id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 3
62.8k
| title
stringlengths 1
382
| comments
stringlengths 1
1.15k
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 7
153
⌀ | report-no
stringlengths 1
509
⌀ | categories
stringlengths 5
125
| license
stringclasses 9
values | abstract
stringlengths 6
6.09k
| versions
listlengths 1
187
| update_date
timestamp[s]date 2007-05-23 00:00:00
2025-04-25 00:00:00
| authors_parsed
sequencelengths 1
2.83k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/9901011 | Barry M. Leiner | Barry M. Leiner, Vinton G. Cerf, David D. Clark, Robert E. Kahn,
Leonard Kleinrock, Daniel C. Lynch, Jon Postel, Larry G. Roberts, and Stephen
Wolf | A Brief History of the Internet | null | null | null | null | cs.NI | null | The Internet has revolutionized the computer and communications world like
nothing before. The invention of the telegraph, telephone, radio, and computer
set the stage for this unprecedented integration of capabilities. The Internet
is at once a world-wide broadcasting capability, a mechanism for information
dissemination, and a medium for collaboration and interaction between
individuals and their computers without regard for geographic location.
In this paper, several of us involved in the development and evolution of the
Internet share our views of its origins and history. This is intended to be a
brief, necessarily cursory and incomplete history. This history revolves around
four distinct aspects. There is the technological evolution that began with
early research on packet switching and the ARPANET (and related technologies),
and where current research continues to expand the horizons of the
infrastructure along several dimensions, such as scale, performance, and higher
level functionality. There is the operations and management aspect of a global
and complex operational infrastructure. There is the social aspect, which
resulted in a broad community of Internauts working together to create and
evolve the technology. And there is the commercialization aspect, resulting in
an extremely effective transition of research results into a broadly deployed
and available information infrastructure.
| [
{
"version": "v1",
"created": "Sat, 23 Jan 1999 00:37:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Leiner",
"Barry M.",
""
],
[
"Cerf",
"Vinton G.",
""
],
[
"Clark",
"David D.",
""
],
[
"Kahn",
"Robert E.",
""
],
[
"Kleinrock",
"Leonard",
""
],
[
"Lynch",
"Daniel C.",
""
],
[
"Postel",
"Jon",
""
],
[
"Roberts",
"Larry G.",
""
],
[
"Wolf",
"Stephen",
""
]
] |
cs/9901012 | Miroslaw Truszczynski | Pawel Cholewinski, Miroslaw Truszczynski | Extremal problems in logic programming and stable model computation | null | Journal of Logic Programming, 38(1999), pp. 219-242 | null | null | cs.LO cs.AI | null | We study the following problem: given a class of logic programs C, determine
the maximum number of stable models of a program from C. We establish the
maximum for the class of all logic programs with at most n clauses, and for the
class of all logic programs of size at most n. We also characterize the
programs for which the maxima are attained. We obtain similar results for the
class of all disjunctive logic programs with at most n clauses, each of length
at most m, and for the class of all disjunctive logic programs of size at most
n. Our results on logic programs have direct implication for the design of
algorithms to compute stable models. Several such algorithms, similar in spirit
to the Davis-Putnam procedure, are described in the paper. Our results imply
that there is an algorithm that finds all stable models of a program with n
clauses after considering the search space of size O(3^{n/3}) in the worst
case. Our results also provide some insights into the question of
representability of families of sets as families of stable models of logic
programs.
| [
{
"version": "v1",
"created": "Mon, 25 Jan 1999 14:44:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cholewinski",
"Pawel",
""
],
[
"Truszczynski",
"Miroslaw",
""
]
] |
cs/9901013 | David M. Mount | Songrit Maneewongvatana and David M. Mount | Analysis of approximate nearest neighbor searching with clustered point
sets | 20 pages, 8 figures. Presented at ALENEX '99, Baltimore, MD, Jan
15-16, 1999 | null | null | null | cs.CG | null | We present an empirical analysis of data structures for approximate nearest
neighbor searching. We compare the well-known optimized kd-tree splitting
method against two alternative splitting methods. The first, called the
sliding-midpoint method, which attempts to balance the goals of producing
subdivision cells of bounded aspect ratio, while not producing any empty cells.
The second, called the minimum-ambiguity method is a query-based approach. In
addition to the data points, it is also given a training set of query points
for preprocessing. It employs a simple greedy algorithm to select the splitting
plane that minimizes the average amount of ambiguity in the choice of the
nearest neighbor for the training points. We provide an empirical analysis
comparing these two methods against the optimized kd-tree construction for a
number of synthetically generated data and query sets. We demonstrate that for
clustered data and query sets, these algorithms can provide significant
improvements over the standard kd-tree construction for approximate nearest
neighbor searching.
| [
{
"version": "v1",
"created": "Tue, 26 Jan 1999 21:23:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Maneewongvatana",
"Songrit",
""
],
[
"Mount",
"David M.",
""
]
] |
cs/9901015 | John Watrous | John Watrous | PSPACE has 2-round quantum interactive proof systems | 13 pages | null | null | null | cs.CC quant-ph | null | In this paper we consider quantum interactive proof systems, i.e.,
interactive proof systems in which the prover and verifier may perform quantum
computations and exchange quantum messages. It is proved that every language in
PSPACE has a quantum interactive proof system that requires only two rounds of
communication between the prover and verifier, while having exponentially small
(one-sided) probability of error. It follows that quantum interactive proof
systems are strictly more powerful than classical interactive proof systems in
the constant-round case unless the polynomial time hierarchy collapses to the
second level.
| [
{
"version": "v1",
"created": "Wed, 27 Jan 1999 21:35:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Watrous",
"John",
""
]
] |
cs/9901016 | Yao Han | Victor Marek, Jan Treur, Miroslaw Truszczynski | Representation Theory for Default Logic | Annals of Mathematics and Artificial Intelligence, 21 (1997), pp.
343-358 | null | null | null | cs.LO cs.AI | null | Default logic can be regarded as a mechanism to represent families of belief
sets of a reasoning agent. As such, it is inherently second-order. In this
paper, we study the problem of representability of a family of theories as the
set of extensions of a default theory. We give a complete solution to the
representability by means of normal default theories. We obtain partial results
on representability by arbitrary default theories. We construct examples of
denumerable families of non-including theories that are not representable. We
also study the concept of equivalence between default theories.
| [
{
"version": "v1",
"created": "Thu, 28 Jan 1999 21:57:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Marek",
"Victor",
""
],
[
"Treur",
"Jan",
""
],
[
"Truszczynski",
"Miroslaw",
""
]
] |
cs/9902001 | Alexander Krotov | Alexander Krotov, Mark Hepple, Robert Gaizauskas and Yorick Wilks
(Department of Computer Science, University of Sheffield, UK) | Compacting the Penn Treebank Grammar | 5 pages, 2 figures | In Proceedings of COLING-98 (Montreal), pages 699-703 | null | null | cs.CL | null | Treebanks, such as the Penn Treebank (PTB), offer a simple approach to
obtaining a broad coverage grammar: one can simply read the grammar off the
parse trees in the treebank. While such a grammar is easy to obtain, a
square-root rate of growth of the rule set with corpus size suggests that the
derived grammar is far from complete and that much more treebanked text would
be required to obtain a complete grammar, if one exists at some limit. However,
we offer an alternative explanation in terms of the underspecification of
structures within the treebank. This hypothesis is explored by applying an
algorithm to compact the derived grammar by eliminating redundant rules --
rules whose right hand sides can be parsed by other rules. The size of the
resulting compacted grammar, which is significantly less than that of the full
treebank grammar, is shown to approach a limit. However, such a compacted
grammar does not yield very good performance figures. A version of the
compaction algorithm taking rule probabilities into account is proposed, which
is argued to be more linguistically motivated. Combined with simple
thresholding, this method can be used to give a 58% reduction in grammar size
without significant change in parsing performance, and can produce a 69%
reduction with some gain in recall, but a loss in precision.
| [
{
"version": "v1",
"created": "Sun, 31 Jan 1999 18:57:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Krotov",
"Alexander",
"",
"Department of Computer Science, University of Sheffield, UK"
],
[
"Hepple",
"Mark",
"",
"Department of Computer Science, University of Sheffield, UK"
],
[
"Gaizauskas",
"Robert",
"",
"Department of Computer Science, University of Sheffield, UK"
],
[
"Wilks",
"Yorick",
"",
"Department of Computer Science, University of Sheffield, UK"
]
] |
cs/9902002 | Kuang-hua Chen | Kuang-hua Chen | Automatic Identification of Subjects for Textual Documents in Digital
Libraries | 7 pages, 6 tables | null | null | null | cs.DL cs.CL | null | The amount of electronic documents in the Internet grows very quickly. How to
effectively identify subjects for documents becomes an important issue. In
past, the researches focus on the behavior of nouns in documents. Although
subjects are composed of nouns, the constituents that determine which nouns are
subjects are not only nouns. Based on the assumption that texts are
well-organized and event-driven, nouns and verbs together contribute the
process of subject identification. This paper considers four factors: 1) word
importance, 2) word frequency, 3) word co-occurrence, and 4) word distance and
proposes a model to identify subjects for textual documents. The preliminary
experiments show that the performance of the proposed model is close to that of
human beings.
| [
{
"version": "v1",
"created": "Mon, 1 Feb 1999 11:01:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chen",
"Kuang-hua",
""
]
] |
cs/9902003 | Eric Lease Morgan | Eric Lease Morgan | MyLibrary: A Model for Implementing a User-centered, Customizable
Interface to a Library's Collection of Information Resources | 10 pages, 6 figures | null | null | null | cs.DL | null | The paper describes an extensible model for implementing a user-centered,
customizable interface to a library's collection of information resources. This
model, called MyLibrary, integrates the principles of librarianship
(collection, organization, dissemination, and evaluation) with globally
networked computing resources creating a dynamic, customer-driven front-end to
any library's set of materials. The model supports a framework for libraries to
provide enhanced access to local and remote sets of data, information, and
knowledge. At the same, the model does not overwhelm its users with too much
information because the users control exactly how much information is displayed
to them at any given time. The model is active and not passive; direct human
interaction, computer mediated guidance and communication technologies, as well
as current awareness services all play indispensable roles in this system.
| [
{
"version": "v1",
"created": "Tue, 2 Feb 1999 13:41:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Morgan",
"Eric Lease",
""
]
] |
cs/9902004 | Eric Lease Morgan | Eric Lease Morgan | The Alex Catalogue, A Collection of Digital Texts with Automatic Methods
for Acquisition and Cataloging, User-Defined Typography, Cross-searching of
Indexed Content, and a Sense of Community | 9 pages, 2 figures | null | null | null | cs.DL | null | This paper describes the Alex Catalogue of Electronic Texts, the only
Internet-accessible collection of digital documents allowing the user to 1)
dynamically create customized, typographically readable documents on demand, 2)
search the content of one or more documents from the collection simultaneously,
3) create sets of documents from the collection for review and annotation, and
4) publish these sets of annotated documents in turn fostering a sense of
community around the Catalogue. More than a just a collection of links that
will break over time, Alex is an archive of electronic texts providing
unprecedented access to its content and features allowing it to meet the needs
of a wide variety of users and settings. Furthermore, the process of
maintaining the Catalogue is streamlined with tools for automatic acquisition
and cataloging making it possible to sustain the service with a minimum of
personnel.
| [
{
"version": "v1",
"created": "Tue, 2 Feb 1999 14:14:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Morgan",
"Eric Lease",
""
]
] |
cs/9902005 | Paul Vitanyi | Harry Buhrman (CWI), Matthew Franklin (Xerox PARC), Juan A. Garay
(Bell Labs - Lucent Technologies), Jaap-Henk Hoepman (University Twente),
John Tromp (CWI), Paul Vitanyi (CWI and University of Amsterdam) | Mutual Search | 18 pages, Latex, 5 figures, J. Assoc. Comp. Mach., To appear | null | null | null | cs.DS cs.CC cs.DB cs.DC cs.DM cs.IR | null | We introduce a search problem called ``mutual search'' where $k$ \agents,
arbitrarily distributed over $n$ sites, are required to locate one another by
posing queries of the form ``Anybody at site $i$?''. We ask for the least
number of queries that is necessary and sufficient. For the case of two \agents
using deterministic protocols we obtain the following worst-case results: In an
oblivious setting (where all pre-planned queries are executed) there is no
savings: $n-1$ queries are required and are sufficient. In a nonoblivious
setting we can exploit the paradigm of ``no news is also news'' to obtain
significant savings: in the synchronous case $0.586n$ queries suffice and
$0.536n$ queries are required; in the asynchronous case $0.896n$ queries
suffice and a fortiori 0.536 queries are required; for $o(\sqrt{n})$ \agents
using a deterministic protocol less than $n$ queries suffice; there is a simple
randomized protocol for two \agents with worst-case expected $0.5n$ queries and
all randomized protocols require at least $0.125n$ worst-case expected queries.
