id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 3
62.8k
| title
stringlengths 1
382
| comments
stringlengths 1
1.15k
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 7
153
⌀ | report-no
stringlengths 1
509
⌀ | categories
stringlengths 5
125
| license
stringclasses 9
values | abstract
stringlengths 6
6.09k
| versions
listlengths 1
187
| update_date
timestamp[s]date 2007-05-23 00:00:00
2025-04-25 00:00:00
| authors_parsed
sequencelengths 1
2.83k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/9906030 | Marsha Chechik | M. Chechik | SCR3: towards usability of formal methods | 15 pages, 10 figures | Proceedings of CASCON'98, December 1998, pp. 177-191 | null | null | cs.SE | null | This paper gives an overview of SCR3 -- a toolset designed to increase the
usability of formal methods for software development. Formal requirements are
specified in SCR3 in an easy to use and review format, and then used in
checking requirements for correctness and in verifying consistency between
annotated code and requirements.
In this paper we discuss motivations behind this work, describe several tools
which are part of SCR3, and illustrate their operation on an example of a
Cruise Control system.
| [
{
"version": "v1",
"created": "Mon, 28 Jun 1999 17:30:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chechik",
"M.",
""
]
] |
cs/9906032 | Marsha Chechik | A. Wong and M. Chechik | Formal Modeling in a Commercial Setting: A Case Study | 18 pages, 5 figures, to appear in Proceedings of FM'99: World
Congress on Formal Methods, September 1999 | null | null | null | cs.SE | null | This paper describes a case study conducted in collaboration with Nortel to
demonstrate the feasibility of applying formal modeling techniques to
telecommunication systems. A formal description language, SDL, was chosen by
our qualitative CASE tool evaluation to model a multimedia-messaging system
described by an 80-page natural language specification. Our model was used to
identify errors in the software requirements document and to derive test
suites, shadowing the existing development process and keeping track of a
variety of productivity data.
| [
{
"version": "v1",
"created": "Tue, 29 Jun 1999 15:29:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wong",
"A.",
""
],
[
"Chechik",
"M.",
""
]
] |
cs/9906033 | Lane A. Hemaspaandra | Jin-Yi Cai, Lane A. Hemaspaandra, Gerd Wechsung | Robust Reductions | 26 pages; 1 figure; will appear in Theory of Computing Systems;
earlier versions appear as UR-CS-TR-666 and in COCOON 98 | null | null | null | cs.CC | null | We continue the study of robust reductions initiated by Gavalda and Balcazar.
In particular, a 1991 paper of Gavalda and Balcazar claimed an optimal
separation between the power of robust and nondeterministic strong reductions.
Unfortunately, their proof is invalid. We re-establish their theorem.
Generalizing robust reductions, we note that robustly strong reductions are
built from two restrictions, robust underproductivity and robust
overproductivity, both of which have been separately studied before in other
contexts. By systematically analyzing the power of these reductions, we explore
the extent to which each restriction weakens the power of reductions. We show
that one of these reductions yields a new, strong form of the Karp-Lipton
Theorem.
| [
{
"version": "v1",
"created": "Tue, 29 Jun 1999 18:26:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cai",
"Jin-Yi",
""
],
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Wechsung",
"Gerd",
""
]
] |
cs/9906034 | Davide Turcato | Davide Turcato, Paul McFetridge, Fred Popowich, Janine Toole | A Unified Example-Based and Lexicalist Approach to Machine Translation | 11 pages, to be presented at the 8th International Conference on
Theoretical and Methodological Issues in Machine Translation (TMI-99) | null | null | null | cs.CL | null | We present an approach to Machine Translation that combines the ideas and
methodologies of the Example-Based and Lexicalist theoretical frameworks. The
approach has been implemented in a multilingual Machine Translation system.
| [
{
"version": "v1",
"created": "Wed, 30 Jun 1999 23:06:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Turcato",
"Davide",
""
],
[
"McFetridge",
"Paul",
""
],
[
"Popowich",
"Fred",
""
],
[
"Toole",
"Janine",
""
]
] |
cs/9907003 | Steven Bird | Steven Bird and Mark Liberman | Annotation graphs as a framework for multidimensional linguistic data
analysis | 10 pages, 10 figures, Towards Standards and Tools for Discourse
Tagging, Proceedings of the Workshop. pp. 1-10. Association for Computational
Linguistics | null | null | null | cs.CL | null | In recent work we have presented a formal framework for linguistic annotation
based on labeled acyclic digraphs. These `annotation graphs' offer a simple yet
powerful method for representing complex annotation structures incorporating
hierarchy and overlap. Here, we motivate and illustrate our approach using
discourse-level annotations of text and speech data drawn from the CALLHOME,
COCONUT, MUC-7, DAMSL and TRAINS annotation schemes. With the help of domain
specialists, we have constructed a hybrid multi-level annotation for a fragment
of the Boston University Radio Speech Corpus which includes the following
levels: segment, word, breath, ToBI, Tilt, Treebank, coreference and named
entity. We show how annotation graphs can represent hybrid multi-level
structures which derive from a diverse set of file formats. We also show how
the approach facilitates substantive comparison of multiple annotations of a
single signal based on different theoretical models. The discussion shows how
annotation graphs open the door to wide-ranging integration of tools, formats
and corpora.
| [
{
"version": "v1",
"created": "Mon, 5 Jul 1999 14:51:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bird",
"Steven",
""
],
[
"Liberman",
"Mark",
""
]
] |
cs/9907004 | Anand Venkataraman | Anand Venkataraman | MAP Lexicon is useful for segmentation and word discovery in
child-directed speech | Because of rather fundamental changes to the underlying model
proposed in the paper, it has been withdrawn from the archive. | null | null | null | cs.CL cs.LG | null | Because of rather fundamental changes to the underlying model proposed in the
paper, it has been withdrawn from the archive.
| [
{
"version": "v1",
"created": "Tue, 6 Jul 1999 01:44:00 GMT"
},
{
"version": "v2",
"created": "Thu, 14 Oct 1999 00:31:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Venkataraman",
"Anand",
""
]
] |
cs/9907005 | Eirik Fossgaard | Eirik Fossgaard | Alternative Local Discriminant Bases Using Empirical Expectation and
Variance Estimation | 11 pages | null | null | null | cs.NA | null | We propose alternative discriminant measures for selecting the best basis
among a large collection of orthonormal bases for classification purposes. A
generalization of the Local Discriminant Basis Algorithm of Saito and Coifman
is constructed. The success of these new methods is evaluated and compared to
earlier methods in experiments.
| [
{
"version": "v1",
"created": "Tue, 6 Jul 1999 11:48:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fossgaard",
"Eirik",
""
]
] |
cs/9907006 | Erik Tjong Kim Sang | Erik F. Tjong Kim Sang and Jorn Veenstra | Representing Text Chunks | 7 pages | EACL'99, Bergen | null | null | cs.CL | null | Dividing sentences in chunks of words is a useful preprocessing step for
parsing, information extraction and information retrieval. (Ramshaw and Marcus,
1995) have introduced a "convenient" data representation for chunking by
converting it to a tagging task. In this paper we will examine seven different
data representations for the problem of recognizing noun phrase chunks. We will
show that the the data representation choice has a minor influence on chunking
performance. However, equipped with the most suitable data representation, our
memory-based learning chunker was able to improve the best published chunking
results for a standard data set.
| [
{
"version": "v1",
"created": "Tue, 6 Jul 1999 12:44:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sang",
"Erik F. Tjong Kim",
""
],
[
"Veenstra",
"Jorn",
""
]
] |
cs/9907007 | Atsushi Fujii | Atsushi Fujii and Tetsuya Ishikawa | Cross-Language Information Retrieval for Technical Documents | 9 pages, 5 Postscript figures, uses colacl.sty and psfig.tex | Proceedings of the Joint ACL SIGDAT Conference on Empirical
Methods in Natural Language Processing and Very Large Corpora, pp.29-37, 1999 | null | null | cs.CL | null | This paper proposes a Japanese/English cross-language information retrieval
(CLIR) system targeting technical documents. Our system first translates a
given query containing technical terms into the target language, and then
retrieves documents relevant to the translated query. The translation of
technical terms is still problematic in that technical terms are often compound
words, and thus new terms can be progressively created simply by combining
existing base words. In addition, Japanese often represents loanwords based on
its phonogram. Consequently, existing dictionaries find it difficult to achieve
sufficient coverage. To counter the first problem, we use a compound word
translation method, which uses a bilingual dictionary for base words and
collocational statistics to resolve translation ambiguity. For the second
problem, we propose a transliteration method, which identifies phonetic
equivalents in the target language. We also show the effectiveness of our
system using a test collection for CLIR.
| [
{
"version": "v1",
"created": "Tue, 6 Jul 1999 16:25:46 GMT"
},
{
"version": "v2",
"created": "Wed, 7 Jul 1999 09:12:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fujii",
"Atsushi",
""
],
[
"Ishikawa",
"Tetsuya",
""
]
] |
cs/9907008 | Janine Toole | Janine Toole, Fred Popowich, Devlan Nicholson, Davide Turcato, Paul
McFetridge | Explanation-based Learning for Machine Translation | 12 pages, 3 figures, To appear in Proceedings of the 8th
International Conference on Theoretical and Methodological Issues in Machine
Translation | null | null | null | cs.CL | null | In this paper we present an application of explanation-based learning (EBL)
in the parsing module of a real-time English-Spanish machine translation system
designed to translate closed captions. We discuss the efficiency/coverage
trade-offs available in EBL and introduce the techniques we use to increase
coverage while maintaining a high level of space and time efficiency. Our
performance results indicate that this approach is effective.
| [
{
"version": "v1",
"created": "Tue, 6 Jul 1999 18:35:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Toole",
"Janine",
""
],
[
"Popowich",
"Fred",
""
],
[
"Nicholson",
"Devlan",
""
],
[
"Turcato",
"Davide",
""
],
[
"McFetridge",
"Paul",
""
]
] |
cs/9907010 | David Elworthy | David Elworthy | Language Identification With Confidence Limits | 8 pages; needs colacl.sty. Appeared in Proceedings of the Sixth
Workshop on Very Large Corpora (COLING-ACL 98) | null | null | null | cs.CL | null | A statistical classification algorithm and its application to language
identification from noisy input are described. The main innovation is to
compute confidence limits on the classification, so that the algorithm
terminates when enough evidence to make a clear decision has been made, and so
avoiding problems with categories that have similar characteristics. A second
application, to genre identification, is briefly examined. The results show
that some of the problems of other language identification techniques can be
avoided, and illustrate a more important point: that a statistical language
process can be used to provide feedback about its own success rate.
| [
{
"version": "v1",
"created": "Wed, 7 Jul 1999 09:28:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Elworthy",
"David",
""
]
] |
cs/9907011 | Ming-Yang Kao | Zhi-Zhong Chen and Ming-Yang Kao | Reducing Randomness via Irrational Numbers | null | SIAM Journal on Computing, 29(4):1247--1256, 2000 | null | null | cs.DS cs.DM | null | We propose a general methodology for testing whether a given polynomial with
integer coefficients is identically zero. The methodology evaluates the
polynomial at efficiently computable approximations of suitable irrational
points. In contrast to the classical technique of DeMillo, Lipton, Schwartz,
and Zippel, this methodology can decrease the error probability by increasing
the precision of the approximations instead of using more random bits.
Consequently, randomized algorithms that use the classical technique can
generally be improved using the new methodology. To demonstrate the
methodology, we discuss two nontrivial applications. The first is to decide
whether a graph has a perfect matching in parallel. Our new NC algorithm uses
fewer random bits while doing less work than the previously best NC algorithm
by Chari, Rohatgi, and Srinivasan. The second application is to test the
equality of two multisets of integers. Our new algorithm improves upon the
previously best algorithms by Blum and Kannan and can speed up their checking
algorithm for sorting programs on a large range of inputs.
| [
{
"version": "v1",
"created": "Wed, 7 Jul 1999 23:39:27 GMT"
},
{
"version": "v2",
"created": "Wed, 15 Nov 2000 14:39:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chen",
"Zhi-Zhong",
""
],
[
"Kao",
"Ming-Yang",
""
]
] |
cs/9907012 | Guido Minnen | Guido Minnen (University of Sussex) | Selective Magic HPSG Parsing | 9 pages, LaTeX with 4 postscript figures (uses avm.sty, eaclap.sty
and psfig-scale.sty) | Proceedings of EACL99, Bergen, Norway, June 8-11 | null | null | cs.CL | null | We propose a parser for constraint-logic grammars implementing HPSG that
combines the advantages of dynamic bottom-up and advanced top-down control. The
parser allows the user to apply magic compilation to specific constraints in a
grammar which as a result can be processed dynamically in a bottom-up and
goal-directed fashion. State of the art top-down processing techniques are used
to deal with the remaining constraints. We discuss various aspects concerning
the implementation of the parser as part of a grammar development system.
| [
{
"version": "v1",
"created": "Thu, 8 Jul 1999 09:46:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Minnen",
"Guido",
"",
"University of Sussex"
]
] |
cs/9907013 | Guido Minnen | John Carroll, Guido Minnen (University of Sussex), Ted Briscoe
(Cambridge University) | Corpus Annotation for Parser Evaluation | 7 pages, LaTeX (uses eaclap.sty) | Proceedings of the EACL99 workshop on Linguistically Interpreted
Corpora (LINC), Bergen, Norway, June 12 | null | null | cs.CL | null | We describe a recently developed corpus annotation scheme for evaluating
parsers that avoids shortcomings of current methods. The scheme encodes
grammatical relations between heads and dependents, and has been used to mark
up a new public-domain corpus of naturally occurring English text. We show how
the corpus can be used to evaluate the accuracy of a robust parser, and relate
the corpus to extant resources.
| [
{
"version": "v1",
"created": "Thu, 8 Jul 1999 10:08:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Carroll",
"John",
"",
"University of Sussex"
],
[
"Minnen",
"Guido",
"",
"University of Sussex"
],
[
"Briscoe",
"Ted",
"",
"Cambridge University"
]
] |
cs/9907016 | Jim Gray | Tom Barclay Jim Gray Don Slutz | Microsoft TerraServer: A Spatial Data Warehouse | Original MSword format at
http://research.microsoft.com/~gray/papers/MS_TR_99_30_TerraServer.doc | null | null | Microsoft Research Technical Report MSR-TR-99-29 | cs.DB cs.DL | null | The TerraServer stores aerial, satellite, and topographic images of the earth
in a SQL database available via the Internet. It is the world's largest online
atlas, combining five terabytes of image data from the United States Geological
Survey (USGS) and SPIN-2. This report describes the system-redesign based on
our experience over the last year. It also reports usage and operations results
over the last year -- over 2 billion web hits and over 20 Terabytes of imagry
served over the Internet. Internet browsers provide intuitive spatial and text
interfaces to the data. Users need no special hardware, software, or knowledge
to locate and browse imagery. This paper describes how terabytes of "Internet
unfriendly" geo-spatial images were scrubbed and edited into hundreds of
millions of "Internet friendly" image tiles and loaded into a SQL data
warehouse. Microsoft TerraServer demonstrates that general-purpose relational
database technology can manage large scale image repositories, and shows that
web browsers can be a good geospatial image presentation system.
