id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
3
62.8k
title
stringlengths
1
382
comments
stringlengths
1
1.15k
journal-ref
stringlengths
1
557
doi
stringlengths
7
153
report-no
stringlengths
1
509
categories
stringlengths
5
125
license
stringclasses
9 values
abstract
stringlengths
6
6.09k
versions
listlengths
1
187
update_date
timestamp[s]date
2007-05-23 00:00:00
2025-04-25 00:00:00
authors_parsed
sequencelengths
1
2.83k
cs/9809099
Chunlei Liu
R. Jain, D. Chiu, and W. Hawe
A Quantitative Measure Of Fairness And Discrimination For Resource Allocation In Shared Computer Systems
DEC Research Report TR-301, September 1984
null
null
TR-301
cs.NI
null
Fairness is an important performance criterion in all resource allocation schemes, including those in distributed computer systems. However, it is often specified only qualitatively. The quantitative measures proposed in the literature are either too specific to a particular application, or suffer from some undesirable characteristics. In this paper, we have introduced a quantitative measure called Indiex of FRairness. The index is applicable to any resource sharing or allocation problem. It is independent of the amount of the resource. The fairness index always lies between 0 and 1. This boundedness aids intuitive understanding of the fairness index. For example, a distribution algorithm with a fairness of 0.10 means that it is unfair to 90% of the users. Also, the discrimination index can be defined as 1 - fairness index.
[ { "version": "v1", "created": "Thu, 24 Sep 1998 05:27:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Jain", "R.", "" ], [ "Chiu", "D.", "" ], [ "Hawe", "W.", "" ] ]
cs/9809100
Chunlei Liu
R. Jain
Data Flies Standby with ABR Service
null
Network World, June 12, 1995, page 43
null
null
cs.NI
null
Explanation of ABR service in plain language.
[ { "version": "v1", "created": "Thu, 24 Sep 1998 05:31:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Jain", "R.", "" ] ]
cs/9809101
Jaihyung Cho
Jaihyung Cho, James Breen
Flood Routing Technique for Data Networks
null
ICICS`97;First International Conference on Information, Communications and Signal Processing, IEEE Singapore, vo. 3, Sep 1997. pp. 1418-1422
null
null
cs.NI
null
In this paper, a new routing algorithm based on a flooding method is introduced. Flooding techniques have been used previously, e.g. for broadcasting the routing table in the ARPAnet [1] and other special purpose networks [3][4][5]. However, sending data using flooding can often saturate the network [2] and it is usually regarded as an inefficient broadcast mechanism. Our approach is to flood a very short packet to explore an optimal route without relying on a pre-established routing table, and an efficient flood control algorithm to reduce the signalling traffic overhead. This is an inherently robust mechanism in the face of a network configuration change, achieves automatic load sharing across alternative routes and has potential to solve many contemporary routing problems. An earlier version of this mechanism was originally developed for virtual circuit establishment in the experimental Caroline ATM LAN [6][7] at Monash University.
[ { "version": "v1", "created": "Thu, 24 Sep 1998 07:53:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Cho", "Jaihyung", "" ], [ "Breen", "James", "" ] ]
cs/9809105
Thomas Lippert
Thomas Lippert, Nikolay Petkov, Paolo Palazzari, and Klaus Schilling
Hyper-Systolic Matrix Multiplication
29 pages, 13 figures
null
null
HLRZ1998-59
cs.MS
null
A novel parallel algorithm for matrix multiplication is presented. The hyper-systolic algorithm makes use of a one-dimensional processor abstraction. The procedure can be implemented on all types of parallel systems. It can handle matrix-vector multiplications as well as transposed matrix products.
[ { "version": "v1", "created": "Thu, 24 Sep 1998 20:56:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Lippert", "Thomas", "" ], [ "Petkov", "Nikolay", "" ], [ "Palazzari", "Paolo", "" ], [ "Schilling", "Klaus", "" ] ]
cs/9809106
Markus Walther
Petra Barg and Markus Walther (University of Duesseldorf)
Processing Unknown Words in HPSG
5 pp., 1 PostScript figure
Proceedings COLING-ACL'98, vol.I, 91-95
null
null
cs.CL
null
The lexical acquisition system presented in this paper incrementally updates linguistic properties of unknown words inferred from their surrounding context by parsing sentences with an HPSG grammar for German. We employ a gradual, information-based concept of ``unknownness'' providing a uniform treatment for the range of completely known to maximally unknown lexical entries. ``Unknown'' information is viewed as revisable information, which is either generalizable or specializable. Updating takes place after parsing, which only requires a modified lexical lookup. Revisable pieces of information are identified by grammar-specified declarations which provide access paths into the parse feature structure. The updating mechanism revises the corresponding places in the lexical feature structures iff the context actually provides new information. For revising generalizable information, type union is required. A worked-out example demonstrates the inferential capacity of our implemented system.
[ { "version": "v1", "created": "Fri, 25 Sep 1998 11:02:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Barg", "Petra", "", "University of Duesseldorf" ], [ "Walther", "Markus", "", "University of Duesseldorf" ] ]
cs/9809107
Markus Walther
Markus Walther (University of Marburg)
Computing Declarative Prosodic Morphology
10 pages
Proceedings of SIGPHON'98, pp. 11-20 (COLING-ACL'98 Post-Conference Workshop on The Computation of Phonological Constraints)
null
null
cs.CL
null
This paper describes a computational, declarative approach to prosodic morphology that uses inviolable constraints to denote small finite candidate sets which are filtered by a restrictive incremental optimization mechanism. The new approach is illustrated with an implemented fragment of Modern Hebrew verbs couched in MicroCUF, an expressive constraint logic formalism. For generation and parsing of word forms, I propose a novel off-line technique to eliminate run-time optimization. It produces a finite-state oracle that efficiently restricts the constraint interpreter's search space. As a byproduct, unknown words can be analyzed without special mechanisms. Unlike pure finite-state transducer approaches, this hybrid setup allows for more expressivity in constraints to specify e.g. token identity for reduplication or arithmetic constraints for phonetics.
[ { "version": "v1", "created": "Fri, 25 Sep 1998 14:32:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Walther", "Markus", "", "University of Marburg" ] ]
cs/9809108
Jose M. Vidal
Jose M. Vidal and Edmund H. Durfee
Learning Nested Agent Models in an Information Economy
null
Journal of Experimental and Theoretical Artificial Intelligence. 10(1998)291-308
null
null
cs.MA cs.AI
null
We present our approach to the problem of how an agent, within an economic Multi-Agent System, can determine when it should behave strategically (i.e. learn and use models of other agents), and when it should act as a simple price-taker. We provide a framework for the incremental implementation of modeling capabilities in agents, and a description of the forms of knowledge required. The agents were implemented and different populations simulated in order to learn more about their behavior and the merits of using and learning agent models. Our results show, among other lessons, how savvy buyers can avoid being ``cheated'' by sellers, how price volatility can be used to quantitatively predict the benefits of deeper models, and how specific types of agent populations influence system behavior.
[ { "version": "v1", "created": "Sat, 26 Sep 1998 17:43:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Vidal", "Jose M.", "" ], [ "Durfee", "Edmund H.", "" ] ]
cs/9809110
Fernando C. N. Pereira
Ido Dagan, Lillian Lee and Fernando C. N. Pereira
Similarity-Based Models of Word Cooccurrence Probabilities
26 pages, 5 figures
Machine Learning, 34, 43-69 (1999)
null
null
cs.CL cs.AI cs.LG
null
In many applications of natural language processing (NLP) it is necessary to determine the likelihood of a given word combination. For example, a speech recognizer may need to determine which of the two word combinations ``eat a peach'' and ``eat a beach'' is more likely. Statistical NLP methods determine the likelihood of a word combination from its frequency in a training corpus. However, the nature of language is such that many word combinations are infrequent and do not occur in any given corpus. In this work we propose a method for estimating the probability of such previously unseen word combinations using available information on ``most similar'' words. We describe probabilistic word association models based on distributional word similarity, and apply them to two tasks, language modeling and pseudo-word disambiguation. In the language modeling task, a similarity-based model is used to improve probability estimates for unseen bigrams in a back-off language model. The similarity-based method yields a 20% perplexity improvement in the prediction of unseen bigrams and statistically significant reductions in speech-recognition error. We also compare four similarity-based estimation methods against back-off and maximum-likelihood estimation methods on a pseudo-word sense disambiguation task in which we controlled for both unigram and bigram frequency to avoid giving too much weight to easy-to-disambiguate high-frequency configurations. The similarity-based methods perform up to 40% better on this particular task.
[ { "version": "v1", "created": "Sun, 27 Sep 1998 18:42:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Dagan", "Ido", "" ], [ "Lee", "Lillian", "" ], [ "Pereira", "Fernando C. N.", "" ] ]
cs/9809111
Lex Weaver
Lex Weaver and Terry Bossomaier
Evolution of Neural Networks to Play the Game of Dots-and-Boxes
8 pages, 5 figures, LaTeX 2.09 (works with LaTeX2e)
Alife V: Poster Presentations, May 16-18 1996, pages 43-50
null
null
cs.NE cs.LG
null
Dots-and-Boxes is a child's game which remains analytically unsolved. We implement and evolve artificial neural networks to play this game, evaluating them against simple heuristic players. Our networks do not evaluate or predict the final outcome of the game, but rather recommend moves at each stage. Superior generalisation of play by co-evolved populations is found, and a comparison made with networks trained by back-propagation using simple heuristics as an oracle.
[ { "version": "v1", "created": "Mon, 28 Sep 1998 03:48:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Weaver", "Lex", "" ], [ "Bossomaier", "Terry", "" ] ]
cs/9809112
Lluis Padro
L. Padro & L. Marquez (Universitat Politecnica de Catalunya)
On the Evaluation and Comparison of Taggers: The Effect of Noise in Testing Corpora
Appears in proceedings of joint COLING-ACL 1998, Montreal, Canada
null
null
null
cs.CL
null
This paper addresses the issue of {\sc pos} tagger evaluation. Such evaluation is usually performed by comparing the tagger output with a reference test corpus, which is assumed to be error-free. Currently used corpora contain noise which causes the obtained performance to be a distortion of the real value. We analyze to what extent this distortion may invalidate the comparison between taggers or the measure of the improvement given by a new system. The main conclusion is that a more rigorous testing experimentation setting/designing is needed to reliably evaluate and compare tagger accuracies.
[ { "version": "v1", "created": "Mon, 28 Sep 1998 07:49:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Padro", "L.", "", "Universitat Politecnica de Catalunya" ], [ "Marquez", "L.", "", "Universitat Politecnica de Catalunya" ] ]
cs/9809113
Lluis Padro
L. Marquez, L. Padro & H. Rodriguez (Universitat Politecnica de Catalunya)
Improving Tagging Performance by Using Voting Taggers
Appears in proceedings of NLP+IA/TAL+AI'98. Moncton, New Brunswick, Canada, 1998
null
null
null
cs.CL
null
We present a bootstrapping method to develop an annotated corpus, which is specially useful for languages with few available resources. The method is being applied to develop a corpus of Spanish of over 5Mw. The method consists on taking advantage of the collaboration of two different POS taggers. The cases in which both taggers agree present a higher accuracy and are used to retrain the taggers.
[ { "version": "v1", "created": "Mon, 28 Sep 1998 07:50:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Marquez", "L.", "", "Universitat Politecnica de\n Catalunya" ], [ "Padro", "L.", "", "Universitat Politecnica de\n Catalunya" ], [ "Rodriguez", "H.", "", "Universitat Politecnica de\n Catalunya" ] ]
cs/9809114
Heribert Vollmer
Clemens Lautemann and Pierre McKenzie and Thomas Schwentick and Heribert Vollmer
The descriptive complexity approach to LOGCFL
10 pages, 1 figure
null
null
null
cs.CC
null
Building upon the known generalized-quantifier-based first-order characterization of LOGCFL, we lay the groundwork for a deeper investigation. Specifically, we examine subclasses of LOGCFL arising from varying the arity and nesting of groupoidal quantifiers. Our work extends the elaborate theory relating monoidal quantifiers to NC1 and its subclasses. In the absence of the BIT predicate, we resolve the main issues: we show in particular that no single outermost unary groupoidal quantifier with FO can capture all the context-free languages, and we obtain the surprising result that a variant of Greibach's ``hardest context-free language'' is LOGCFL-complete under quantifier-free BIT-free projections. We then prove that FO with unary groupoidal quantifiers is strictly more expressive with the BIT predicate than without. Considering a particular groupoidal quantifier, we prove that first-order logic with majority of pairs is strictly more expressive than first-order with majority of individuals. As a technical tool of independent interest, we define the notion of an aperiodic nondeterministic finite automaton and prove that FO translations are precisely the mappings computed by single-valued aperiodic nondeterministic finite transducers.
[ { "version": "v1", "created": "Mon, 28 Sep 1998 07:57:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Lautemann", "Clemens", "" ], [ "McKenzie", "Pierre", "" ], [ "Schwentick", "Thomas", "" ], [ "Vollmer", "Heribert", "" ] ]
cs/9809115
Heribert Vollmer
Heribert Vollmer
A Generalized Quantifier Concept in Computational Complexity Theory
null
null
null
null
cs.CC
null
A notion of generalized quantifier in computational complexity theory is explored and used to give a unified treatment of leaf language definability, oracle separations, type 2 operators, and circuits with monoidal gates. Relations to Lindstroem quantifiers are pointed out.
