
We show how to calculate the finite-state dimension (equivalently, the finite-state compressibility) of a saturated sets $X$ consisting of {\em all} infinite sequences $S$ over a finite alphabet $\Sigma_m$ satisfying some given condition $P$ on the asymptotic frequencies with which various symbols from $\Sigma_m$ appear in $S$. When the condition $P$ completely specifies an empirical probability distribution $\pi$ over $\Sigma_m$, i.e., a limiting frequency of occurrence for {\em every} symbol in $\Sigma_m$, it has been known since 1949 that the Hausdorff dimension of $X$ is precisely $\CH(\pi)$, the Shannon entropy of $\pi$, and the finite-state dimension was proven to have this same value in 2001. The saturated sets were studied by Volkmann and Cajar decades ago. It got attention again only with the recent developments in multifractal analysis by Barreira, Saussol, Schmeling, and separately Olsen. However, the powerful methods they used -- ergodic theory and multifractal analysis -- do not yield a value for the finite-state (or even computable) dimension in an obvious manner. We give a pointwise characterization of finite-state dimensions of saturated sets. Simultaneously, we also show that their finite-state dimension and strong dimension coincide with their Hausdorff and packing dimension respectively, though the techniques we use are completely elementary. Our results automatically extend to less restrictive effective settings (e.g., constructive, computable, and polynomial-time dimensions).
[ { "version": "v1", "created": "Fri, 16 Mar 2007 02:42:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Gu", "Xiaoyang", "" ], [ "Lutz", "Jack H.", "" ] ]
cs/0703092
Partha Basuchowdhuri
Partha Basuchowdhuri
Comparing BB84 and Authentication-Aided Kak's Three-Stage Quantum Protocol
9 pages, 4 figures
null
null
null
cs.CR
null
This paper compares the popular quantum key distribution (QKD) protocol BB84 with the more recent Kak's three-stage protocol and the latter is shown to be more secure. A theoretical representation of an authentication-aided version of Kak's three-stage protocol is provided that makes it possible to deal with the man-in-the-middle attack.
[ { "version": "v1", "created": "Mon, 19 Mar 2007 08:13:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Basuchowdhuri", "Partha", "" ] ]
cs/0703094
Olivier Powell
Olivier Powell and Sotiris Nikolesteas
Geographic Routing Around Obstacles in Wireless Sensor Networks
37 pages, 23 figures
null
null
null
cs.DC
null
Geographic routing is becoming the protocol of choice for many sensor network applications. The current state of the art is unsatisfactory: some algorithms are very efficient, however they require a preliminary planarization of the communication graph. Planarization induces overhead and is not realistic in many scenarios. On the otherhand, georouting algorithms which do not rely on planarization have fairly low success rates and either fail to route messages around all but the simplest obstacles or have a high topology control overhead (e.g. contour detection algorithms). To overcome these limitations, we propose GRIC, the first lightweight and efficient on demand (i.e. all-to-all) geographic routing algorithm which does not require planarization and has almost 100% delivery rates (when no obstacles are added). Furthermore, the excellent behavior of our algorithm is maintained even in the presence of large convex obstacles. The case of hard concave obstacles is also studied; such obstacles are hard instances for which performance diminishes.
[ { "version": "v1", "created": "Tue, 20 Mar 2007 12:17:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Powell", "Olivier", "" ], [ "Nikolesteas", "Sotiris", "" ] ]
cs/0703095
Jian Ma
Jian Ma and Zengqi Sun
Copula Component Analysis
null
null
null
null
cs.IR cs.AI
null
A framework named Copula Component Analysis (CCA) for blind source separation is proposed as a generalization of Independent Component Analysis (ICA). It differs from ICA which assumes independence of sources that the underlying components may be dependent with certain structure which is represented by Copula. By incorporating dependency structure, much accurate estimation can be made in principle in the case that the assumption of independence is invalidated. A two phrase inference method is introduced for CCA which is based on the notion of multidimensional ICA.