| [
{
"version": "v1",
"created": "Fri, 9 Jul 1999 21:30:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Slutz",
"Tom Barclay Jim Gray Don",
""
]
] |
cs/9907017 | Davide Turcato | Davide Turcato, Paul McFetridge, Fred Popowich and Janine Toole | A Bootstrap Approach to Automatically Generating Lexical Transfer Rules | 8 pages, 1 figure, to be presented at Machine Translation Summit VII,
September 13-17, 1999, Singapore | null | null | null | cs.CL | null | We describe a method for automatically generating Lexical Transfer Rules
(LTRs) from word equivalences using transfer rule templates. Templates are
skeletal LTRs, unspecified for words. New LTRs are created by instantiating a
template with words, provided that the words belong to the appropriate lexical
categories required by the template. We define two methods for creating an
inventory of templates and using them to generate new LTRs. A simpler method
consists of extracting a finite set of templates from a sample of hand coded
LTRs and directly using them in the generation process. A further method
consists of abstracting over the initial finite set of templates to define
higher level templates, where bilingual equivalences are defined in terms of
correspondences involving phrasal categories. Phrasal templates are then mapped
onto sets of lexical templates with the aid of grammars. In this way an
infinite set of lexical templates is recursively defined. New LTRs are created
by parsing input words, matching a template at the phrasal level and using the
corresponding lexical categories to instantiate the lexical template. The
definition of an infinite set of templates enables the automatic creation of
LTRs for multi-word, non-compositional word equivalences of any cardinality.
| [
{
"version": "v1",
"created": "Fri, 9 Jul 1999 22:39:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Turcato",
"Davide",
""
],
[
"McFetridge",
"Paul",
""
],
[
"Popowich",
"Fred",
""
],
[
"Toole",
"Janine",
""
]
] |
cs/9907018 | Erik Demaine | Erik D. Demaine, Martin L. Demaine, David Eppstein, Greg N.
Frederickson, Erich Friedman | Hinged Dissection of Polyominoes and Polyforms | 27 pages, 39 figures. Accepted to Computational Geometry: Theory and
Applications. v3 incorporates several comments by referees. v2 added many new
results and a new coauthor (Frederickson) | null | null | null | cs.CG cs.DM | null | A hinged dissection of a set of polygons S is a collection of polygonal
pieces hinged together at vertices that can be folded into any member of S. We
present a hinged dissection of all edge-to-edge gluings of n congruent copies
of a polygon P that join corresponding edges of P. This construction uses kn
pieces, where k is the number of vertices of P. When P is a regular polygon, we
show how to reduce the number of pieces to ceiling(k/2)*(n-1). In particular,
we consider polyominoes (made up of unit squares), polyiamonds (made up of
equilateral triangles), and polyhexes (made up of regular hexagons). We also
give a hinged dissection of all polyabolos (made up of right isosceles
triangles), which do not fall under the general result mentioned above.
Finally, we show that if P can be hinged into Q, then any edge-to-edge gluing
of n congruent copies of P can be hinged into any edge-to-edge gluing of n
congruent copies of Q.
| [
{
"version": "v1",
"created": "Sat, 10 Jul 1999 21:29:56 GMT"
},
{
"version": "v2",
"created": "Wed, 13 Oct 1999 01:54:07 GMT"
},
{
"version": "v3",
"created": "Sun, 23 Mar 2003 13:29:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Demaine",
"Erik D.",
""
],
[
"Demaine",
"Martin L.",
""
],
[
"Eppstein",
"David",
""
],
[
"Frederickson",
"Greg N.",
""
],
[
"Friedman",
"Erich",
""
]
] |
cs/9907019 | Craig Bordelon | Craig Bordelon | A Reasonable C++ Wrappered Java Native Interface | 27 pages, 18 figures; Submitted to Software Practice & Experience;
Withdrawn after 3 month negotiation failed to reach compromise on copyright
(Wiley Publisher vs. Telcordia Technologies); jH software inquiries to
http://www.telcordia.com | null | null | null | cs.SE | null | A reasonable C++ Java Native Interface (JNI) technique termed C++ Wrappered
JNI (C++WJ) is presented. The technique simplifies current error-prone JNI
development by wrappering JNI calls. Provided development is done with the aid
of a C++ compiler, C++WJ offers type checking and behind the scenes caching. A
tool (jH) patterned on javah automates the creation of C++WJ classes.
The paper presents the rationale behind the choices that led to C++WJ.
Handling of Java class and interface hierarchy including Java type downcasts is
discussed. Efficiency considerations in the C++WJ lead to two flavors of C++
classes: jtypes and Jtypes. A jtype is a lightweight less than full wrapper of
a JNI object reference. A Jtype is a heavyweight full wrapper of a JNI object
reference.
| [
{
"version": "v1",
"created": "Mon, 12 Jul 1999 13:34:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bordelon",
"Craig",
""
]
] |
cs/9907022 | Satoru Kuroda | Satoru Kuroda | Weak length induction and slow growing depth boolean circuits | null | null | null | null | cs.LO | null | We define a hierarchy of circuit complexity classes LD^i, whose depth are the
inverse of a function in Ackermann hierarchy. Then we introduce extremely weak
versions of length induction and construct a bounded arithmetic theory L^i_2
whose provably total functions exactly correspond to functions computable by
LD^i circuits. Finally, we prove a non-conservation result between L^i_2 and a
weaker theory AC^0CA which corresponds to the class AC^0. Our proof utilizes
KPT witnessing theorem.
| [
{
"version": "v1",
"created": "Fri, 16 Jul 1999 08:41:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kuroda",
"Satoru",
""
]
] |
cs/9907023 | Devillers | Olivier Devillers | On Deletion in Delaunay Triangulation | 15 pages 5 figures. in Proc. 15th Annu. ACM Sympos. Comput. Geom.,
181--188, 1999 | null | null | INRIA Research report 3451 | cs.CG | null | This paper presents how the space of spheres and shelling may be used to
delete a point from a $d$-dimensional triangulation efficiently. In dimension
two, if k is the degree of the deleted vertex, the complexity is O(k log k),
but we notice that this number only applies to low cost operations, while time
consuming computations are only done a linear number of times.
This algorithm may be viewed as a variation of Heller's algorithm, which is
popular in the geographic information system community. Unfortunately, Heller
algorithm is false, as explained in this paper.
| [
{
"version": "v1",
"created": "Fri, 16 Jul 1999 13:25:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Devillers",
"Olivier",
""
]
] |
cs/9907024 | Devillers | Olivier Devillers | Improved Incremental Randomized Delaunay Triangulation | 19 pages, 7 figures Proc. 14th Annu. ACM Sympos. Comput. Geom.,
106--115, 1998 | null | null | INRIA Research Report 3298 | cs.CG | null | We propose a new data structure to compute the Delaunay triangulation of a
set of points in the plane. It combines good worst case complexity, fast
behavior on real data, and small memory occupation.
The location structure is organized into several levels. The lowest level
just consists of the triangulation, then each level contains the triangulation
of a small sample of the levels below. Point location is done by marching in a
triangulation to determine the nearest neighbor of the query at that level,
then the march restarts from that neighbor at the level below. Using a small
sample (3%) allows a small memory occupation; the march and the use of the
nearest neighbor to change levels quickly locate the query.
| [
{
"version": "v1",
"created": "Fri, 16 Jul 1999 12:44:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Devillers",
"Olivier",
""
]
] |
cs/9907025 | Devillers | Herve Bronnimann, Olivier Devillers | The union of unit balls has quadratic complexity, even if they all
contain the origin | 5 pages, 5 figures | null | null | null | cs.CG | null | We provide a lower bound construction showing that the union of unit balls in
three-dimensional space has quadratic complexity, even if they all contain the
origin. This settles a conjecture of Sharir.
| [
{
"version": "v1",
"created": "Fri, 16 Jul 1999 15:20:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bronnimann",
"Herve",
""
],
[
"Devillers",
"Olivier",
""
]
] |
cs/9907026 | Tovena | Emanuele Pianta, Lucia M. Tovena | Mixing representation levels: The hybrid approach to automatic text
generation | 6 pages | Proceedings of the AISB'99 Workshop on ``Reference Architectures
and Data Standards for NLP'', Edinburgh Scotland, April 1999, 8-13 | null | null | cs.CL cs.AI | null | Natural language generation systems (NLG) map non-linguistic representations
into strings of words through a number of steps using intermediate
representations of various levels of abstraction. Template based systems, by
contrast, tend to use only one representation level, i.e. fixed strings, which
are combined, possibly in a sophisticated way, to generate the final text.
In some circumstances, it may be profitable to combine NLG and template based
techniques. The issue of combining generation techniques can be seen in more
abstract terms as the issue of mixing levels of representation of different
degrees of linguistic abstraction. This paper aims at defining a reference
architecture for systems using mixed representations. We argue that mixed
representations can be used without abandoning a linguistically grounded
approach to language generation.
| [
{
"version": "v1",
"created": "Fri, 16 Jul 1999 15:43:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pianta",
"Emanuele",
""
],
[
"Tovena",
"Lucia M.",
""
]
] |
cs/9907027 | Andrea Schaerf | Krzysztof R. Apt and Andrea Schaerf | The Alma Project, or How First-Order Logic Can Help Us in Imperative
Programming | 25 pages | null | null | null | cs.LO cs.PL | null | The aim of the Alma project is the design of a strongly typed constraint
programming language that combines the advantages of logic and imperative
programming. The first stage of the project was the design and implementation
of Alma-0, a small programming language that provides a support for declarative
programming within the imperative programming framework. It is obtained by
extending a subset of Modula-2 by a small number of features inspired by the
logic programming paradigm. In this paper we discuss the rationale for the
design of Alma-0, the benefits of the resulting hybrid programming framework,
and the current work on adding constraint processing capabilities to the
language. In particular, we discuss the role of the logical and customary
variables, the interaction between the constraint store and the program, and
the need for lists.
| [
{
"version": "v1",
"created": "Mon, 19 Jul 1999 09:36:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Apt",
"Krzysztof R.",
""
],
[
"Schaerf",
"Andrea",
""
]
] |
cs/9907028 | Devillers | Olivier Devillers and Franco P. Preparata | Further Results on Arithmetic Filters for Geometric Predicates | 7 pages 2 figures presented at the 15th European Workshop Comput.
Geom., 113--116, 1999 improve previous results (in other paper) | Comput. Geom. Theory Appl. 1999 13:141-148 | null | INRIA Research report 3528 | cs.CG | null | An efficient technique to solve precision problems consists in using exact
computations. For geometric predicates, using systematically expensive exact
computations can be avoided by the use of filters. The predicate is first
evaluated using rounding computations, and an error estimation gives a
certificate of the validity of the result. In this note, we studies the
statistical efficiency of filters for cosphericity predicate with an assumption
of regular distribution of the points. We prove that the expected value of the
polynomial corresponding to the in sphere test is greater than epsilon with
probability O(epsilon log 1/epsilon) improving the results of a previous paper
by the same authors.
| [
{
"version": "v1",
"created": "Mon, 19 Jul 1999 15:09:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Devillers",
"Olivier",
""
],
[
"Preparata",
"Franco P.",
""
]
] |
cs/9907029 | Devillers | Olivier Devillers and Franco P. Preparata | A Probabilistic Analysis of the Power of Arithmetic Filters | 22 pages 7 figures Results for in sphere test inproved in
cs.CG/9907028 | Discrete and Computational Geometry, 20:523--547, 1998 | null | INRIA Research report 2971 | cs.CG | null | The assumption of real-number arithmetic, which is at the basis of
conventional geometric algorithms, has been seriously challenged in recent
years, since digital computers do not exhibit such capability.
A geometric predicate usually consists of evaluating the sign of some
algebraic expression. In most cases, rounded computations yield a reliable
result, but sometimes rounded arithmetic introduces errors which may invalidate
the algorithms. The rounded arithmetic may produce an incorrect result only if
the exact absolute value of the algebraic expression is smaller than some
(small) varepsilon, which represents the largest error that may arise in the
evaluation of the expression. The threshold varepsilon depends on the structure
of the expression and on the adopted computer arithmetic, assuming that the
input operands are error-free.
A pair (arithmetic engine,threshold) is an "arithmetic filter". In this paper
we develop a general technique for assessing the efficacy of an arithmetic
filter. The analysis consists of evaluating both the threshold and the
probability of failure of the filter.
To exemplify the approach, under the assumption that the input points be
chosen randomly in a unit ball or unit cube with uniform density, we analyze
the two important predicates "which-side" and "insphere". We show that the
probability that the absolute values of the corresponding determinants be no
larger than some positive value V, with emphasis on small V, is Theta(V) for
the which-side predicate, while for the insphere predicate it is Theta(V^(2/3))
in dimension 1, O(sqrt(V)) in dimension 2, and O(sqrt(V) ln(1/V)) in higher
dimensions. Constants are small, and are given in the paper.
| [
{
"version": "v1",
"created": "Mon, 19 Jul 1999 15:22:19 GMT"
},
{
"version": "v2",
"created": "Wed, 21 Jul 1999 07:27:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Devillers",
"Olivier",
""
],
[
"Preparata",
"Franco P.",
""
]
] |
cs/9907032 | Clare Dixon | Michael Fisher (1), Clare Dixon (1), Martin Peim (2) ((1) Department
of Computing and Mathematics, Manchester Metropolitan University, Manchester,
UK, (2) Department of Computer Science, Victoria University of Manchester,
Manchester, UK) | Clausal Temporal Resolution | 35 pages, 0 figures Expanded related work, corrected typos, expanded
proofs | null | null | null | cs.LO cs.AI | null | In this article, we examine how clausal resolution can be applied to a
specific, but widely used, non-classical logic, namely discrete linear temporal
logic. Thus, we first define a normal form for temporal formulae and show how
arbitrary temporal formulae can be translated into the normal form, while
preserving satisfiability. We then introduce novel resolution rules that can be
applied to formulae in this normal form, provide a range of examples and
examine the correctness and complexity of this approach is examined and. This
clausal resolution approach. Finally, we describe related work and future
developments concerning this work.
| [
{
"version": "v1",
"created": "Wed, 21 Jul 1999 15:48:06 GMT"
},
{
"version": "v2",
"created": "Fri, 14 Apr 2000 10:13:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fisher",
"Michael",
""
],
[
"Dixon",
"Clare",
""
],
[
"Peim",
"Martin",
""
]
] |
cs/9907033 | Joerg Rothe | Lane A. Hemaspaandra and Joerg Rothe | Unambiguous Computation: Boolean Hierarchies and Sparse Turing-Complete
Sets | 27 pages | SIAM Journal on Computing vol. 26, no. 3, pp. 634--653, 1997 | null | earlier version appeared as University of Rochester TR-94-483 | cs.CC | null | It is known that for any class C closed under union and intersection, the
Boolean closure of C, the Boolean hierarchy over C, and the symmetric
difference hierarchy over C all are equal. We prove that these equalities hold
for any complexity class closed under intersection; in particular, they thus
hold for unambiguous polynomial time (UP). In contrast to the NP case, we prove
that the Hausdorff hierarchy and the nested difference hierarchy over UP both
fail to capture the Boolean closure of UP in some relativized worlds.