[ { "version": "v1", "created": "Mon, 28 Sep 1998 08:20:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Vollmer", "Heribert", "" ] ]
cs/9809116
Heribert Vollmer
Steffen Reith and Heribert Vollmer
The Complexity of Computing Optimal Assignments of Generalized Propositional Formulae
17 pages, 1 figure
null
null
null
cs.CC
null
We consider the problems of finding the lexicographically minimal (or maximal) satisfying assignment of propositional formulae for different restricted formula classes. It turns out that for each class from our framework, the above problem is either polynomial time solvable or complete for OptP. We also consider the problem of deciding if in the optimal assignment the largest variable gets value 1. We show that this problem is either in P or P^NP complete.
[ { "version": "v1", "created": "Mon, 28 Sep 1998 08:38:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Reith", "Steffen", "" ], [ "Vollmer", "Heribert", "" ] ]
cs/9809117
Osamu Watanabe
Satoshi Horie and Osamu Watanabe
Hard instance generation for SAT
null
In the Proc. of ISAAC'97, Lecture Notes in CS, Vol.1350, 22-31, 1997
null
TR98-0007
cs.CC
null
We propose an algorithm of generating hard instances for the Satisfying Assignment Search Problem (in short, SAT). The algorithm transforms instances of the integer factorization problem into SAT instances efficiently by using the Chinese Remainder Theorem. For example, it is possible to construct SAT instances with about 5,600 variables that is as hard as factorizing 100 bit integers.
[ { "version": "v1", "created": "Mon, 28 Sep 1998 10:50:03 GMT" }, { "version": "v2", "created": "Tue, 29 Sep 1998 00:58:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Horie", "Satoshi", "" ], [ "Watanabe", "Osamu", "" ] ]
cs/9809119
Denis V. Juriev
Denis V. Juriev
Droems: experimental mathematics, informatics and infinite dimensional geometry
bilingual version [English translation+Russian original]: 43 pages, AMSTEX
null
null
RCMPI/96-05+
cs.HC cs.GR math.RT
null
The article is devoted to a problem of elaboration of the real-time interactive videosystems for accelerated nonverbal cognitive computer and telecommunications. The proposed approach is based on the using of droems (dynamically reconstructed objects of experimental mathematics) and interpretational figures as pointers to them. Four paragraphs of the article are devoted to (1) an exposition of basic notions of the interpretational geometry, (2) the operator methods in the theory of interactive dynamical videosystems, (3) the general concept of organization of the integrated interactive real-time videocognitive systems, (4) the droems and processes of their dynamical reconstruction, where the general notions are illustrated by a concrete example related to the infinite dimensional geometry. The exposition is presumably heuristic and conceptual (the first and the third paragraphs) though some particular aspects such as content of the second and the fourth paragraphs, which allow deeper formalization and detailing in present, are exposed on the mathematical level of rigor.
[ { "version": "v1", "created": "Tue, 29 Sep 1998 07:06:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Juriev", "Denis V.", "" ] ]
cs/9809120
Marino Miculan
Marino Miculan
A Natural Deduction style proof system for propositional $\mu$-calculus and its formalization in inductive type theories
17 pages; longer version of the paper which will appear in Proc. ICTCS'98 (World Scientific)
null
null
null
cs.LO
null
In this paper, we present a formalization of Kozen's propositional modal $\mu$-calculus, in the Calculus of Inductive Constructions. We address several problematic issues, such as the use of higher-order abstract syntax in inductive sets in presence of recursive constructors, the encoding of modal (``proof'') rules and of context sensitive grammars. The encoding can be used in the \Coq system, providing an experimental computer-aided proof environment for the interactive development of error-free proofs in the $\mu$-calculus. The techniques we adopted can be readily ported to other languages and proof systems featuring similar problematic issues.
[ { "version": "v1", "created": "Tue, 29 Sep 1998 11:57:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Miculan", "Marino", "" ] ]
cs/9809121
Neil C. Rowe
Neil C. Rowe
Using Local Optimality Criteria for Efficient Information Retrieval with Redundant Information Filters
null
ACM Transactions on Information Systems, 14, 2 (April 1996), 138-174
null
null
cs.IR cs.AI
null
We consider information retrieval when the data, for instance multimedia, is coputationally expensive to fetch. Our approach uses "information filters" to considerably narrow the universe of possiblities before retrieval. We are especially interested in redundant information filters that save time over more general but more costly filters. Efficient retrieval requires that decision must be made about the necessity, order, and concurrent processing of proposed filters (an "execution plan"). We develop simple polynomial-time local criteria for optimal execution plans, and show that most forms of concurrency are suboptimal with information filters. Although the general problem of finding an optimal execution plan is likely exponential in the number of filters, we show experimentally that our local optimality criteria, used in a polynomial-time algorithm, nearly always find the global optimum with 15 filters or less, a sufficient number of filters for most applications. Our methods do not require special hardware and avoid the high processor idleness that is characteristic of massive parallelism solutions to this problem. We apply our ideas to an important application, information retrieval of cpationed data using natural-language understanding, a problem for which the natural-language processing can be the bottleneck if not implemented well.
[ { "version": "v1", "created": "Tue, 29 Sep 1998 21:55:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Rowe", "Neil C.", "" ] ]
cs/9809122
Osamu Watanabe
Carlos Domingo, Ricard Gavalda, and Osamu Watanabe
Practical algorithms for on-line sampling
To appear in the Proc. of Discovery Science '98, Dec. 1998
null
null
C-123
cs.LG cs.DS
null
One of the core applications of machine learning to knowledge discovery consists on building a function (a hypothesis) from a given amount of data (for instance a decision tree or a neural network) such that we can use it afterwards to predict new instances of the data. In this paper, we focus on a particular situation where we assume that the hypothesis we want to use for prediction is very simple, and thus, the hypotheses class is of feasible size. We study the problem of how to determine which of the hypotheses in the class is almost the best one. We present two on-line sampling algorithms for selecting hypotheses, give theoretical bounds on the number of necessary examples, and analize them exprimentally. We compare them with the simple batch sampling approach commonly used and show that in most of the situations our algorithms use much fewer number of examples.
[ { "version": "v1", "created": "Wed, 30 Sep 1998 03:44:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Domingo", "Carlos", "" ], [ "Gavalda", "Ricard", "" ], [ "Watanabe", "Osamu", "" ] ]
cs/9809123
Osamu Watanabe
Carlos Domingo, Osamu Watanabe, and Tadashi Yamazaki
A role of constraint in self-organization
To appear in the Proc. RANDOM'98, Oct. 1998
null
null
C-124
cs.NE cs.CG
null
In this paper we introduce a neural network model of self-organization. This model uses a variation of Hebb rule for updating its synaptic weights, and surely converges to the equilibrium status. The key point of the convergence is the update rule that constrains the total synaptic weight and this seems to make the model stable. We investigate the role of the constraint and show that it is the constraint that makes the model stable. For analyzing this setting, we propose a simple probabilistic game that models the neural network and the self-organization process. Then, we investigate the characteristics of this game, namely, the probability that the game becomes stable and the number of the steps it takes.
[ { "version": "v1", "created": "Wed, 30 Sep 1998 04:06:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Domingo", "Carlos", "" ], [ "Watanabe", "Osamu", "" ], [ "Yamazaki", "Tadashi", "" ] ]
cs/9809124
James A. Hoagland
James A. Hoagland, Raju Pandey, Karl N. Levitt
Security Policy Specification Using a Graphical Approach
28 pages, 22 figures, in color (but color is not essential for viewing); UC Davis CS department technical report (July 22, 1998)
null
null
CSE-98-3
cs.CR
null
A security policy states the acceptable actions of an information system, as the actions bear on security. There is a pressing need for organizations to declare their security policies, even informal statements would be better than the current practice. But, formal policy statements are preferable to support (1) reasoning about policies, e.g., for consistency and completeness, (2) automated enforcement of the policy, e.g., using wrappers around legacy systems or after the fact with an intrusion detection system, and (3) other formal manipulation of policies, e.g., the composition of policies. We present LaSCO, the Language for Security Constraints on Objects, in which a policy consists of two parts: the domain (assumptions about the system) and the requirement (what is allowed assuming the domain is satisfied). Thus policies defined in LaSCO have the appearance of conditional access control statements. LaSCO policies are specified as expressions in logic and as directed graphs, giving a visual view of policy. LaSCO has a simple semantics in first order logic (which we provide), thus permitting policies we write, even for complex policies, to be very perspicuous. LaSCO has syntax to express many of the situations we have found to be useful on policies or, more interesting, the composition of policies. LaSCO has an object-oriented structure, permitting it to be useful to describe policies on the objects and methods of an application written in an object-oriented language, in addition to the traditional policies on operating system objects. A LaSCO specification can be automatically translated into executable code that checks an invocation of a program with respect to a policy. The implementation of LaSCO is in Java, and generates wrappers to check Java programs with respect to a policy.
[ { "version": "v1", "created": "Wed, 30 Sep 1998 17:00:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Hoagland", "James A.", "" ], [ "Pandey", "Raju", "" ], [ "Levitt", "Karl N.", "" ] ]
cs/9809125
Michael Manthey
Michael Manthey
Distributed Computation, the Twisted Isomorphism, and Auto-Poiesis
26 pages, 4 figures. Originally submitted to the neuro-sys archive which was never publicly announced (was 9809001)
CASYS'97 First International Conference on Computing Anticipatory Systems, Liege (Belgium), August 11-15, 1997. D. Dubois, Ed (Dept.of Mathematics, University of Liege)
null
null
cs.DC
null
This paper presents a synchronization-based, multi-process computational model of anticipatory systems called the Phase Web. It describes a self-organizing paradigm that explicitly recognizes and exploits the existence of a boundary between inside and outside, accepts and exploits intentionality, and uses explicit self-reference to describe eg. auto-poiesis. The model explicitly connects computation to a discrete Clifford algebraic formalization that is in turn extended into homology and co-homology, wherein the recursive nature of objects and boundaries becomes apparent and itself subject to hierarchical recursion. Topsy, a computer program embodying the Phase Web, is available at www.cs.auc.dk/topsy.
[ { "version": "v1", "created": "Mon, 14 Sep 1998 14:42:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Manthey", "Michael", "" ] ]
cs/9810001
Lunjin Lu
Lunjin Lu and John G. Cleary
On Dart-Zobel Algorithm for Testing Regular Type Inclusion
16 pages
null
null
null
cs.LO cs.PL
null
This paper answers open questions about the correctness and the completeness of Dart-Zobel algorithm for testing the inclusion relation between two regular types. We show that the algorithm is incorrect for regular types. We also prove that the algorithm is complete for regular types as well as correct for tuple distributive regular types. Also presented is a simplified version of Dart-Zobel algorithm for tuple distributive regular types.
[ { "version": "v1", "created": "Thu, 1 Oct 1998 02:33:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Lu", "Lunjin", "" ], [ "Cleary", "John G.", "" ] ]
cs/9810002
Lex Weaver
Lex Weaver and Chris Johnson
Pre-fetching tree-structured data in distributed memory
8 pages; added PDF version
Proceedings of the Third Fujitsu Parallel Computing Workshop, pages P1-J-1 to P1-J-8, Kawasaki, Japan, November 1994. Fujitsu Laboratories Ltd
null
null
cs.DC cs.DB
null
A distributed heap storage manager has been implemented on the Fujitsu AP1000 multicomputer. The performance of various pre-fetching strategies is experimentally compared. Subjective programming benefits and objective performance benefits of up to 10% in pre-fetching are found for certain applications, but not for all. The performance benefits of pre-fetching depend on the specific data structure and access patterns. We suggest that control of pre-fetching strategy be dynamically under the control of the application.
[ { "version": "v1", "created": "Fri, 2 Oct 1998 04:41:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Weaver", "Lex", "" ], [ "Johnson", "Chris", "" ] ]
cs/9810003
Andreas Siebert
Andreas Siebert
A Linear Shift Invariant Multiscale Transform
4 pages, 5 figures
Proceedings 1998 International Conference on Image Processing, Chicago, 4-7 October 1998
null
null
cs.CV
null
This paper presents a multiscale decomposition algorithm. Unlike standard wavelet transforms, the proposed operator is both linear and shift invariant. The central idea is to obtain shift invariance by averaging the aligned wavelet transform projections over all circular shifts of the signal. It is shown how the same transform can be obtained by a linear filter bank.