The graph-theoretic framework we formulate for expressing and analyzing
algorithms for this problem may be of independent interest.
| [
{
"version": "v1",
"created": "Tue, 2 Feb 1999 15:46:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Buhrman",
"Harry",
"",
"CWI"
],
[
"Franklin",
"Matthew",
"",
"Xerox PARC"
],
[
"Garay",
"Juan A.",
"",
"Bell Labs - Lucent Technologies"
],
[
"Hoepman",
"Jaap-Henk",
"",
"University Twente"
],
[
"Tromp",
"John",
"",
"CWI"
],
[
"Vitanyi",
"Paul",
"",
"CWI and University of Amsterdam"
]
] |
cs/9902006 | Paul Vitanyi | Paul Vitanyi | A Discipline of Evolutionary Programming | 25 pages, LaTeX source, Theoretical Computer Science, To appear | Theoret. Comp. Sci., 241:1-2 (2000), 3--23. | null | null | cs.NE cs.AI cs.CC cs.DS cs.LG cs.MA | null | Genetic fitness optimization using small populations or small population
updates across generations generally suffers from randomly diverging
evolutions. We propose a notion of highly probable fitness optimization through
feasible evolutionary computing runs on small size populations. Based on
rapidly mixing Markov chains, the approach pertains to most types of
evolutionary genetic algorithms, genetic programming and the like. We establish
that for systems having associated rapidly mixing Markov chains and appropriate
stationary distributions the new method finds optimal programs (individuals)
with probability almost 1. To make the method useful would require a structured
design methodology where the development of the program and the guarantee of
the rapidly mixing property go hand in hand. We analyze a simple example to
show that the method is implementable. More significant examples require
theoretical advances, for example with respect to the Metropolis filter.
| [
{
"version": "v1",
"created": "Tue, 2 Feb 1999 16:17:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vitanyi",
"Paul",
""
]
] |
cs/9902008 | Mario Winter | Mario Winter | Managing Object-Oriented Integration and Regression Testing | Proc. 6th euroSTAR, Munich, 30 November-4 December 1998 | null | null | null | cs.SE | null | Systematic testing of object-oriented software turned out to be much more
complex than testing conventional software. Especially the highly incremental
and iterative development cycle demands both many more changes and partially
implemented resp. re-implemented classes. Much more integration and regression
testing has to be done to reach stable stages during the development. In this
presentation we propose a diagram capturing all possible dependencies and
interactions in an object-oriented program. Then we give algorithms and
coverage criteria to identify integration resp. regression test strategys and
all test cases to be executed after some implementation resp. modification
activities. Finally, we summarize some practical experiences and heuristics.
| [
{
"version": "v1",
"created": "Fri, 5 Feb 1999 12:01:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Winter",
"Mario",
""
]
] |
cs/9902009 | Roger Hartley | Roger T. Hartley, Kathleen Crumpton | Quality of OCR for Degraded Text Images | 7 pages | null | null | null | cs.DL | null | Commercial OCR packages work best with high-quality scanned images. They
often produce poor results when the image is degraded, either because the
original itself was poor quality, or because of excessive photocopying. The
ability to predict the word failure rate of OCR from a statistical analysis of
the image can help in making decisions in the trade-off between the success
rate of OCR and the cost of human correction of errors. This paper describes an
investigation of OCR of degraded text images using a standard OCR engine (Adobe
Capture). The documents were selected from those in the archive at Los Alamos
National Laboratory. By introducing noise in a controlled manner into perfect
documents, we show how the quality of OCR can be predicted from the nature of
the noise. The preliminary results show that a simple noise model can give good
prediction of the number of OCR errors.
| [
{
"version": "v1",
"created": "Fri, 5 Feb 1999 20:52:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hartley",
"Roger T.",
""
],
[
"Crumpton",
"Kathleen",
""
]
] |
cs/9902010 | Stiglic Anton | Adam Smith and Anton Stiglic | Multiparty computation unconditionally secure against Q^2 adversary
structures | 11 pages. McGill University School of Computer Science tech. report | null | null | SOCS-98.2 | cs.CR | null | We present here a generalization of the work done by Rabin and Ben-Or. We
give a protocol for multiparty computation which tolerates any Q^2 active
adversary structure based on the existence of a broadcast channel, secure
communication between each pair of participants, and a monotone span program
with multiplication tolerating the structure. The secrecy achieved is
unconditional although we allow an exponentially small probability of error.
This is possible due to a protocol for computing the product of two values
already shared by means of a homomorphic commitment scheme which appeared
originally in a paper of Chaum, Evertse and van de Graaf.
| [
{
"version": "v1",
"created": "Mon, 8 Feb 1999 23:33:46 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Smith",
"Adam",
""
],
[
"Stiglic",
"Anton",
""
]
] |
cs/9902011 | Raymond J. Mooney | Raymond J. Mooney and Loriene Roy (University of Texas at Austin) | Content-Based Book Recommending Using Learning for Text Categorization | 8 pages, 3 figures, Submission to Fourth ACM Conference on Digital
Libraries | null | null | null | cs.DL | null | Recommender systems improve access to relevant products and information by
making personalized suggestions based on previous examples of a user's likes
and dislikes. Most existing recommender systems use social filtering methods
that base recommendations on other users' preferences. By contrast,
content-based methods use information about an item itself to make suggestions.
This approach has the advantage of being able to recommended previously unrated
items to users with unique interests and to provide explanations for its
recommendations. We describe a content-based book recommending system that
utilizes information extraction and a machine-learning algorithm for text
categorization. Initial experimental results demonstrate that this approach can
produce accurate recommendations.
| [
{
"version": "v1",
"created": "Sun, 7 Feb 1999 20:03:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mooney",
"Raymond J.",
"",
"University of Texas at Austin"
],
[
"Roy",
"Loriene",
"",
"University of Texas at Austin"
]
] |
cs/9902012 | Robert e. McGrath | Robert E. McGrath, Joe Futrelle, Ray Plante, Damien Guillaume | Digital Library Technology for Locating and Accessing Scientific Data | null | null | null | null | cs.DL | null | In this paper we describe our efforts to bring scientific data into the
digital library. This has required extension of the standard WWW, and also the
extension of metadata standards far beyond the Dublin Core. Our system
demonstrates this technology for real scientific data from astronomy.
| [
{
"version": "v1",
"created": "Sun, 7 Feb 1999 20:06:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"McGrath",
"Robert E.",
""
],
[
"Futrelle",
"Joe",
""
],
[
"Plante",
"Ray",
""
],
[
"Guillaume",
"Damien",
""
]
] |
cs/9902013 | Robert K. France | Robert K. France, Lucy Terry Nowell, Edward A. Fox, Rani A. Saad and
Jianxin Zhao | Use and usability in a digital library search system | System paper | null | null | null | cs.DL | null | Digital libraries must reach out to users from all walks of life, serving
information needs at all levels. To do this, they must attain high standards of
usability over an extremely broad audience. This paper details the evolution of
one important digital library component as it has grown in functionality and
usefulness over several years of use by a live, unrestricted community. Central
to its evolution have been user studies, analysis of use patterns, and
formative usability evaluation. We extrapolate that all three components are
necessary in the production of successful digital library systems.
| [
{
"version": "v1",
"created": "Mon, 8 Feb 1999 23:08:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"France",
"Robert K.",
""
],
[
"Nowell",
"Lucy Terry",
""
],
[
"Fox",
"Edward A.",
""
],
[
"Saad",
"Rani A.",
""
],
[
"Zhao",
"Jianxin",
""
]
] |
cs/9902014 | Barry M. Leiner | Barry M. Leiner and Ekaterina A. Drozdova | Proceedings from Critical Infrastructure: The Path Ahead (XIWT Symposium
on Cross-Industry Activities for Information Infrastructure Robustness) | null | null | null | null | cs.NI | null | The Cross-Industry Working Team (XIWT), with the support of the Stanford
University Consortium for Research on Information Security and Policy (CRISP),
sponsored a symposium on cross-industry activities aimed at improving the
reliability, dependability, and robustness of the information infrastructure.
Held 3-4 November 1998 in Crystal City, Virginia, the symposium engaged
representatives from industry, academia, and government in discussion of
current and potential cross-industry, cross-sector activities including
information exchange, collaborative operations, and cooperative research and
development. This proceedings summarizes the discussions and results of the
meeting.
| [
{
"version": "v1",
"created": "Mon, 8 Feb 1999 22:46:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Leiner",
"Barry M.",
""
],
[
"Drozdova",
"Ekaterina A.",
""
]
] |
cs/9902015 | Franck Chevalier | Franck Chevalier, David Harle, Geoffrey Smith | Resource Discovery in Trilogy | 9 pages, 5 figures, DL'99 conference | null | null | STRA1 | cs.DL cs.AI cs.MA | null | Trilogy is a collaborative project whose key aim is the development of an
integrated virtual laboratory to support research training within each
institution and collaborative projects between the partners. In this paper, the
architecture and underpinning platform of the system is described with
particular emphasis being placed on the structure and the integration of the
distributed database. A key element is the ontology that provides the
multi-agent system with a conceptualisation specification of the domain; this
ontology is explained, accompanied by a discussion how such a system is
integrated and used within the virtual laboratory. Although in this paper,
Telecommunications and in particular Broadband networks are used as exemplars,
the underlying system principles are applicable to any domain where a
combination of experimental and literature-based resources are required.
| [
{
"version": "v1",
"created": "Mon, 8 Feb 1999 21:23:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chevalier",
"Franck",
""
],
[
"Harle",
"David",
""
],
[
"Smith",
"Geoffrey",
""
]
] |
cs/9902016 | Ye Jian | Michael J. Hu, Ye Jian | Multimedia Description Framework (MDF) for Content Description of
Audio/Video Documents | 20 pages | null | null | null | cs.DL | null | MPEG is undertaking a new initiative to standardize content description of
audio and video data/documents. When it is finalized in 2001, MPEG-7 is
expected to provide standardized description schemes for concise and
unambiguous content description of data/documents of complex media types.
Meanwhile, other meta-data or description schemes, such as Dublin Core, XML,
etc., are becoming popular in different application domains. In this paper, we
propose the Multimedia Description Framework (MDF), which is designated to
accommodate multiple description (meta-data) schemes, both MPEG-7 and
non-MPEG-7, into integrated architecture. We will use examples to show how MDF
description makes use of combined strength of different description schemes to
enhance its expression power and flexibility. We conclude the paper with
discussion of using MDF description of a movie video to search/retrieve
required scene clips from the movie, on the MDF prototype system we have
implemented.
| [
{
"version": "v1",
"created": "Tue, 9 Feb 1999 02:17:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hu",
"Michael J.",
""
],
[
"Jian",
"Ye",
""
]
] |
cs/9902017 | Kurt D. Bollacker | Not Available | Not Available | null | null | null | null | cs.DL cs.DB | null | withdrawn by author
| [
{
"version": "v1",
"created": "Tue, 9 Feb 1999 04:02:55 GMT"
},
{
"version": "v2",
"created": "Thu, 11 Feb 1999 18:31:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Available",
"Not",
""
]
] |
cs/9902019 | Wei Ding | Wei Ding, Gary Marchionini, Dagobert Soergel | Multimodal Surrogates for Video Browsing | 11 pages | null | null | null | cs.DL cs.HC | null | Three types of video surrogates - visual (keyframes), verbal
(keywords/phrases), and combination of the two - were designed and studied in a
qualitative investigation of user cognitive processes. The results favor the
combined surrogates in which verbal information and images reinforce each
other, lead to better comprehension, and may actually require less processing
time. The results also highlight image features users found most helpful. These
findings will inform the interface design and video representation for video
retrieval and browsing.
| [
{
"version": "v1",
"created": "Tue, 9 Feb 1999 04:56:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ding",
"Wei",
""
],
[
"Marchionini",
"Gary",
""
],
[
"Soergel",
"Dagobert",
""
]
] |
cs/9902020 | Carl Lagoze | Naomi Dushay, James C. French, and Carl Lagoze | Using Query Mediators for Distributed Searching in Federated Digital
Libraries | Submission to ACM DL99 Conference | null | null | null | cs.DL | null | We describe an architecture and investigate the characteristics of
distributed searching in federated digital libraries. We introduce the notion
of a query mediator as a digital library service responsible for selecting
among available search engines, routing queries to those search engines, and
aggregating results. We examine operational data from the NCSTRL distributed
digital library that reveals a number of characteristics of distributed
resource discovery. These include availability and response time of indexers
and the distinction between the query mediator view of these characteristics
and the indexer view.
| [
{
"version": "v1",
"created": "Tue, 9 Feb 1999 05:18:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dushay",
"Naomi",
""
],
[
"French",
"James C.",
""
],
[
"Lagoze",
"Carl",
""
]
] |
cs/9902021 | Sung Hyon Myaeng | Sa-Kwang Song & Sung Hyon Myaeng | Visualization of Retrieved Documents using a Presentation Server | 13 pages | null | null | null | cs.DL cs.IR | null | In any search-based digital library (DL) systems dealing with a non-trivial
number of documents, users are often required to go through a long list of
short document descriptions in order to identify what they are looking for. To
tackle the problem, a variety of document organization algorithms and/or
visualization techniques have been used to guide users in selecting relevant
documents. Since these techniques require heavy computations, however, we
developed a presentation server designed to serve as an intermediary between
retrieval servers and clients equipped with a visualization interface. In
addition, we designed our own visual interface by which users can view a set of
documents from different perspectives through layers of document maps. We
finally ran experiments to show that the visual interface, in conjunction with
the presentation server, indeed helps users in selecting relevant documents
from the retrieval results.
| [
{
"version": "v1",
"created": "Wed, 10 Feb 1999 09:30:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Song",
"Sa-Kwang",
""
],
[
"Myaeng",
"Sung Hyon",
""
]
] |
cs/9902022 | Ulrich Schiel | Ulrich Schiel, Ianna M. Sodre Ferreira de Souza and Edberto Ferneda | Semi-Automatic Indexing of Multilingual Documents | 9 pages. Submission to the Fourth ACM Conference on Digital Libraries | null | null | null | cs.DL | null | With the growing significance of digital libraries and the Internet, more and
more electronic texts become accessible to a wide and geographically disperse
public. This requires adequate tools to facilitate indexing, storage, and
retrieval of documents written in different languages. We present a method for
semi-automatic indexing of electronic documents and construction of a
multilingual thesaurus, which can be used for query formulation and information
retrieval. We use special dictionaries and user interaction in order to solve
ambiguities and find adequate canonical terms in the language and adequate
abstract language-independent terms. The abstract thesaurus is updated
incrementally by new indexed documents and is used to search document
concerning terms in a query to the document base.
| [
{
"version": "v1",
"created": "Thu, 11 Feb 1999 00:19:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Schiel",
"Ulrich",
""
],
[
"de Souza",
"Ianna M. Sodre Ferreira",
""
],
[
"Ferneda",
"Edberto",
""
]
] |
cs/9902023 | Martin Wechsler | Martin Wechsler, Peter Schauble | A New Ranking Principle for Multimedia Information Retrieval | submission for DL'99. conference compliant format (two-column, etc.)
will be produced later | null | null | null | cs.DL | null | A theoretic framework for multimedia information retrieval is introduced
which guarantees optimal retrieval effectiveness. In particular, a Ranking
Principle for Distributed Multimedia-Documents (RPDM) is described together
with an algorithm that satisfies this principle. Finally, the RPDM is shown to
be a generalization of the Probability Ranking principle (PRP) which guarantees
optimal retrieval effectiveness in the case of text document retrieval. The PRP
justifies theoretically the relevance ranking adopted by modern search engines.