Karp and Lipton proved that if nondeterministic polynomial time has sparse
Turing-complete sets, then the polynomial hierarchy collapses. We establish the
first consequences from the assumption that unambiguous polynomial time has
sparse Turing-complete sets: (a) UP is in Low_2, where Low_2 is the second
level of the low hierarchy, and (b) each level of the unambiguous polynomial
hierarchy is contained one level lower in the promise unambiguous polynomial
hierarchy than is otherwise known to be the case.
| [
{
"version": "v1",
"created": "Mon, 26 Jul 1999 10:09:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Rothe",
"Joerg",
""
]
] |
cs/9907034 | Joerg Rothe | Lane A. Hemaspaandra, Zhigen Jiang, Joerg Rothe and Osamu Watanabe | Polynomial-Time Multi-Selectivity | 40 pages | Journal of Universal Computer Science vol. 3, no. 3, pp. 197--229,
1997 | null | earlier version appeared as FSU Jena TR Math/Inf/96/11 | cs.CC | null | We introduce a generalization of Selman's P-selectivity that yields a more
flexible notion of selectivity, called (polynomial-time) multi-selectivity, in
which the selector is allowed to operate on multiple input strings. Since our
introduction of this class, it has been used to prove the first known (and
optimal) lower bounds for generalized selectivity-like classes in terms of
EL_2, the second level of the extended low hierarchy. We study the resulting
selectivity hierarchy, denoted by SH, which we prove does not collapse. In
particular, we study the internal structure and the properties of SH and
completely establish, in terms of incomparability and strict inclusion, the
relations between our generalized selectivity classes and Ogihara's P-mc
(polynomial-time membership-comparable) classes. Although SH is a strictly
increasing infinite hierarchy, we show that the core results that hold for the
P-selective sets and that prove them structurally simple also hold for SH. In
particular, all sets in SH have small circuits; the NP sets in SH are in Low_2,
the second level of the low hierarchy within NP; and SAT cannot be in SH unless
P = NP. Finally, it is known that P-Sel, the class of P-selective sets, is not
closed under union or intersection. We provide an extended selectivity
hierarchy that is based on SH and that is large enough to capture those
closures of the P-selective sets, and yet, in contrast with the P-mc classes,
is refined enough to distinguish them.
| [
{
"version": "v1",
"created": "Sun, 25 Jul 1999 20:55:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Jiang",
"Zhigen",
""
],
[
"Rothe",
"Joerg",
""
],
[
"Watanabe",
"Osamu",
""
]
] |
cs/9907035 | Joerg Rothe | Lane A. Hemaspaandra, Joerg Rothe and Gerd Wechsung | Easy Sets and Hard Certificate Schemes | 26 pages | Acta Informatica vol. 34, no 11, pp. 859--879, 1997 | null | earlier version appeared as FSU Jena TR Math/95/5 | cs.CC | null | Can easy sets only have easy certificate schemes? In this paper, we study the
class of sets that, for all NP certificate schemes (i.e., NP machines), always
have easy acceptance certificates (i.e., accepting paths) that can be computed
in polynomial time. We also study the class of sets that, for all NP
certificate schemes, infinitely often have easy acceptance certificates.
In particular, we provide equivalent characterizations of these classes in
terms of relative generalized Kolmogorov complexity, showing that they are
robust. We also provide structural conditions---regarding immunity and class
collapses---that put upper and lower bounds on the sizes of these two classes.
Finally, we provide negative results showing that some of our positive claims
are optimal with regard to being relativizable. Our negative results are proven
using a novel observation: we show that the classical ``wide spacing'' oracle
construction technique yields instant non-bi-immunity results. Furthermore, we
establish a result that improves upon Baker, Gill, and Solovay's classical
result that NP \neq P = NP \cap coNP holds in some relativized world.
| [
{
"version": "v1",
"created": "Sun, 25 Jul 1999 21:05:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Rothe",
"Joerg",
""
],
[
"Wechsung",
"Gerd",
""
]
] |
cs/9907036 | Joerg Rothe | Edith Hemaspaandra, Lane A. Hemaspaandra and Joerg Rothe | Exact Analysis of Dodgson Elections: Lewis Carroll's 1876 Voting System
is Complete for Parallel Access to NP | 22 pages | Journal of the ACM vol. 44, no. 6, pp. 806--825, 1997 | null | earlier version appeared as University of Rochester TR-96-640 | cs.CC | null | In 1876, Lewis Carroll proposed a voting system in which the winner is the
candidate who with the fewest changes in voters' preferences becomes a
Condorcet winner---a candidate who beats all other candidates in pairwise
majority-rule elections. Bartholdi, Tovey, and Trick provided a lower
bound---NP-hardness---on the computational complexity of determining the
election winner in Carroll's system. We provide a stronger lower bound and an
upper bound that matches our lower bound. In particular, determining the winner
in Carroll's system is complete for parallel access to NP, i.e., it is complete
for $\thetatwo$, for which it becomes the most natural complete problem known.
It follows that determining the winner in Carroll's elections is not
NP-complete unless the polynomial hierarchy collapses.
| [
{
"version": "v1",
"created": "Sun, 25 Jul 1999 21:16:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hemaspaandra",
"Edith",
""
],
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Rothe",
"Joerg",
""
]
] |
cs/9907037 | Joerg Rothe | Lane A. Hemaspaandra, Zhigen Jiang, Joerg Rothe and Osamu Watanabe | Boolean Operations, Joins, and the Extended Low Hierarchy | 12 pages | Theoretical Computer Science vol. 205, no. 1-2, pp. 317--327, 1998 | null | earlier version appeared as University of Rochester TR-96-627 | cs.CC | null | We prove that the join of two sets may actually fall into a lower level of
the extended low hierarchy than either of the sets. In particular, there exist
sets that are not in the second level of the extended low hierarchy, EL_2, yet
their join is in EL_2. That is, in terms of extended lowness, the join operator
can lower complexity. Since in a strong intuitive sense the join does not lower
complexity, our result suggests that the extended low hierarchy is unnatural as
a complexity measure. We also study the closure properties of EL_ and prove
that EL_2 is not closed under certain Boolean operations. To this end, we
establish the first known (and optimal) EL_2 lower bounds for certain notions
generalizing Selman's P-selectivity, which may be regarded as an interesting
result in its own right.
| [
{
"version": "v1",
"created": "Sun, 25 Jul 1999 21:30:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Jiang",
"Zhigen",
""
],
[
"Rothe",
"Joerg",
""
],
[
"Watanabe",
"Osamu",
""
]
] |
cs/9907038 | Joerg Rothe | Lane A. Hemaspaandra and Joerg Rothe | A Second Step Towards Complexity-Theoretic Analogs of Rice's Theorem | 14 pages. To appear in Theoretical Computer Science | null | null | earlier version appeared as University of Rochester TR-97-662 | cs.CC | null | Rice's Theorem states that every nontrivial language property of the
recursively enumerable sets is undecidable. Borchert and Stephan initiated the
search for complexity-theoretic analogs of Rice's Theorem. In particular, they
proved that every nontrivial counting property of circuits is UP-hard, and that
a number of closely related problems are SPP-hard.
The present paper studies whether their UP-hardness result itself can be
improved to SPP-hardness. We show that their UP-hardness result cannot be
strengthened to SPP-hardness unless unlikely complexity class containments
hold. Nonetheless, we prove that every P-constructibly bi-infinite counting
property of circuits is SPP-hard. We also raise their general lower bound from
unambiguous nondeterminism to constant-ambiguity nondeterminism.
| [
{
"version": "v1",
"created": "Sun, 25 Jul 1999 21:39:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Rothe",
"Joerg",
""
]
] |
cs/9907039 | Joerg Rothe | Edith Hemaspaandra, Lane A. Hemaspaandra and Joerg Rothe | Raising NP Lower Bounds to Parallel NP Lower Bounds | 14 pages | SIGACT News vol. 28, no. 2, pp. 2--13, 1997 | null | earlier version appeared as University of Rochester TR-97-658 | cs.CC | null | A decade ago, a beautiful paper by Wagner developed a ``toolkit'' that in
certain cases allows one to prove problems hard for parallel access to NP.
However, the problems his toolkit applies to most directly are not overly
natural. During the past year, problems that previously were known only to be
NP-hard or coNP-hard have been shown to be hard even for the class of sets
solvable via parallel access to NP. Many of these problems are longstanding and
extremely natural, such as the Minimum Equivalent Expression problem (which was
the original motivation for creating the polynomial hierarchy), the problem of
determining the winner in the election system introduced by Lewis Carroll in
1876, and the problem of determining on which inputs heuristic algorithms
perform well. In the present article, we survey this recent progress in raising
lower bounds.
| [
{
"version": "v1",
"created": "Sun, 25 Jul 1999 21:47:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hemaspaandra",
"Edith",
""
],
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Rothe",
"Joerg",
""
]
] |
cs/9907040 | Joerg Rothe | Joerg Rothe and Lane A. Hemaspaandra | Characterizations of the Existence of Partial and Total One-Way
Permutations | 12 pages; An extended abstract of this paper was presented at the
Third Italian Conference on Algorithms and Complexity | null | null | null | cs.CC cs.CR | null | In this note, we study the easy certificate classes introduced by
Hemaspaandra, Rothe, and Wechsung, with regard to the question of whether or
not surjective one-way functions exist. This is an important open question in
cryptology. We show that the existence of partial one-way permutations can be
characterized by separating P from the class of UP sets that, for all
unambiguous polynomial-time Turing machines accepting them, always have easy
(i.e., polynomial-time computable) certificates. This extends results of
Grollmann and Selman. By Gr\"adel's recent results about one-way functions,
this also links statements about easy certificates of NP sets with statements
in finite model theory. Similarly, there exist surjective poly-one one-way
functions if and only if there is a set L in P such that not all FewP machines
accepting L always have easy certificates. We also establish a condition
necessary and sufficient for the existence of (total) one-way permutations.
| [
{
"version": "v1",
"created": "Mon, 26 Jul 1999 10:42:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rothe",
"Joerg",
""
],
[
"Hemaspaandra",
"Lane A.",
""
]
] |
cs/9907041 | Joerg Rothe | Bernd Borchert, Lane A. Hemaspaandra and Joerg Rothe | Restrictive Acceptance Suffices for Equivalence Problems | 14 pages; to appear in Proc. FCT'99 | null | null | Revises Friedrich-Schiller-Universit\"at Jena Technical Report
Math/Inf/96/13 | cs.CC | null | One way of suggesting that an NP problem may not be NP-complete is to show
that it is in the class UP. We suggest an analogous new approach---weaker in
strength of evidence but more broadly applicable---to suggesting that
concrete~NP problems are not NP-complete. In particular we introduce the class
EP, the subclass of NP consisting of those languages accepted by NP machines
that when they accept always have a number of accepting paths that is a power
of two. Since if any NP-complete set is in EP then all NP sets are in EP, it
follows---with whatever degree of strength one believes that EP differs from
NP---that membership in EP can be viewed as evidence that a problem is not
NP-complete.
We show that the negation equivalence problem for OBDDs (ordered binary
decision diagrams) and the interchange equivalence problem for 2-dags are in
EP. We also show that for boolean negation the equivalence problem is in
EP^{NP}, thus tightening the existing NP^{NP} upper bound. We show that FewP,
bounded ambiguity polynomial time, is contained in EP, a result that is not
known to follow from the previous SPP upper bound. For the three problems and
classes just mentioned with regard to EP, no proof of membership/containment in
UP is known, and for the problem just mentioned with regard to EP^{NP}, no
proof of membership in UP^{NP} is known. Thus, EP is indeed a tool that gives
evidence against NP-completeness in natural cases where UP cannot currently be
applied.
| [
{
"version": "v1",
"created": "Mon, 26 Jul 1999 10:50:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Borchert",
"Bernd",
""
],
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Rothe",
"Joerg",
""
]
] |
cs/9907042 | Scott Nicholson | Scott Nicholson | Raising Reliability of Web Search Tool Research through Replication and
Chaos Theory | null | null | null | null | cs.IR cs.DL | null | Because the World Wide Web is a dynamic collection of information, the Web
search tools (or "search engines") that index the Web are dynamic. Traditional
information retrieval evaluation techniques may not provide reliable results
when applied to the Web search tools. This study is the result of ten
replications of the classic 1996 Ding and Marchionini Web search tool research.