[ { "version": "v1", "created": "Fri, 2 Oct 1998 03:34:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Siebert", "Andreas", "" ] ]
cs/9810004
James P. Cohoon
Bruce R. Childers, James P. Cohoon, Jack W. Davidson, Peter Valle
The Design of EzWindows: A Graphics API for an Introductory Programming Course
5 pages, 5 figures, conference submission
null
null
null
cs.CY cs.GR
null
Teaching object-oriented programming in an introductory programming course poses considerable challenges to the instructor. An often advocated approach to meeting this challenge is the use of a simple, object-oriented graphics library. We have developed a simple, portable graphics library for teaching object-oriented programming using C++. The library, EzWindows, allows beginning programmers to design and write programs that use the graphical display found on all modern desktop computers. In addition to providing simple graphical objects such as windows, geometric shapes, and bitmaps, EzWindows provides facilities for introducing event-based programming using the mouse and timers. EzWindows has proven to be extremely popular; it is currently in use at over 200 universities, colleges, and high schools. This paper describes the rationale for EzWindows and its high-level design.
[ { "version": "v1", "created": "Sat, 3 Oct 1998 12:04:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Childers", "Bruce R.", "" ], [ "Cohoon", "James P.", "" ], [ "Davidson", "Jack W.", "" ], [ "Valle", "Peter", "" ] ]
cs/9810005
Kate Larson
Tuomas Sandholm, Kate Larson, Martin Andersson, Onn Shehory, Fernando Tohme
Anytime Coalition Structure Generation with Worst Case Guarantees
null
Proceedings of the National Conference on Artificial Intelligence, pp 46-53, Madison, WI, July 1998
null
null
cs.MA cs.AI
null
Coalition formation is a key topic in multiagent systems. One would prefer a coalition structure that maximizes the sum of the values of the coalitions, but often the number of coalition structures is too large to allow exhaustive search for the optimal one. But then, can the coalition structure found via a partial search be guaranteed to be within a bound from optimum? We show that none of the previous coalition structure generation algorithms can establish any bound because they search fewer nodes than a threshold that we show necessary for establishing a bound. We present an algorithm that establishes a tight bound within this minimal amount of search, and show that any other algorithm would have to search strictly more. The fraction of nodes needed to be searched approaches zero as the number of agents grows. If additional time remains, our anytime algorithm searches further, and establishes a progressively lower tight bound. Surprisingly, just searching one more node drops the bound in half. As desired, our algorithm lowers the bound rapidly early on, and exhibits diminishing returns to computation. It also drastically outperforms its obvious contenders. Finally, we show how to distribute the desired search across self-interested manipulative agents.
[ { "version": "v1", "created": "Mon, 5 Oct 1998 16:08:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Sandholm", "Tuomas", "" ], [ "Larson", "Kate", "" ], [ "Andersson", "Martin", "" ], [ "Shehory", "Onn", "" ], [ "Tohme", "Fernando", "" ] ]
cs/9810006
Kersten Barney
Nick McKeown (Stanford University), Martin Izzard (Texas Instruments), Adisak Mekkittikul (Stanford University), Bill Ellersick (Stanford University) and Mark Horowitz (Stanford University)
The Tiny Tera: A Packet Switch Core
13 pages, 10 figures
Hot Interconnects V, Stanford University, August 1996; IEEE Micro Jan/Feb 1997, pp 26-33
null
null
cs.NI
null
The objective is to design and build a small, high-bandwidth switch.
[ { "version": "v1", "created": "Mon, 5 Oct 1998 17:50:02 GMT" } ]
2007-05-23T00:00:00
[ [ "McKeown", "Nick", "", "Stanford University" ], [ "Izzard", "Martin", "", "Texas Instruments" ], [ "Mekkittikul", "Adisak", "", "Stanford University" ], [ "Ellersick", "Bill", "", "Stanford\n University" ], [ "Horowitz", "Mark", "", "Stanford University" ] ]
cs/9810008
Rob van Glabbeek
R. J. van Glabbeek (Stanford)
Axiomatizing Flat Iteration
15 pages. LaTeX 2.09. Filename: flat.tex.gz. On A4 paper print with: dvips -t a4 -O -2.15cm,-2.22cm -x 1225 flat. For US letter with: dvips -t letter -O -0.73in,-1.27in -x 1225 flat. More info at http://theory.stanford.edu/~rvg/abstracts.html#38
Proc. CONCUR '97, Warsaw, Poland, July 1997 (A. Mazurkiewicz and J. Winkowski, eds.), LNCS 1243, Springer-Verlag, 1997, pp. 228-242
null
STAN-CS-TN-97-57
cs.LO
null
Flat iteration is a variation on the original binary version of the Kleene star operation P*Q, obtained by restricting the first argument to be a sum of atomic actions. It generalizes prefix iteration, in which the first argument is a single action. Complete finite equational axiomatizations are given for five notions of bisimulation congruence over basic CCS with flat iteration, viz. strong congruence, branching congruence, eta-congruence, delay congruence and weak congruence. Such axiomatizations were already known for prefix iteration and are known not to exist for general iteration. The use of flat iteration has two main advantages over prefix iteration: 1.The current axiomatizations generalize to full CCS, whereas the prefix iteration approach does not allow an elimination theorem for an asynchronous parallel composition operator. 2.The greater expressiveness of flat iteration allows for much shorter completeness proofs. In the setting of prefix iteration, the most convenient way to obtain the completeness theorems for eta-, delay, and weak congruence was by reduction to the completeness theorem for branching congruence. In the case of weak congruence this turned out to be much simpler than the only direct proof found. In the setting of flat iteration on the other hand, the completeness theorems for delay and weak (but not eta-) congruence can equally well be obtained by reduction to the one for strong congruence, without using branching congruence as an intermediate step. Moreover, the completeness results for prefix iteration can be retrieved from those for flat iteration, thus obtaining a second indirect approach for proving completeness for delay and weak congruence in the setting of prefix iteration.
[ { "version": "v1", "created": "Wed, 7 Oct 1998 22:39:16 GMT" } ]
2007-05-23T00:00:00
[ [ "van Glabbeek", "R. J.", "", "Stanford" ] ]
cs/9810009
Maurizio Pizzonia
Maurizio Pizzonia, Giuseppe Di Battista
Object-Oriented Design of Graph Oriented Data Structures
10 pages, 9 figures, code examples, ALENEX (accepted)
null
null
null
cs.SE cs.CG cs.DS
null
Applied research in graph algorithms and combinatorial structures needs comprehensive and versatile software libraries. However, the design and the implementation of flexible libraries are challenging activities. Among the other problems involved in such a difficult field, a very special role is played by graph classification issues. We propose new techniques devised to help the designer and the programmer in the development activities. Such techniques are especially suited for dealing with graph classification problems and rely on an extension of the usual object-oriented paradigm. In order to support the usage of our approach, we devised an extension of the C++ programming language and implemented the corresponding pre-compiler.
[ { "version": "v1", "created": "Thu, 8 Oct 1998 23:54:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Pizzonia", "Maurizio", "" ], [ "Di Battista", "Giuseppe", "" ] ]
cs/9810010
Todd Veldhuizen
Todd L. Veldhuizen
C++ Templates as Partial Evaluation
13 pages
null
null
IUCS 519
cs.PL cs.PF
null
This paper explores the relationship between C++ templates and partial evaluation. Templates were designed to support generic programming, but unintentionally provided the ability to perform compile-time computations and code generation. These features are completely accidental, and as a result their syntax is awkward. By recasting these features in terms of partial evaluation, a much simpler syntax can be achieved. C++ may be regarded as a two-level language in which types are first-class values. Template instantiation resembles an offline partial evaluator. This paper describes preliminary work toward a single mechanism based on Partial Evaluation which unifies generic programming, compile-time computation and code generation. The language Catat is introduced to illustrate these ideas.
[ { "version": "v1", "created": "Fri, 9 Oct 1998 20:29:43 GMT" }, { "version": "v2", "created": "Mon, 2 Nov 1998 21:39:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Veldhuizen", "Todd L.", "" ] ]
cs/9810014
Min-Yen Kan
Judith L. Klavans (Columbia University), Kathleen R. McKeown (Columbia University), Min-Yen Kan (Columbia University) and Susan Lee (University of California at Berkeley)
Resources for Evaluation of Summarization Techniques
LaTeX source, 5 pages, US Letter, uses lrec98.sty
in Proc. of First International Conference on Language Resources and Evaluation, Rubio, Gallardo, Castro, and Tejada (eds.), Granada, Spain, 1998
null
null
cs.CL
null
We report on two corpora to be used in the evaluation of component systems for the tasks of (1) linear segmentation of text and (2) summary-directed sentence extraction. We present characteristics of the corpora, methods used in the collection of user judgments, and an overview of the application of the corpora to evaluating the component system. Finally, we discuss the problems and issues with construction of the test set which apply broadly to the construction of evaluation resources for language technologies.
[ { "version": "v1", "created": "Tue, 13 Oct 1998 20:33:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Klavans", "Judith L.", "", "Columbia University" ], [ "McKeown", "Kathleen R.", "", "Columbia\n University" ], [ "Kan", "Min-Yen", "", "Columbia University" ], [ "Lee", "Susan", "", "University of\n California at Berkeley" ] ]
cs/9810015
William Schuler
Giorgio Satta (Universita di Padova) and William Schuler (University of Pennsylvania)
Restrictions on Tree Adjoining Languages
7 pages LaTeX + 5 eps figures
Proceedings of COLING-ACL'98
null
null
cs.CL
null
Several methods are known for parsing languages generated by Tree Adjoining Grammars (TAGs) in O(n^6) worst case running time. In this paper we investigate which restrictions on TAGs and TAG derivations are needed in order to lower this O(n^6) time complexity, without introducing large runtime constants, and without losing any of the generative power needed to capture the syntactic constructions in natural language that can be handled by unrestricted TAGs. In particular, we describe an algorithm for parsing a strict subclass of TAG in O(n^5), and attempt to show that this subclass retains enough generative power to make it useful in the general case.
[ { "version": "v1", "created": "Tue, 13 Oct 1998 21:17:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Satta", "Giorgio", "", "Universita di Padova" ], [ "Schuler", "William", "", "University\n of Pennsylvania" ] ]
cs/9810016
Ion Muslea
Ion Muslea
SYNERGY: A Linear Planner Based on Genetic Programming
13 pages, European Conference on Planning 1997
"Recent Advances in AI Planning" (Sam Steel & Rachid Alami eds.), p. 312-325, Springer 1997 (LNAI 1348)
null
null
cs.AI
null
In this paper we describe SYNERGY, which is a highly parallelizable, linear planning system that is based on the genetic programming paradigm. Rather than reasoning about the world it is planning for, SYNERGY uses artificial selection, recombination and fitness measure to generate linear plans that solve conjunctive goals. We ran SYNERGY on several domains (e.g., the briefcase problem and a few variants of the robot navigation problem), and the experimental results show that our planner is capable of handling problem instances that are one to two orders of magnitude larger than the ones solved by UCPOP. In order to facilitate the search reduction and to enhance the expressive power of SYNERGY, we also propose two major extensions to our planning system: a formalism for using hierarchical planning operators, and a framework for planning in dynamic environments.
[ { "version": "v1", "created": "Fri, 16 Oct 1998 22:11:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Muslea", "Ion", "" ] ]
cs/9810017
Valerie Nowak
Stephen L. Adler
General Theory of Image Normalization
33 pages, plain tex, no figures
null
null
IASSNS-HEP-95/89
cs.CV
null
We give a systematic, abstract formulation of the image normalization method as applied to a general group of image transformations, and then illustrate the abstract analysis by applying it to the hierarchy of viewing transformations of a planar object.
[ { "version": "v1", "created": "Mon, 19 Oct 1998 20:46:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Adler", "Stephen L.", "" ] ]
cs/9810018
Krzysztof R. Apt
Krzysztof R. Apt
A Proof Theoretic View of Constraint Programming
25 pages
Fundamenta Informaticae 34(1998), pp. 295-321
null
null
cs.AI cs.PL
null
We provide here a proof theoretic account of constraint programming that attempts to capture the essential ingredients of this programming style. We exemplify it by presenting proof rules for linear constraints over interval domains, and illustrate their use by analyzing the constraint propagation process for the {\tt SEND + MORE = MONEY} puzzle. We also show how this approach allows one to build new constraint solvers.
[ { "version": "v1", "created": "Tue, 20 Oct 1998 11:23:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Apt", "Krzysztof R.", "" ] ]
cs/9810019
Guruduth Banavar
Robert Strom, Guruduth Banavar, Tushar Chandra, Marc Kaplan, Kevan Miller, Bodhi Mukherjee, Daniel Sturman, and Michael Ward
Gryphon: An Information Flow Based Approach to Message Brokering
Two page extended abstract
null
null
null
cs.DC
null
Gryphon is a distributed computing paradigm for message brokering, which is the transferring of information in the form of streams of events from information providers to information consumers. This extended abstract outlines the major problems in message brokering and Gryphon's approach to solving them.
[ { "version": "v1", "created": "Wed, 21 Oct 1998 18:43:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Strom", "Robert", "" ], [ "Banavar", "Guruduth", "" ], [ "Chandra", "Tushar", "" ], [ "Kaplan", "Marc", "" ], [ "Miller", "Kevan", "" ], [ "Mukherjee", "Bodhi", "" ], [ "Sturman", "Daniel", "" ], [ "Ward", "Michael", "" ] ]
cs/9810020
Joseph O'Rourke
Joseph O'Rourke
Computational Geometry Column 33
null
Internat. J. Comput. Geom. Appl., 8(3) 381-384, 1998. Also in SIGACT News, 29(2) (Issue 107) 14-16, 1998
null
null
cs.CG cs.AI cs.GR
null
Several recent SIGGRAPH papers on surface simplification are described.