In contrast to the classical PRP, the new RPDM takes into account transmission
and inspection time, and most importantly, aspectual recall rather than simple
recall.
| [
{
"version": "v1",
"created": "Thu, 11 Feb 1999 12:33:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wechsler",
"Martin",
""
],
[
"Schauble",
"Peter",
""
]
] |
cs/9902024 | Gregory Khanlarov | Alexander V. Bogdanov, Nick Yu. Bykov, Igor A. Grishin, Gregory O.
Khanlarov, German A. Lukianov and Vladimir V. Zakharov | Algorithms of Two-Level Parallelization for DSMC of Unsteady Flows in
Molecular Gasdynamics | 20 pages, 17 postscript figures Submitted to the conference HPCN
Europe 99 | null | null | 10-98 | cs.CE cs.PF | null | The general scheme of two-level parallelization (TLP) for direct simulation
Monte Carlo of unsteady gas flows on shared memory multiprocessor computers has
been described. The high efficient algorithm of parallel independent runs is
used on the first level. The data parallelization is employed for the second
one. Two versions of TLP algorithm are elaborated with static and dynamic load
balancing. The method of dynamic processor reallocation is used for dynamic
load balancing. Two gasdynamic unsteady problems were used to study speedup and
efficiency of the algorithms. The conditions of efficient application field for
the algorithms have been determined.
| [
{
"version": "v1",
"created": "Thu, 11 Feb 1999 13:13:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bogdanov",
"Alexander V.",
""
],
[
"Bykov",
"Nick Yu.",
""
],
[
"Grishin",
"Igor A.",
""
],
[
"Khanlarov",
"Gregory O.",
""
],
[
"Lukianov",
"German A.",
""
],
[
"Zakharov",
"Vladimir V.",
""
]
] |
cs/9902025 | Mattias Ohlsson | Mattias Ohlsson, Carsten Peterson and Bo S\"oderberg | An Efficient Mean Field Approach to the Set Covering Problem | 17 pages, 2 figures | null | null | null | cs.NE | null | A mean field feedback artificial neural network algorithm is developed and
explored for the set covering problem. A convenient encoding of the inequality
constraints is achieved by means of a multilinear penalty function. An
approximate energy minimum is obtained by iterating a set of mean field
equations, in combination with annealing. The approach is numerically tested
against a set of publicly available test problems with sizes ranging up to
5x10^3 rows and 10^6 columns. When comparing the performance with exact results
for sizes where these are available, the approach yields results within a few
percent from the optimal solutions. Comparisons with other approximate methods
also come out well, in particular given the very low CPU consumption required
-- typically a few seconds. Arbitrary problems can be processed using the
algorithm via a public domain server.
| [
{
"version": "v1",
"created": "Fri, 12 Feb 1999 09:18:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ohlsson",
"Mattias",
""
],
[
"Peterson",
"Carsten",
""
],
[
"Söderberg",
"Bo",
""
]
] |
cs/9902026 | Andris Ambainis | Andris Ambainis | Probabilistic Inductive Inference:a Survey | 16 pages, to appear in Theoretical Computer Science | null | null | null | cs.LG cs.CC cs.LO math.LO | null | Inductive inference is a recursion-theoretic theory of learning, first
developed by E. M. Gold (1967). This paper surveys developments in
probabilistic inductive inference. We mainly focus on finite inference of
recursive functions, since this simple paradigm has produced the most
interesting (and most complex) results.
| [
{
"version": "v1",
"created": "Mon, 15 Feb 1999 01:52:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ambainis",
"Andris",
""
]
] |
cs/9902027 | Mark D. Roberts | Mark D. Roberts | Autocatalytic Theory of Meaning | 4 pages, no diagrams, LaTex2e | PSYCHOLOQUY.99.10.014 | null | null | cs.CL adap-org nlin.AO | null | Recently it has been argued that autocatalytic theory could be applied to the
origin of culture. Here possible application to a theory of meaning in the
philosophy of language, called radical interpretation, is commented upon and
compared to previous applications.
| [
{
"version": "v1",
"created": "Tue, 16 Feb 1999 15:34:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Roberts",
"Mark D.",
""
]
] |
cs/9902028 | Donald Byrd | Donald Byrd | A Scrollbar-based Visualization for Document Navigation | 2 figures, about 12 pages; corrected references, added librarians'
Comments on the visualization | null | null | IR-163 | cs.IR cs.HC | null | We are interested in questions of improving user control in best-match
text-retrieval systems, specifically questions as to whether simple
visualizations that nonetheless go beyond the minimal ones generally available
can significantly help users. Recently, we have been investigating ways to help
users decide-given a set of documents retrieved by a query-which documents and
passages are worth closer examination. We built a document viewer incorporating
a visualization centered around a novel content-displaying scrollbar and color
term highlighting, and studied whether the visualization is helpful to
non-expert searchers. Participants' reaction to the visualization was very
positive, while the objective results were inconclusive.
| [
{
"version": "v1",
"created": "Wed, 24 Feb 1999 17:10:46 GMT"
},
{
"version": "v2",
"created": "Thu, 25 Feb 1999 16:35:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Byrd",
"Donald",
""
]
] |
cs/9902029 | Roberta Catizone | Yorick Wilks | The "Fodor"-FODOR fallacy bites back | null | null | null | cs-98-13 | cs.CL | null | The paper argues that Fodor and Lepore are misguided in their attack on
Pustejovsky's Generative Lexicon, largely because their argument rests on a
traditional, but implausible and discredited, view of the lexicon on which it
is effectively empty of content, a view that stands in the long line of
explaining word meaning (a) by ostension and then (b) explaining it by means of
a vacuous symbol in a lexicon, often the word itself after typographic
transmogrification. (a) and (b) both share the wrong belief that to a word must
correspond a simple entity that is its meaning. I then turn to the semantic
rules that Pustejovsky uses and argue first that, although they have novel
features, they are in a well-established Artificial Intelligence tradition of
explaining meaning by reference to structures that mention other structures
assigned to words that may occur in close proximity to the first. It is argued
that Fodor and Lepore's view that there cannot be such rules is without
foundation, and indeed systems using such rules have proved their practical
worth in computational systems. Their justification descends from line of
argument, whose high points were probably Wittgenstein and Quine that meaning
is not to be understood by simple links to the world, ostensive or otherwise,
but by the relationship of whole cultural representational structures to each
other and to the world as a whole.
| [
{
"version": "v1",
"created": "Thu, 25 Feb 1999 14:41:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wilks",
"Yorick",
""
]
] |
cs/9902030 | Roberta Catizone | Yorick Wilks | Is Word Sense Disambiguation just one more NLP task? | null | null | null | cs-98-12 | cs.CL | null | This paper compares the tasks of part-of-speech (POS) tagging and
word-sense-tagging or disambiguation (WSD), and argues that the tasks are not
related by fineness of grain or anything like that, but are quite different
kinds of task, particularly becuase there is nothing in POS corresponding to
sense novelty. The paper also argues for the reintegration of sub-tasks that
are being separated for evaluation
| [
{
"version": "v1",
"created": "Thu, 25 Feb 1999 14:41:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wilks",
"Yorick",
""
]
] |
cs/9903001 | Robert Milson | R. Milson | Introduction to the RSA algorithm and modular arithmetic | Notes for the Dalhousie Integrated Science Program | null | null | null | cs.CR | null | These notes are a brief introduction to the RSA algorithm and modular
arithmetic. They are intended for an undergraduate audience.
| [
{
"version": "v1",
"created": "Mon, 1 Mar 1999 02:44:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Milson",
"R.",
""
]
] |
cs/9903002 | Jan Heering | T. B. Dinesh (Academic Systems Corp.), M. Haveraaen (UiB) and J.
Heering (CWI) | An Algebraic Programming Style for Numerical Software and its
Optimization | 19 pages. Submitted to Scientific Programming | Scientific Programming 8 (2000) 4 pages 247-259 (Special issue on
coordinate-free numerics) | null | SEN-R9844 (CWI, Amsterdam) | cs.SE cs.AI cs.CE cs.MS | null | The abstract mathematical theory of partial differential equations (PDEs) is
formulated in terms of manifolds, scalar fields, tensors, and the like, but
these algebraic structures are hardly recognizable in actual PDE solvers. The
general aim of the Sophus programming style is to bridge the gap between theory
and practice in the domain of PDE solvers. Its main ingredients are a library
of abstract datatypes corresponding to the algebraic structures used in the
mathematical theory and an algebraic expression style similar to the expression
style used in the mathematical theory. Because of its emphasis on abstract
datatypes, Sophus is most naturally combined with object-oriented languages or
other languages supporting abstract datatypes. The resulting source code
patterns are beyond the scope of current compiler optimizations, but are
sufficiently specific for a dedicated source-to-source optimizer. The limited,
domain-specific, character of Sophus is the key to success here. This kind of
optimization has been tested on computationally intensive Sophus style code
with promising results. The general approach may be useful for other styles and
in other application domains as well.
| [
{
"version": "v1",
"created": "Mon, 1 Mar 1999 11:03:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dinesh",
"T. B.",
"",
"Academic Systems Corp."
],
[
"Haveraaen",
"M.",
"",
"UiB"
],
[
"Heering",
"J.",
"",
"CWI"
]
] |
cs/9903003 | Steven Bird | Steven Bird and Mark Liberman (University of Pennsylvania) | A Formal Framework for Linguistic Annotation | 49 pages | null | null | Tech Report MS-CIS-99-01, Dept of Computer and Information Science | cs.CL | null | `Linguistic annotation' covers any descriptive or analytic notations applied
to raw language data. The basic data may be in the form of time functions --
audio, video and/or physiological recordings -- or it may be textual. The added
notations may include transcriptions of all sorts (from phonetic features to
discourse structures), part-of-speech and sense tagging, syntactic analysis,
`named entity' identification, co-reference annotation, and so on. While there
are several ongoing efforts to provide formats and tools for such annotations
and to publish annotated linguistic databases, the lack of widely accepted
standards is becoming a critical problem. Proposed standards, to the extent
they exist, have focussed on file formats. This paper focuses instead on the
logical structure of linguistic annotations. We survey a wide variety of
existing annotation formats and demonstrate a common conceptual core, the
annotation graph. This provides a formal framework for constructing,
maintaining and searching linguistic annotations, while remaining consistent
with many alternative data structures and file formats.
| [
{
"version": "v1",
"created": "Tue, 2 Mar 1999 12:30:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bird",
"Steven",
"",
"University of Pennsylvania"
],
[
"Liberman",
"Mark",
"",
"University of Pennsylvania"
]
] |
cs/9903005 | Lecomte Pierre | Pierre B. A. Lecomte, Michel Rigo | Numeration systems on a regular language | 15 pages | null | null | null | cs.OH | null | Generalizations of linear numeration systems in which the set of natural
numbers is recognizable by finite automata are obtained by describing an
arbitrary infinite regular language following the lexicographic ordering. For
these systems of numeration, we show that ultimately periodic sets are
recognizable. We also study the translation and the multiplication by constants
as well as the order dependence of the recognizability.
| [
{
"version": "v1",
"created": "Thu, 4 Mar 1999 08:35:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lecomte",
"Pierre B. A.",
""
],
[
"Rigo",
"Michel",
""
]
] |
cs/9903006 | Anatoly D. Plotnikov | Anatoly D. Plotnikov (Vinnitsa Institute of Regional Economics and
Management) | Designing SAT for HCP | 7 pages, 1 figures. It has sent to 6th Twente Workshop on Graphs and
Combinatorial Optimization | null | null | null | cs.LO | null | For arbitrary undirected graph $G$, we are designing SATISFIABILITY problem
(SAT) for HCP, using tools of Boolean algebra only. The obtained SAT be the
logic formulation of conditions for Hamiltonian cycle existence, and use $m$
Boolean variables, where $m$ is the number of graph edges. This Boolean
expression is true if and only if an initial graph is Hamiltonian. That is,
each satisfying assignment of the Boolean variables determines a Hamiltonian
cycle of $G$, and each Hamiltonian cycle of $G$ corresponds to a satisfying
assignment of the Boolean variables. In common case, the obtained Boolean
expression may has an exponential length (the number of Boolean literals).
| [
{
"version": "v1",
"created": "Fri, 5 Mar 1999 16:10:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Plotnikov",
"Anatoly D.",
"",
"Vinnitsa Institute of Regional Economics and\n Management"
]
] |
cs/9903007 | Marc Dymetman | Marc Dymetman | Some Remarks on the Geometry of Grammar | 22 pages, 15 figures | null | null | null | cs.CL cs.LO | null | This paper, following (Dymetman:1998), presents an approach to grammar
description and processing based on the geometry of cancellation diagrams, a
concept which plays a central role in combinatorial group theory
(Lyndon-Schuppe:1977). The focus here is on the geometric intuitions and on
relating group-theoretical diagrams to the traditional charts associated with
context-free grammars and type-0 rewriting systems. The paper is structured as
follows. We begin in Section 1 by analyzing charts in terms of constructs
called cells, which are a geometrical counterpart to rules. Then we move in
Section 2 to a presentation of cancellation diagrams and show how they can be
used computationally. In Section 3 we give a formal algebraic presentation of
the concept of group computation structure, which is based on the standard
notions of free group and conjugacy. We then relate in Section 4 the geometric
and the algebraic views of computation by using the fundamental theorem of
combinatorial group theory (Rotman:1994). In Section 5 we study in more detail
the relationship between the two views on the basis of a simple grammar stated
as a group computation structure. In section 6 we extend this grammar to handle
non-local constructs such as relative pronouns and quantifiers. We conclude in
Section 7 with some brief notes on the differences between normal submonoids
and normal subgroups, group computation versus rewriting systems, and the use
of group morphisms to study the computational complexity of parsing and
generation.
| [
{
"version": "v1",
"created": "Fri, 5 Mar 1999 18:25:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dymetman",
"Marc",
""
]
] |
cs/9903008 | Diane Litman | Diane J. Litman (AT&T Labs - Research) and Shimei Pan (Columbia
University) | Empirically Evaluating an Adaptable Spoken Dialogue System | to be published in the Proceedings of the 7th International
Conference on User Modeling (UM'99); uses llncs.cls,um97.sty | null | null | null | cs.CL | null | Recent technological advances have made it possible to build real-time,
interactive spoken dialogue systems for a wide variety of applications.