It explores the effects that replication can have on transforming unreliable
results from one iteration into replicable and therefore reliable results after
multiple iterations.
| [
{
"version": "v1",
"created": "Tue, 27 Jul 1999 16:42:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Nicholson",
"Scott",
""
]
] |
cs/9907043 | Christoph Best | Christoph Best (ZIB, Berlin, and J. v. Neumann Institute, Juelich) | A simple C++ library for manipulating scientific data sets as structured
data | 22 pages, LaTeX. Also available at
http://www.zib.de/PaperWeb/abstracts/TR-98-06/ | null | null | TR 98-06 (ZIB Berlin) | cs.CE cs.DB | null | Representing scientific data sets efficiently on external storage usually
involves converting them to a byte string representation using specialized
reader/writer routines. The resulting storage files are frequently difficult to
interpret without these specialized routines as they do not contain information
about the logical structure of the data. Avoiding such problems usually
involves heavy-weight data format libraries or data base systems. We present a
simple C++ library that allows to create and access data files that store
structured data. The structure of the data is described by a data type that can
be built from elementary data types (integer and floating-point numbers, byte
strings) and composite data types (arrays, structures, unions). An abstract
data access class presents the data to the application. Different actual data
file structures can be implemented under this layer. This method is
particularly suited to applications that require complex data structures, e.g.
molecular dynamics simulations. Extensions such as late type binding and object
persistence are discussed.
| [
{
"version": "v1",
"created": "Fri, 30 Jul 1999 08:35:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Best",
"Christoph",
"",
"ZIB, Berlin, and J. v. Neumann Institute, Juelich"
]
] |
cs/9908001 | Zvi Marx | Zvika Marx (1 and 2), Ido Dagan (1), Eli Shamir (2) ((1) Bar-Ilan
University, (2) The Hebrew University of Jerusalem) | Detecting Sub-Topic Correspondence through Bipartite Term Clustering | html with 3 gif figures; generated from 7 pages MS-Word file | Proceedings of ACL'99 Workshop on Unsupervised Learning in Natural
Language Processing, 1999, pp 45-51 | null | null | cs.CL | null | This paper addresses a novel task of detecting sub-topic correspondence in a
pair of text fragments, enhancing common notions of text similarity. This task
is addressed by coupling corresponding term subsets through bipartite
clustering. The paper presents a cost-based clustering scheme and compares it
with a bipartite version of the single-link method, providing illustrating
results.
| [
{
"version": "v1",
"created": "Sun, 1 Aug 1999 14:02:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Marx",
"Zvika",
"",
"1 and 2"
],
[
"Dagan",
"Ido",
""
],
[
"Shamir",
"Eli",
""
]
] |
cs/9908003 | Erik Demaine | Marshall Bern, Erik D. Demaine, David Eppstein, Eric Kuo, Andrea
Mantler, Jack Snoeyink | Ununfoldable Polyhedra with Convex Faces | 14 pages, 9 figures, LaTeX 2e. To appear in Computational Geometry:
Theory and Applications. Major revision with two new authors, solving the
open problem about triangular faces | Computational Geometry: Theory and Applications 24(2):51-62,
February 2003 | null | null | cs.CG cs.DM | null | Unfolding a convex polyhedron into a simple planar polygon is a well-studied
problem. In this paper, we study the limits of unfoldability by studying
nonconvex polyhedra with the same combinatorial structure as convex polyhedra.
In particular, we give two examples of polyhedra, one with 24 convex faces and
one with 36 triangular faces, that cannot be unfolded by cutting along edges.
We further show that such a polyhedron can indeed be unfolded if cuts are
allowed to cross faces. Finally, we prove that ``open'' polyhedra with
triangular faces may not be unfoldable no matter how they are cut.
| [
{
"version": "v1",
"created": "Tue, 3 Aug 1999 17:37:04 GMT"
},
{
"version": "v2",
"created": "Mon, 27 Aug 2001 20:42:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bern",
"Marshall",
""
],
[
"Demaine",
"Erik D.",
""
],
[
"Eppstein",
"David",
""
],
[
"Kuo",
"Eric",
""
],
[
"Mantler",
"Andrea",
""
],
[
"Snoeyink",
"Jack",
""
]
] |
cs/9908004 | Patrik Simons | Patrik Simons | Extending the Stable Model Semantics with More Expressive Rules | 18 pages, a shortened version will be published in the proceedings of
the 5th International Conference on Logic Programming and Nonmonotonic
Reasoning (LPNMR'99) | null | null | null | cs.LO cs.AI | null | The rules associated with propositional logic programs and the stable model
semantics are not expressive enough to let one write concise programs. This
problem is alleviated by introducing some new types of propositional rules.
Together with a decision procedure that has been used as a base for an
efficient implementation, the new rules supplant the standard ones in practical
applications of the stable model semantics.
| [
{
"version": "v1",
"created": "Fri, 6 Aug 1999 06:01:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Simons",
"Patrik",
""
]
] |
cs/9908005 | Joseph O'Rourke | Roxana Cocan and Joseph O'Rourke | Polygonal Chains Cannot Lock in 4D | Major revision of the Aug. 1999 version, including: Proof extended to
show trees cannot lock in 4D; new example of the implementation straightening
a chain of n=100 vertices; improved time complexity for chain to O(n^2);
fixed several minor technical errors. (Thanks to three referees.) 29 pages;
15 figures. v3: Reference updated | null | null | Smith Technical Report 063 | cs.CG cs.DM | null | We prove that, in all dimensions d>=4, every simple open polygonal chain and
every tree may be straightened, and every simple closed polygonal chain may be
convexified. These reconfigurations can be achieved by algorithms that use
polynomial time in the number of vertices, and result in a polynomial number of
``moves.'' These results contrast to those known for d=2, where trees can
``lock,'' and for d=3, where open and closed chains can lock.
| [
{
"version": "v1",
"created": "Wed, 11 Aug 1999 16:09:59 GMT"
},
{
"version": "v2",
"created": "Fri, 2 Feb 2001 21:48:48 GMT"
},
{
"version": "v3",
"created": "Tue, 20 Feb 2001 19:10:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cocan",
"Roxana",
""
],
[
"O'Rourke",
"Joseph",
""
]
] |
cs/9908006 | Joseph O'Rourke | Joseph O'Rourke | Computational Geometry Column 36 | To appear in SIGACT News and in Int. J. Comp. Geom. Appl., 1999.
Replacement corrects disk-packing reference: [BDDH98] -> [BDEH98] | null | null | null | cs.CG | null | Two results in "computational origami" are illustrated.
| [
{
"version": "v1",
"created": "Wed, 11 Aug 1999 17:14:00 GMT"
},
{
"version": "v2",
"created": "Fri, 13 Aug 1999 13:46:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"O'Rourke",
"Joseph",
""
]
] |
cs/9908007 | Joseph O'Rourke | Erik D. Demaine and Joseph O'Rourke | Computational Geometry Column 37 | To appear in SIGACT News, and in Int. J. Comp. Geom. Appl., 1999 | null | null | null | cs.CG | null | Open problems from the 15th Annual ACM Symposium on Computational Geometry.
| [
{
"version": "v1",
"created": "Wed, 11 Aug 1999 17:19:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Demaine",
"Erik D.",
""
],
[
"O'Rourke",
"Joseph",
""
]
] |
cs/9908008 | Dahlia Malkhi | Dahlia Malkhi, Michael Merritt and Ohad Rodeh | Secure Multicast in a WAN | preprint of a paper to appear in the Distributed Computing Journal | null | null | null | cs.CR cs.DC | null | A secure reliable multicast protocol enables a process to send a message to a
group of recipients such that all correct destinations receive the same
message, despite the malicious efforts of fewer than a third of the total
number of processes, including the sender. This has been sh own to be a useful
tool in building secure distributed services, albeit with a cost that typically
grows linearly with the size of the system. For very large networks, for which
this is prohibitive, we present two approaches for reducing the cost: First, we
show a protocol whose cost is on the order of the number of tolerated failures.
Secondly, we show how relaxing the consistency requirement to a probabilistic
guarantee can reduce the associated cost, effectively to a constant.
| [
{
"version": "v1",
"created": "Thu, 12 Aug 1999 17:40:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Malkhi",
"Dahlia",
""
],
[
"Merritt",
"Michael",
""
],
[
"Rodeh",
"Ohad",
""
]
] |
cs/9908009 | Dahlia Malkhi | Dahlia Malkhi and Michael Reiter | Secure Execution of Java Applets using a Remote Playground | preprint of a paper to appear in IEEE Transactions on Software
Engineering | null | null | null | cs.CR cs.NI | null | Mobile code presents a number of threats to machines that execute it. We
introduce an approach for protecting machines and the resources they hold from
mobile code, and describe a system based on our approach for protecting host
machines from Java 1.1 applets. In our approach, each Java applet downloaded to
the protected domain is rerouted to a dedicated machine (or set of machines),
the {\em playground}, at which it is executed. Prior to execution the applet is
transformed to use the downloading user's web browser as a graphics terminal
for its input and output, and so the user has the illusion that the applet is
running on her own machine. In reality, however, mobile code runs only in the
sanitized environment of the playground, where user files cannot be mounted and
from which only limited network connections are accepted by machines in the
protected domain. Our playground thus provides a second level of defense
against mobile code that circumvents language-based defenses. The paper
presents the design and implementation of a playground for Java 1.1 applets,
and discusses extensions of it for other forms of mobile code including Java
1.2.
| [
{
"version": "v1",
"created": "Thu, 12 Aug 1999 17:50:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Malkhi",
"Dahlia",
""
],
[
"Reiter",
"Michael",
""
]
] |
cs/9908010 | Dahlia Malkhi | Dahlia Malkhi, Yishay Mansour and Michael Reiter | On Propagating Updates in a Byzantine Environment | null | null | null | null | cs.DC cs.CR | null | We study how to efficiently diffuse updates to a large distributed system of
data replicas, some of which may exhibit arbitrary (Byzantine) failures. We
assume that strictly fewer than $t$ replicas fail, and that each update is
initially received by at least $t$ correct replicas. The goal is to diffuse
each update to all correct replicas while ensuring that correct replicas accept
no updates generated spuriously by faulty replicas. To achieve reliable
diffusion, each correct replica accepts an update only after receiving it from
at least $t$ others. We provide the first analysis of epidemic-style protocols
for such environments. This analysis is fundamentally different from known
analyses for the benign case due to our treatment of fully Byzantine
failures---which, among other things, precludes the use of digital signatures
for authenticating forwarded updates. We propose two epidemic-style diffusion
algorithms and two measures that characterize the efficiency of diffusion
algorithms in general. We characterize both of our algorithms according to
these measures, and also prove lower bounds with regards to these measures that
show that our algorithms are close to optimal.
| [
{
"version": "v1",
"created": "Thu, 12 Aug 1999 18:00:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Malkhi",
"Dahlia",
""
],
[
"Mansour",
"Yishay",
""
],
[
"Reiter",
"Michael",
""
]
] |
cs/9908011 | Dahlia Malkhi | Dahlia Malkhi, Michael Reiter and Avishai Wool | The Load and Availability of Byzantine Quorum Systems | preprint of a paper to appear in the SIAM Journal of Computing | null | null | null | cs.DC cs.CR | null | Replicated services accessed via {\em quorums} enable each access to be
performed at only a subset (quorum) of the servers, and achieve consistency
across accesses by requiring any two quorums to intersect. Recently,
$b$-masking quorum systems, whose intersections contain at least $2b+1$
servers, have been proposed to construct replicated services tolerant of $b$
arbitrary (Byzantine) server failures. In this paper we consider a hybrid fault
model allowing benign failures in addition to the Byzantine ones. We present
four novel constructions for $b$-masking quorum systems in this model, each of
which has optimal {\em load} (the probability of access of the busiest server)
or optimal availability (probability of some quorum surviving failures). To
show optimality we also prove lower bounds on the load and availability of any
$b$-masking quorum system in this model.
| [
{
"version": "v1",
"created": "Thu, 12 Aug 1999 18:06:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Malkhi",
"Dahlia",
""
],
[
"Reiter",
"Michael",
""
],
[
"Wool",
"Avishai",
""
]
] |
cs/9908012 | H. M. Gladney | H.M. Gladney | Safe Deals Between Strangers | 31 pages, 6 figures | null | null | null | cs.CR cs.DL | null | E-business, information serving, and ubiquitous computing will create heavy
request traffic from strangers or even incognitos. Such requests must be
managed automatically. Two ways of doing this are well known: giving every
incognito consumer the same treatment, and rendering service in return for
money. However, different behavior will be often wanted, e.g., for a university
library with different access policies for undergraduates, graduate students,
faculty, alumni, citizens of the same state, and everyone else.
For a data or process server contacted by client machines on behalf of users
not previously known, we show how to provide reliable automatic access
administration conforming to service agreements. Implementations scale well
from very small collections of consumers and producers to immense client/server
networks. Servers can deliver information, effect state changes, and control
external equipment.
Consumer privacy is easily addressed by the same protocol. We support
consumer privacy, but allow servers to deny their resources to incognitos. A
protocol variant even protects against statistical attacks by consortia of
service organizations.
One e-commerce application would put the consumer's tokens on a smart card
whose readers are in vending kiosks. In e-business we can simplify supply chain
administration. Our method can also be used in sensitive networks without
introducing new security loopholes.
| [
{
"version": "v1",
"created": "Tue, 17 Aug 1999 01:09:54 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gladney",
"H. M.",
""
]
] |
cs/9908014 | Kagan Tumer | David H. Wolpert and Kagan Tumer | An Introduction to Collective Intelligence | 88 pages, 10 figs, 297 refs | null | null | NASA-ARC-IC-99-63 | cs.LG adap-org cond-mat cs.DC cs.MA nlin.AO | null | This paper surveys the emerging science of how to design a ``COllective
INtelligence'' (COIN). A COIN is a large multi-agent system where:
(i) There is little to no centralized communication or control; and
(ii) There is a provided world utility function that rates the possible
histories of the full system.
In particular, we are interested in COINs in which each agent runs a
reinforcement learning (RL) algorithm. Rather than use a conventional modeling
approach (e.g., model the system dynamics, and hand-tune agents to cooperate),
we aim to solve the COIN design problem implicitly, via the ``adaptive''
character of the RL algorithms of each of the agents. This approach introduces
an entirely new, profound design problem: Assuming the RL algorithms are able
to achieve high rewards, what reward functions for the individual agents will,
when pursued by those agents, result in high world utility? In other words,
what reward functions will best ensure that we do not have phenomena like the
tragedy of the commons, Braess's paradox, or the liquidity trap?