[ { "version": "v1", "created": "Thu, 22 Oct 1998 20:44:35 GMT" } ]
2007-05-23T00:00:00
[ [ "O'Rourke", "Joseph", "" ] ]
cs/9810021
Joseph O'Rourke
Joseph O'Rourke
Computational Geometry Column 32
null
Internat. J. Comput. Geom. Appl.,7(5) 509-513, 1997. Also in SIGACT News, 29(2) (Issue 107) 14-16, 1998
null
null
cs.CG cs.GR
null
The proof of Dey's new k-set bound is illustrated.
[ { "version": "v1", "created": "Thu, 22 Oct 1998 21:01:36 GMT" } ]
2007-05-23T00:00:00
[ [ "O'Rourke", "Joseph", "" ] ]
cs/9810022
James K. Huggins
James K. Huggins
Broy-Lamport Specification Problem: A Gurevich Abstract State Machine Solution
null
null
null
University of Michigan EECS Department Technical Report CSE-TR-320-96
cs.SE
null
We apply the Gurevich Abstract State Machine methodology to a benchmark specification problem of Broy and Lamport.
[ { "version": "v1", "created": "Mon, 26 Oct 1998 16:52:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Huggins", "James K.", "" ] ]
cs/9810023
James K. Huggins
Yuri Gurevich and James K. Huggins
Equivalence is in the Eye of the Beholder
See also the ASM web site at http://www.eecs.umich.edu/gasm/
Theoretical Computer Science (179) 1-2 (1997), 353-380
null
null
cs.SE
null
In a recent provocative paper, Lamport points out "the insubstantiality of processes" by proving the equivalence of two different decompositions of the same intuitive algorithm by means of temporal formulas. We point out that the correct equivalence of algorithms is itself in the eye of the beholder. We discuss a number of related issues and, in particular, whether algorithms can be proved equivalent directly.
[ { "version": "v1", "created": "Mon, 26 Oct 1998 18:46:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Gurevich", "Yuri", "" ], [ "Huggins", "James K.", "" ] ]
cs/9810024
James K. Huggins
Yuri Gurevich and James K. Huggins
Evolving Algebras and Partial Evaluation
See also the web site at http://www.eecs.umich.edu/gasm/
In IFIP 13th World Computer Congress 1994, Volume I: Technology and Foundations, eds. B. Pehrson and I. Simon, North-Holland, Amsterdam, 587-592
null
null
cs.SE
null
We describe an automated partial evaluator for evolving algebras implemented at the University of Michigan.
[ { "version": "v1", "created": "Mon, 26 Oct 1998 19:13:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Gurevich", "Yuri", "" ], [ "Huggins", "James K.", "" ] ]
cs/9810026
James K. Huggins
Yuri Gurevich and James K. Huggins
The Railroad Crossing Problem: An Experiment with Instantaneous Actions and Immediate Reactions
See also the web site at http://www.eecs.umich.edu/gasm/
Selected papers from CSL'95, ed. H.K. Buening, Springer Lecture Notes in Computer Science 1092, 1996, 266--290
null
null
cs.SE
null
We give an evolving algebra solution for the well-known railroad crossing problem and use the occasion to experiment with agents that perform instantaneous actions in continuous time and in particular with agents that fire at the moment they are enabled.
[ { "version": "v1", "created": "Mon, 26 Oct 1998 19:24:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Gurevich", "Yuri", "" ], [ "Huggins", "James K.", "" ] ]
cs/9810027
Graham Kirby
G. N. C. Kirby, R. Morrison, D. W. Stemple
Linguistic Reflection in Java
25 pages. Source code for examples at http://www-ppg.dcs.st-and.ac.uk/Java/ReflectionExample/ Dynamic compilation package at http://www-ppg.dcs.st-and.ac.uk/Java/DynamicCompilation/
Software - Practice & Experience 28, 10 (1998) pp 1045-1077
null
null
cs.PL
null
Reflective systems allow their own structures to be altered from within. Here we are concerned with a style of reflection, called linguistic reflection, which is the ability of a running program to generate new program fragments and to integrate these into its own execution. In particular we describe how this kind of reflection may be provided in the compiler-based, strongly typed object-oriented programming language Java. The advantages of the programming technique include attaining high levels of genericity and accommodating system evolution. These advantages are illustrated by an example taken from persistent programming which shows how linguistic reflection allows functionality (program code) to be generated on demand (Just-In-Time) from a generic specification and integrated into the evolving running program. The technique is evaluated against alternative implementation approaches with respect to efficiency, safety and ease of use.
[ { "version": "v1", "created": "Thu, 29 Oct 1998 14:30:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Kirby", "G. N. C.", "" ], [ "Morrison", "R.", "" ], [ "Stemple", "D. W.", "" ] ]
cs/9811001
Lunjin Lu
Lunjin Lu (University of Waikato)
A Polymorphic Groundness Analysis of Logic Programs
30 pages
null
null
null
cs.PL
null
A polymorphic analysis is an analysis whose input and output contain parameters which serve as placeholders for information that is unknown before analysis but provided after analysis. In this paper, we present a polymorphic groundness analysis that infers parameterised groundness descriptions of the variables of interest at a program point. The polymorphic groundness analysis is designed by replacing two primitive operators used in a monomorphic groundness analysis and is shown to be as precise as the monomorphic groundness analysis for any possible values for mode parameters. Experimental results of a prototype implementation of the polymorphic groundness analysis are given.
[ { "version": "v1", "created": "Sat, 31 Oct 1998 07:20:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Lu", "Lunjin", "", "University of Waikato" ] ]
cs/9811002
Serguei P. Tsarev
Serguei P. Tsarev
Factorization of linear partial differential operators and Darboux integrability of nonlinear PDEs
LaTeX 2.09, acmconf.sty (included in the tar file), 8 pages. Presented at the Poster session of ISSAC'98 (Rostock, Germany)
null
null
null
cs.SC nlin.SI solv-int
null
Using a new definition of generalized divisors we prove that the lattice of such divisors for a given linear partial differential operator is modular and obtain analogues of the well-known theorems of the Loewy-Ore theory of factorization of linear ordinary differential operators. Possible applications to factorized Groebner bases computations in the commutative and non-commutative cases are discussed, an application to finding criterions of Darboux integrability of nonlinear PDEs is given.
[ { "version": "v1", "created": "Sat, 31 Oct 1998 09:09:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Tsarev", "Serguei P.", "" ] ]
cs/9811003
Andy Golding
Andrew R. Golding and Dan Roth
A Winnow-Based Approach to Context-Sensitive Spelling Correction
To appear in Machine Learning, Special Issue on Natural Language Learning, 1999. 25 pages
null
null
null
cs.LG cs.CL
null
A large class of machine-learning problems in natural language require the characterization of linguistic context. Two characteristic properties of such problems are that their feature space is of very high dimensionality, and their target concepts refer to only a small subset of the features in the space. Under such conditions, multiplicative weight-update algorithms such as Winnow have been shown to have exceptionally good theoretical properties. We present an algorithm combining variants of Winnow and weighted-majority voting, and apply it to a problem in the aforementioned class: context-sensitive spelling correction. This is the task of fixing spelling errors that happen to result in valid words, such as substituting "to" for "too", "casual" for "causal", etc. We evaluate our algorithm, WinSpell, by comparing it against BaySpell, a statistics-based method representing the state of the art for this task. We find: (1) When run with a full (unpruned) set of features, WinSpell achieves accuracies significantly higher than BaySpell was able to achieve in either the pruned or unpruned condition; (2) When compared with other systems in the literature, WinSpell exhibits the highest performance; (3) The primary reason that WinSpell outperforms BaySpell is that WinSpell learns a better linear separator; (4) When run on a test set drawn from a different corpus than the training set was drawn from, WinSpell is better able than BaySpell to adapt, using a strategy we will present that combines supervised learning on the training set with unsupervised learning on the (noisy) test set.
[ { "version": "v1", "created": "Sat, 31 Oct 1998 19:33:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Golding", "Andrew R.", "" ], [ "Roth", "Dan", "" ] ]
cs/9811004
Mark D. Roberts
Mark D. Roberts
Does Meaning Evolve?
title changed, completely rewritten, new version 37 pages previous version 28 pages, to appear in Behaviour and Philosophy
null
null
null
cs.CL q-bio.PE
null
A common method of making a theory more understandable, is by comparing it to another theory which has been better developed. Radical interpretation is a theory which attempts to explain how communication has meaning. Radical interpretation is treated as another time-dependent theory and compared to the time dependent theory of biological evolution. The main reason for doing this is to find the nature of the time dependence; producing analogs between the two theories is a necessary prerequisite to this and brings up many problems. Once the nature of the time dependence is better known it might allow the underlying mechanism to be uncovered. Several similarities and differences are uncovered, there appear to be more differences than similarities.
[ { "version": "v1", "created": "Sun, 1 Nov 1998 11:18:22 GMT" }, { "version": "v2", "created": "Thu, 24 Dec 1998 13:22:43 GMT" }, { "version": "v3", "created": "Sun, 16 Jan 2000 17:29:43 GMT" }, { "version": "v4", "created": "Sat, 14 Aug 2004 15:35:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Roberts", "Mark D.", "" ] ]
cs/9811005
Lane A. Hemaspaandra
Lane A. Hemaspaandra and Alan L. Selman
Writing and Editing Complexity Theory: Tales and Tools
11 pages. Will appear in the SIGACT News Complexity Theory Column
null
null
null
cs.GL cs.CC
null
Each researcher should have a full shelf---physical or virtual---of books on writing and editing prose. Though we make no claim to any special degree of expertise, we recently edited a book of complexity theory surveys (Complexity Theory Retrospective II, Springer-Verlag, 1997), and in doing so we were brought into particularly close contact with the subject of this article, and with a number of the excellent resources available to writers and editors. In this article, we list some of these resources, and we also relate some of the adventures we had as our book moved from concept to reality.
[ { "version": "v1", "created": "Sun, 1 Nov 1998 17:44:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Hemaspaandra", "Lane A.", "" ], [ "Selman", "Alan L.", "" ] ]
cs/9811006
Eric Bloedorn
Inderjeet Mani and Eric Bloedorn
Machine Learning of Generic and User-Focused Summarization
In Proceedings of the Fifteenth National Conference on AI (AAAI-98), p. 821-826
null
null
null
cs.CL cs.LG
null
A key problem in text summarization is finding a salience function which determines what information in the source should be included in the summary. This paper describes the use of machine learning on a training corpus of documents and their abstracts to discover salience functions which describe what combination of features is optimal for a given summarization task. The method addresses both "generic" and user-focused summaries.
[ { "version": "v1", "created": "Mon, 2 Nov 1998 18:57:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Mani", "Inderjeet", "" ], [ "Bloedorn", "Eric", "" ] ]
cs/9811007
Barbara White
L. Bass, G. Chastek, P. Clements, L. Northrop, D. Smith, J. Withey
Second Product Line Practice Workshop Report
null
null
null
CMU/SEI-98-TR-015
cs.SE
null
The second Software Engineering Institute Product Line Practice Workshop was a hands-on meeting held in November 1997 to share industry practices in software product lines and to explore the technical and non-technical issues involved. This report synthesizes the workshop presentations and discussions, which identified factors involved in product line practices and analyzed issues in the areas of software engineering, technical management, and enterprise management.
[ { "version": "v1", "created": "Mon, 2 Nov 1998 19:34:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Bass", "L.", "" ], [ "Chastek", "G.", "" ], [ "Clements", "P.", "" ], [ "Northrop", "L.", "" ], [ "Smith", "D.", "" ], [ "Withey", "J.", "" ] ]
cs/9811008
Philip Edmonds
Philip Edmonds (University of Toronto)
Translating near-synonyms: Possibilities and preferences in the interlingua
8 pages, LaTeX2e, 1 eps figure, uses colacl.sty, epsfig.sty, avm.sty, times.sty
Proceedings of the AMTA/SIG-IL Second Workshop on Interlinguas, October 1998
null
null
cs.CL
null
This paper argues that an interlingual representation must explicitly represent some parts of the meaning of a situation as possibilities (or preferences), not as necessary or definite components of meaning (or constraints). Possibilities enable the analysis and generation of nuance, something required for faithful translation. Furthermore, the representation of the meaning of words, especially of near-synonyms, is crucial, because it specifies which nuances words can convey in which contexts.
[ { "version": "v1", "created": "Mon, 2 Nov 1998 21:29:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Edmonds", "Philip", "", "University of Toronto" ] ]
cs/9811009
Philip Edmonds
Philip Edmonds (University of Toronto)
Choosing the Word Most Typical in Context Using a Lexical Co-occurrence Network
3 pages, LaTeX2e, 1 ps figure, uses mathptm.sty, colacl.sty, psfig.sty
Proceedings of ACL-EACL '97, student session
null
null
cs.CL
null
This paper presents a partial solution to a component of the problem of lexical choice: choosing the synonym most typical, or expected, in context. We apply a new statistical approach to representing the context of a word through lexical co-occurrence networks. The implementation was trained and evaluated on a large corpus, and results show that the inclusion of second-order co-occurrence relations improves the performance of our implemented lexical choice program.