However, when users do not respect the limitations of such systems, performance
typically degrades. Although users differ with respect to their knowledge of
system limitations, and although different dialogue strategies make system
limitations more apparent to users, most current systems do not try to improve
performance by adapting dialogue behavior to individual users. This paper
presents an empirical evaluation of TOOT, an adaptable spoken dialogue system
for retrieving train schedules on the web. We conduct an experiment in which 20
users carry out 4 tasks with both adaptable and non-adaptable versions of TOOT,
resulting in a corpus of 80 dialogues. The values for a wide range of
evaluation measures are then extracted from this corpus. Our results show that
adaptable TOOT generally outperforms non-adaptable TOOT, and that the utility
of adaptation depends on TOOT's initial dialogue strategies.
| [
{
"version": "v1",
"created": "Fri, 5 Mar 1999 22:03:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Litman",
"Diane J.",
"",
"AT&T Labs - Research"
],
[
"Pan",
"Shimei",
"",
"Columbia\n University"
]
] |
cs/9903009 | Paul Vitanyi | Harry Buhrman (CWI), Jaap-Henk Hoepman, Paul Vitanyi (CWI and
University of Amsterdam) | Space-Efficient Routing Tables for Almost All Networks and the
Incompressibility Method | 19 pages, Latex, 1 table, 1 figure; SIAM J. Comput., To appear | null | null | CWI Tech Report 1997 | cs.DC cs.AR cs.CC cs.DS cs.NI | null | We use the incompressibility method based on Kolmogorov complexity to
determine the total number of bits of routing information for almost all
network topologies. In most models for routing, for almost all labeled graphs
$\Theta (n^2)$ bits are necessary and sufficient for shortest path routing. By
`almost all graphs' we mean the Kolmogorov random graphs which constitute a
fraction of $1-1/n^c$ of all graphs on $n$ nodes, where $c > 0$ is an arbitrary
fixed constant. There is a model for which the average case lower bound rises
to $\Omega(n^2 \log n)$ and another model where the average case upper bound
drops to $O(n \log^2 n)$. This clearly exposes the sensitivity of such bounds
to the model under consideration. If paths have to be short, but need not be
shortest (if the stretch factor may be larger than 1), then much less space is
needed on average, even in the more demanding models. Full-information routing
requires $\Theta (n^3)$ bits on average. For worst-case static networks we
prove a $\Omega(n^2 \log n)$ lower bound for shortest path routing and all
stretch factors $<2$ in some networks where free relabeling is not allowed.
| [
{
"version": "v1",
"created": "Wed, 10 Mar 1999 19:01:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Buhrman",
"Harry",
"",
"CWI"
],
[
"Hoepman",
"Jaap-Henk",
"",
"CWI and\n University of Amsterdam"
],
[
"Vitanyi",
"Paul",
"",
"CWI and\n University of Amsterdam"
]
] |
cs/9903010 | Anatoly D. Plotnikov | Anatoly D. Plotnikov (Vinnitsa Institute of Regional Economics and
Management) | A class of problems of NP to be worth to search an efficient solving
algorithm | 9 pages, 1 figures | null | null | null | cs.DS | null | We examine possibility to design an efficient solving algorithm for problems
of the class \np. It is introduced a classification of \np problems by the
property that a partial solution of size $k$ can be extended into a partial
solution of size $k+1$ in polynomial time. It is defined an unique class
problems to be worth to search an efficient solving algorithm. The problems,
which are outside of this class, are inherently exponential. We show that the
Hamiltonian cycle problem is inherently exponential.
| [
{
"version": "v1",
"created": "Thu, 11 Mar 1999 19:36:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Plotnikov",
"Anatoly D.",
"",
"Vinnitsa Institute of Regional Economics and\n Management"
]
] |
cs/9903011 | Stephan Mertens | Stephan Mertens | A complete anytime algorithm for balanced number partitioning | 12 pages, 5 figures | null | null | null | cs.DS cond-mat.dis-nn cs.AI | null | Given a set of numbers, the balanced partioning problem is to divide them
into two subsets, so that the sum of the numbers in each subset are as nearly
equal as possible, subject to the constraint that the cardinalities of the
subsets be within one of each other. We combine the balanced largest
differencing method (BLDM) and Korf's complete Karmarkar-Karp algorithm to get
a new algorithm that optimally solves the balanced partitioning problem. For
numbers with twelve significant digits or less, the algorithm can optimally
solve balanced partioning problems of arbitrary size in practice. For numbers
with greater precision, it first returns the BLDM solution, then continues to
find better solutions as time allows.
| [
{
"version": "v1",
"created": "Thu, 11 Mar 1999 22:38:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mertens",
"Stephan",
""
]
] |
cs/9903012 | Anatoly D. Plotnikov | Anatoly D. Plotnikov | Formalization of the class of problems solvable by a nondeterministic
Turing machine | 10 pages, 2 figures | Cybernetics and Systems Analysis. Vol. 33, 5(1997) pp. 635-640 | null | null | cs.DS cs.CC | null | The objective of this article is to formalize the definition of NP problems.
We construct a mathematical model of discrete problems as independence
systems with weighted elements. We introduce two auxiliary sets that
characterize the solution of the problem: the adjoint set, which contains the
elements from the original set none of which can be adjoined to the already
chosen solution elements; and the residual set, in which every element can be
adjoined to previously chosen solution elements.
In a problem without lookahead, every adjoint set can be generated by the
solution algorithm effectively, in polynomial time.
The main result of the study is the assertion that the NP class is identical
with the class of problems without lookahead. Hence it follows that if we fail
to find an effective (polynomial-time) solution algorithm for a given problem,
then we need to look for an alternative formulation of the problem in set of
problems without lookahead.
| [
{
"version": "v1",
"created": "Tue, 16 Mar 1999 17:13:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Plotnikov",
"Anatoly D.",
""
]
] |
cs/9903013 | Tapas K. Das | Tapas Kumar Das | The Impact of Net Culture on Mainstream Societies: a Global Analysis | 8 pages, no figure, Submitted to The Economic and Political Weekly | null | null | null | cs.CY | null | In this work the impact of the Internet culture on standard mainstream
societies has been analyzed. After analytically establishing the fact that the
Net can be viewed as a pan-societal superstructure which supports its own
distinct culture, an ethnographic analysis is provided to find out the key
aspects of this culture. The elements of this culture which have an empowering
impacts on the standard mainstream societies, as well as the elements in it
which can cause discouraging social effects are then discussed by a global
investigation of the present status of various fundamental aspects (e,g,
education, economics, politics, entertainment etc) of the mainstream societies
as well as their links with the Net culture. Though immensely potential for
providing various prominent positive impacts, the key findings of this work
indicate that misuse of Internet can create tremendous harm to the members of
the mainstream societies by generating a set of morally crippled people as well
as a future generation completely void of principles and ethics. This
structured diagnostic approach to the social problems caused by the manhandling
of Internet leads to a concrete effort of providing the measures that can be
taken to enhance or to overcome the supporting and limiting effects of the Net
culture respectively with the intent to benefit our society and to protect the
teratoidation of certain ethical values.
| [
{
"version": "v1",
"created": "Thu, 18 Mar 1999 17:01:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Das",
"Tapas Kumar",
""
]
] |
cs/9903014 | Thomas Kistler | Thomas Kistler and Michael Franz | Perpetual Adaptation of Software to Hardware: An Extensible Architecture
for Providing Code Optimization as a Central System Service | 22 pages | null | null | ICS-TR-99-12 | cs.OS cs.PL | null | We present an open architecture for just-in-time code generation and dynamic
code optimization that is flexible, customizable, and extensible. While
previous research has primarily investigated functional aspects of such a
system, architectural aspects have so far remained unexplored. In this paper,
we argue that these properties are important to generate optimal code for a
variety of hardware architectures and different processor generations within
processor families. These properties are also important to make system-level
code generation useful in practice.
| [
{
"version": "v1",
"created": "Mon, 22 Mar 1999 21:24:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kistler",
"Thomas",
""
],
[
"Franz",
"Michael",
""
]
] |
cs/9903015 | Geoffrey McKim | Rob Kling and Geoffrey McKim | Scholarly Communication and the Continuum of Electronic Publishing | 35 pages | Journal of the American Society for Information Science 50(10):
890-906. (July 19, 1999) | null | null | cs.CY physics.soc-ph | null | Electronic publishing opportunities, manifested today in a variety of
electronic journals and Web-based compendia, have captured the imagination of
many scholars. These opportunities have also destabilized norms about the
character of legitimate scholarly publishing in some fields. Unfortunately,
much of the literature about scholarly e-publishing homogenizes the character
of publishing. This article provides an analytical approach for evaluating
disciplinary conventions and for proposing policies about scholarly
e-publishing. We characterize three dimensions of scholarly publishing as a
communicative practice -- publicity, access, and trustworthiness, and examine
several forms of paper and electronic publications in this framework. This
analysis shows how the common claim that e-publishing "substantially expands
access" is over-simplified. It also indicates how peer-reviewing (whether in
paper or electronically) provides valuable functions for scholarly
communication that are not effectively replaced by self-posting articles in
electronic media.
| [
{
"version": "v1",
"created": "Tue, 23 Mar 1999 02:05:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kling",
"Rob",
""
],
[
"McKim",
"Geoffrey",
""
]
] |
cs/9903016 | Journal of Artificial Intelligence Research | N Friedman, J.Y. Halpern | Modeling Belief in Dynamic Systems, Part II: Revision and Update | See http://www.jair.org/ for other files accompanying this article | Journal of Artificial Intelligence Research, Vol.10 (1999) 117-167 | null | null | cs.AI | null | The study of belief change has been an active area in philosophy and AI. In
recent years two special cases of belief change, belief revision and belief
update, have been studied in detail. In a companion paper (Friedman & Halpern,
1997), we introduce a new framework to model belief change. This framework
combines temporal and epistemic modalities with a notion of plausibility,
allowing us to examine the change of beliefs over time. In this paper, we show
how belief revision and belief update can be captured in our framework. This
allows us to compare the assumptions made by each method, and to better
understand the principles underlying them. In particular, it shows that Katsuno
and Mendelzon's notion of belief update (Katsuno & Mendelzon, 1991a) depends on
several strong assumptions that may limit its applicability in artificial
intelligence. Finally, our analysis allow us to identify a notion of minimal
change that underlies a broad range of belief change operations including
revision and update.
| [
{
"version": "v1",
"created": "Wed, 24 Mar 1999 00:22:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Friedman",
"N",
""
],
[
"Halpern",
"J. Y.",
""
]
] |
cs/9903017 | Martin Meier-Schellersheim | M. Meier-Schellersheim, G. Mack | SIMMUNE, a tool for simulating and analyzing immune system behavior | 23 pages, 10 figures | null | null | DESY-99-034 | cs.MA q-bio | null | We present a new approach to the simulation and analysis of immune system
behavior. The simulations that can be done with our software package called
SIMMUNE are based on immunological data that describe the behavior of immune
system agents (cells, molecules) on a microscopial (i.e. agent-agent
interaction) scale by defining cellular stimulus-response mechanisms. Since the
behavior of the agents in SIMMUNE can be very flexibly configured, its
application is not limited to immune system simulations. We outline the
principles of SIMMUNE's multiscale analysis of emergent structure within the
simulated immune system that allow the identification of immunological contexts
using minimal a priori assumptions about the higher level organization of the
immune system.
| [
{
"version": "v1",
"created": "Sun, 28 Mar 1999 20:46:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Meier-Schellersheim",
"M.",
""
],
[
"Mack",
"G.",
""
]
] |
cs/9903018 | Carlos Cassino | Carlos Cassino, Roberto Ierusalimschy, and Noemi Rodriguez | LuaJava - A Scripting Tool for Java | 10 pages, LaTeX, 1 figure. Available at
http://www.tecgraf.puc-rio.br/~cassino/luajava | null | null | PUC-RioInf.MCC02/99 | cs.SE | null | Scripting languages are becoming more and more important as a tool for
software development, as they provide great flexibility for rapid prototyping
and for configuring componentware applications. In this paper we present
LuaJava, a scripting tool for Java. LuaJava adopts Lua, a dynamically typed
interpreted language, as its script language. Great emphasis is given to the
transparency of the integration between the two languages, so that objects from
one language can be used inside the other like native objects. The final result
of this integration is a tool that allows the construction of configurable Java
applications, using off-the-shelf components, in a high abstraction level.
| [
{
"version": "v1",
"created": "Tue, 30 Mar 1999 11:28:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cassino",
"Carlos",
""
],
[
"Ierusalimschy",
"Roberto",
""
],
[
"Rodriguez",
"Noemi",
""
]
] |
cs/9903019 | Saulius Maskeliunas | Saulius Maskeliunas (Institute of Mathematics & Informatics, Vilnius) | Workflow Automation with Lotus Notes for the Governmental Administrative
Information System | 8 pages, 7 figures | null | null | MII.PSIS/SM.99-01 | cs.HC | null | The paper presents an introductory overview of the workflow automation area,
outlining the main types, basic technologies, the essential features of
workflow applications. Two sorts of process models for the definition of
workflows (according to the conversation-based and activity-based
methodologies) are sketched. Later on, the nature of Lotus Notes and its
capabilities (as an environment for workflow management systems development)
are indicated. Concluding, the experience of automating administrative
workflows (developing a Subsystem of Inter-institutional Document Management of
the VADIS project) is briefly outlined.