Although still very young, research specifically concentrating on the COIN
design problem has already resulted in successes in artificial domains, in
particular in packet-routing, the leader-follower problem, and in variants of
Arthur's El Farol bar problem. It is expected that as it matures and draws upon
other disciplines related to COINs, this research will greatly expand the range
of tasks addressable by human engineers. Moreover, in addition to drawing on
them, such a fully developed scie nce of COIN design may provide much insight
into other already established scientific fields, such as economics, game
theory, and population biology.
| [
{
"version": "v1",
"created": "Tue, 17 Aug 1999 22:49:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wolpert",
"David H.",
""
],
[
"Tumer",
"Kagan",
""
]
] |
cs/9908015 | Simon Buckingham Shum | Simon Buckingham Shum, Enrico Motta and John Domingue | Representing Scholarly Claims in Internet Digital Libraries: A Knowledge
Modelling Approach | 18 pages. Preprint, to appear: Proceedings of ECDL'99: Third European
Conference on Research and Advanced Technology for Digital Libraries, Paris,
France, September 22-24, 1999. Springer-Verlag Lecture Notes in Computer
Science (Eds.) Serge Abiteboul and Anne-Marie Vercoustre | null | null | KMI-TR-80 | cs.DL cs.AI cs.HC cs.IR | null | This paper is concerned with tracking and interpreting scholarly documents in
distributed research communities. We argue that current approaches to document
description, and current technological infrastructures particularly over the
World Wide Web, provide poor support for these tasks. We describe the design of
a digital library server which will enable authors to submit a summary of the
contributions they claim their documents makes, and its relations to the
literature. We describe a knowledge-based Web environment to support the
emergence of such a community-constructed semantic hypertext, and the services
it could provide to assist the interpretation of an idea or document in the
context of its literature. The discussion considers in detail how the approach
addresses usability issues associated with knowledge structuring environments.
| [
{
"version": "v1",
"created": "Thu, 19 Aug 1999 09:51:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Shum",
"Simon Buckingham",
""
],
[
"Motta",
"Enrico",
""
],
[
"Domingue",
"John",
""
]
] |
cs/9908016 | David Eppstein | Marshall Bern and David Eppstein | Quadrilateral Meshing by Circle Packing | 12 pages, 10 figures. To appear in Int. J. Comp. Geom. & Appl. A
preliminary version of this work was presented at the 6th Int. Meshing
Roundtable, Park City, Utah, 1997 | Int. J. Comp. Geom. & Appl. 10(4):347-360, Aug. 2000 | null | null | cs.CG | null | We use circle-packing methods to generate quadrilateral meshes for polygonal
domains, with guaranteed bounds both on the quality and the number of elements.
We show that these methods can generate meshes of several types: (1) the
elements form the cells of a Voronoi diagram, (2) all elements have two
opposite right angles, (3) all elements are kites, or (4) all angles are at
most 120 degrees. In each case the total number of elements is O(n), where n is
the number of input vertices.
| [
{
"version": "v1",
"created": "Thu, 19 Aug 1999 20:40:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bern",
"Marshall",
""
],
[
"Eppstein",
"David",
""
]
] |
cs/9908017 | Andreas Siebert | Andreas Siebert | A Differential Invariant for Zooming | 5 pages, 7 figures | Proceedings 1999 International Conference on Image Processing,
Kobe, 25-28 October 1999 | null | null | cs.CV | null | This paper presents an invariant under scaling and linear brightness change.
The invariant is based on differentials and therefore is a local feature.
Rotationally invariant 2-d differential Gaussian operators up to third order
are proposed for the implementation of the invariant. The performance is
analyzed by simulating a camera zoom-out.
| [
{
"version": "v1",
"created": "Thu, 26 Aug 1999 17:18:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Siebert",
"Andreas",
""
]
] |
cs/9908018 | Rigo Michel | Michel Rigo | Construction of regular languages and recognizability of polynomials | 11 pages | null | null | null | cs.CC | null | A generalization of numeration system in which the set N of the natural
numbers is recognizable by finite automata can be obtained by describing a
lexicographically ordered infinite regular language. Here we show that if P
belonging to Q[x] is a polynomial such that P(N) is a subset of N then we can
construct a numeration system in which the set of representations of P(N) is
regular. The main issue in this construction is to setup a regular language
with a density function equals to P(n+1)-P(n) for n large enough.
| [
{
"version": "v1",
"created": "Fri, 27 Aug 1999 07:33:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rigo",
"Michel",
""
]
] |
cs/9909001 | David Eppstein | Marshall Bern, David Eppstein, Pankaj K. Agarwal, Nina Amenta, Paul
Chew, Tamal Dey, David P. Dobkin, Herbert Edelsbrunner, Cindy Grimm, Leonidas
J. Guibas, John Harer, Joel Hass, Andrew Hicks, Carroll K. Johnson, Gilad
Lerman, David Letscher, Paul Plassmann, Eric Sedgwick, Jack Snoeyink, Jeff
Weeks, Chee Yap, and Denis Zorin | Emerging Challenges in Computational Topology | 20 pages | null | null | null | cs.CG math.GT | null | Here we present the results of the NSF-funded Workshop on Computational
Topology, which met on June 11 and 12 in Miami Beach, Florida. This report
identifies important problems involving both computation and topology.
| [
{
"version": "v1",
"created": "Wed, 1 Sep 1999 20:33:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bern",
"Marshall",
""
],
[
"Eppstein",
"David",
""
],
[
"Agarwal",
"Pankaj K.",
""
],
[
"Amenta",
"Nina",
""
],
[
"Chew",
"Paul",
""
],
[
"Dey",
"Tamal",
""
],
[
"Dobkin",
"David P.",
""
],
[
"Edelsbrunner",
"Herbert",
""
],
[
"Grimm",
"Cindy",
""
],
[
"Guibas",
"Leonidas J.",
""
],
[
"Harer",
"John",
""
],
[
"Hass",
"Joel",
""
],
[
"Hicks",
"Andrew",
""
],
[
"Johnson",
"Carroll K.",
""
],
[
"Lerman",
"Gilad",
""
],
[
"Letscher",
"David",
""
],
[
"Plassmann",
"Paul",
""
],
[
"Sedgwick",
"Eric",
""
],
[
"Snoeyink",
"Jack",
""
],
[
"Weeks",
"Jeff",
""
],
[
"Yap",
"Chee",
""
],
[
"Zorin",
"Denis",
""
]
] |
cs/9909002 | Vincenzo Pallotta | Afzal Ballim and Vincenzo Pallotta | Semantic robust parsing for noun extraction from natural language
queries | null | Proceedings of WPDI'99 (Workshop on Procedures in Discourse
Interpretation),1999, Iasi - Romania | null | null | cs.CL | null | This paper describes how robust parsing techniques can be fruitful applied
for building a query generation module which is part of a pipelined NLP
architecture aimed at process natural language queries in a restricted domain.
We want to show that semantic robustness represents a key issue in those NLP
systems where it is more likely to have partial and ill-formed utterances due
to various factors (e.g. noisy environments, low quality of speech recognition
modules, etc...) and where it is necessary to succeed, even if partially, in
extracting some meaningful information.
| [
{
"version": "v1",
"created": "Thu, 2 Sep 1999 15:53:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ballim",
"Afzal",
""
],
[
"Pallotta",
"Vincenzo",
""
]
] |
cs/9909003 | Rabindra Narayan Behera | S. Mohanty (1) and R.N. Behera (2) ((1) Department of Computer Science
and Application Utkal University, Bhubaneswar, India, (2) National
Informatics Centre, Puri, India) | Iterative Deepening Branch and Bound | 39 html pages + 4 gif files (fig1,fig1(a),fig2,fig3) | null | null | null | cs.AI | null | In tree search problem the best-first search algorithm needs too much of
space . To remove such drawbacks of these algorithms the IDA* was developed
which is both space and time cost efficient. But again IDA* can give an optimal
solution for real valued problems like Flow shop scheduling, Travelling
Salesman and 0/1 Knapsack due to their real valued cost estimates. Thus further
modifications are done on it and the Iterative Deepening Branch and Bound
Search Algorithms is developed which meets the requirements. We have tried
using this algorithm for the Flow Shop Scheduling Problem and have found that
it is quite effective.
| [
{
"version": "v1",
"created": "Fri, 3 Sep 1999 10:31:46 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mohanty",
"S.",
""
],
[
"Behera",
"R. N.",
""
]
] |
cs/9909004 | Devillers | Jean-Daniel Boissonnat, Jurek Czyzowicz, Olivier Devillers, Jean-Marc
Robert, Mariette Yvinec | Convex Tours of Bounded Curvature | 11 pages, 5 figures, abstract presented at European Symposium on
Algorithms 1993 | null | null | INRIA Research report 2375 | cs.CG | null | We consider the motion planning problem for a point constrained to move along
a smooth closed convex path of bounded curvature. The workspace of the moving
point is bounded by a convex polygon with m vertices, containing an obstacle in
a form of a simple polygon with $n$ vertices. We present an O(m+n) time
algorithm finding the path, going around the obstacle, whose curvature is the
smallest possible.
| [
{
"version": "v1",
"created": "Fri, 3 Sep 1999 15:09:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Boissonnat",
"Jean-Daniel",
""
],
[
"Czyzowicz",
"Jurek",
""
],
[
"Devillers",
"Olivier",
""
],
[
"Robert",
"Jean-Marc",
""
],
[
"Yvinec",
"Mariette",
""
]
] |
cs/9909005 | Devillers | Jean-Daniel Boissonnat, Jurek Czyzowicz, Olivier Devillers, Jorge
Urrutia, Mariette Yvinec | Computing largest circles separating two sets of segments | 14 pages, 3 figures, abstract presented at 8th Canadian Conference on
Computational Geometry, 1996 | null | null | INRIA Research report 2705 | cs.CG | null | A circle $C$ separates two planar sets if it encloses one of the sets and its
open interior disk does not meet the other set. A separating circle is a
largest one if it cannot be locally increased while still separating the two
given sets. An Theta(n log n) optimal algorithm is proposed to find all largest
circles separating two given sets of line segments when line segments are
allowed to meet only at their endpoints. In the general case, when line
segments may intersect $\Omega(n^2)$ times, our algorithm can be adapted to
work in O(n alpha(n) log n) time and O(n \alpha(n)) space, where alpha(n)
represents the extremely slowly growing inverse of the Ackermann function.
| [
{
"version": "v1",
"created": "Fri, 3 Sep 1999 15:29:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Boissonnat",
"Jean-Daniel",
""
],
[
"Czyzowicz",
"Jurek",
""
],
[
"Devillers",
"Olivier",
""
],
[
"Urrutia",
"Jorge",
""
],
[
"Yvinec",
"Mariette",
""
]
] |
cs/9909008 | Geoffrey McKim | Rob Kling, Geoffrey McKim | Not Just a Matter of Time: Field Differences and the Shaping of
Electronic Media in Supporting Scientific Communication | Accepted for publication in the Journal of the American Society for
Information Science. Version was reformatted with several minor text changes | null | null | null | cs.CY | null | The shift towards the use of electronic media in scholarly communication
appears to be an inescapable imperative. However, these shifts are uneven, both
with respect to field and with respect to the form of communication. Different
scientific fields have developed and use distinctly different communicative
forums, both in the paper and electronic arenas, and these forums play
different communicative roles within the field. One common claim is that we are
in the early stages of an electronic revolution, that it is only a matter of
time before other fields catch up with the early adopters, and that all fields
converge on a stable set of electronic forums. A social shaping of technology
(SST) perspective helps us to identify important social forces centered around
disciplinary constructions of trust and of legitimate communication that pull
against convergence. This analysis concludes that communicative plurality and
communicative heterogeneity are durable features of the scholarly landscape,
and that we are likely to see field differences in the use of and meaning
ascribed to communications forums persist, even as overall use of electronic
communications technologies both in science and in society as a whole
increases.
| [
{
"version": "v1",
"created": "Tue, 7 Sep 1999 11:35:28 GMT"
},
{
"version": "v2",
"created": "Sat, 29 Apr 2000 17:43:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kling",
"Rob",
""
],
[
"McKim",
"Geoffrey",
""
]
] |
cs/9909009 | Krzysztof R. Apt | Krzysztof R. Apt | The Rough Guide to Constraint Propagation | 23 pages. To appear in the Proc. 5th International Conference on
Principles and Practice of Constraint Programming as an invited talk | null | null | null | cs.AI cs.PL | null | We provide here a simple, yet very general framework that allows us to
explain several constraint propagation algorithms in a systematic way. In
particular, using the notions commutativity and semi-commutativity, we show how
the well-known AC-3, PC-2, DAC and DPC algorithms are instances of a single
generic algorithm. The work reported here extends and simplifies that of Apt,
cs.AI/9811024.
| [
{
"version": "v1",
"created": "Wed, 8 Sep 1999 13:50:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Apt",
"Krzysztof R.",
""
]
] |
cs/9909010 | Krzysztof R. Apt | Krzysztof R. Apt and Eric Monfroy | Automatic Generation of Constraint Propagation Algorithms for Small
Finite Domains | 15 pages. To appear in the Proc. 5th International Conference on
Principles and Practice of Constraint Programming | null | null | null | cs.AI cs.PL | null | We study here constraint satisfaction problems that are based on predefined,
explicitly given finite constraints. To solve them we propose a notion of rule
consistency that can be expressed in terms of rules derived from the explicit
representation of the initial constraints.
This notion of local consistency is weaker than arc consistency for
constraints of arbitrary arity but coincides with it when all domains are unary
or binary. For Boolean constraints rule consistency coincides with the closure
under the well-known propagation rules for Boolean constraints.
By generalizing the format of the rules we obtain a characterization of arc
consistency in terms of so-called inclusion rules. The advantage of rule
consistency and this rule based characterization of the arc consistency is that
the algorithms that enforce both notions can be automatically generated, as CHR
rules. So these algorithms could be integrated into constraint logic
programming systems such as Eclipse.