[ { "version": "v1", "created": "Mon, 2 Nov 1998 23:06:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Edmonds", "Philip", "", "University of Toronto" ] ]
cs/9811010
Dan Roth
Dan Roth
Learning to Resolve Natural Language Ambiguities: A Unified Approach
null
Proceedings of of AAAI'98 pp. 806--813
null
null
cs.CL cs.LG
null
We analyze a few of the commonly used statistics based and machine learning algorithms for natural language disambiguation tasks and observe that they can be re-cast as learning linear separators in the feature space. Each of the methods makes a priori assumptions, which it employs, given the data, when searching for its hypothesis. Nevertheless, as we show, it searches a space that is as rich as the space of all linear separators. We use this to build an argument for a data driven approach which merely searches for a good linear separator in the feature space, without further assumptions on the domain or a specific problem. We present such an approach - a sparse network of linear separators, utilizing the Winnow learning algorithm - and show how to use it in a variety of ambiguity resolution problems. The learning approach presented is attribute-efficient and, therefore, appropriate for domains having very large number of attributes. In particular, we present an extensive experimental comparison of our approach with other methods on several well studied lexical disambiguation tasks such as context-sensitive spelling correction, prepositional phrase attachment and part of speech tagging. In all cases we show that our approach either outperforms other methods tried for these tasks or performs comparably to the best.
[ { "version": "v1", "created": "Tue, 3 Nov 1998 21:14:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Roth", "Dan", "" ] ]
cs/9811011
Barbara White
Robert Ellison, Rick Linger, Thomas Longstaff, Nancy Mead
Case Study in Survivable Network System Analysis
null
null
null
CMU/SEI-98-TR-014
cs.SE
null
This paper presents a method for analyzing the survivability of distributed network systems and an example of its application.
[ { "version": "v1", "created": "Wed, 4 Nov 1998 14:32:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Ellison", "Robert", "" ], [ "Linger", "Rick", "" ], [ "Longstaff", "Thomas", "" ], [ "Mead", "Nancy", "" ] ]
cs/9811013
Jim Gray
Phil Bernstein, Michael Brodie, Stefano Ceri, David DeWitt, Mike Franklin, Hector Garcia-Molina, Jim Gray, Jerry Held, Joe Hellerstein, H. V. Jagadish, Michael Lesk, Dave Maier, Jeff Naughton, Hamid Pirahesh, Mike Stonebraker, Jeff Ullman
The Asilomar Report on Database Research
20 pages in HTML; an original in MSword at http://research.microsoft.com/~gray/Asilomar_DB_98.doc
ACM SIGMOD Record, December 1998
null
MSR TR 98 57
cs.DB cs.DL
null
The database research community is rightly proud of success in basic research, and its remarkable record of technology transfer. Now the field needs to radically broaden its research focus to attack the issues of capturing, storing, analyzing, and presenting the vast array of online data. The database research community should embrace a broader research agenda -- broadening the definition of database management to embrace all the content of the Web and other online data stores, and rethinking our fundamental assumptions in light of technology shifts. To accelerate this transition, we recommend changing the way research results are evaluated and presented. In particular, we advocate encouraging more speculative and long-range work, moving conferences to a poster format, and publishing all research literature on the Web.
[ { "version": "v1", "created": "Mon, 9 Nov 1998 05:09:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Bernstein", "Phil", "" ], [ "Brodie", "Michael", "" ], [ "Ceri", "Stefano", "" ], [ "DeWitt", "David", "" ], [ "Franklin", "Mike", "" ], [ "Garcia-Molina", "Hector", "" ], [ "Gray", "Jim", "" ], [ "Held", "Jerry", "" ], [ "Hellerstein", "Joe", "" ], [ "Jagadish", "H. V.", "" ], [ "Lesk", "Michael", "" ], [ "Maier", "Dave", "" ], [ "Naughton", "Jeff", "" ], [ "Pirahesh", "Hamid", "" ], [ "Stonebraker", "Mike", "" ], [ "Ullman", "Jeff", "" ] ]
cs/9811014
James K. Huggins
Egon Boerger and James K. Huggins
Abstract State Machines 1988-1998: Commented ASM Bibliography
Also maintained as a BibTeX file at http://www.eecs.umich.edu/gasm/
Formal Specification Column (H. Ehrig, ed.), EATCS Bulletin 64, February 1998, 105--127
null
null
cs.SE
null
An annotated bibliography of papers which deal with or use Abstract State Machines (ASMs), as of January 1998.
[ { "version": "v1", "created": "Mon, 9 Nov 1998 19:32:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Boerger", "Egon", "" ], [ "Huggins", "James K.", "" ] ]
cs/9811015
Lunjin Lu
Lunjin Lu and John G. Cleary (University of Waikato)
An Emptiness Algorithm for Regular Types with Set Operators
22 pages
null
null
null
cs.LO cs.PL
null
An algorithm to decide the emptiness of a regular type expression with set operators given a set of parameterised type definitions is presented. The algorithm can also be used to decide the equivalence of two regular type expressions and the inclusion of one regular type expression in another. The algorithm strictly generalises previous work in that tuple distributivity is not assumed and set operators are permitted in type expressions.
[ { "version": "v1", "created": "Wed, 11 Nov 1998 04:50:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Lu", "Lunjin", "", "University of Waikato" ], [ "Cleary", "John G.", "", "University of Waikato" ] ]
cs/9811016
Martin Volk
Martin Volk and Gerold Schneider (University of Zurich)
Comparing a statistical and a rule-based tagger for German
8 pages
null
null
null
cs.CL
null
In this paper we present the results of comparing a statistical tagger for German based on decision trees and a rule-based Brill-Tagger for German. We used the same training corpus (and therefore the same tag-set) to train both taggers. We then applied the taggers to the same test corpus and compared their respective behavior and in particular their error rates. Both taggers perform similarly with an error rate of around 5%. From the detailed error analysis it can be seen that the rule-based tagger has more problems with unknown words than the statistical tagger. But the results are opposite for tokens that are many-ways ambiguous. If the unknown words are fed into the taggers with the help of an external lexicon (such as the Gertwol system) the error rate of the rule-based tagger drops to 4.7%, and the respective rate of the statistical taggers drops to around 3.7%. Combining the taggers by using the output of one tagger to help the other did not lead to any further improvement.
[ { "version": "v1", "created": "Wed, 11 Nov 1998 11:06:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Volk", "Martin", "", "University of Zurich" ], [ "Schneider", "Gerold", "", "University of Zurich" ] ]
cs/9811017
Marc Bezem
Krzysztof R. Apt and Marc Bezem
Formulas as Programs
34 pages, appears in: The Logic Programming Paradigm: a 25 Years Perspective, K.R. Apt, V. Marek, M. Truszczynski and D.S. Warren (eds), Springer-Verlag, Artificial Intelligence Series
null
null
null
cs.LO cs.SC
null
We provide here a computational interpretation of first-order logic based on a constructive interpretation of satisfiability w.r.t. a fixed but arbitrary interpretation. In this approach the formulas themselves are programs. This contrasts with the so-called formulas as types approach in which the proofs of the formulas are typed terms that can be taken as programs. This view of computing is inspired by logic programming and constraint logic programming but differs from them in a number of crucial aspects. Formulas as programs is argued to yield a realistic approach to programming that has been realized in the implemented programming language ALMA-0 (Apt et al.) that combines the advantages of imperative and logic programming. The work here reported can also be used to reason about the correctness of non-recursive ALMA-0 programs that do not include destructive assignment.
[ { "version": "v1", "created": "Wed, 11 Nov 1998 14:05:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Apt", "Krzysztof R.", "" ], [ "Bezem", "Marc", "" ] ]
cs/9811018
Mark D. Roberts
Mark D. Roberts
P-model Alternative to the T-model
28 pages, 73262 bytes, six eps diagrams, 53 references, background to this work is described: http://cosmology.mth.uct.ac.za/~roberts/pastresearch/pmodel.html
null
null
null
cs.CL q-bio.NC
null
Standard linguistic analysis of syntax uses the T-model. This model requires the ordering: D-structure $>$ S-structure $>$ LF. Between each of these representations there is movement which alters the order of the constituent words; movement is achieved using the principles and parameters of syntactic theory. Psychological serial models do not accommodate the T-model immediately so that here a new model called the P-model is introduced. Here it is argued that the LF representation should be replaced by a variant of Frege's three qualities. In the F-representation the order of elements is not necessarily the same as that in LF and it is suggested that the correct ordering is: F-representation $>$ D-structure $>$ S-structure. Within this framework movement originates as the outcome of emphasis applied to the sentence.
[ { "version": "v1", "created": "Wed, 11 Nov 1998 14:17:09 GMT" }, { "version": "v2", "created": "Sun, 13 Aug 2000 12:52:13 GMT" }, { "version": "v3", "created": "Sun, 8 Jul 2001 18:51:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Roberts", "Mark D.", "" ] ]
cs/9811019
Joseph O'Rourke
T. Biedl, E. Demaine, M. Demaine, S. Lazard, A. Lubiw, J. O'Rourke, M. Overmars, S. Robbins, I. Streinu, G. Toussaint, S. Whitesides
Locked and Unlocked Polygonal Chains in 3D
To appear in Proc. 10th ACM-SIAM Sympos. Discrete Algorithms, Jan. 1999
Proc. 10th ACM-SIAM Sympos. Discrete Algorithms, Jan. 1999, pp. S866-7.
null
null
cs.CG cs.DS cs.RO
null
In this paper, we study movements of simple polygonal chains in 3D. We say that an open, simple polygonal chain can be straightened if it can be continuously reconfigured to a straight sequence of segments in such a manner that both the length of each link and the simplicity of the chain are maintained throughout the movement. The analogous concept for closed chains is convexification: reconfiguration to a planar convex polygon. Chains that cannot be straightened or convexified are called locked. While there are open chains in 3D that are locked, we show that if an open chain has a simple orthogonal projection onto some plane, it can be straightened. For closed chains, we show that there are unknotted but locked closed chains, and we provide an algorithm for convexifying a planar simple polygon in 3D with a polynomial number of moves.
[ { "version": "v1", "created": "Wed, 11 Nov 1998 20:36:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Biedl", "T.", "" ], [ "Demaine", "E.", "" ], [ "Demaine", "M.", "" ], [ "Lazard", "S.", "" ], [ "Lubiw", "A.", "" ], [ "O'Rourke", "J.", "" ], [ "Overmars", "M.", "" ], [ "Robbins", "S.", "" ], [ "Streinu", "I.", "" ], [ "Toussaint", "G.", "" ], [ "Whitesides", "S.", "" ] ]
cs/9811021
Bernardo Kastrup
Bernardo Kastrup
Automatic Hardware Synthesis for a Hybrid Reconfigurable CPU Featuring Philips CPLDs
6 pages, 7 figures, PACT '98 Workshop on Reconfigurable Computing
null
null
null
cs.PL cs.AR
null
A high-level architecture of a Hybrid Reconfigurable CPU, based on a Philips-supported core processor, is introduced. It features the Philips XPLA2 CPLD as a reconfigurable functional unit. A compilation chain is presented, in which automatic implementation of time-critical program segments in custom hardware is performed. The entire process is transparent from the programmer's point of view. The hardware synthesis module of the chain, which translates segments of assembly code into a hardware netlist, is discussed in details. Application examples are also presented.
[ { "version": "v1", "created": "Thu, 12 Nov 1998 09:49:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Kastrup", "Bernardo", "" ] ]
cs/9811022
Ciprian Chelba
Ciprian Chelba, Frederick Jelinek (CLSP The Johns Hopkins University)
Expoiting Syntactic Structure for Language Modeling
changed ACM-class membership and buggy author names
Proceedings of ACL'98, Montreal, Canada
null
null
cs.CL
null
The paper presents a language model that develops syntactic structure and uses it to extract meaningful information from the word history, thus enabling the use of long distance dependencies. The model assigns probability to every joint sequence of words--binary-parse-structure with headword annotation and operates in a left-to-right manner --- therefore usable for automatic speech recognition. The model, its probabilistic parameterization, and a set of experiments meant to evaluate its predictive power are presented; an improvement over standard trigram modeling is achieved.
[ { "version": "v1", "created": "Thu, 12 Nov 1998 17:31:17 GMT" }, { "version": "v2", "created": "Tue, 25 Jan 2000 15:37:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Chelba", "Ciprian", "", "CLSP The Johns Hopkins University" ], [ "Jelinek", "Frederick", "", "CLSP The Johns Hopkins University" ] ]
cs/9811023
John D. Rogers
Lance Fortnow and John D. Rogers
Complexity limitations on quantum computation
13 pages, no figures; presented at the 13th annual Conference on Computational Complexity (1998); submitted to the Journal of Computer and System Sciences
null
null
CTI-TR-97003
cs.CC quant-ph
null
We use the powerful tools of counting complexity and generic oracles to help understand the limitations of the complexity of quantum computation. We show several results for the probabilistic quantum class BQP. 1. BQP is low for PP, i.e., PP^BQP=PP. 2. There exists a relativized world where P=BQP and the polynomial-time hierarchy is infinite. 3. There exists a relativized world where BQP does not have complete sets. 4. There exists a relativized world where P=BQP but P is not equal to UP intersect coUP and one-way functions exist. This gives a relativized answer to an open question of Simon.