| [
{
"version": "v1",
"created": "Tue, 30 Mar 1999 21:28:07 GMT"
},
{
"version": "v2",
"created": "Wed, 31 Mar 1999 22:44:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Maskeliunas",
"Saulius",
"",
"Institute of Mathematics & Informatics, Vilnius"
]
] |
cs/9903020 | Christoph D\"urr | Christoph Durr, Eric Goles, Ivan Rapaport, Eric Remila | Tiling with bars under tomographic constraints | Updated references | null | null | null | cs.DS cs.CC | null | We wish to tile a rectangle or a torus with only vertical and horizontal bars
of a given length, such that the number of bars in every column and row equals
given numbers. We present results for particular instances and for a more
general problem, while leaving open the initial problem.
| [
{
"version": "v1",
"created": "Wed, 31 Mar 1999 09:58:20 GMT"
},
{
"version": "v2",
"created": "Wed, 7 Jul 1999 06:51:42 GMT"
},
{
"version": "v3",
"created": "Fri, 28 Sep 2001 15:59:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Durr",
"Christoph",
""
],
[
"Goles",
"Eric",
""
],
[
"Rapaport",
"Ivan",
""
],
[
"Remila",
"Eric",
""
]
] |
cs/9904001 | Bruce Edmonds | Bruce Edmonds | A Proposal for the Establishment of Review Boards - a flexible approach
to the selection of academic knowledge | Other formats at http://www.cpm.mmu.ac.uk/cpmrep50.html | null | null | CPM-99-50 | cs.CY cs.DL cs.IR | null | Paper journals use a small number of trusted academics to select information
on behalf of all their readers. This inflexibility in the selection was
justified due to the expense of publishing. The advent of cheap distribution
via the internet allows a new trade-off between time and expense and the
flexibility of the selection process. This paper explores one such possible
process one where the role of mark-up and archiving is separated from that of
review. The idea is that authors publish their papers on their own web pages or
in a public paper archive, a board of reviewers judge that paper on a number of
different criteria. The detailed results of the reviews are stored in such a
way as to enable readers to use these judgements to find the papers they want
using search engines on the web. Thus instead of journals using generic
selection criteria readers can set their own to suit their needs. The resulting
system might be even cheaper than web-journals to implement.
| [
{
"version": "v1",
"created": "Thu, 1 Apr 1999 07:54:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Edmonds",
"Bruce",
""
]
] |
cs/9904004 | Mark Lee | Mark Lee and John Barnden | Mixing Metaphors | null | Proceedings of the AISB'99 Symposium on Metaphor, Artificial
Intelligence, and Cognition, pages 11-16, Edinburgh | null | null | cs.CL cs.AI | null | Mixed metaphors have been neglected in recent metaphor research. This paper
suggests that such neglect is short-sighted. Though mixing is a more complex
phenomenon than straight metaphors, the same kinds of reasoning and knowledge
structures are required. This paper provides an analysis of both parallel and
serial mixed metaphors within the framework of an AI system which is already
capable of reasoning about straight metaphorical manifestations and argues that
the processes underlying mixing are central to metaphorical meaning. Therefore,
any theory of metaphors must be able to account for mixing.
| [
{
"version": "v1",
"created": "Mon, 12 Apr 1999 11:37:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lee",
"Mark",
""
],
[
"Barnden",
"John",
""
]
] |
cs/9904005 | Walter Eaves | Walter Eaves | Transport Level Security: a proof using the Gong-Needham-Yahalom Logic | 22 pages, 2 figures, 1 appendix | null | null | null | cs.CR | null | This paper provides a proof of the proposed Internet standard Transport Level
Security protocol using the Gong-Needham-Yahalom logic. It is intended as a
teaching aid and hopes to show to students: the potency of a formal method for
protocol design; some of the subtleties of authenticating parties on a network
where all messages can be intercepted; the design of what should be a widely
accepted standard.
| [
{
"version": "v1",
"created": "Wed, 14 Apr 1999 20:05:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Eaves",
"Walter",
""
]
] |
cs/9904008 | Gertjan van Noord | Dale Gerdemann and Gertjan van Noord | Transducers from Rewrite Rules with Backreferences | 8 pages, EACL 1999 Bergen | null | null | null | cs.CL | null | Context sensitive rewrite rules have been widely used in several areas of
natural language processing, including syntax, morphology, phonology and speech
processing. Kaplan and Kay, Karttunen, and Mohri & Sproat have given various
algorithms to compile such rewrite rules into finite-state transducers. The
present paper extends this work by allowing a limited form of backreferencing
in such rules. The explicit use of backreferencing leads to more elegant and
general solutions.
| [
{
"version": "v1",
"created": "Thu, 15 Apr 1999 14:00:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gerdemann",
"Dale",
""
],
[
"van Noord",
"Gertjan",
""
]
] |
cs/9904009 | Mark Lee | Mark Lee and Yorick Wilks | An ascription-based approach to speech acts | 6 pages | Proceedings of COLING`96, Copenhagen. (1996) | null | null | cs.CL | null | The two principal areas of natural language processing research in pragmatics
are belief modelling and speech act processing. Belief modelling is the
development of techniques to represent the mental attitudes of a dialogue
participant. The latter approach, speech act processing, based on speech act
theory, involves viewing dialogue in planning terms. Utterances in a dialogue
are modelled as steps in a plan where understanding an utterance involves
deriving the complete plan a speaker is attempting to achieve. However,
previous speech act based approaches have been limited by a reliance upon
relatively simplistic belief modelling techniques and their relationship to
planning and plan recognition. In particular, such techniques assume
precomputed nested belief structures. In this paper, we will present an
approach to speech act processing based on novel belief modelling techniques
where nested beliefs are propagated on demand.
| [
{
"version": "v1",
"created": "Thu, 15 Apr 1999 16:03:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lee",
"Mark",
""
],
[
"Wilks",
"Yorick",
""
]
] |
cs/9904010 | Lorrie Cranor | Lorrie Faith Cranor, Joseph Reagle, and Mark S. Ackerman | Beyond Concern: Understanding Net Users' Attitudes About Online Privacy | 5 figures and appendix | null | null | AT&T Labs-Research Technical Report TR 99.4.3 | cs.CY cs.HC | null | People are concerned about privacy, particularly on the Internet. While many
studies have provided evidence of this concern, few have explored the nature of
the concern in detail, especially for the online environment. With this study,
we have tried to better understand the nature of online privacy concerns; we
look beyond the fact that people are concerned and attempt to understand how
they are concerned. We hope our results will help inform both policy decisions
as well as the development of technology tools that can assist Internet users
in protecting their privacy.
We present results here from the analysis of 381 questionnaires completed
between November 6 and November 13, 1998 by American Internet users. The sample
was drawn from the FamilyPC magazine/Digital Research, Inc. Family Panel. While
this is not a statistically representative sample of US Internet users, our
respondents are heavy Internet users, and quite possibly lead innovators. As
such, we believe that this sample is important for understanding the future
Internet user population.
| [
{
"version": "v1",
"created": "Sun, 18 Apr 1999 19:04:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cranor",
"Lorrie Faith",
""
],
[
"Reagle",
"Joseph",
""
],
[
"Ackerman",
"Mark S.",
""
]
] |
cs/9904011 | Yin Zhang | Yin Zhang | WebScript -- A Scripting Language for the Web | 19 pages, 11 figures | null | null | null | cs.NI cs.PL | null | WebScript is a scripting language for processing Web documents. Designed as
an extension to Jacl, the Java implementation of Tcl, WebScript allows
programmers to manipulate HTML in the same way as Tcl manipulates text strings
and GUI elements. This leads to a completely new way of writing the next
generation of Web applications. This paper presents the motivation behind the
design and implementation of WebScript, an overview of its major features, as
well as some demonstrations of its power.
| [
{
"version": "v1",
"created": "Wed, 21 Apr 1999 19:21:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zhang",
"Yin",
""
]
] |
cs/9904013 | Stephen F. Bush | Stephen F. Bush and Victor S. Frost and Joseph B. Evans | Network Management of Predictive Mobile Networks | null | Journal of Network and Systems Management, volume 7, number 2,
June, 1999 | null | null | cs.NI | null | There is a trend toward the use of predictive systems in communications
networks. At the systems and network management level predictive capabilities
are focused on anticipating network faults and performance degradation.
Simultaneously, mobile communication networks are being developed with
predictive location and tracking mechanisms. The interactions and synergies
between these systems present a new set of problems. A new predictive network
management framework is developed and examined. The interaction between a
predictive mobile network and the proposed network management system is
discussed. The Rapidly Deployable Radio Network is used as a specific example
to illustrate these interactions.
| [
{
"version": "v1",
"created": "Wed, 21 Apr 1999 21:58:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bush",
"Stephen F.",
""
],
[
"Frost",
"Victor S.",
""
],
[
"Evans",
"Joseph B.",
""
]
] |
cs/9904014 | Stephen F. Bush | Stephen F. Bush and Sunil Jagannath and Joseph B. Evans and Victor
Frost and Gary Minden and K. Sam Shanmugan | A Control and Management Network for Wireless ATM Systems | author's web page at http://www.crd.ge.com/people/bush | ACM-Baltzer Wireless Networks (WINET), volume 3, pages
267-283,1997 | null | null | cs.NI | null | This paper describes the design of a control and management network
(orderwire) for a mobile wireless Asynchronous Transfer Mode (ATM) network.
This mobile wireless ATM network is part of the Rapidly Deployable Radio
Network (RDRN). The orderwire system consists of a packet radio network which
overlays the mobile wireless ATM network, each network element in this network
uses Global Positioning System (GPS) information to control a beamforming
antenna subsystem which provides for spatial reuse. This paper also proposes a
novel Virtual Network Configuration (VNC) algorithm for predictive network
configuration. A mobile ATM Private Network-Network Interface (PNNI) based on
VNC is also discussed. Finally, as a prelude to the system implementation,
results of a Maisie simulation of the orderwire system are discussed.
| [
{
"version": "v1",
"created": "Thu, 22 Apr 1999 12:58:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bush",
"Stephen F.",
""
],
[
"Jagannath",
"Sunil",
""
],
[
"Evans",
"Joseph B.",
""
],
[
"Frost",
"Victor",
""
],
[
"Minden",
"Gary",
""
],
[
"Shanmugan",
"K. Sam",
""
]
] |
cs/9904017 | David R. Hanson | David R. Hanson | A Machine-Independent Debugger--Revisited | 12 pages; 6 figures; 3 tables | Software--Practice & Experience, vol. 29, no. 10, 849-862, Aug.
1999 | null | Microsoft Research MSR-TR-99-04 | cs.PL cs.SE | null | Most debuggers are notoriously machine-dependent, but some recent research
prototypes achieve varying degrees of machine-independence with novel designs.
Cdb, a simple source-level debugger for C, is completely independent of its
target architecture. This independence is achieved by embedding symbol tables
and debugging code in the target program, which costs both time and space. This
paper describes a revised design and implementation of cdb that reduces the
space cost by nearly one-half and the time cost by 13% by storing symbol tables
in external files. A symbol table is defined by a 31-line grammar in the
Abstract Syntax Description Language (ASDL). ASDL is a domain-specific language
for specifying tree data structures. The ASDL tools accept an ASDL grammar and
generate code to construct, read, and write these data structures. Using ASDL
automates implementing parts of the debugger, and the grammar documents the
symbol table concisely. Using ASDL also suggested simplifications to the
interface between the debugger and the target program. Perhaps most important,
ASDL emphasizes that symbol tables are data structures, not file formats. Many
of the pitfalls of working with low-level file formats can be avoided by
focusing instead on high-level data structures and automating the
implementation details.
| [
{
"version": "v1",
"created": "Fri, 23 Apr 1999 18:34:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hanson",
"David R.",
""
]
] |
cs/9904019 | Ronald de Wolf | H. Buhrman (CWI), R. Cleve (U.Calgary), R. de Wolf (CWI and
U.Amsterdam), and Ch. Zalka (LANL) | Bounds for Small-Error and Zero-Error Quantum Algorithms | 11 pages, LaTeX. New title and some sections are rewritten. This
version to appear in IEEE FOCS'99 | null | null | null | cs.CC quant-ph | null | We present a number of results related to quantum algorithms with small error
probability and quantum algorithms that are zero-error. First, we give a tight
analysis of the trade-offs between the number of queries of quantum search
algorithms, their error probability, the size of the search space, and the
number of solutions in this space. Using this, we deduce new lower and upper
bounds for quantum versions of amplification problems. Next, we establish
nearly optimal quantum-classical separations for the query complexity of
monotone functions in the zero-error model (where our quantum zero-error model
is defined so as to be robust when the quantum gates are noisy). Also, we
present a communication complexity problem related to a total function for
which there is a quantum-classical communication complexity gap in the
zero-error model. Finally, we prove separations for monotone graph properties
in the zero-error and other error models which imply that the evasiveness
conjecture for such properties does not hold for quantum computers.
| [
{
"version": "v1",
"created": "Mon, 26 Apr 1999 08:54:21 GMT"
},
{
"version": "v2",
"created": "Tue, 17 Aug 1999 12:05:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Buhrman",
"H.",
"",
"CWI"
],
[
"Cleve",
"R.",
"",
"U.Calgary"
],
[
"de Wolf",
"R.",
"",
"CWI and\n U.Amsterdam"
],
[
"Zalka",
"Ch.",
"",
"LANL"
]
] |
cs/9904020 | Walter Eaves | Walter Eaves | ODP channel objects that provide services transparently for distributing
processing systems | 35 pages, 10 figures | null | null | null | cs.DC cs.OS | null | This paper describes an architecture for a distributing processing system
that would allow remote procedure calls to invoke other services as messages
are passed between clients and servers. It proposes that an additional class of
data processing objects be located in the software communications channel. The
objects in this channel would then be used to enforce protocols on
client-server applications without any additional effort by the application
programmers. For example, services such as key-management, time-stamping,
sequencing and encryption can be implemented at different levels of the
software communications stack to provide a complete authentication service. A
distributing processing environment could be used to control broadband network
data delivery. Architectures and invocation semantics are discussed, Example
classes and interfaces for channel objects are given in the Java programming
language.
| [
{
"version": "v1",
"created": "Mon, 26 Apr 1999 21:13:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Eaves",
"Walter",
""
]
] |
cs/9905001 | Rebecca Hwa | Rebecca Hwa | Supervised Grammar Induction Using Training Data with Limited
Constituent Information | 7 pages, 2 figures, to appear in the proc. of ACL '99 | null | null | null | cs.CL | null | Corpus-based grammar induction generally relies on hand-parsed training data
to learn the structure of the language. Unfortunately, the cost of building
large annotated corpora is prohibitively expensive. This work aims to improve
the induction strategy when there are few labels in the training data. We show
that the most informative linguistic constituents are the higher nodes in the
parse trees, typically denoting complex noun phrases and sentential clauses.