[ { "version": "v1", "created": "Tue, 20 Mar 2007 14:52:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Ma", "Jian", "" ], [ "Sun", "Zengqi", "" ] ]
cs/0703097
Lane A. Hemaspaandra
Gabor Erdelyi, Lane A. Hemaspaandra, Joerg Rothe, Holger Spakowski
On Approximating Optimal Weighted Lobbying, and Frequency of Correctness versus Average-Case Polynomial Time
null
null
null
URCS-TR-2007-914
cs.GT cs.CC cs.MA
null
We investigate issues related to two hard problems related to voting, the optimal weighted lobbying problem and the winner problem for Dodgson elections. Regarding the former, Christian et al. [CFRS06] showed that optimal lobbying is intractable in the sense of parameterized complexity. We provide an efficient greedy algorithm that achieves a logarithmic approximation ratio for this problem and even for a more general variant--optimal weighted lobbying. We prove that essentially no better approximation ratio than ours can be proven for this greedy algorithm. The problem of determining Dodgson winners is known to be complete for parallel access to NP [HHR97]. Homan and Hemaspaandra [HH06] proposed an efficient greedy heuristic for finding Dodgson winners with a guaranteed frequency of success, and their heuristic is a ``frequently self-knowingly correct algorithm.'' We prove that every distributional problem solvable in polynomial time on the average with respect to the uniform distribution has a frequently self-knowingly correct polynomial-time algorithm. Furthermore, we study some features of probability weight of correctness with respect to Procaccia and Rosenschein's junta distributions [PR07].
[ { "version": "v1", "created": "Tue, 20 Mar 2007 20:35:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Erdelyi", "Gabor", "" ], [ "Hemaspaandra", "Lane A.", "" ], [ "Rothe", "Joerg", "" ], [ "Spakowski", "Holger", "" ] ]
cs/0703098
Sergey Gubin
Sergey Gubin
Polynomial time algorithm for 3-SAT. Examples of use
19 pages
null
null
null
cs.CC cs.DM cs.DS cs.LO
null
The algorithm checks the propositional formulas for patterns of unsatisfiability.
[ { "version": "v1", "created": "Wed, 21 Mar 2007 06:46:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Gubin", "Sergey", "" ] ]
cs/0703100
Rajmohan Rajaraman
Guolong Lin and Rajmohan Rajaraman
Approximation Algorithms for Multiprocessor Scheduling under Uncertainty
12 pages, 2 encapsulated postscript figures
null
null
null
cs.DC cs.CC cs.DS
null
Motivated by applications in grid computing and project management, we study multiprocessor scheduling in scenarios where there is uncertainty in the successful execution of jobs when assigned to processors. We consider the problem of multiprocessor scheduling under uncertainty, in which we are given n unit-time jobs and m machines, a directed acyclic graph C giving the dependencies among the jobs, and for every job j and machine i, the probability p_{ij} of the successful completion of job j when scheduled on machine i in any given particular step. The goal of the problem is to find a schedule that minimizes the expected makespan, that is, the expected completion time of all the jobs. The problem of multiprocessor scheduling under uncertainty was introduced by Malewicz and was shown to be NP-hard even when all the jobs are independent. In this paper, we present polynomial-time approximation algorithms for the problem, for special cases of the dag C. We obtain an O(log(n))-approximation for the case of independent jobs, an O(log(m)log(n)log(n+m)/loglog(n+m))-approximation when C is a collection of disjoint chains, an O(log(m)log^2(n))-approximation when C is a collection of directed out- or in-trees, and an O(log(m)log^2(n)log(n+m)/loglog(n+m))-approximation when C is a directed forest.
[ { "version": "v1", "created": "Wed, 21 Mar 2007 20:35:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Lin", "Guolong", "" ], [ "Rajaraman", "Rajmohan", "" ] ]
cs/0703101
Thomas M. Breuel
Thomas M. Breuel
A Note on Approximate Nearest Neighbor Methods
The report was originally written in 2005 and does not reference information after that date
null
null
null
cs.IR cs.CC cs.CV
null
A number of authors have described randomized algorithms for solving the epsilon-approximate nearest neighbor problem. In this note I point out that the epsilon-approximate nearest neighbor property often fails to be a useful approximation property, since epsilon-approximate solutions fail to satisfy the necessary preconditions for using nearest neighbors for classification and related tasks.