[ { "version": "v1", "created": "Thu, 12 Nov 1998 17:55:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Fortnow", "Lance", "" ], [ "Rogers", "John D.", "" ] ]
cs/9811024
Krzysztof R. Apt
Krzysztof R. Apt
The Essence of Constraint Propagation
To appear in Theoretical Computer Science in the special issue devoted to the 24th ICALP conference (Bologna 1997)
null
null
null
cs.AI
null
We show that several constraint propagation algorithms (also called (local) consistency, consistency enforcing, Waltz, filtering or narrowing algorithms) are instances of algorithms that deal with chaotic iteration. To this end we propose a simple abstract framework that allows us to classify and compare these algorithms and to establish in a uniform way their basic properties.
[ { "version": "v1", "created": "Fri, 13 Nov 1998 13:04:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Apt", "Krzysztof R.", "" ] ]
cs/9811025
Ciprian Chelba
Ciprian Chelba (CLSP, The Johns Hopkins University, USA)
A Structured Language Model
changed ACM-class membership, Proceedings of ACL-EACL'97, Student Section, Madrid, Spain
null
null
null
cs.CL
null
The paper presents a language model that develops syntactic structure and uses it to extract meaningful information from the word history, thus enabling the use of long distance dependencies. The model assigns probability to every joint sequence of words - binary-parse-structure with headword annotation. The model, its probabilistic parametrization, and a set of experiments meant to evaluate its predictive power are presented.
[ { "version": "v1", "created": "Fri, 13 Nov 1998 16:53:15 GMT" }, { "version": "v2", "created": "Tue, 25 Jan 2000 15:46:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Chelba", "Ciprian", "", "CLSP, The Johns Hopkins University, USA" ] ]
cs/9811026
Paul Muter
Tarjin Rahman and Paul Muter
Designing an interface to optimize reading with small display windows
null
Human Factors 41 (1999) 106-117
null
null
cs.HC
null
The electronic presentation of text in small display windows is mushrooming. In the present paper, four ways of presenting text in a small display window were examined and compared to a Normal Page condition: rapid serial visual presentation (RSVP), RSVP with a Completion Meter, Sentence-by-Sentence presentation, and Sentence-by-Sentence presentation with a Completion Meter. Dependent measures were reading efficiency - speed and comprehension - and preference. For designers of hardware or software with small display windows, the results suggest the following: (1) Though RSVP is disliked by readers, the present methods of allowing self-pacing and regressions in RSVP, unlike earlier tested methods, are efficient and feasible. (2) Slower reading in RSVP should be achieved by increasing pauses between sentences or by repeating sentences, not by decreasing the within-sentence rate. (3) Completion meters do not interfere with performance, and are usually preferred. (4) The space-saving Sentence-by-Sentence format is as efficient and as preferred as the Normal Page format.
[ { "version": "v1", "created": "Mon, 16 Nov 1998 19:42:30 GMT" }, { "version": "v2", "created": "Wed, 8 Sep 1999 15:36:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Rahman", "Tarjin", "" ], [ "Muter", "Paul", "" ] ]
cs/9811027
J. P. Martin-Flatin
J.P. Martin-Flatin
Push vs. Pull in Web-Based Network Management
21 pages, submitted to IM'99, http://tcomwww.epfl.ch/~jpmf/papers/tr_1998_022.pdf
null
null
SSC/1998/022
cs.NI
null
In this paper, we show how Web technologies can be used effectively to (i) address some of the deficiencies of traditional IP network management platforms, and (ii) render these expensive platforms redundant. We build on the concept of embedded management application, proposed by Wellens and Auerbach, and present two models of network management application designs that rely on Web technologies. First, the pull model is based on the request/response paradigm. It is typically used to perform data polling. Several commercial management platforms already use Web technologies that rely on this model to provide for ad hoc management; we demonstrate how to extend this to regular management. Second, the push model is a novel approach which relies on the publish/subscribe/distribute paradigm. It is better suited to regular management than the pull model, and allows administrators to conserve network bandwidth as well as CPU time on the management station. It can be seen as a generalization of the paradigm commonly used for notification delivery. Finally, we introduce the concept of the collapsed network management platform, where these two models coexist.
[ { "version": "v1", "created": "Fri, 20 Nov 1998 14:33:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Martin-Flatin", "J. P.", "" ] ]
cs/9811028
Shie-Yuan Wang
H.T. Kung and S.Y. Wang
TCP Trunking
postscript file
null
null
null
cs.NI
null
A TCP trunk is an IP tunnel under TCP control, capable of carrying packets from any number of user flows. By exploiting properties of TCP, a TCP trunk provides elastic and reliable transmission over a network, and automatically shares the network fairly with other competing trunks. Moreover, by aggregating user flows into a single trunk flow, TCP trunking can significantly reduce the number of flows that the network needs to manage, thereby allowing use of simplified management to achieve improved perfor mance. For example, when dealing with only a small number of TCP trunk flows, a router with a simple FIFO buffer can experience low packet loss rates. A TCP trunk is a "soft" circuit in the sense that it requires no flow states to be maintained inside the network. Setting up a TCP trunk involves only configuring the two end nodes. This is in contrast with traditional methods of configuring circuits via signaling of network nodes. A simple packet-dropping mechanism based on packet accounting at the transmitter of a TCP trunk assures that, when the trunk reduces its bandwidth in response to network congestion, user TCP flows carried by the trunk will reduce their bandwidths by the same proportion. Simu lation results have demonstrated that TCP trunks can provide improved network performance to users, while achieving high network utilization.
[ { "version": "v1", "created": "Fri, 20 Nov 1998 20:55:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Kung", "H. T.", "" ], [ "Wang", "S. Y.", "" ] ]
cs/9811029
Igor Ivanisevic
I. Ivanisevic and V. Lumelsky
A Human - machine interface for teleoperation of arm manipulators in a complex environment
Appeared in Proc. IROS, Oct. 1998
null
null
RL-97006
cs.RO cs.AI
null
This paper discusses the feasibility of using configuration space (C-space) as a means of visualization and control in operator-guided real-time motion of a robot arm manipulator. The motivation is to improve performance of the human operator in tasks involving the manipulator motion in an environment with obstacles. Unlike some other motion planning tasks, operators are known to make expensive mistakes in such tasks, even in a simpler two-dimensional case. They have difficulty learning better procedures and their performance improves very little with practice. Using an example of a two-dimensional arm manipulator, we show that translating the problem into C-space improves the operator performance rather remarkably, on the order of magnitude compared to the usual work space control. An interface that makes the transfer possible is described, and an example of its use in a virtual environment is shown.
[ { "version": "v1", "created": "Fri, 20 Nov 1998 21:06:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Ivanisevic", "I.", "" ], [ "Lumelsky", "V.", "" ] ]
cs/9811030
Otto Schnurr
Gerald Corrigan, Noel Massey and Orhan Karaali
Generating Segment Durations in a Text-To-Speech System: A Hybrid Rule-Based/Neural Network Approach
4 pages, PostScript
Proceedings of Eurospeech (1997) 2675-2678. Rhodes, Greece
null
null
cs.NE cs.HC
null
A combination of a neural network with rule firing information from a rule-based system is used to generate segment durations for a text-to-speech system. The system shows a slight improvement in performance over a neural network system without the rule firing information. Synthesized speech using segment durations was accepted by listeners as having about the same quality as speech generated using segment durations extracted from natural speech.
[ { "version": "v1", "created": "Tue, 24 Nov 1998 22:51:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Corrigan", "Gerald", "" ], [ "Massey", "Noel", "" ], [ "Karaali", "Orhan", "" ] ]
cs/9811031
Otto Schnurr
Orhan Karaali, Gerald Corrigan and Ira Gerson
Speech Synthesis with Neural Networks
6 pages, PostScript
World Congress on Neural Networks (1996) 45-50. San Diego
null
null
cs.NE cs.HC
null
Text-to-speech conversion has traditionally been performed either by concatenating short samples of speech or by using rule-based systems to convert a phonetic representation of speech into an acoustic representation, which is then converted into speech. This paper describes a system that uses a time-delay neural network (TDNN) to perform this phonetic-to-acoustic mapping, with another neural network to control the timing of the generated speech. The neural network system requires less memory than a concatenation system, and performed well in tests comparing it to commercial systems using other technologies.
[ { "version": "v1", "created": "Tue, 24 Nov 1998 23:33:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Karaali", "Orhan", "" ], [ "Corrigan", "Gerald", "" ], [ "Gerson", "Ira", "" ] ]
cs/9812001
Li Hang
Hang LI (NEC Corporation)
A Probabilistic Approach to Lexical Semantic Knowledge Acquisition and S tructural Disambiguation
PhD. Thesis, Univ. of Tokyo, July 1998; latex file, eps figures; 136 pages, page numbers do not comfort to the original; ps font changes
null
null
null
cs.CL
null
In this thesis, I address the problem of automatically acquiring lexical semantic knowledge, especially that of case frame patterns, from large corpus data and using the acquired knowledge in structural disambiguation. The approach I adopt has the following characteristics: (1) dividing the problem into three subproblems: case slot generalization, case dependency learning, and word clustering (thesaurus construction). (2) viewing each subproblem as that of statistical estimation and defining probability models for each subproblem, (3) adopting the Minimum Description Length (MDL) principle as learning strategy, (4) employing efficient learning algorithms, and (5) viewing the disambiguation problem as that of statistical prediction. Major contributions of this thesis include: (1) formalization of the lexical knowledge acquisition problem, (2) development of a number of learning methods for lexical knowledge acquisition, and (3) development of a high-performance disambiguation method.
[ { "version": "v1", "created": "Tue, 1 Dec 1998 11:43:32 GMT" }, { "version": "v2", "created": "Wed, 2 Dec 1998 01:24:22 GMT" }, { "version": "v3", "created": "Thu, 3 Dec 1998 04:18:33 GMT" } ]
2007-05-23T00:00:00
[ [ "LI", "Hang", "", "NEC Corporation" ] ]
cs/9812002
Aristidis Likas
A. Likas and I. E. Lagaris
Training Reinforcement Neurocontrollers Using the Polytope Algorithm
null
null
null
Preprint, Dept. of Computer Science, Univ. of Ioannina, 1996
cs.NE
null
A new training algorithm is presented for delayed reinforcement learning problems that does not assume the existence of a critic model and employs the polytope optimization algorithm to adjust the weights of the action network so that a simple direct measure of the training performance is maximized. Experimental results from the application of the method to the pole balancing problem indicate improved training performance compared with critic-based and genetic reinforcement approaches.
[ { "version": "v1", "created": "Thu, 3 Dec 1998 09:08:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Likas", "A.", "" ], [ "Lagaris", "I. E.", "" ] ]
cs/9812003
Aristidis Likas
I. E. Lagaris, A. Likas and D. G. Papageorgiou
Neural Network Methods for Boundary Value Problems Defined in Arbitrarily Shaped Domains
null
null
null
Preprint no. 7-98, Dept. of Computer Science, Univ. of Ioannina, Greece, 1998
cs.NE cond-mat.dis-nn cs.NA math-ph math.MP math.NA physics.comp-ph
null
Partial differential equations (PDEs) with Dirichlet boundary conditions defined on boundaries with simple geometry have been succesfuly treated using sigmoidal multilayer perceptrons in previous works. This article deals with the case of complex boundary geometry, where the boundary is determined by a number of points that belong to it and are closely located, so as to offer a reasonable representation. Two networks are employed: a multilayer perceptron and a radial basis function network. The later is used to account for the satisfaction of the boundary conditions. The method has been successfuly tested on two-dimensional and three-dimensional PDEs and has yielded accurate solutions.
[ { "version": "v1", "created": "Thu, 3 Dec 1998 10:09:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Lagaris", "I. E.", "" ], [ "Likas", "A.", "" ], [ "Papageorgiou", "D. G.", "" ] ]
cs/9812004
Mark D. Roberts
Mark D. Roberts
Name Strategy: Its Existence and Implications
32 pages, 2 ascii diagrams
Int.J.Computational Cognition Volume 3 Pages 1-14 (2005).
null
null
cs.CL cs.AI math.HO
null
It is argued that colour name strategy, object name strategy, and chunking strategy in memory are all aspects of the same general phenomena, called stereotyping. It is pointed out that the Berlin-Kay universal partial ordering of colours and the frequency of traffic accidents classified by colour are surprisingly similar. Some consequences of the existence of a name strategy for the philosophy of language and mathematics are discussed. It is argued that real valued quantities occur {\it ab initio}. The implication of real valued truth quantities is that the {\bf Continuum Hypothesis} of pure mathematics is side-stepped. The existence of name strategy shows that thought/sememes and talk/phonemes can be separate, and this vindicates the assumption of thought occurring before talk used in psycholinguistic speech production models.