They account for only 20% of all constituents. For inducing grammars from
sparsely labeled training data (e.g., only higher-level constituent labels), we
propose an adaptation strategy, which produces grammars that parse almost as
well as grammars induced from fully labeled corpora. Our results suggest that
for a partial parser to replace human annotators, it must be able to
automatically extract higher-level constituents rather than base noun phrases.
| [
{
"version": "v1",
"created": "Sun, 2 May 1999 20:48:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hwa",
"Rebecca",
""
]
] |
cs/9905003 | Walter Eaves | Walter Eaves | Collective Choice Theory in Collaborative Computing | 40 pages, 10 figures | null | null | null | cs.MA cs.DC | null | This paper presents some fundamental collective choice theory for information
system designers, particularly those working in the field of computer-supported
cooperative work. This paper is focused on a presentation of Arrow's
Possibility and Impossibility theorems which form the fundamental boundary on
the efficacy of collective choice: voting and selection procedures. It restates
the conditions that Arrow placed on collective choice functions in more
rigorous second-order logic, which could be used as a set of test conditions
for implementations, and a useful probabilistic result for analyzing votes on
issue pairs. It also describes some simple collective choice functions. There
is also some discussion of how enterprises should approach putting their
resources under collective control: giving an outline of a superstructure of
performative agents to carry out this function and what distributing processing
technology would be needed.
| [
{
"version": "v1",
"created": "Mon, 10 May 1999 17:07:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Eaves",
"Walter",
""
]
] |
cs/9905004 | Kagan Tumer | David H. Wolpert, Kagan Tumer, Jeremy Frank | Using Collective Intelligence to Route Internet Traffic | 7 pages | Advances in Information Processing Systems - 11, eds M. Kearns, S.
Solla, D. Cohn, MIT Press, 1999 | null | null | cs.LG adap-org cond-mat.stat-mech cs.DC cs.NI nlin.AO | null | A COllective INtelligence (COIN) is a set of interacting reinforcement
learning (RL) algorithms designed in an automated fashion so that their
collective behavior optimizes a global utility function. We summarize the
theory of COINs, then present experiments using that theory to design COINs to
control internet traffic routing. These experiments indicate that COINs
outperform all previously investigated RL-based, shortest path routing
algorithms.
| [
{
"version": "v1",
"created": "Mon, 10 May 1999 20:52:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wolpert",
"David H.",
""
],
[
"Tumer",
"Kagan",
""
],
[
"Frank",
"Jeremy",
""
]
] |
cs/9905005 | Kagan Tumer | David H. Wolpert, Kevin R. Wheeler, Kagan Tumer | General Principles of Learning-Based Multi-Agent Systems | 7 pages, 6 figures | Proceedings of the Third International Conference on Autonomous
Agents, Seatle, WA 1999 | null | null | cs.MA adap-org cond-mat.stat-mech cs.DC cs.LG nlin.AO | null | We consider the problem of how to design large decentralized multi-agent
systems (MAS's) in an automated fashion, with little or no hand-tuning. Our
approach has each agent run a reinforcement learning algorithm. This converts
the problem into one of how to automatically set/update the reward functions
for each of the agents so that the global goal is achieved. In particular we do
not want the agents to ``work at cross-purposes'' as far as the global goal is
concerned. We use the term artificial COllective INtelligence (COIN) to refer
to systems that embody solutions to this problem. In this paper we present a
summary of a mathematical framework for COINs. We then investigate the
real-world applicability of the core concepts of that framework via two
computer experiments: we show that our COINs perform near optimally in a
difficult variant of Arthur's bar problem (and in particular avoid the tragedy
of the commons for that problem), and we also illustrate optimal performance
for our COINs in the leader-follower problem.
| [
{
"version": "v1",
"created": "Mon, 10 May 1999 22:20:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wolpert",
"David H.",
""
],
[
"Wheeler",
"Kevin R.",
""
],
[
"Tumer",
"Kagan",
""
]
] |
cs/9905007 | Michael R. Brent | Michael R. Brent | An Efficient, Probabilistically Sound Algorithm for Segmentation and
Word Discovery | 65 double-spaced ms. pages including 3 figures | Brent, M. R. (1999). An efficient, probabilistically sound
algorithm for segmentation and word discovery. Machine Learning 34, 71-105 | null | null | cs.CL cs.LG | null | This paper presents a model-based, unsupervised algorithm for recovering word
boundaries in a natural-language text from which they have been deleted. The
algorithm is derived from a probability model of the source that generated the
text. The fundamental structure of the model is specified abstractly so that
the detailed component models of phonology, word-order, and word frequency can
be replaced in a modular fashion. The model yields a language-independent,
prior probability distribution on all possible sequences of all possible words
over a given alphabet, based on the assumption that the input was generated by
concatenating words from a fixed but unknown lexicon. The model is unusual in
that it treats the generation of a complete corpus, regardless of length, as a
single event in the probability space. Accordingly, the algorithm does not
estimate a probability distribution on words; instead, it attempts to calculate
the prior probabilities of various word sequences that could underlie the
observed text. Experiments on phonemic transcripts of spontaneous speech by
parents to young children suggest that this algorithm is more effective than
other proposed algorithms, at least when utterance boundaries are given and the
text includes a substantial number of short utterances.
Keywords: Bayesian grammar induction, probability models, minimum description
length (MDL), unsupervised learning, cognitive modeling, language acquisition,
segmentation
| [
{
"version": "v1",
"created": "Wed, 12 May 1999 14:25:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Brent",
"Michael R.",
""
]
] |
cs/9905008 | Stefan Riezler | Mats Rooth, Stefan Riezler, Detlef Prescher, Glenn Carroll, and Franz
Beil (IMS, University of Stuttgart) | Inducing a Semantically Annotated Lexicon via EM-Based Clustering | 8 pages, uses colacl.sty. Proceedings of the 37th Annual Meeting of
the ACL, 1999 | null | null | null | cs.CL cs.AI cs.LG | null | We present a technique for automatic induction of slot annotations for
subcategorization frames, based on induction of hidden classes in the EM
framework of statistical estimation. The models are empirically evalutated by a
general decision test. Induction of slot labeling for subcategorization frames
is accomplished by a further application of EM, and applied experimentally on
frame observations derived from parsing large corpora. We outline an
interpretation of the learned representations as theoretical-linguistic
decompositional lexical entries.
| [
{
"version": "v1",
"created": "Wed, 19 May 1999 14:52:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rooth",
"Mats",
"",
"IMS, University of Stuttgart"
],
[
"Riezler",
"Stefan",
"",
"IMS, University of Stuttgart"
],
[
"Prescher",
"Detlef",
"",
"IMS, University of Stuttgart"
],
[
"Carroll",
"Glenn",
"",
"IMS, University of Stuttgart"
],
[
"Beil",
"Franz",
"",
"IMS, University of Stuttgart"
]
] |
cs/9905009 | Stefan Riezler | Franz Beil, Glenn Carroll, Detlef Prescher, Stefan Riezler, and Mats
Rooth (IMS, University of Stuttgart) | Inside-Outside Estimation of a Lexicalized PCFG for German | 8 pages, uses colacl.sty. Proceedings of the 37th Annual Meeting of
the ACL, 1999 | null | null | null | cs.CL cs.LG | null | The paper describes an extensive experiment in inside-outside estimation of a
lexicalized probabilistic context free grammar for German verb-final clauses.
Grammar and formalism features which make the experiment feasible are
described. Successive models are evaluated on precision and recall of phrase
markup.
| [
{
"version": "v1",
"created": "Wed, 19 May 1999 14:47:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Beil",
"Franz",
"",
"IMS, University of Stuttgart"
],
[
"Carroll",
"Glenn",
"",
"IMS, University of Stuttgart"
],
[
"Prescher",
"Detlef",
"",
"IMS, University of Stuttgart"
],
[
"Riezler",
"Stefan",
"",
"IMS, University of Stuttgart"
],
[
"Rooth",
"Mats",
"",
"IMS, University of Stuttgart"
]
] |
cs/9905010 | Stefan Riezler | Stefan Riezler (IMS, University of Stuttgart) | Statistical Inference and Probabilistic Modelling for Constraint-Based
NLP | 12 pages, uses knvns98.sty. Proceedings of the 4th Conference on
Natural Language Processing (KONVENS-98) | null | null | null | cs.CL cs.LG | null | We present a probabilistic model for constraint-based grammars and a method
for estimating the parameters of such models from incomplete, i.e., unparsed
data. Whereas methods exist to estimate the parameters of probabilistic
context-free grammars from incomplete data (Baum 1970), so far for
probabilistic grammars involving context-dependencies only parameter estimation
techniques from complete, i.e., fully parsed data have been presented (Abney
1997). However, complete-data estimation requires labor-intensive, error-prone,
and grammar-specific hand-annotating of large language corpora. We present a
log-linear probability model for constraint logic programming, and a general
algorithm to estimate the parameters of such models from incomplete data by
extending the estimation algorithm of Della-Pietra, Della-Pietra, and Lafferty
(1997) to incomplete data settings.
| [
{
"version": "v1",
"created": "Wed, 19 May 1999 16:03:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Riezler",
"Stefan",
"",
"IMS, University of Stuttgart"
]
] |
cs/9905011 | Kagan Tumer | Kagan Tumer, Nirmala Ramanujam, Joydeep Ghosh, and Rebecca
Richards-Kortum | Ensembles of Radial Basis Function Networks for Spectroscopic Detection
of Cervical Pre-Cancer | 23 pages | IEEE Transactions on Biomedical Engineering, vol 45, no. 8, pp
953-962, 1998 | null | null | cs.NE cs.LG q-bio | null | The mortality related to cervical cancer can be substantially reduced through
early detection and treatment. However, current detection techniques, such as
Pap smear and colposcopy, fail to achieve a concurrently high sensitivity and
specificity.
In vivo fluorescence spectroscopy is a technique which quickly,
non-invasively and quantitatively probes the biochemical and morphological
changes that occur in pre-cancerous tissue.
A multivariate statistical algorithm was used to extract clinically useful
information from tissue spectra acquired from 361 cervical sites from 95
patients at 337, 380 and 460 nm excitation wavelengths. The multivariate
statistical analysis was also employed to reduce the number of fluorescence
excitation-emission wavelength pairs required to discriminate healthy tissue
samples from pre-cancerous tissue samples. The use of connectionist methods
such as multi layered perceptrons, radial basis function networks, and
ensembles of such networks was investigated. RBF ensemble algorithms based on
fluorescence spectra potentially provide automated, and near real-time
implementation of pre-cancer detection in the hands of non-experts. The results
are more reliable, direct and accurate than those achieved by either human
experts or multivariate statistical algorithms.
| [
{
"version": "v1",
"created": "Thu, 20 May 1999 18:28:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Tumer",
"Kagan",
""
],
[
"Ramanujam",
"Nirmala",
""
],
[
"Ghosh",
"Joydeep",
""
],
[
"Richards-Kortum",
"Rebecca",
""
]
] |
cs/9905012 | Kagan Tumer | Kagan Tumer and Joydeep Ghosh | Linear and Order Statistics Combiners for Pattern Classification | 31 pages | Combining Artificial Neural Networks,Ed. Amanda Sharkey, pp
127-162, Springer Verlag, 1999 | null | null | cs.NE cs.LG | null | Several researchers have experimentally shown that substantial improvements
can be obtained in difficult pattern recognition problems by combining or
integrating the outputs of multiple classifiers. This chapter provides an
analytical framework to quantify the improvements in classification results due
to combining. The results apply to both linear combiners and order statistics
combiners. We first show that to a first order approximation, the error rate
obtained over and above the Bayes error rate, is directly proportional to the
variance of the actual decision boundaries around the Bayes optimum boundary.
Combining classifiers in output space reduces this variance, and hence reduces
the "added" error. If N unbiased classifiers are combined by simple averaging,
the added error rate can be reduced by a factor of N if the individual errors
in approximating the decision boundaries are uncorrelated. Expressions are then
derived for linear combiners which are biased or correlated, and the effect of
output correlations on ensemble performance is quantified. For order statistics
based non-linear combiners, we derive expressions that indicate how much the
median, the maximum and in general the ith order statistic can improve
classifier performance. The analysis presented here facilitates the
understanding of the relationships among error rates, classifier boundary
distributions, and combining in output space. Experimental results on several
public domain data sets are provided to illustrate the benefits of combining
and to support the analytical results.
| [
{
"version": "v1",
"created": "Thu, 20 May 1999 20:15:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Tumer",
"Kagan",
""
],
[
"Ghosh",
"Joydeep",
""
]
] |
cs/9905013 | Kagan Tumer | Kagan Tumer and Joydeep Ghosh | Robust Combining of Disparate Classifiers through Order Statistics | 22 pages | null | null | UT-CVIS-TR-99-001 (The University of Texas) | cs.LG cs.CV cs.NE | null | Integrating the outputs of multiple classifiers via combiners or
meta-learners has led to substantial improvements in several difficult pattern
recognition problems. In the typical setting investigated till now, each
classifier is trained on data taken or resampled from a common data set, or
(almost) randomly selected subsets thereof, and thus experiences similar
quality of training data. However, in certain situations where data is acquired
and analyzed on-line at several geographically distributed locations, the
quality of data may vary substantially, leading to large discrepancies in
performance of individual classifiers. In this article we introduce and
investigate a family of classifiers based on order statistics, for robust
handling of such cases. Based on a mathematical modeling of how the decision
boundaries are affected by order statistic combiners, we derive expressions for
the reductions in error expected when such combiners are used. We show
analytically that the selection of the median, the maximum and in general, the
$i^{th}$ order statistic improves classification performance. Furthermore, we
introduce the trim and spread combiners, both based on linear combinations of
the ordered classifier outputs, and show that they are quite beneficial in
presence of outliers or uneven classifier performance. Experimental results on
several public domain data sets corroborate these findings.
| [
{
"version": "v1",
"created": "Thu, 20 May 1999 20:37:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Tumer",
"Kagan",
""
],
[
"Ghosh",
"Joydeep",
""
]
] |
cs/9905014 | Dietterich | Thomas G. Dietterich | Hierarchical Reinforcement Learning with the MAXQ Value Function
Decomposition | 63 pages, 15 figures | null | null | null | cs.LG | null | This paper presents the MAXQ approach to hierarchical reinforcement learning
based on decomposing the target Markov decision process (MDP) into a hierarchy
of smaller MDPs and decomposing the value function of the target MDP into an
additive combination of the value functions of the smaller MDPs. The paper
defines the MAXQ hierarchy, proves formal results on its representational
power, and establishes five conditions for the safe use of state abstractions.