[ { "version": "v1", "created": "Wed, 21 Mar 2007 20:47:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Breuel", "Thomas M.", "" ] ]
cs/0703106
Paul Wang
Shengbao Wang
Practical Identity-Based Encryption (IBE) in Multiple PKG Environments and Its Applications
A work in progress, any comment and suggestion will be highly appreciated by the author
null
null
null
cs.CR
null
In this paper, we present a new identity-based encryption (IBE) scheme using bilinear pairings. Our IBE scheme enjoys the same \textsf{Key Extraction} and \textsf{Decryption} algorithms with the famous IBE scheme of Boneh and Franklin (BF-IBE for short), while differs from the latter in that it has modified \textsf{Setup} and \textsf{Encryption} algorithms. Compared with BF-IBE, we show that ours are more practical in a multiple private key generator (PKG) environment, mainly due to that the session secret $g_{ID}$ could be pre-computed \emph{before} any interaction, and the sender could encrypt a message using $g_{ID}$ prior to negotiating with the intended recipient(s). As an application of our IBE scheme, we also derive an escrowed ElGamal scheme which possesses certain good properties in practice.
[ { "version": "v1", "created": "Thu, 22 Mar 2007 08:05:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Wang", "Shengbao", "" ] ]
cs/0703108
Sourav Dhar
Sourav Dhar, Rabindranath Bera, K.Mal
Wireless Lan to Support Multimedia Communication Using Spread Spectrum Technology
URSI 0ctober 22-29 2005, 4pages, 6 figures
null
null
null
cs.NI
null
Wireless LAN is currently enjoying rapid deployment in University departments, business offices, hospitals and homes. It becomes an inexpensive technology and allows multiple numbers of the households to simultaneously access the internet while roaming about the house. In the present work, the design and development of a wireless LAN is highlighted which utilizes direct sequence spread spectrum (DSSS) technology at 900MHz RF carrier frequency in its physical layer. This provides enormous security in the physical layer and hence it is very difficult to hack or jam the network. The installation cost is also less due to the use of 900 MHz RF carrier frequency..
[ { "version": "v1", "created": "Thu, 22 Mar 2007 11:07:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Dhar", "Sourav", "" ], [ "Bera", "Rabindranath", "" ], [ "Mal", "K.", "" ] ]
cs/0703112
Bharath Ramesh
Bharath Ramesh and Srinidhi Varadarajan
User-level DSM System for Modern High-Performance Interconnection Networks
6 pages, 5 figures
null
null
null
cs.DC
null
In this paper, we introduce a new user-level DSM system which has the ability to directly interact with underlying interconnection networks. The DSM system provides the application programmer a flexible API to program parallel applications either using shared memory semantics over physically distributed memory or to use an efficient remote memory demand paging technique. We also introduce a new time slice based memory consistency protocol which is used by the DSM system. We present preliminary results from our implementation on a small Opteron Linux cluster interconnected over Myrinet.
[ { "version": "v1", "created": "Thu, 22 Mar 2007 19:15:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Ramesh", "Bharath", "" ], [ "Varadarajan", "Srinidhi", "" ] ]
cs/0703117
Juan J. Merelo Pr.
J.L.J. Laredo, E.A. Eiben, M. Schoenauer, P.A. Castillo, A.M. Mora, F. Fernandez, J.J. Merelo
Self-adaptive Gossip Policies for Distributed Population-based Algorithms
Submitted to Europar 2007
null
null
null
cs.DC
null
Gossipping has demonstrate to be an efficient mechanism for spreading information among P2P networks. Within the context of P2P computing, we propose the so-called Evolvable Agent Model for distributed population-based algorithms which uses gossipping as communication policy, and represents every individual as a self-scheduled single thread. The model avoids obsolete nodes in the population by defining a self-adaptive refresh rate which depends on the latency and bandwidth of the network. Such a mechanism balances the migration rate to the congestion of the links pursuing global population coherence. We perform an experimental evaluation of this model on a real parallel system and observe how solution quality and algorithm speed scale with the number of processors with this seamless approach.
[ { "version": "v1", "created": "Fri, 23 Mar 2007 11:29:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Laredo", "J. L. J.", "" ], [ "Eiben", "E. A.", "" ], [ "Schoenauer", "M.", "" ], [ "Castillo", "P. A.", "" ], [ "Mora", "A. M.", "" ], [ "Fernandez", "F.", "" ], [ "Merelo", "J. J.", "" ] ]