[ { "version": "v1", "created": "Fri, 4 Dec 1998 12:28:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Roberts", "Mark D.", "" ] ]
cs/9812005
Oskari Heinonen
Oskari Heinonen (University of Helsinki)
Optimal Multi-Paragraph Text Segmentation by Dynamic Programming
5 pages, 3 eps figures, LaTeX2e; includes errata; uses colacl, epsf, times
Proceedings of COLING-ACL '98, pp. 1484-1486, Montreal, Canada
null
null
cs.CL
null
There exist several methods of calculating a similarity curve, or a sequence of similarity values, representing the lexical cohesion of successive text constituents, e.g., paragraphs. Methods for deciding the locations of fragment boundaries are, however, scarce. We propose a fragmentation method based on dynamic programming. The method is theoretically sound and guaranteed to provide an optimal splitting on the basis of a similarity curve, a preferred fragment length, and a cost function defined. The method is especially useful when control on fragment size is of importance.
[ { "version": "v1", "created": "Fri, 4 Dec 1998 16:16:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Heinonen", "Oskari", "", "University of Helsinki" ] ]
cs/9812007
David Karger
David R. Karger
Minimum Cuts in Near-Linear Time
null
null
null
null
cs.DS
null
We significantly improve known time bounds for solving the minimum cut problem on undirected graphs. We use a ``semi-duality'' between minimum cuts and maximum spanning tree packings combined with our previously developed random sampling techniques. We give a randomized algorithm that finds a minimum cut in an m-edge, n-vertex graph with high probability in O(m log^3 n) time. We also give a simpler randomized algorithm that finds all minimum cuts with high probability in O(n^2 log n) time. This variant has an optimal RNC parallelization. Both variants improve on the previous best time bound of O(n^2 log^3 n). Other applications of the tree-packing approach are new, nearly tight bounds on the number of near minimum cuts a graph may have and a new data structure for representing them in a space-efficient manner.
[ { "version": "v1", "created": "Tue, 8 Dec 1998 21:29:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Karger", "David R.", "" ] ]
cs/9812008
David Karger
David Karger, Rajeev Motwani, and Madhu Sudan
Approximate Graph Coloring by Semidefinite Programming
null
JACM 45(2), mar. 1998, pp.246--265
null
null
cs.DS
null
We consider the problem of coloring k-colorable graphs with the fewest possible colors. We present a randomized polynomial time algorithm that colors a 3-colorable graph on $n$ vertices with min O(Delta^{1/3} log^{1/2} Delta log n), O(n^{1/4} log^{1/2} n) colors where Delta is the maximum degree of any vertex. Besides giving the best known approximation ratio in terms of n, this marks the first non-trivial approximation result as a function of the maximum degree Delta. This result can be generalized to k-colorable graphs to obtain a coloring using min O(Delta^{1-2/k} log^{1/2} Delta log n), O(n^{1-3/(k+1)} log^{1/2} n) colors. Our results are inspired by the recent work of Goemans and Williamson who used an algorithm for semidefinite optimization problems, which generalize linear programs, to obtain improved approximations for the MAX CUT and MAX 2-SAT problems. An intriguing outcome of our work is a duality relationship established between the value of the optimum solution to our semidefinite program and the Lovasz theta-function. We show lower bounds on the gap between the optimum solution of our semidefinite program and the actual chromatic number; by duality this also demonstrates interesting new facts about the theta-function.
[ { "version": "v1", "created": "Tue, 8 Dec 1998 22:03:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Karger", "David", "" ], [ "Motwani", "Rajeev", "" ], [ "Sudan", "Madhu", "" ] ]
cs/9812009
Fabio Crestani
Fabio Crestani
Vocal Access to a Newspaper Archive: Design Issues and Preliminary Investigation
null
null
null
null
cs.DL
null
This paper presents the design and the current prototype implementation of an interactive vocal Information Retrieval system that can be used to access articles of a large newspaper archive using a telephone. The results of preliminary investigation into the feasibility of such a system are also presented.
[ { "version": "v1", "created": "Thu, 10 Dec 1998 13:49:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Crestani", "Fabio", "" ] ]
cs/9812010
Erik T. Mueller
Erik T. Mueller, Michael G. Dyer
Towards a computational theory of human daydreaming
10 pages. Appears in: Proceedings of the Seventh Annual Conference of the Cognitive Science Society (pp. 120-129). Irvine, CA. 1985
null
null
null
cs.AI
null
This paper examines the phenomenon of daydreaming: spontaneously recalling or imagining personal or vicarious experiences in the past or future. The following important roles of daydreaming in human cognition are postulated: plan preparation and rehearsal, learning from failures and successes, support for processes of creativity, emotion regulation, and motivation. A computational theory of daydreaming and its implementation as the program DAYDREAMER are presented. DAYDREAMER consists of 1) a scenario generator based on relaxed planning, 2) a dynamic episodic memory of experiences used by the scenario generator, 3) a collection of personal goals and control goals which guide the scenario generator, 4) an emotion component in which daydreams initiate, and are initiated by, emotional states arising from goal outcomes, and 5) domain knowledge of interpersonal relations and common everyday occurrences. The role of emotions and control goals in daydreaming is discussed. Four control goals commonly used in guiding daydreaming are presented: rationalization, failure/success reversal, revenge, and preparation. The role of episodic memory in daydreaming is considered, including how daydreamed information is incorporated into memory and later used. An initial version of DAYDREAMER which produces several daydreams (in English) is currently running.
[ { "version": "v1", "created": "Thu, 10 Dec 1998 16:29:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Mueller", "Erik T.", "" ], [ "Dyer", "Michael G.", "" ] ]
cs/9812011
Erik T. Mueller
Erik T. Mueller, Johanna D. Moore, and Gerald J. Popek
A nested transaction mechanism for LOCUS
17 pages. Appears in: Proceedings of the Ninth ACM Symposium on Operating Systems Principles (pp. 71-87). Operating Systems Review. Vol. 17, No. 5. New York: Association for Computing Machinery. 1983
null
null
null
cs.OS cs.DC
null
A working implementation of nested transactions has been produced for LOCUS, an integrated distributed operating system which provides a high degree of network transparency. Several aspects of our mechanism are novel. First, the mechanism allows a transaction to access objects directly without regard to the location of the object. Second, processes running on behalf of a single transaction may be located at many sites. Thus there is no need to invoke a new transaction to perform processing or access objects at a remote site. Third, unlike other environments, LOCUS allows replication of data objects at more than one site in the network, and this capability is incorporated into the transaction mechanism. If the copy of an object that is currently being accessed becomes unavailable, it is possible to continue work by using another one of the replicated copies. Finally, an efficient orphan removal algorithm is presented, and the problem of providing continued operation during network partitions is addressed in detail.
[ { "version": "v1", "created": "Thu, 10 Dec 1998 16:49:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Mueller", "Erik T.", "" ], [ "Moore", "Johanna D.", "" ], [ "Popek", "Gerald J.", "" ] ]
cs/9812012
John Watrous
John Watrous (University of Montreal)
Quantum simulations of classical random walks and undirected graph connectivity
11 pages, submitted to Complexity'99
null
null
null
cs.CC quant-ph
null
It is not currently known if quantum Turing machines can efficiently simulate probabilistic computations in the space-bounded case. In this paper we show that space-bounded quantum Turing machines can efficiently simulate a limited class of random processes: random walks on undirected graphs. By means of such simulations, it is demonstrated that the undirected graph connectivity problem for regular graphs can be solved by one-sided error quantum Turing machines that run in logspace and halt absolutely. It follows that symmetric logspace is contained in the quantum analogue of randomized logspace.
[ { "version": "v1", "created": "Fri, 11 Dec 1998 00:06:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Watrous", "John", "", "University of Montreal" ] ]
cs/9812013
Babak Hodjat
Babak Hodjat and Makoto Amamiya
The Self-Organizing Symbiotic Agent
12 pages, 2 figures
null
null
null
cs.NE cs.CC
null
In [N. A. Baas, Emergence, Hierarchies, and Hyper-structures, in C.G. Langton ed., Artificial Life III, Addison Wesley, 1994.] a general framework for the study of Emergence and hyper-structure was presented. This approach is mostly concerned with the description of such systems. In this paper we will try to bring forth a different aspect of this model we feel will be useful in the engineering of agent based solutions, namely the symbiotic approach. In this approach a self-organizing method of dividing the more complex "main-problem" to a hyper-structure of "sub-problems" with the aim of reducing complexity is desired. A description of the general problem will be given along with some instances of related work. This paper is intended to serve as an introductory challenge for general solutions to the described problem.
[ { "version": "v1", "created": "Fri, 11 Dec 1998 20:51:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Hodjat", "Babak", "" ], [ "Amamiya", "Makoto", "" ] ]
cs/9812014
Babak Hodjat
Babak Hodjat, Christopher J. Savoie, and Makoto Amamiya
An Adaptive Agent Oriented Software Architecture
14 pages, 5 figures. Presemted at PRICAI '98 (5th Pacific Rim Conference on Artificial Intelligence)
null
null
null
cs.DC cs.MA
null
A new approach to software design based on an agent-oriented architecture is presented. Unlike current research, we consider software to be designed and implemented with this methodology in mind. In this approach agents are considered adaptively communicating concurrent modules which are divided into a white box module responsible for the communications and learning, and a black box which is the independent specialized processes of the agent. A distributed Learning policy is also introduced for adaptability.
[ { "version": "v1", "created": "Fri, 11 Dec 1998 22:36:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Hodjat", "Babak", "" ], [ "Savoie", "Christopher J.", "" ], [ "Amamiya", "Makoto", "" ] ]
cs/9812015
Babak Hodjat
Babak Hodjat and Makoto Amamiya
Adaptive Interaction Using the Adaptive Agent Oriented Software Architecture (AAOSA)
14 pages, 4 figures
null
null
null
cs.HC cs.DC
null
User interfaces that adapt their characteristics to those of the user are referred to as adaptive interfaces. We propose Adaptive Agent Oriented Software Architecture (AAOSA) as a new way of designing adaptive interfaces. AAOSA is a new approach to software design based on an agent-oriented architecture. In this approach agents are considered adaptively communicating concurrent modules which are divided into a white box module responsible for the communications and learning, and a black box which is responsible for the independent specialized processes of the agent. A distributed learning policy that makes use of this architecture is used for purposes of system adaptability.
[ { "version": "v1", "created": "Fri, 11 Dec 1998 23:05:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Hodjat", "Babak", "" ], [ "Amamiya", "Makoto", "" ] ]
cs/9812016
Steve Hitchcock
Steve Hitchcock, Les Carr and Wendy Hall
Making the most of electronic journals
11 pages
null
null
null
cs.DL
null
As most electronic journals available today have been derived from print originals, print journals have become a vital element in the broad development of electronic journals publishing. Further dependence on the print publishing model, however, will be a constraint on the continuing development of e-journals, and a series of conflicts are likely to arise. Making the most of e-journals requires that a distinctive new publishing model is developed. We consider some of the issues that will be fundamental in this new model, starting with user motivations and some reported publisher experiences, both of which suggest a broadening desire for comprehensive linked archives. This leads in turn to questions about the impact of rights assignment by authors, in particular the common practice of giving exlusive rights to publishers for individual works. Some non-prescriptive solutions are suggested, and four steps towards optimum e-journals are proposed.
[ { "version": "v1", "created": "Mon, 14 Dec 1998 18:24:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Hitchcock", "Steve", "" ], [ "Carr", "Les", "" ], [ "Hall", "Wendy", "" ] ]
cs/9812017
Wolfgang Slany
Andreas Raggl, Wolfgang Slany
A reusable iterative optimization software library to solve combinatorial problems with approximate reasoning
33 pages, 9 figures; for a project overview see http://www.dbai.tuwien.ac.at/proj/StarFLIP/
International Journal of Approximate Reasoning, 19(1--2):161--191, July/August 1998
null
DBAI-TR-98-23
cs.AI
null
Real world combinatorial optimization problems such as scheduling are typically too complex to solve with exact methods. Additionally, the problems often have to observe vaguely specified constraints of different importance, the available data may be uncertain, and compromises between antagonistic criteria may be necessary. We present a combination of approximate reasoning based constraints and iterative optimization based heuristics that help to model and solve such problems in a framework of C++ software libraries called StarFLIP++. While initially developed to schedule continuous caster units in steel plants, we present in this paper results from reusing the library components in a shift scheduling system for the workforce of an industrial production plant.
[ { "version": "v1", "created": "Tue, 15 Dec 1998 21:45:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Raggl", "Andreas", "" ], [ "Slany", "Wolfgang", "" ] ]
cs/9812018
Stephan Busemann
Stephan Busemann and Helmut Horacek (DFKI GmbH)
A Flexible Shallow Approach to Text Generation
LaTeX, 10 pages
Proc. 9th International Workshop on Natural Language Generation, Niagara-on-the-Lake, Canada, August 1998, 238-247
null
null
cs.CL
null
In order to support the efficient development of NL generation systems, two orthogonal methods are currently pursued with emphasis: (1) reusable, general, and linguistically motivated surface realization components, and (2) simple, task-oriented template-based techniques. In this paper we argue that, from an application-oriented perspective, the benefits of both are still limited. In order to improve this situation, we suggest and evaluate shallow generation methods associated with increased flexibility. We advise a close connection between domain-motivated and linguistic ontologies that supports the quick adaptation to new tasks and domains, rather than the reuse of general resources. Our method is especially designed for generating reports with limited linguistic variations.