The paper presents an online model-free learning algorithm, MAXQ-Q, and proves
that it converges wih probability 1 to a kind of locally-optimal policy known
as a recursively optimal policy, even in the presence of the five kinds of
state abstraction. The paper evaluates the MAXQ representation and MAXQ-Q
through a series of experiments in three domains and shows experimentally that
MAXQ-Q (with state abstractions) converges to a recursively optimal policy much
faster than flat Q learning. The fact that MAXQ learns a representation of the
value function has an important benefit: it makes it possible to compute and
execute an improved, non-hierarchical policy via a procedure similar to the
policy improvement step of policy iteration. The paper demonstrates the
effectiveness of this non-hierarchical execution experimentally. Finally, the
paper concludes with a comparison to related work and a discussion of the
design tradeoffs in hierarchical reinforcement learning.
| [
{
"version": "v1",
"created": "Fri, 21 May 1999 14:26:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dietterich",
"Thomas G.",
""
]
] |
cs/9905015 | Dietterich | Thomas G. Dietterich | State Abstraction in MAXQ Hierarchical Reinforcement Learning | 7 pages, 2 figures | null | null | null | cs.LG | null | Many researchers have explored methods for hierarchical reinforcement
learning (RL) with temporal abstractions, in which abstract actions are defined
that can perform many primitive actions before terminating. However, little is
known about learning with state abstractions, in which aspects of the state
space are ignored. In previous work, we developed the MAXQ method for
hierarchical RL. In this paper, we define five conditions under which state
abstraction can be combined with the MAXQ value function decomposition. We
prove that the MAXQ-Q learning algorithm converges under these conditions and
show experimentally that state abstraction is important for the successful
application of MAXQ-Q learning.
| [
{
"version": "v1",
"created": "Fri, 21 May 1999 14:49:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dietterich",
"Thomas G.",
""
]
] |
cs/9905016 | Max Chaves | M. Chaves | Programs with Stringent Performance Objectives Will Often Exhibit
Chaotic Behavior | 7 pages, no figures | null | null | null | cs.CE cs.CC | null | Software for the resolution of certain kind of problems, those that rate high
in the Stringent Performance Objectives adjustment factor (IFPUG scheme), can
be described using a combination of game theory and autonomous systems. From
this description it can be shown that some of those problems exhibit chaotic
behavior, an important fact in understanding the functioning of the related
software. As a relatively simple example, it is shown that chess exhibits
chaotic behavior in its configuration space. This implies that static
evaluators in chess programs have intrinsic limitations.
| [
{
"version": "v1",
"created": "Thu, 27 May 1999 23:58:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chaves",
"M.",
""
]
] |
cs/9906003 | Melanie Siegel | Melanie Siegel | The syntactic processing of particles in Japanese spoken language | 8 pages | Proceedings of the 13th Pacific Asia Conference on Language,
Information and Computation. 1999 | null | null | cs.CL | null | Particles fullfill several distinct central roles in the Japanese language.
They can mark arguments as well as adjuncts, can be functional or have semantic
funtions. There is, however, no straightforward matching from particles to
functions, as, e.g., GA can mark the subject, the object or an adjunct of a
sentence. Particles can cooccur. Verbal arguments that could be identified by
particles can be eliminated in the Japanese sentence. And finally, in spoken
language particles are often omitted. A proper treatment of particles is thus
necessary to make an analysis of Japanese sentences possible. Our treatment is
based on an empirical investigation of 800 dialogues. We set up a type
hierarchy of particles motivated by their subcategorizational and
modificational behaviour. This type hierarchy is part of the Japanese syntax in
VERBMOBIL.
| [
{
"version": "v1",
"created": "Wed, 2 Jun 1999 12:03:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Siegel",
"Melanie",
""
]
] |
cs/9906004 | Jorn Veenstra | Sabine Buchholz, Jorn Veenstra, Walter Daelemans | Cascaded Grammatical Relation Assignment | 8 pages, to appear in: proceedings of EMNLP/VLC-99, University of
Maryland, USA, June 21-22, 1999 | null | null | ILK-9908 | cs.CL cs.LG | null | In this paper we discuss cascaded Memory-Based grammatical relations
assignment. In the first stages of the cascade, we find chunks of several types
(NP,VP,ADJP,ADVP,PP) and label them with their adverbial function (e.g. local,
temporal). In the last stage, we assign grammatical relations to pairs of
chunks. We studied the effect of adding several levels to this cascaded
classifier and we found that even the less performing chunkers enhanced the
performance of the relation finder.
| [
{
"version": "v1",
"created": "Wed, 2 Jun 1999 13:41:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Buchholz",
"Sabine",
""
],
[
"Veenstra",
"Jorn",
""
],
[
"Daelemans",
"Walter",
""
]
] |
cs/9906005 | Sabine Buchholz | Walter Daelemans, Sabine Buchholz, Jorn Veenstra | Memory-Based Shallow Parsing | 8 pages, to appear in: Proceedings of the EACL'99 workshop on
Computational Natural Language Learning (CoNLL-99), Bergen, Norway, June 1999 | null | null | ILK-9907 | cs.CL cs.LG | null | We present a memory-based learning (MBL) approach to shallow parsing in which
POS tagging, chunking, and identification of syntactic relations are formulated
as memory-based modules. The experiments reported in this paper show
competitive results, the F-value for the Wall Street Journal (WSJ) treebank is:
93.8% for NP chunking, 94.7% for VP chunking, 77.1% for subject detection and
79.0% for object detection.
| [
{
"version": "v1",
"created": "Wed, 2 Jun 1999 13:48:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Daelemans",
"Walter",
""
],
[
"Buchholz",
"Sabine",
""
],
[
"Veenstra",
"Jorn",
""
]
] |
cs/9906006 | Khalil Sima'an | Khalil Sima'an | Learning Efficient Disambiguation | 222 pages | null | null | Ph.d. thesis, ILLC Dissertation Series number 1999-02, University of
Amsterdam | cs.CL cs.AI | null | This dissertation analyses the computational properties of current
performance-models of natural language parsing, in particular Data Oriented
Parsing (DOP), points out some of their major shortcomings and suggests
suitable solutions. It provides proofs that various problems of probabilistic
disambiguation are NP-Complete under instances of these performance-models, and
it argues that none of these models accounts for attractive efficiency
properties of human language processing in limited domains, e.g. that frequent
inputs are usually processed faster than infrequent ones. The central
hypothesis of this dissertation is that these shortcomings can be eliminated by
specializing the performance-models to the limited domains. The dissertation
addresses "grammar and model specialization" and presents a new framework, the
Ambiguity-Reduction Specialization (ARS) framework, that formulates the
necessary and sufficient conditions for successful specialization. The
framework is instantiated into specialization algorithms and applied to
specializing DOP. Novelties of these learning algorithms are 1) they limit the
hypotheses-space to include only "safe" models, 2) are expressed as constrained
optimization formulae that minimize the entropy of the training tree-bank given
the specialized grammar, under the constraint that the size of the specialized
model does not exceed a predefined maximum, and 3) they enable integrating the
specialized model with the original one in a complementary manner. The
dissertation provides experiments with initial implementations and compares the
resulting Specialized DOP (SDOP) models to the original DOP models with
encouraging results.
| [
{
"version": "v1",
"created": "Wed, 2 Jun 1999 15:50:26 GMT"
},
{
"version": "v2",
"created": "Thu, 3 Jun 1999 14:46:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sima'an",
"Khalil",
""
]
] |
cs/9906009 | Thorsten Brants | Thorsten Brants | Cascaded Markov Models | 8 pages | Proceedings of EACL-99, Bergen, Norway | null | null | cs.CL | null | This paper presents a new approach to partial parsing of context-free
structures. The approach is based on Markov Models. Each layer of the resulting
structure is represented by its own Markov Model, and output of a lower layer
is passed as input to the next higher layer. An empirical evaluation of the
method yields very good results for NP/PP chunking of German newspaper texts.
| [
{
"version": "v1",
"created": "Sun, 6 Jun 1999 17:36:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Brants",
"Thorsten",
""
]
] |
cs/9906010 | Victor Makarov | Victor Makarov | Predicate Logic with Definitions | 15 pages | null | null | null | cs.LO cs.AI | null | Predicate Logic with Definitions (PLD or D-logic) is a modification of
first-order logic intended mostly for practical formalization of mathematics.
The main syntactic constructs of D-logic are terms, formulas and definitions. A
definition is a definition of variables, a definition of constants, or a
composite definition (D-logic has also abbreviation definitions called
abbreviations). Definitions can be used inside terms and formulas. This
possibility alleviates introducing new quantifier-like names. Composite
definitions allow constructing new definitions from existing ones.
| [
{
"version": "v1",
"created": "Mon, 7 Jun 1999 20:16:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Makarov",
"Victor",
""
]
] |
cs/9906013 | Karl Stroetmann | Sabine Glesner and Karl Stroetmann | Combining Inclusion Polymorphism and Parametric Polymorphism | 14 pages | null | null | null | cs.LO cs.PL | null | We show that the question whether a term is typable is decidable for type
systems combining inclusion polymorphism with parametric polymorphism provided
the type constructors are at most unary. To prove this result we first reduce
the typability problem to the problem of solving a system of type inequations.
The result is then obtained by showing that the solvability of the resulting
system of type inequations is decidable.
| [
{
"version": "v1",
"created": "Mon, 14 Jun 1999 09:42:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Glesner",
"Sabine",
""
],
[
"Stroetmann",
"Karl",
""
]
] |
cs/9906014 | Gertjan van Noord | Gert Veldhuijzen van Zanten and Gosse Bouma and Khalil Sima'an and
Gertjan van Noord and Remko Bonnema | Evaluation of the NLP Components of the OVIS2 Spoken Dialogue System | Proceedings of CLIN 99 | null | null | null | cs.CL | null | The NWO Priority Programme Language and Speech Technology is a 5-year
research programme aiming at the development of spoken language information
systems. In the Programme, two alternative natural language processing (NLP)
modules are developed in parallel: a grammar-based (conventional, rule-based)
module and a data-oriented (memory-based, stochastic, DOP) module. In order to
compare the NLP modules, a formal evaluation has been carried out three years
after the start of the Programme. This paper describes the evaluation procedure
and the evaluation results. The grammar-based component performs much better
than the data-oriented one in this comparison.
| [
{
"version": "v1",
"created": "Mon, 14 Jun 1999 10:06:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"van Zanten",
"Gert Veldhuijzen",
""
],
[
"Bouma",
"Gosse",
""
],
[
"Sima'an",
"Khalil",
""
],
[
"van Noord",
"Gertjan",
""
],
[
"Bonnema",
"Remko",
""
]
] |
cs/9906015 | Alexander Yeh | Lisa Ferro, Marc Vilain and Alexander Yeh | Learning Transformation Rules to Find Grammatical Relations | 10 pages. Uses latex-acl.sty and named.sty | Computational Natural Language Learning (CoNLL-99), pages 43-52,
June, 1999. Bergen, Norway | null | null | cs.CL | null | Grammatical relationships are an important level of natural language
processing. We present a trainable approach to find these relationships through
transformation sequences and error-driven learning. Our approach finds
grammatical relationships between core syntax groups and bypasses much of the
parsing phase. On our training and test set, our procedure achieves 63.6%
recall and 77.3% precision (f-score = 69.8).
| [
{
"version": "v1",
"created": "Mon, 14 Jun 1999 22:06:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ferro",
"Lisa",
""
],
[
"Vilain",
"Marc",
""
],
[
"Yeh",
"Alexander",
""
]
] |
cs/9906016 | Ken Samuel | Ken Samuel, Sandra Carberry, and K. Vijay-Shanker | Automatically Selecting Useful Phrases for Dialogue Act Tagging | 14 pages, published in PACLING'99 | Samuel, Ken and Carberry, Sandra and Vijay-Shanker, K. 1999.
Automatically Selecting Useful Phrases for Dialogue Act Tagging. In
Proceedings of the Fourth Conference of the Pacific Association for
Computational Linguistics. Waterloo, Ontario, Canada | null | null | cs.AI cs.LG | null | We present an empirical investigation of various ways to automatically
identify phrases in a tagged corpus that are useful for dialogue act tagging.
We found that a new method (which measures a phrase's deviation from an
optimally-predictive phrase), enhanced with a lexical filtering mechanism,
produces significantly better cues than manually-selected cue phrases, the
exhaustive set of phrases in a training corpus, and phrases chosen by
traditional metrics, like mutual information and information gain.
| [
{
"version": "v1",
"created": "Fri, 18 Jun 1999 03:25:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Samuel",
"Ken",
""
],
[
"Carberry",
"Sandra",
""
],
[
"Vijay-Shanker",
"K.",
""
]
] |
cs/9906017 | Rigo Michel | Michel Rigo | Generalization of automatic sequences for numeration systems on a
regular language | 10 pages, 3 figures | Theoret. Comput. Sci. 244 (2000) 271--281 | null | null | cs.CC | null | Let L be an infinite regular language on a totally ordered alphabet (A,<).