We illustrate the usefulness of this approach to constraint propagation by
discussing the implementations of both algorithms and their use on various
examples, including Boolean constraints, three valued logic of Kleene,
constraints dealing with Waltz's language for describing polyhedreal scenes,
and Allen's qualitative approach to temporal logic.
| [
{
"version": "v1",
"created": "Wed, 8 Sep 1999 14:18:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Apt",
"Krzysztof R.",
""
],
[
"Monfroy",
"Eric",
""
]
] |
cs/9909011 | Osnat Mokryn | Israel Cidon and Osnat Mokryn | Distributed Algorithms in Multihop Broadcast Networks | Apeared at the 12th International Symposium on DIStributed Computing,
(DISC98) | null | null | Technical Report CC #241, Center for Communication and Information
Technologies, Technion - Israel Institute of Technology | cs.DC cs.NI | null | Broadcast networks are often used in modern communication systems. A common
broadcast network is a single hop shared media system, where a transmitted
message is heard by all neighbors, such as some LAN networks. In this work we
consider a more complex environment, in which a transmitted message is heard
only by a group of neighbors, such as Ad-Hoc networks, satellite and radio
networks, as well as wireless multistation backbone system for mobile
communication. It is important to design efficient algorithms for such
environments. Our main result is a new Leader Election algorithm, with O(n)
time complexity and O(n*lg(n)) message transmission complexity. Our distributed
solution uses a propagation of information with feedback (PIF) building block
tuned to the broadcast media, and a special counting and joining approach for
the election procedure phase. The latter is required for achieving the linear
time. It is demonstrated that the broadcast model requires solutions which are
different from the known point-to-point model.
| [
{
"version": "v1",
"created": "Wed, 8 Sep 1999 14:49:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cidon",
"Israel",
""
],
[
"Mokryn",
"Osnat",
""
]
] |
cs/9909012 | Jan Willemson | Jan Willemson | Certificate Revocation Paradigms | Tech report on 14 pages, 2 figures | null | null | null | cs.CR | null | Research in the field of electronic signature confirmation has been active
for some 20 years now. Unfortunately present certificate-based solutions also
come from that age when no-one knew about online data transmission. The
official standardized X.509 framework also depends heavily on offline
operations, one of the most complicated ones being certificate revocation
handling. This is done via huge Certificate Revocation Lists which are both
inconvenient and expencive. Several improvements to these lists are proposed
and in this report we try to analyze them briefly. We conclude that although it
is possible to do better than in the original X.509 setting, none of the
solutions presented this far is good enough.
| [
{
"version": "v1",
"created": "Fri, 17 Sep 1999 08:00:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Willemson",
"Jan",
""
]
] |
cs/9909013 | Jaap-Henk Hoepman | Jaap-Henk Hoepman | Self-stabilizing mutual exclusion on a ring, even if K=N | 2 pages | null | null | null | cs.DC | null | We show that, contrary to common belief, Dijkstra's self-stabilizing mutual
exclusion algorithm on a ring [Dij74,Dij82] also stabilizes when the number of
states per node is one less than the number of nodes on the ring.
| [
{
"version": "v1",
"created": "Tue, 21 Sep 1999 13:39:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hoepman",
"Jaap-Henk",
""
]
] |
cs/9909014 | Joseph Y. Halpern | Joseph Y. Halpern and Richard A. Shore | Reasoning About Common Knowledge with Infinitely Many Agents | Preliminary version appears in 14th IEEE Symposium on Logic in
Computer Science, 1999. This is the full version | null | null | null | cs.LO cs.AI | null | Complete axiomatizations and exponential-time decision procedures are
provided for reasoning about knowledge and common knowledge when there are
infinitely many agents. The results show that reasoning about knowledge and
common knowledge with infinitely many agents is no harder than when there are
finitely many agents, provided that we can check the cardinality of certain set
differences G - G', where G and G' are sets of agents. Since our complexity
results are independent of the cardinality of the sets G involved, they
represent improvements over the previous results even with the sets of agents
involved are finite. Moreover, our results make clear the extent to which
issues of complexity and completeness depend on how the sets of agents involved
are represented.
| [
{
"version": "v1",
"created": "Tue, 21 Sep 1999 20:43:46 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Halpern",
"Joseph Y.",
""
],
[
"Shore",
"Richard A.",
""
]
] |
cs/9909015 | Joseph Y. Halpern | Francis C. Chu and Joseph Y. Halpern | A decision-theoretic approach to reliable message delivery | This is the full version of a paper that appears in the Proceedings
of the 12th International Symposium on Distributed Computing, 1998, pp. 89-10 | null | null | null | cs.DC | null | We argue that the tools of decision theory need to be taken more seriously in
the specification and analysis of systems. We illustrate this by considering a
simple problem involving reliable communication, showing how considerations of
utility and probability can be used to decide when it is worth sending
heartbeat messages and, if they are sent, how often they should be sent.
| [
{
"version": "v1",
"created": "Tue, 21 Sep 1999 20:51:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chu",
"Francis C.",
""
],
[
"Halpern",
"Joseph Y.",
""
]
] |
cs/9909016 | Joseph Y. Halpern | Francis C. Chu, Joseph Y. Halpern, and Praveen Seshadri | Least expected cost query optimization: an exercise in utility | This paper appears in Proceedings of the Eighteenth Annual ACM
Symposium on Principles of Database Systems, 1999, pp. 138--147 | null | null | null | cs.DB | null | We identify two unreasonable, though standard, assumptions made by database
query optimizers that can adversely affect the quality of the chosen evaluation
plans. One assumption is that it is enough to optimize for the expected
case---that is, the case where various parameters (like available memory) take
on their expected value. The other assumption is that the parameters are
constant throughout the execution of the query. We present an algorithm based
on the ``System R''-style query optimization algorithm that does not rely on
these assumptions. The algorithm we present chooses the plan of the least
expected cost instead of the plan of least cost given some fixed value of the
parameters. In execution environments that exhibit a high degree of
variability, our techniques should result in better performance.
| [
{
"version": "v1",
"created": "Tue, 21 Sep 1999 21:20:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chu",
"Francis C.",
""
],
[
"Halpern",
"Joseph Y.",
""
],
[
"Seshadri",
"Praveen",
""
]
] |
cs/9909017 | Devillers | Olivier Devillers, Asish Mukhopadhyay | Finding an ordinary conic and an ordinary hyperplane | 7 pages, 2 figures | null | null | INRIA Research report 3517 | cs.CG | null | Given a finite set of non-collinear points in the plane, there exists a line
that passes through exactly two points. Such a line is called an ordinary line.
An efficient algorithm for computing such a line was proposed by Mukhopadhyay
et al. In this note we extend this result in two directions. We first show how
to use this algorithm to compute an ordinary conic, that is, a conic passing
through exactly five points, assuming that all the points do not lie on the
same conic. Both our proofs of existence and the consequent algorithms are
simpler than previous ones. We next show how to compute an ordinary hyperplane
in three and higher dimensions.
| [
{
"version": "v1",
"created": "Mon, 27 Sep 1999 11:55:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Devillers",
"Olivier",
""
],
[
"Mukhopadhyay",
"Asish",
""
]
] |
cs/9909018 | Devillers | Olivier Devillers, Pierre-Maris Gandoin | Geometric compression for progressive transmission | 16 pages, 10 figures | null | null | INRIA Research report 3766, in french | cs.CG cs.GR | null | The compression of geometric structures is a relatively new field of data
compression. Since about 1995, several articles have dealt with the coding of
meshes, using for most of them the following approach: the vertices of the mesh
are coded in an order such that it contains partially the topology of the mesh.
In the same time, some simple rules attempt to predict the position of the
current vertex from the positions of its neighbours that have been previously
coded. In this article, we describe a compression algorithm whose principle is
completely different: the order of the vertices is used to compress their
coordinates, and then the topology of the mesh is reconstructed from the
vertices. This algorithm, particularly suited for terrain models, achieves
compression factors that are slightly greater than those of the currently
available algorithms, and moreover, it allows progressive and interactive
transmission of the meshes.
| [
{
"version": "v1",
"created": "Tue, 28 Sep 1999 06:56:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Devillers",
"Olivier",
""
],
[
"Gandoin",
"Pierre-Maris",
""
]
] |
cs/9909019 | Alessio R. Lomuscio | A. R. Lomuscio, R. van der Meyden, M. D. Ryan | Knowledge in Multi-Agent Systems: Initial Configurations and Broadcast | 32 Pages, 2 Figures. Submitted to Transactions of Computational Logic | null | null | null | cs.LO cs.AI | null | The semantic framework for the modal logic of knowledge due to Halpern and
Moses provides a way to ascribe knowledge to agents in distributed and
multi-agent systems. In this paper we study two special cases of this
framework: full systems and hypercubes. Both model static situations in which
no agent has any information about another agent's state. Full systems and
hypercubes are an appropriate model for the initial configurations of many
systems of interest. We establish a correspondence between full systems and
hypercube systems and certain classes of Kripke frames. We show that these
classes of systems correspond to the same logic. Moreover, this logic is also
the same as that generated by the larger class of weakly directed frames. We
provide a sound and complete axiomatization, S5WDn, of this logic. Finally, we
show that under certain natural assumptions, in a model where knowledge evolves
over time, S5WDn characterizes the properties of knowledge not just at the
initial configuration, but also at all later configurations. In particular,
this holds for homogeneous broadcast systems, which capture settings in which
agents are initially ignorant of each others local states, operate
synchronously, have perfect recall and can communicate only by broadcasting.
| [
{
"version": "v1",
"created": "Thu, 30 Sep 1999 17:03:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lomuscio",
"A. R.",
""
],
[
"van der Meyden",
"R.",
""
],
[
"Ryan",
"M. D.",
""
]
] |
cs/9909020 | Harald Hempel | Lane A. Hemaspaandra, Harald Hempel, and Gerd Wechsung | Query Order | 18 pages, 1 figure (earlier version appears as UR-CS-TR-95-596) | SIAM Journal on Computing, 28, 637-651, 1999 | null | null | cs.CC | null | We study the effect of query order on computational power, and show that
$\pjk$-the languages computable via a polynomial-time machine given one query
to the jth level of the boolean hierarchy followed by one query to the kth
level of the boolean hierarchy-equals $\redttnp{j+2k-1}$ if j is even and k is
odd, and equals $\redttnp{j+2k}$ otherwise. Thus, unless the polynomial
hierarchy collapses, it holds that for each $1\leq j \leq k$: $\pjk = \pkj \iff
(j=k) \lor (j{is even} \land k=j+1)$. We extend our analysis to apply to more
general query classes.
| [
{
"version": "v1",
"created": "Thu, 30 Sep 1999 17:06:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Hempel",
"Harald",
""
],
[
"Wechsung",
"Gerd",
""
]
] |
cs/9910001 | Martin Grohe | Joerg Flum and Martin Grohe | Fixed-parameter tractability, definability, and model checking | To appear in SIAM Journal on Computing | null | null | null | cs.CC cs.LO | null | In this article, we study parameterized complexity theory from the
perspective of logic, or more specifically, descriptive complexity theory.
We propose to consider parameterized model-checking problems for various
fragments of first-order logic as generic parameterized problems and show how
this approach can be useful in studying both fixed-parameter tractability and
intractability. For example, we establish the equivalence between the
model-checking for existential first-order logic, the homomorphism problem for
relational structures, and the substructure isomorphism problem. Our main
tractability result shows that model-checking for first-order formulas is
fixed-parameter tractable when restricted to a class of input structures with
an excluded minor. On the intractability side, for every t >= 0 we prove an
equivalence between model-checking for first-order formulas with t quantifier
alternations and the parameterized halting problem for alternating Turing
machines with t alternations. We discuss the close connection between this
alternation hierarchy and Downey and Fellows' W-hierarchy.
On a more abstract level, we consider two forms of definability, called Fagin
definability and slicewise definability, that are appropriate for describing
parameterized problems. We give a characterization of the class FPT of all
fixed-parameter tractable problems in terms of slicewise definability in finite
variable least fixed-point logic, which is reminiscent of the Immerman-Vardi
Theorem characterizing the class PTIME in terms of definability in least
fixed-point logic.
| [
{
"version": "v1",
"created": "Fri, 1 Oct 1999 15:10:00 GMT"
},
{
"version": "v2",
"created": "Mon, 19 Feb 2001 21:01:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Flum",
"Joerg",
""
],
[
"Grohe",
"Martin",
""
]
] |
cs/9910002 | Harald Hempel | Edith Hemaspaandra, Lane A. Hemaspaandra, and Harald Hempel | What's Up with Downward Collapse: Using the Easy-Hard Technique to Link
Boolean and Polynomial Hierarchy Collapses | 37 pages. an extended abstract appeared in SIGACT News, 29, 10-22,
1998 | null | null | UR-CS-TR-98-682 | cs.CC | null | During the past decade, nine papers have obtained increasingly strong
consequences from the assumption that boolean or bounded-query hierarchies
collapse. The final four papers of this nine-paper progression actually achieve
downward collapse---that is, they show that high-level collapses induce
collapses at (what beforehand were thought to be) lower complexity levels. For
example, for each $k\geq 2$ it is now known that if $\psigkone=\psigktwo$ then
$\ph=\sigmak$. This article surveys the history, the results, and the
technique---the so-called easy-hard method---of these nine papers.
| [
{
"version": "v1",
"created": "Fri, 1 Oct 1999 15:45:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hemaspaandra",
"Edith",
""
],
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Hempel",
"Harald",
""
]
] |
cs/9910003 | Harald Hempel | Edith Hemaspaandra, Lane A. Hemaspaandra, and Harald Hempel | R_{1-tt}^{SN}(NP) Distinguishes Robust Many-One and Turing Completeness | 22 pages | Theory of Computing Systems, 31, 307-325, 1998 | null | earlier version appears as UR-CS-TR-96-635 | cs.CC | null | Do complexity classes have many-one complete sets if and only if they have
Turing-complete sets? We prove that there is a relativized world in which a
relatively natural complexity class-namely a downward closure of NP, \rsnnp -
has Turing-complete sets but has no many-one complete sets. In fact, we show
that in the same relativized world this class has 2-truth-table complete sets
but lacks 1-truth-table complete sets. As part of the groundwork for our
result, we prove that \rsnnp has many equivalent forms having to do with
ordered and parallel access to $\np$ and $\npinterconp$.
| [
{
"version": "v1",
"created": "Fri, 1 Oct 1999 18:55:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hemaspaandra",
"Edith",
""
],
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Hempel",
"Harald",
""
]
] |
cs/9910004 | Harald Hempel | Edith Hemaspaandra, Lane A. Hemaspaandra, and Harald Hempel | An Introduction to Query Order | 15 pages | Bulletin of the EATCS, 63, 93-107, 1997 | null | earlier version appears as UR-CS-TR-97-665 | cs.CC | null | Hemaspaandra, Hempel, and Wechsung [cs.CC/9909020] raised the following
questions: If one is allowed one question to each of two different information
sources, does the order in which one asks the questions affect the class of
problems that one can solve with the given access? If so, which order yields
the greater computational power?
The answers to these questions have been learned-inasfar as they can be
learned without resolving whether or not the polynomial hierarchy collapses-for
both the polynomial hierarchy and the boolean hierarchy. In the polynomial
hierarchy, query order never matters. In the boolean hierarchy, query order
sometimes does not matter and, unless the polynomial hierarchy collapses,
sometimes does matter. Furthermore, the study of query order has yielded
dividends in seemingly unrelated areas, such as bottleneck computations and
downward translation of equality.