[ { "version": "v1", "created": "Wed, 16 Dec 1998 16:37:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Busemann", "Stephan", "", "DFKI GmbH" ], [ "Horacek", "Helmut", "", "DFKI GmbH" ] ]
cs/9812019
Peter M. Hines
Peter M. Hines
Symmetries and transitions of bounded Turing machines
21 pages, submitted
null
null
null
cs.LO math.CT
null
We consider the structures given by repeatedly generalising the definition of finite state automata by symmetry considerations, and constructing analogues of transition monoids at each step. This approach first gives us non-deterministic automata, then (non-deterministic) two-way automata and bounded Turing machines --- that is, Turing machines where the read / write head is unable to move past the end of the input word. In the case of two-way automata, the transition monoids generalise to endomorphism monoids in compact closed categories. These use Girard's resolution formula (from the Geometry of Interaction representation of linear logic) to construct the images of singleton words. In the case of bounded Turing machines, the transition homomorphism generalises to a monoid homomorphism from the natural numbers to a monoid constructed from the union of endomorphism monoids of a compact closed category, together with an appropriate composition. These use Girard's execution formula (also from the Geometry of Interaction representation of linear logic) to construct images of singletons.
[ { "version": "v1", "created": "Wed, 16 Dec 1998 20:49:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Hines", "Peter M.", "" ] ]
cs/9812020
Carl Lagoze
Joseph Y. Halpern, Carl Lagoze
The Computing Research Repository: Promoting the Rapid Dissemination and Archiving of Computer Science Research
Submission to ACM DL99
null
null
null
cs.DL
null
We describe the Computing Research Repository (CoRR), a new electronic archive for rapid dissemination and archiving of computer science research results. CoRR was initiated in September 1998 through the cooperation of ACM, LANL (Los Alamos National Laboratory) e-Print archive, and NCSTRL (Networked Computer Science Technical Research Library. Through its implementation of the Dienst protocol, CoRR combines the open and extensible architecture of NCSTRL with the reliable access and well-established management practices of the LANL XXX e-Print repository. This architecture will allow integration with other e-Print archives and provides a foundation for a future broad-based scholarly digital library. We describe the decisions that were made in creating CoRR, the architecture of the CoRR/NCSTRL interoperation, and issues that have arisen during the operation of CoRR.
[ { "version": "v1", "created": "Tue, 22 Dec 1998 11:49:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Halpern", "Joseph Y.", "" ], [ "Lagoze", "Carl", "" ] ]
cs/9812021
Antal van den Bosch
Walter Daelemans, Antal van den Bosch, and Jakub Zavrel
Forgetting Exceptions is Harmful in Language Learning
31 pages, 7 figures, 10 tables. uses 11pt, fullname, a4wide tex styles. Pre-print version of article to appear in Machine Learning 11:1-3, Special Issue on Natural Language Learning. Figures on page 22 slightly compressed to avoid page overload
null
null
null
cs.CL cs.LG
null
We show that in language learning, contrary to received wisdom, keeping exceptional training instances in memory can be beneficial for generalization accuracy. We investigate this phenomenon empirically on a selection of benchmark natural language processing tasks: grapheme-to-phoneme conversion, part-of-speech tagging, prepositional-phrase attachment, and base noun phrase chunking. In a first series of experiments we combine memory-based learning with training set editing techniques, in which instances are edited based on their typicality and class prediction strength. Results show that editing exceptional instances (with low typicality or low class prediction strength) tends to harm generalization accuracy. In a second series of experiments we compare memory-based learning and decision-tree learning methods on the same selection of tasks, and find that decision-tree learning often performs worse than memory-based learning. Moreover, the decrease in performance can be linked to the degree of abstraction from exceptions (i.e., pruning or eagerness). We provide explanations for both results in terms of the properties of the natural language processing tasks and the learning algorithms.
[ { "version": "v1", "created": "Tue, 22 Dec 1998 16:33:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Daelemans", "Walter", "" ], [ "Bosch", "Antal van den", "" ], [ "Zavrel", "Jakub", "" ] ]
cs/9812022
Francesco Scarcello
G. Gottlob, N. Leone, F. Scarcello
Hypertree Decompositions and Tractable Queries
30 pages, 7 figures, uses fancybox, epsfig, epic, and eepic
Journal of Computer and System Sciences, 64(3):579-627, 2002
10.1006/jcss.2001.1809
DBAI-TR-98/21
cs.DB cs.AI
null
Several important decision problems on conjunctive queries (CQs) are NP-complete in general but become tractable, and actually highly parallelizable, if restricted to acyclic or nearly acyclic queries. Examples are the evaluation of Boolean CQs and query containment. These problems were shown tractable for conjunctive queries of bounded treewidth and of bounded degree of cyclicity. The so far most general concept of nearly acyclic queries was the notion of queries of bounded query-width introduced by Chekuri and Rajaraman (1997). While CQs of bounded query width are tractable, it remained unclear whether such queries are efficiently recognizable. Chekuri and Rajaraman stated as an open problem whether for each constant k it can be determined in polynomial time if a query has query width less than or equal to k. We give a negative answer by proving this problem NP-complete (specifically, for k=4). In order to circumvent this difficulty, we introduce the new concept of hypertree decomposition of a query and the corresponding notion of hypertree width. We prove: (a) for each k, the class of queries with query width bounded by k is properly contained in the class of queries whose hypertree width is bounded by k; (b) unlike query width, constant hypertree-width is efficiently recognizable; (c) Boolean queries of constant hypertree width can be efficiently evaluated.
[ { "version": "v1", "created": "Mon, 28 Dec 1998 12:30:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Gottlob", "G.", "" ], [ "Leone", "N.", "" ], [ "Scarcello", "F.", "" ] ]
cs/9901002
Lex Weaver
Jonathan Baxter, Andrew Tridgell, and Lex Weaver
KnightCap: A chess program that learns by combining TD(lambda) with game-tree search
9 pages
MACHINE LEARNING Proceedings of the Fifteenth International Conference (ICML '98), ISBN 1-55860-556-8, ISSN 1049-1910, Madison WISCONSIN, July 24-27 1998, pages 28-36
null
null
cs.LG cs.AI
null
In this paper we present TDLeaf(lambda), a variation on the TD(lambda) algorithm that enables it to be used in conjunction with game-tree search. We present some experiments in which our chess program ``KnightCap'' used TDLeaf(lambda) to learn its evaluation function while playing on the Free Internet Chess Server (FICS, fics.onenet.net). The main success we report is that KnightCap improved from a 1650 rating to a 2150 rating in just 308 games and 3 days of play. As a reference, a rating of 1650 corresponds to about level B human play (on a scale from E (1000) to A (1800)), while 2150 is human master level. We discuss some of the reasons for this success, principle among them being the use of on-line, rather than self-play.
[ { "version": "v1", "created": "Sun, 10 Jan 1999 03:21:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Baxter", "Jonathan", "" ], [ "Tridgell", "Andrew", "" ], [ "Weaver", "Lex", "" ] ]
cs/9901003
Yao Han
M. Denecker and V. Marek and M. Truszczynski
Fixpoint 3-valued semantics for autoepistemic logic
Proceedings of the Fifteenth National Conference on Artificial Intelligence (AAAI-98), pages 840--845, (MIT Press, 1998)
null
null
null
cs.LO cs.AI
null
The paper presents a constructive fixpoint semantics for autoepistemic logic (AEL). This fixpoint characterizes a unique but possibly three-valued belief set of an autoepistemic theory. It may be three-valued in the sense that for a subclass of formulas F, the fixpoint may not specify whether F is believed or not. The paper presents a constructive 3-valued semantics for autoepistemic logic (AEL). We introduce a derivation operator and define the semantics as its least fixpoint. The semantics is 3-valued in the sense that, for some formulas, the least fixpoint does not specify whether they are believed or not. We show that complete fixpoints of the derivation operator correspond to Moore's stable expansions. In the case of modal representations of logic programs our least fixpoint semantics expresses well-founded semantics or 3-valued Fitting-Kunen semantics (depending on the embedding used). We show that, computationally, our semantics is simpler than the semantics proposed by Moore (assuming that the polynomial hierarchy does not collapse).
[ { "version": "v1", "created": "Tue, 12 Jan 1999 18:44:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Denecker", "M.", "" ], [ "Marek", "V.", "" ], [ "Truszczynski", "M.", "" ] ]
cs/9901006
Alexander Yu. Vlasov
Alexander Yu. Vlasov (FCR/IRH, St.-Petersburg, Russia)
Object Oriented and Functional Programming for Symbolic Manipulation
6 pages, LaTeX, poster presentation at 5th International Workshop on New Computing Techniques in Physics Research (AIHENP'96), http://lapphp0.in2p3.fr/aihep/aihep96/abstracts/sm.html , EPFL Lausanne, (Switzerland), 2 - 6 Sep 1996; corrected due to referee suggestions (Nov 96), adjusted to LaTeX2e article class (Jan 99)
null
null
null
cs.SC cs.PL
null
The advantages of mixed approach with using different kinds of programming techniques for symbolic manipulation are discussed. The main purpose of approach offered is merge the methods of object oriented programming that convenient for presentation data and algorithms for user with advantages of functional languages for data manipulation, internal presentation, and portability of software.
[ { "version": "v1", "created": "Wed, 13 Jan 1999 20:40:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Vlasov", "Alexander Yu.", "", "FCR/IRH, St.-Petersburg, Russia" ] ]
cs/9901008
Eirik Fossgaard
Eirik Fossgaard
Fast Computational Algorithms for the Discrete Wavelet Transform and Applications of Localized Orthonormal Bases in Signal Classification
127 pages, 25 figures, LaTeX2e
null
null
82-90487-93-2
cs.MS cs.CE
null
We construct an algorithm for implementing the discrete wavelet transform by means of matrices in SO_2(R) for orthonormal compactly supported wavelets and matrices in SL_m(R), m > = 2, for compactly supported biorthogonal wavelets. We show that in 1 dimension the total operation count using this algorithm can be reduced to about 50% of the conventional convolution and downsampling by 2-operation for both orthonormal and biorthogonal filters. In the special case of biorthogonal symmetric odd-odd filters, we show an implementation yielding a total operation count of about 38% of the conventional method. In 2 dimensions we show an implementation of this algorithm yielding a reduction in the total operation count of about 70% when the filters are orthonormal, a reduction of about 62% for general biorthogonal filters, and a reduction of about 70% if the filters are symmetric odd-odd length filters. We further extend these results to 3 dimensions. We also show how the SO_2(R)-method for implementing the discrete wavelet transform may be exploited to compute short FIR filters, and we construct edge mappings where we try to improve upon the degree of preservation of regularity in the conventional methods. We also consider a two-class waveform discrimination problem. A statistical space-frequency analysis is performed on a training data set using the LDB-algorithm of N.Saito and R.Coifman. The success of the algorithm on this particular problem is evaluated on a disjoint test data set.
[ { "version": "v1", "created": "Sat, 16 Jan 1999 16:54:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Fossgaard", "Eirik", "" ] ]
cs/9901009
Andrew Odlyzko
Andrew Odlyzko
Competition and cooperation: Libraries and publishers in the transition to electronic scholarly journals
null
null
null
null
cs.DL
null
The conversion of scholarly journals to digital format is proceeding rapidly, especially for those from large commercial and learned society publishers. This conversion offers the best hope for survival for such publishers. The infamous "journal crisis" is more of a library cost crisis than a publisher pricing problem, with internal library costs much higher than the amount spent on purchasing books and journals. Therefore publishers may be able to retain or even increase their revenues and profits, while at the same time providing a superior service. To do this, they will have to take over many of the function of libraries, and they can do that only in the digital domain. This paper examines publishers' strategies, how they are likely to evolve, and how they will affect libraries.
[ { "version": "v1", "created": "Wed, 20 Jan 1999 13:01:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Odlyzko", "Andrew", "" ] ]
cs/9901010
Tao Jiang
Tao Jiang (McMaster U.), Ming Li (U of Waterloo), Paul Vitanyi (CWI and U of Amsterdam)
Average-Case Complexity of Shellsort
11 pages. Submitted to ICALP'99
null
null
null
cs.DS cs.CC
null
We prove a general lower bound on the average-case complexity of Shellsort: the average number of data-movements (and comparisons) made by a $p$-pass Shellsort for any incremental sequence is $\Omega (pn^{1 + 1/p)$ for all $p \leq \log n$. Using similar arguments, we analyze the average-case complexity of several other sorting algorithms.
[ { "version": "v1", "created": "Wed, 20 Jan 1999 16:32:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Jiang", "Tao", "", "McMaster U." ], [ "Li", "Ming", "", "U of Waterloo" ], [ "Vitanyi", "Paul", "", "CWI\n and U of Amsterdam" ] ]