Feeding a finite deterministic automaton (with output) with the words of L
enumerated lexicographically with respect to < leads to an infinite sequence
over the output alphabet of the automaton. This process generalizes the concept
of k-automatic sequence for abstract numeration systems on a regular language
(instead of systems in base k). Here, I study the first properties of these
sequences and their relations with numeration systems.
| [
{
"version": "v1",
"created": "Tue, 22 Jun 1999 10:01:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rigo",
"Michel",
""
]
] |
cs/9906018 | Christoph Durr | Christoph Durr and Marek Chrobak | Reconstructing Polyatomic Structures from Discrete X-Rays:
NP-Completeness Proof for Three Atoms | null | Proceedings of the 23rd International Symposium on Mathematical
Foundations of Computer Science, LNCS vol 1450, 185-193, 1998 | null | null | cs.DS cs.CC | null | We address a discrete tomography problem that arises in the study of the
atomic structure of crystal lattices. A polyatomic structure T can be defined
as an integer lattice in dimension D>=2, whose points may be occupied by $c$
distinct types of atoms. To ``analyze'' T, we conduct ell measurements that we
call_discrete X-rays_. A discrete X-ray in direction xi determines the number
of atoms of each type on each line parallel to xi. Given ell such non-parallel
X-rays, we wish to reconstruct T.
The complexity of the problem for c=1 (one atom type) has been completely
determined by Gardner, Gritzmann and Prangenberg, who proved that the problem
is NP-complete for any dimension D>=2 and ell>=3 non-parallel X-rays, and that
it can be solved in polynomial time otherwise.
The NP-completeness result above clearly extends to any c>=2, and therefore
when studying the polyatomic case we can assume that ell=2. As shown in another
article by the same authors, this problem is also NP-complete for c>=6 atoms,
even for dimension D=2 and axis-parallel X-rays. They conjecture that the
problem remains NP-complete for c=3,4,5, although, as they point out, the proof
idea does not seem to extend to c<=5.
We resolve the conjecture by proving that the problem is indeed NP-complete
for c>=3 in 2D, even for axis-parallel X-rays. Our construction relies heavily
on some structure results for the realizations of 0-1 matrices with given row
and column sums.
| [
{
"version": "v1",
"created": "Mon, 21 Jun 1999 15:33:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Durr",
"Christoph",
""
],
[
"Chrobak",
"Marek",
""
]
] |
cs/9906019 | Ion Androutsopoulos | G. Petasis, G. Paliouras, V. Karkaletsis, C. D. Spyropoulos and I.
Androutsopoulos (Software & Knowledge Engineering Lab, Institute of
Informatics & Telecommunications, NCSR Demokritos, Greece) | Resolving Part-of-Speech Ambiguity in the Greek Language Using Learning
Techniques | 6 pages. To appear in the Proceedings of the ECCAI Advanced Course on
Artificial Intelligence(ACAI'99), Chania, Greece, July 1999 | In Fakotakis, N. et al. (Eds.), Machine Learning in Human Language
Technology (Proceedings of the ACAI Workshop), pp. 29-34, Chania, Greece,
1999. | null | null | cs.CL cs.AI | null | This article investigates the use of Transformation-Based Error-Driven
learning for resolving part-of-speech ambiguity in the Greek language. The aim
is not only to study the performance, but also to examine its dependence on
different thematic domains. Results are presented here for two different test
cases: a corpus on "management succession events" and a general-theme corpus.
The two experiments show that the performance of this method does not depend on
the thematic domain of the corpus, and its accuracy for the Greek language is
around 95%.
| [
{
"version": "v1",
"created": "Tue, 22 Jun 1999 07:41:24 GMT"
},
{
"version": "v2",
"created": "Wed, 30 Jun 1999 14:46:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Petasis",
"G.",
"",
"Software & Knowledge Engineering Lab, Institute of\n Informatics & Telecommunications, NCSR Demokritos, Greece"
],
[
"Paliouras",
"G.",
"",
"Software & Knowledge Engineering Lab, Institute of\n Informatics & Telecommunications, NCSR Demokritos, Greece"
],
[
"Karkaletsis",
"V.",
"",
"Software & Knowledge Engineering Lab, Institute of\n Informatics & Telecommunications, NCSR Demokritos, Greece"
],
[
"Spyropoulos",
"C. D.",
"",
"Software & Knowledge Engineering Lab, Institute of\n Informatics & Telecommunications, NCSR Demokritos, Greece"
],
[
"Androutsopoulos",
"I.",
"",
"Software & Knowledge Engineering Lab, Institute of\n Informatics & Telecommunications, NCSR Demokritos, Greece"
]
] |
cs/9906020 | Ion Androutsopoulos | I. Androutsopoulos (Software & Knowledge Engineering Lab, Institute of
Informatics & Telecommunications, NCSR Demokritos, Greece) | Temporal Meaning Representations in a Natural Language Front-End | 15 pages. To appear in the Proceedings of the 12th International
Symposium on Languages for Intensional Programming, Athens, Greece, 1999 | In Gergatsoulis, M. and Rondogiannis, P. (Eds.), Intensional
Programming II (Proceedings of the 12th International Symposium on Languages
for Intensional Programming, Athens, Greece, 1999), pp. 197-213, World
Scientific, 2000. | null | null | cs.CL | null | Previous work in the context of natural language querying of temporal
databases has established a method to map automatically from a large subset of
English time-related questions to suitable expressions of a temporal logic-like
language, called TOP. An algorithm to translate from TOP to the TSQL2 temporal
database language has also been defined. This paper shows how TOP expressions
could be translated into a simpler logic-like language, called BOT. BOT is very
close to traditional first-order predicate logic (FOPL), and hence existing
methods to manipulate FOPL expressions can be exploited to interface to
time-sensitive applications other than TSQL2 databases, maintaining the
existing English-to-TOP mapping.
| [
{
"version": "v1",
"created": "Tue, 22 Jun 1999 08:28:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Androutsopoulos",
"I.",
"",
"Software & Knowledge Engineering Lab, Institute of\n Informatics & Telecommunications, NCSR Demokritos, Greece"
]
] |
cs/9906021 | Christoph D\"urr | Christoph Durr and Marek Chrobak | Reconstructing hv-Convex Polyominoes from Orthogonal Projections | null | Information Processing Letters, 69, 1999, 283-289 | null | null | cs.DS | null | Tomography is the area of reconstructing objects from projections. Here we
wish to reconstruct a set of cells in a two dimensional grid, given the number
of cells in every row and column. The set is required to be an hv-convex
polyomino, that is all its cells must be connected and the cells in every row
and column must be consecutive. A simple, polynomial algorithm for
reconstructing hv-convex polyominoes is provided, which is several orders of
magnitudes faster than the best previously known algorithm from Barcucci et al.
In addition, the problem of reconstructing a special class of centered
hv-convex polyominoes is addressed. (An object is centered if it contains a row
whose length equals the total width of the object). It is shown that in this
case the reconstruction problem can be solved in linear time.
| [
{
"version": "v1",
"created": "Tue, 22 Jun 1999 09:56:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Durr",
"Christoph",
""
],
[
"Chrobak",
"Marek",
""
]
] |
cs/9906022 | Joseph O'Rourke | Joseph O'Rourke and Irena Pashchenko | Zero-Parity Stabbing Information | null | Proc. Japan Conf. Discrete Comput. Geom. '98, Dec. 1998, 93--97 | null | null | cs.CG cs.DM | null | Everett et al. introduced several varieties of stabbing information for the
lines determined by pairs of vertices of a simple polygon P, and established
their relationships to vertex visibility and other combinatorial data. In the
same spirit, we define the ``zero-parity (ZP) stabbing information'' to be a
natural weakening of their ``weak stabbing information,'' retaining only the
distinction among {zero, odd, even>0} in the number of polygon edges stabbed.
Whereas the weak stabbing information's relation to visibility remains an open
problem, we completely settle the analogous questions for zero-parity
information, with three results: (1) ZP information is insufficient to
distinguish internal from external visibility graph edges; (2) but it does
suffice for all polygons that avoid a certain complex substructure; and (3) the
natural generalization of ZP information to the continuous case of smooth
curves does distinguish internal from external visibility.
| [
{
"version": "v1",
"created": "Tue, 22 Jun 1999 20:32:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"O'Rourke",
"Joseph",
""
],
[
"Pashchenko",
"Irena",
""
]
] |
cs/9906023 | Joseph O'Rourke | Joseph O'Rourke | Computational Geometry Column 35 | null | SIGACT News, 30(2) Issue #111 (1999) 31-32 | null | null | cs.CG | null | The subquadratic algorithm of Kapoor for finding shortest paths on a
polyhedron is described.
| [
{
"version": "v1",
"created": "Tue, 22 Jun 1999 20:40:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"O'Rourke",
"Joseph",
""
]
] |
cs/9906024 | Christoph D\"urr | Christoph Durr, Huong LeThanh and Miklos Santha | A decision procedure for well-formed linear quantum cellular automata | null | Random Structures and Algorithms 11, 381-394, 1997 | null | null | cs.DS cs.CC quant-ph | null | In this paper we introduce a new quantum computation model, the linear
quantum cellular automaton. Well-formedness is an essential property for any
quantum computing device since it enables us to define the probability of a
configuration in an observation as the squared magnitude of its amplitude. We
give an efficient algorithm which decides if a linear quantum cellular
automaton is well-formed. The complexity of the algorithm is $O(n^2)$ in the
algebraic model of computation if the input automaton has continuous
neighborhood.
| [
{
"version": "v1",
"created": "Wed, 23 Jun 1999 10:48:10 GMT"
},
{
"version": "v2",
"created": "Fri, 27 Oct 2000 16:00:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Durr",
"Christoph",
""
],
[
"LeThanh",
"Huong",
""
],
[
"Santha",
"Miklos",
""
]
] |
cs/9906025 | Lluis Padro | J. Daude, L. Padro and G. Rigau (TALP Research Center. LSI Dept.
Universitat Politecnica de Catalunya. Barcelona) | Mapping Multilingual Hierarchies Using Relaxation Labeling | 8 pages. 1 eps figure | null | null | null | cs.CL | null | This paper explores the automatic construction of a multilingual Lexical
Knowledge Base from pre-existing lexical resources. We present a new and robust
approach for linking already existing lexical/semantic hierarchies. We used a
constraint satisfaction algorithm (relaxation labeling) to select --among all
the candidate translations proposed by a bilingual dictionary-- the right
English WordNet synset for each sense in a taxonomy automatically derived from
a Spanish monolingual dictionary. Although on average, there are 15 possible
WordNet connections for each sense in the taxonomy, the method achieves an
accuracy over 80%. Finally, we also propose several ways in which this
technique could be applied to enrich and improve existing lexical databases.
| [
{
"version": "v1",
"created": "Thu, 24 Jun 1999 16:56:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Daude",
"J.",
"",
"TALP Research Center. LSI Dept.\n Universitat Politecnica de Catalunya. Barcelona"
],
[
"Padro",
"L.",
"",
"TALP Research Center. LSI Dept.\n Universitat Politecnica de Catalunya. Barcelona"
],
[
"Rigau",
"G.",
"",
"TALP Research Center. LSI Dept.\n Universitat Politecnica de Catalunya. Barcelona"
]
] |
cs/9906027 | Gillian Callaghan | Yorick Wilks and Roberta Catizone | Human-Computer Conversation | 14 pages, 1 figure | null | null | CS-99-04 | cs.CL cs.HC | null | The article surveys a little of the history of the technology, sets out the
main current theoretical approaches in brief, and discusses the on-going
opposition between theoretical and empirical approaches. It illustrates the
situation with some discussion of CONVERSE, a system that won the Loebner prize
in 1997 and which displays features of both approaches.
| [
{
"version": "v1",
"created": "Fri, 25 Jun 1999 11:44:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wilks",
"Yorick",
""
],
[
"Catizone",
"Roberta",
""
]
] |
cs/9906028 | Edith Hemaspaandra | Edith Hemaspaandra | On the Power of Positive Turing Reductions | 7 pages | null | null | null | cs.CC | null | In the early 1980s, Selman's seminal work on positive Turing reductions
showed that positive Turing reduction to NP yields no greater computational
power than NP itself. Thus, positive Turing and Turing reducibility to NP
differ sharply unless the polynomial hierarchy collapses.
We show that the situation is quite different for DP, the next level of the
boolean hierarchy. In particular, positive Turing reduction to DP already
yields all (and only) sets Turing reducibility to NP. Thus, positive Turing and
Turing reducibility to DP yield the same class. Additionally, we show that an
even weaker class, P(NP[1]), can be substituted for DP in this context.
| [
{
"version": "v1",
"created": "Sat, 26 Jun 1999 23:31:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hemaspaandra",
"Edith",
""
]
] |
cs/9906029 | Marsha Chechik | M.Chechik, D.Paun | Events in Property Patterns | 14 pages, 3 figures | Lecture notes in Computer Science (Proceedings of 6 Spin'99
Workshop) | null | null | cs.SE cs.AI cs.CL cs.SC | null | A pattern-based approach to the presentation, codification and reuse of
property specifications for finite-state verification was proposed by Dwyer and
his collegues. The patterns enable non-experts to read and write formal
specifications for realistic systems and facilitate easy conversion of
specifications between formalisms, such as LTL, CTL, QRE. In this paper, we
extend the pattern system with events - changes of values of variables in the
context of LTL.
| [
{
"version": "v1",
"created": "Mon, 28 Jun 1999 17:06:51 GMT"
},
{
"version": "v2",
"created": "Tue, 29 Jun 1999 16:28:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chechik",
"M.",
""
],
[
"Paun",
"D.",
""
]
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.