In this article, we present some of the central results on query order. The
article is written in such a way as to encourage the reader to try his or her
own hand at proving some of these results. We also give literature pointers to
the quickly growing set of related results and applications.
| [
{
"version": "v1",
"created": "Fri, 1 Oct 1999 19:08:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hemaspaandra",
"Edith",
""
],
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Hempel",
"Harald",
""
]
] |
cs/9910005 | Harald Hempel | Edith Hemaspaandra, Lane A. Hemaspaandra, and Harald Hempel | Query Order and the Polynomial Hierarchy | 14 pages | Journal of Universal Computer Science, 4, 574-588, 1998 | null | earlier version appears as UR-CS-TR-96-634 | cs.CC | null | Hemaspaandra, Hempel, and Wechsung [cs.CC/9909020] initiated the field of
query order, which studies the ways in which computational power is affected by
the order in which information sources are accessed. The present paper studies,
for the first time, query order as it applies to the levels of the polynomial
hierarchy. We prove that the levels of the polynomial hierarchy are
order-oblivious. Yet, we also show that these ordered query classes form new
levels in the polynomial hierarchy unless the polynomial hierarchy collapses.
We prove that all leaf language classes - and thus essentially all standard
complexity classes - inherit all order-obliviousness results that hold for P.
| [
{
"version": "v1",
"created": "Fri, 1 Oct 1999 19:20:07 GMT"
},
{
"version": "v2",
"created": "Mon, 4 Oct 1999 12:46:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hemaspaandra",
"Edith",
""
],
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Hempel",
"Harald",
""
]
] |
cs/9910006 | Harald Hempel | Lane A. Hemaspaandra, Harald Hempel, and Gerd Wechsung | Self-Specifying Machines | 15 pages, to appear in IJFCS | null | null | earlier version appears as UR-CS-TR-97-654 | cs.CC | null | We study the computational power of machines that specify their own
acceptance types, and show that they accept exactly the languages that
$\manyonesharp$-reduce to NP sets. A natural variant accepts exactly the
languages that $\manyonesharp$-reduce to P sets. We show that these two classes
coincide if and only if $\psone = \psnnoplusbigohone$, where the latter class
denotes the sets acceptable via at most one question to $\sharpp$ followed by
at most a constant number of questions to $\np$.
| [
{
"version": "v1",
"created": "Fri, 1 Oct 1999 19:29:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Hempel",
"Harald",
""
],
[
"Wechsung",
"Gerd",
""
]
] |
cs/9910007 | Harald Hempel | Edith Hemaspaandra, Lane A. Hemaspaandra, and Harald Hempel | A Downward Collapse within the Polynomial Hierarchy | 14 pages | SIAM Journal on Computing, 28, 383-393, 1999 | null | earlier version appears as UR-CS-TR-96-630 | cs.CC | null | Downward collapse (a.k.a. upward separation) refers to cases where the
equality of two larger classes implies the equality of two smaller classes. We
provide an unqualified downward collapse result completely within the
polynomial hierarchy. In particular, we prove that, for k > 2, if $\psigkone =
\psigktwo$ then $\sigmak = \pik = \ph$. We extend this to obtain a more general
downward collapse result.
| [
{
"version": "v1",
"created": "Fri, 1 Oct 1999 19:48:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hemaspaandra",
"Edith",
""
],
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Hempel",
"Harald",
""
]
] |
cs/9910008 | Harald Hempel | Edith Hemaspaandra, Lane A. Hemaspaandra, and Harald Hempel | Translating Equality Downwards | 13 pages, an extended abstract was presented at the 16th Symposium on
Theoretical Aspects of Computer Science | null | null | earlier version appears as UR-CS-TR-97-657 | cs.CC | null | Downward translation of equality refers to cases where a collapse of some
pair of complexity classes would induce a collapse of some other pair of
complexity classes that (a priori) one expects are smaller. Recently, the first
downward translation of equality was obtained that applied to the polynomial
hierarchy-in particular, to bounded access to its levels [cs.CC/9910007]. In
this paper, we provide a much broader downward translation that extends not
only that downward translation but also that translation's elegant enhancement
by Buhrman and Fortnow. Our work also sheds light on previous research on the
structure of refined polynomial hierarchies, and strengthens the connection
between the collapse of bounded query hierarchies and the collapse of the
polynomial hierarchy.
| [
{
"version": "v1",
"created": "Fri, 1 Oct 1999 19:58:41 GMT"
},
{
"version": "v2",
"created": "Mon, 4 Oct 1999 13:04:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hemaspaandra",
"Edith",
""
],
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Hempel",
"Harald",
""
]
] |
cs/9910009 | Joseph O'Rourke | T. Biedl, E. Demaine, M. Demaine, S. Lazard, A. Lubiw, J. O'Rourke, M.
Overmars, S. Robbins, I. Streinu, G. Toussaint, S. Whitesides | Locked and Unlocked Polygonal Chains in 3D | 29 pages; This is a revised and expanded version of an abstract that
appeared in Proc. 10th ACM-SIAM Sympos. Discrete Algorithms (SODA '98), Jan.
1998, pp. 866-867 | null | null | Smith Tech. Rep. 060 | cs.CG cs.DM | null | In this paper, we study movements of simple polygonal chains in 3D. We say
that an open, simple polygonal chain can be straightened if it can be
continuously reconfigured to a straight sequence of segments in such a manner
that both the length of each link and the simplicity of the chain are
maintained throughout the movement. The analogous concept for closed chains is
convexification: reconfiguration to a planar convex polygon. Chains that cannot
be straightened or convexified are called locked. While there are open chains
in 3D that are locked, we show that if an open chain has a simple orthogonal
projection onto some plane, it can be straightened. For closed chains, we show
that there are unknotted but locked closed chains, and we provide an algorithm
for convexifying a planar simple polygon in 3D. All our algorithms require only
O(n) basic ``moves'' and run in linear time.
| [
{
"version": "v1",
"created": "Fri, 8 Oct 1999 12:04:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Biedl",
"T.",
""
],
[
"Demaine",
"E.",
""
],
[
"Demaine",
"M.",
""
],
[
"Lazard",
"S.",
""
],
[
"Lubiw",
"A.",
""
],
[
"O'Rourke",
"J.",
""
],
[
"Overmars",
"M.",
""
],
[
"Robbins",
"S.",
""
],
[
"Streinu",
"I.",
""
],
[
"Toussaint",
"G.",
""
],
[
"Whitesides",
"S.",
""
]
] |
cs/9910010 | Ronald de Wolf | Harry Buhrman (CWI, Amsterdam) and Ronald de Wolf (CWI and U of
Amsterdam) | Communication Complexity Lower Bounds by Polynomials | 16 pages LaTeX, no figures. 2nd version: rewritten and some results
added | null | null | null | cs.CC quant-ph | null | The quantum version of communication complexity allows the two communicating
parties to exchange qubits and/or to make use of prior entanglement (shared
EPR-pairs). Some lower bound techniques are available for qubit communication
complexity, but except for the inner product function, no bounds are known for
the model with unlimited prior entanglement. We show that the log-rank lower
bound extends to the strongest model (qubit communication + unlimited prior
entanglement). By relating the rank of the communication matrix to properties
of polynomials, we are able to derive some strong bounds for exact protocols.
In particular, we prove both the "log-rank conjecture" and the polynomial
equivalence of quantum and classical communication complexity for various
classes of functions. We also derive some weaker bounds for bounded-error
quantum protocols.
| [
{
"version": "v1",
"created": "Tue, 12 Oct 1999 13:30:28 GMT"
},
{
"version": "v2",
"created": "Fri, 28 Apr 2000 15:25:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Buhrman",
"Harry",
"",
"CWI, Amsterdam"
],
[
"de Wolf",
"Ronald",
"",
"CWI and U of\n Amsterdam"
]
] |
cs/9910011 | Anand V. Raman | Anand Venkataraman | A statistical model for word discovery in child directed speech | 48 pgs, 10 figs | null | null | null | cs.CL cs.LG | null | A statistical model for segmentation and word discovery in child directed
speech is presented. An incremental unsupervised learning algorithm to infer
word boundaries based on this model is described and results of empirical tests
showing that the algorithm is competitive with other models that have been used
for similar tasks are also presented.
| [
{
"version": "v1",
"created": "Wed, 13 Oct 1999 03:25:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Venkataraman",
"Anand",
""
]
] |
cs/9910012 | Mark Reynolds | M. Reynolds | The Complexity of Temporal Logic over the Reals | null | null | null | null | cs.LO cs.CC | null | It is shown that the decision problem for the temporal logic with until and
since connectives over real-numbers time is PSPACE-complete.
| [
{
"version": "v1",
"created": "Wed, 13 Oct 1999 04:04:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Reynolds",
"M.",
""
]
] |
cs/9910013 | Michelangelo Grigni | Zhi-Zhong Chen, Michelangelo Grigni, Christos Papadimitriou | Map Graphs | 46 pages, LaTeX with 41 PS figures; see
http://www.mathcs.emory.edu/~mic/mapgraphs/ for hi-res figures | null | null | null | cs.DM cs.DS | null | We consider a modified notion of planarity, in which two nations of a map are
considered adjacent when they share any point of their boundaries (not
necessarily an edge, as planarity requires). Such adjacencies define a map
graph. We give an NP characterization for such graphs, and a cubic time
recognition algorithm for a restricted version: given a graph, decide whether
it is realized by adjacencies in a map without holes, in which at most four
nations meet at any point.
| [
{
"version": "v1",
"created": "Wed, 13 Oct 1999 21:41:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chen",
"Zhi-Zhong",
""
],
[
"Grigni",
"Michelangelo",
""
],
[
"Papadimitriou",
"Christos",
""
]
] |
cs/9910014 | Randal E. Bryant | Randal E. Bryant, Steven German, Miroslav N. Velev | Processor Verification Using Efficient Reductions of the Logic of
Uninterpreted Functions to Propositional Logic | 46 pages | null | null | null | cs.LO cs.AR | null | The logic of equality with uninterpreted functions (EUF) provides a means of
abstracting the manipulation of data by a processor when verifying the
correctness of its control logic. By reducing formulas in this logic to
propositional formulas, we can apply Boolean methods such as Ordered Binary
Decision Diagrams (BDDs) and Boolean satisfiability checkers to perform the
verification.
We can exploit characteristics of the formulas describing the verification
conditions to greatly simplify the propositional formulas generated. In
particular, we exploit the property that many equations appear only in positive
form. We can therefore reduce the set of interpretations of the function
symbols that must be considered to prove that a formula is universally valid to
those that are ``maximally diverse.''
We present experimental results demonstrating the efficiency of this approach
when verifying pipelined processors using the method proposed by Burch and
Dill.
| [
{
"version": "v1",
"created": "Thu, 14 Oct 1999 22:41:39 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Jul 2000 21:32:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bryant",
"Randal E.",
""
],
[
"German",
"Steven",
""
],
[
"Velev",
"Miroslav N.",
""
]
] |
cs/9910015 | Naren Ramakrishnan | Naren Ramakrishnan | PIPE: Personalizing Recommendations via Partial Evaluation | null | null | null | null | cs.IR cs.AI | null | It is shown that personalization of web content can be advantageously viewed
as a form of partial evaluation --- a technique well known in the programming
languages community. The basic idea is to model a recommendation space as a
program, then partially evaluate this program with respect to user preferences
(and features) to obtain specialized content. This technique supports both
content-based and collaborative approaches, and is applicable to a range of
applications that require automatic information integration from multiple web
sources. The effectiveness of this methodology is illustrated by two example
applications --- (i) personalizing content for visitors to the Blacksburg
Electronic Village (http://www.bev.net), and (ii) locating and selecting
scientific software on the Internet. The scalability of this technique is
demonstrated by its ability to interface with online web ontologies that index
thousands of web pages.
| [
{
"version": "v1",
"created": "Mon, 18 Oct 1999 15:47:29 GMT"
},
{
"version": "v2",
"created": "Tue, 19 Oct 1999 19:52:12 GMT"
},
{
"version": "v3",
"created": "Wed, 26 Apr 2000 03:05:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ramakrishnan",
"Naren",
""
]
] |
cs/9910016 | Juergen Dix | Juergen Dix, Mirco Nanni, VS Subrahmanian | Probabilistic Agent Programs | 44 pages, 1 figure, Appendix | null | null | null | cs.AI | null | Agents are small programs that autonomously take actions based on changes in
their environment or ``state.'' Over the last few years, there have been an
increasing number of efforts to build agents that can interact and/or
collaborate with other agents. In one of these efforts, Eiter, Subrahmanian amd
Pick (AIJ, 108(1-2), pages 179-255) have shown how agents may be built on top
of legacy code. However, their framework assumes that agent states are
completely determined, and there is no uncertainty in an agent's state. Thus,
their framework allows an agent developer to specify how his agents will react
when the agent is 100% sure about what is true/false in the world state. In
this paper, we propose the concept of a \emph{probabilistic agent program} and
show how, given an arbitrary program written in any imperative language, we may
build a declarative ``probabilistic'' agent program on top of it which supports
decision making in the presence of uncertainty. We provide two alternative
semantics for probabilistic agent programs. We show that the second semantics,
though more epistemically appealing, is more complex to compute. We provide
sound and complete algorithms to compute the semantics of \emph{positive} agent
programs.
| [
{
"version": "v1",
"created": "Thu, 21 Oct 1999 09:35:38 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dix",
"Juergen",
""
],
[
"Nanni",
"Mirco",
""
],
[
"Subrahmanian",
"VS",
""
]
] |
cs/9910017 | Jeff Erickson | Jeff Erickson | Finite-resolution hidden surface removal | 10 pages, many figures; To appear in Proceedings of the 11th Annual
ACM-SIAM Symposium on Discrete Algorithms, 2000; See also
http://www.uiuc.edu/~jeffe/pubs/gridvis.html | null | null | null | cs.CG cs.GR | null | We propose a hybrid image-space/object-space solution to the classical hidden
surface removal problem: Given n disjoint triangles in Real^3 and p sample
points (``pixels'') in the xy-plane, determine the first triangle directly
behind each pixel. Our algorithm constructs the sampled visibility map of the
triangles with respect to the pixels, which is the subset of the trapezoids in
a trapezoidal decomposition of the analytic visibility map that contain at
least one pixel. The sampled visibility map adapts to local changes in image
complexity, and its complexity is bounded both by the number of pixels and by
the complexity of the analytic visibility map. Our algorithm runs in time
O(n^{1+e} + n^{2/3+e}t^{2/3} + p), where t is the output size and e is any
positive constant. This is nearly optimal in the worst case and compares
favorably with the best output-sensitive algorithms for both ray casting and
analytic hidden surface removal. In the special case where the pixels form a
regular grid, a sweepline variant of our algorithm runs in time O(n^{1+e} +
n^{2/3+e}t^{2/3} + t log p), which is usually sublinear in the number of
pixels.
| [
{
"version": "v1",
"created": "Thu, 21 Oct 1999 21:51:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Erickson",
"Jeff",
""
]
] |
cs/9910018 | Shie-Yuan Wang | S.Y. Wang | Decoupling Control from Data for TCP Congestion Control | Ph.D. Thesis, Harvard University, September 1999. This thesis's
Chapter 3 about "TCP Trunking" will be published in IEEE ICNP'99 Proceedings.
A condensed version of this thesis is currently submitted to a conference | null | null | null | cs.NI | null | Many applications want to use TCP congestion control to regulate the
transmission rate of a data packet stream. A natural way to achieve this goal
is to transport the data packet stream on a TCP connection. However, because
TCP implements both congestion and error control, transporting a data packet
stream directly using a TCP connection forces the data packet stream to be
subject to TCP's other properties caused by TCP error control, which may be
inappropriate for these applications.
The TCP decoupling approach proposed in this thesis is a novel way of
applying TCP congestion control to a data packet stream without actually
transporting the data packet stream on a TCP connection. Instead, a TCP
connection using the same network path as the data packet stream is set up
separately and the transmission rate of the data packet stream is then
associated with that of the TCP packets. Since the transmission rate of these
TCP packets is under TCP congestion control, so is that of the data packet
stream. Furthermore, since the data packet stream is not transported on a TCP
connection, the regulated data packet stream is not subject to TCP error
control.
Because of this flexibility, the TCP decoupling approach opens up many new
opportunities, solves old problems, and improves the performance of some
existing applications. All of these advantages will be demonstrated in the
thesis.
This thesis presents the design, implementation, and analysis of the TCP
decoupling approach, and its successful applications in TCP trunking, wireless
communication, and multimedia streaming.
| [
{
"version": "v1",
"created": "Thu, 21 Oct 1999 22:03:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wang",
"S. Y.",
""
]
] |
cs/9910019 | Roberto Baldoni | R.Baldoni, F. Quaglia, and M.Raynal | Consistent Checkpointing in Distributed Databases: Towards a Formal
Approach | 13 pages, 3 figures | null | null | Rapporto di Ricerca, Dipartimento di Informatica e Sistemistica,
Universita' di Roma "La Sapienza"-(Italy) n. 27-97, July 1997 | cs.DB cs.DC | null | Whether it is for audit or for recovery purposes, data checkpointing is an
important problem of distributed database systems. Actually, transactions
establish dependence relations on data checkpoints taken by data object
managers. So, given an arbitrary set of data checkpoints (including at least a
single data checkpoint from a data manager, and at most a data checkpoint from
each data manager), an important question is the following one: ``Can these
data checkpoints be members of a same consistent global checkpoint?''. This
paper answers this question by providing a necessary and sufficient condition
suited for database systems. Moreover, to show the usefulness of this
condition, two {\em non-intrusive} data checkpointing protocols are derived
from this condition. It is also interesting to note that this paper, by
exhibiting ``correspondences'', establishes a bridge between the data
object/transaction model and the process/message-passing model.
| [
{
"version": "v1",
"created": "Fri, 22 Oct 1999 15:17:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Baldoni",
"R.",
""
],
[
"Quaglia",
"F.",
""
],
[
"Raynal",
"M.",
""
]
] |
cs/9910020 | Atsushi Fujii | Atsushi Fujii, Kentaro Inui, Takenobu Tokunaga, and Hozumi Tanaka | Selective Sampling for Example-based Word Sense Disambiguation | 25 pages, 14 Postscript figures | Computational Linguistics, Vol.24, No.4, pp.573-597, 1998 | null | null | cs.CL | null | This paper proposes an efficient example sampling method for example-based
word sense disambiguation systems. To construct a database of practical size, a
considerable overhead for manual sense disambiguation (overhead for
supervision) is required. In addition, the time complexity of searching a
large-sized database poses a considerable problem (overhead for search). To
counter these problems, our method selectively samples a smaller-sized
effective subset from a given example set for use in word sense disambiguation.
Our method is characterized by the reliance on the notion of training utility:
the degree to which each example is informative for future example sampling
when used for the training of the system. The system progressively collects
examples by selecting those with greatest utility. The paper reports the
effectiveness of our method through experiments on about one thousand
sentences. Compared to experiments with other example sampling methods, our
method reduced both the overhead for supervision and the overhead for search,
without the degeneration of the performance of the system.
| [
{
"version": "v1",
"created": "Sat, 23 Oct 1999 11:19:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fujii",
"Atsushi",
""
],
[
"Inui",
"Kentaro",
""
],
[
"Tokunaga",
"Takenobu",
""
],
[
"Tanaka",
"Hozumi",
""
]
] |
cs/9910021 | Prasan Roy | Prasan Roy, S. Seshadri, S. Sudarshan, Siddhesh Bhobe | Efficient and Extensible Algorithms for Multi Query Optimization | null | null | null | null | cs.DB | null | Complex queries are becoming commonplace, with the growing use of decision
support systems. These complex queries often have a lot of common
sub-expressions, either within a single query, or across multiple such queries
run as a batch. Multi-query optimization aims at exploiting common
sub-expressions to reduce evaluation cost. Multi-query optimization has
hither-to been viewed as impractical, since earlier algorithms were exhaustive,
and explore a doubly exponential search space.
In this paper we demonstrate that multi-query optimization using heuristics
is practical, and provides significant benefits. We propose three cost-based
heuristic algorithms: Volcano-SH and Volcano-RU, which are based on simple
modifications to the Volcano search strategy, and a greedy heuristic. Our
greedy heuristic incorporates novel optimizations that improve efficiency
greatly. Our algorithms are designed to be easily added to existing optimizers.
We present a performance study comparing the algorithms, using workloads
consisting of queries from the TPC-D benchmark. The study shows that our
algorithms provide significant benefits over traditional optimization, at a
very acceptable overhead in optimization time.
| [
{
"version": "v1",
"created": "Mon, 25 Oct 1999 16:30:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Roy",
"Prasan",
""
],
[
"Seshadri",
"S.",
""
],
[
"Sudarshan",
"S.",
""
],
[
"Bhobe",
"Siddhesh",
""
]
] |
cs/9910022 | Mark-Jan Nederhof | Mark-Jan Nederhof | Practical experiments with regular approximation of context-free
languages | 28 pages. To appear in Computational Linguistics 26(1), March 2000 | null | null | null | cs.CL | null | Several methods are discussed that construct a finite automaton given a
context-free grammar, including both methods that lead to subsets and those
that lead to supersets of the original context-free language. Some of these
methods of regular approximation are new, and some others are presented here in
a more refined form with respect to existing literature. Practical experiments
with the different methods of regular approximation are performed for
spoken-language input: hypotheses from a speech recognizer are filtered through
a finite automaton.
| [
{
"version": "v1",
"created": "Mon, 25 Oct 1999 15:00:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Nederhof",
"Mark-Jan",
""
]
] |
cs/9910023 | Alessio Guglielmi | Alessio Guglielmi | A System of Interaction and Structure | This is the authoritative version of the article, with readable
pictures, in colour, also available at
<http://cs.bath.ac.uk/ag/p/SystIntStr.pdf>. (The published version contains
errors introduced by the editorial processing.) Web site for Deep Inference
and the Calculus of Structures at <http://alessio.guglielmi.name/res/cos> | ACM Transactions on Computational Logic, Vol. 8 (1:1), 2007, pp.
1-64 | 10.1145/1182613.1182614 | null | cs.LO | null | This paper introduces a logical system, called BV, which extends
multiplicative linear logic by a non-commutative self-dual logical operator.
This extension is particularly challenging for the sequent calculus, and so far
it is not achieved therein. It becomes very natural in a new formalism, called
the calculus of structures, which is the main contribution of this work.
Structures are formulae submitted to certain equational laws typical of
sequents. The calculus of structures is obtained by generalising the sequent
calculus in such a way that a new top-down symmetry of derivations is observed,
and it employs inference rules that rewrite inside structures at any depth.
These properties, in addition to allow the design of BV, yield a modular proof
of cut elimination.
| [
{
"version": "v1",
"created": "Thu, 28 Oct 1999 09:17:34 GMT"
},
{
"version": "v2",
"created": "Fri, 27 Sep 2002 13:51:53 GMT"
},
{
"version": "v3",
"created": "Thu, 2 Sep 2004 08:40:28 GMT"
},
{
"version": "v4",
"created": "Sat, 27 Jan 2007 13:02:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Guglielmi",
"Alessio",
""
]
] |
cs/9910024 | Steven M. Robbins | Therese Biedl, Erik Demaine, Martin Demaine, Sylvain Lazard, Anna
Lubiw, Joseph O'Rourke, Steve Robbins, Ileana Streinu, Godfried Toussaint,
Sue Whitesides | On Reconfiguring Tree Linkages: Trees can Lock | 16 pages, 6 figures Introduction reworked and references added, as
the main open problem was recently closed | null | null | SOCS-00.7 | cs.CG cs.DM | null | It has recently been shown that any simple (i.e. nonintersecting) polygonal
chain in the plane can be reconfigured to lie on a straight line, and any
simple polygon can be reconfigured to be convex. This result cannot be extended
to tree linkages: we show that there are trees with two simple configurations
that are not connected by a motion that preserves simplicity throughout the
motion. Indeed, we prove that an $N$-link tree can have $2^{\Omega(N)}$
equivalence classes of configurations.
| [
{
"version": "v1",
"created": "Mon, 1 Nov 1999 17:50:19 GMT"
},
{
"version": "v2",
"created": "Fri, 29 Sep 2000 02:26:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Biedl",
"Therese",
""
],
[
"Demaine",
"Erik",
""
],
[
"Demaine",
"Martin",
""
],
[
"Lazard",
"Sylvain",
""
],
[
"Lubiw",
"Anna",
""
],
[
"O'Rourke",
"Joseph",
""
],
[
"Robbins",
"Steve",
""
],
[
"Streinu",
"Ileana",
""
],
[
"Toussaint",
"Godfried",
""
],
[
"Whitesides",
"Sue",
""
]
] |
cs/9911001 | Jan Heering | Jan Heering, Paul Klint | Semantics of Programming Languages: A Tool-Oriented Approach | 12 pages, 2 figures. Submitted to ACM SIGPLAN Notices | ACM SIGPLAN Notices V. 35(3) March 2000 pp. 39-48 | null | SEN-R9920 (CWI, Amsterdam) | cs.PL | null | By paying more attention to semantics-based tool generation, programming
language semantics can significantly increase its impact. Ultimately, this may
lead to ``Language Design Assistants'' incorporating substantial amounts of
semantic knowledge.
| [
{
"version": "v1",
"created": "Thu, 4 Nov 1999 11:14:45 GMT"
},
{
"version": "v2",
"created": "Fri, 26 Nov 1999 12:54:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Heering",
"Jan",
""
],
[
"Klint",
"Paul",
""
]
] |
cs/9911002 | Rigo Michel | Michel Rigo | Numeration systems on a regular language: Arithmetic operations,
Recognizability and Formal power series | 34 pages; corrected typos, two sections concerning exponential case
and relation with positional systems added | Theoret. Comput. Sci. 269 (2001) 469--498 | null | null | cs.CC | null | Generalizations of numeration systems in which N is recognizable by a finite
automaton are obtained by describing a lexicographically ordered infinite
regular language L over a finite alphabet A. For these systems, we obtain a
characterization of recognizable sets of integers in terms of rational formal
series. We also show that, if the complexity of L is Theta (n^q) (resp. if L is
the complement of a polynomial language), then multiplication by an integer k
preserves recognizability only if k=t^{q+1} (resp. if k is not a power of the
cardinality of A) for some integer t. Finally, we obtain sufficient conditions
for the notions of recognizability and U-recognizability to be equivalent,
where U is some positional numeration system related to a sequence of integers.
| [
{
"version": "v1",
"created": "Mon, 8 Nov 1999 13:03:50 GMT"
},
{
"version": "v2",
"created": "Thu, 20 Jan 2000 13:40:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rigo",
"Michel",
""
]
] |
cs/9911003 | David Eppstein | David Eppstein | Subgraph Isomorphism in Planar Graphs and Related Problems | 27 pages, 6 figures. A preliminary version of this paper appeared at
the 6th ACM-SIAM Symp. Discrete Algorithms, 1995 | J. Graph Algorithms & Applications 3(3):1-27, 1999 | null | null | cs.DS | null | We solve the subgraph isomorphism problem in planar graphs in linear time,
for any pattern of constant size. Our results are based on a technique of
partitioning the planar graph into pieces of small tree-width, and applying
dynamic programming within each piece. The same methods can be used to solve
other planar graph problems including connectivity, diameter, girth, induced
subgraph isomorphism, and shortest paths.
| [
{
"version": "v1",
"created": "Tue, 9 Nov 1999 18:58:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Eppstein",
"David",
""
]
] |
cs/9911004 | Wolfgang Slany | Wolfgang Slany | Graph Ramsey games | 47 pages; To actually play small but nontrivial game instances, go to
http://www.dbai.tuwien.ac.at/proj/ramsey/ | null | null | DBAI-TR-99-34 | cs.CC cs.DM math.CO | null | We consider combinatorial avoidance and achievement games based on graph
Ramsey theory: The players take turns in coloring still uncolored edges of a
graph G, each player being assigned a distinct color, choosing one edge per
move. In avoidance games, completing a monochromatic subgraph isomorphic to
another graph A leads to immediate defeat or is forbidden and the first player
that cannot move loses. In the avoidance+ variants, both players are free to
choose more than one edge per move. In achievement games, the first player that
completes a monochromatic subgraph isomorphic to A wins. Erdos & Selfridge
(1973) were the first to identify some tractable subcases of these games,
followed by a large number of further studies. We complete these investigations
by settling the complexity of all unrestricted cases: We prove that general
graph Ramsey avoidance, avoidance+, and achievement games and several variants
thereof are PSPACE-complete. We ultra-strongly solve some nontrivial instances
of graph Ramsey avoidance games that are based on symmetric binary Ramsey
numbers and provide strong evidence that all other cases based on symmetric
binary Ramsey numbers are effectively intractable.
Keywords: combinatorial games, graph Ramsey theory, Ramsey game,
PSPACE-completeness, complexity, edge coloring, winning strategy, achievement
game, avoidance game, the game of Sim, Polya's enumeration formula,
probabilistic counting, machine learning, heuristics, Java applet
| [
{
"version": "v1",
"created": "Wed, 10 Nov 1999 11:28:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Slany",
"Wolfgang",
""
]
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.