id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
3
62.8k
title
stringlengths
1
382
comments
stringlengths
1
1.15k
journal-ref
stringlengths
1
557
doi
stringlengths
7
153
report-no
stringlengths
1
509
categories
stringlengths
5
125
license
stringclasses
9 values
abstract
stringlengths
6
6.09k
versions
listlengths
1
187
update_date
timestamp[s]date
2007-05-23 00:00:00
2025-04-25 00:00:00
authors_parsed
sequencelengths
1
2.83k
cs/9906030
Marsha Chechik
M. Chechik
SCR3: towards usability of formal methods
15 pages, 10 figures
Proceedings of CASCON'98, December 1998, pp. 177-191
null
null
cs.SE
null
This paper gives an overview of SCR3 -- a toolset designed to increase the usability of formal methods for software development. Formal requirements are specified in SCR3 in an easy to use and review format, and then used in checking requirements for correctness and in verifying consistency between annotated code and requirements. In this paper we discuss motivations behind this work, describe several tools which are part of SCR3, and illustrate their operation on an example of a Cruise Control system.
[ { "version": "v1", "created": "Mon, 28 Jun 1999 17:30:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Chechik", "M.", "" ] ]
cs/9906032
Marsha Chechik
A. Wong and M. Chechik
Formal Modeling in a Commercial Setting: A Case Study
18 pages, 5 figures, to appear in Proceedings of FM'99: World Congress on Formal Methods, September 1999
null
null
null
cs.SE
null
This paper describes a case study conducted in collaboration with Nortel to demonstrate the feasibility of applying formal modeling techniques to telecommunication systems. A formal description language, SDL, was chosen by our qualitative CASE tool evaluation to model a multimedia-messaging system described by an 80-page natural language specification. Our model was used to identify errors in the software requirements document and to derive test suites, shadowing the existing development process and keeping track of a variety of productivity data.
[ { "version": "v1", "created": "Tue, 29 Jun 1999 15:29:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Wong", "A.", "" ], [ "Chechik", "M.", "" ] ]
cs/9906033
Lane A. Hemaspaandra
Jin-Yi Cai, Lane A. Hemaspaandra, Gerd Wechsung
Robust Reductions
26 pages; 1 figure; will appear in Theory of Computing Systems; earlier versions appear as UR-CS-TR-666 and in COCOON 98
null
null
null
cs.CC
null
We continue the study of robust reductions initiated by Gavalda and Balcazar. In particular, a 1991 paper of Gavalda and Balcazar claimed an optimal separation between the power of robust and nondeterministic strong reductions. Unfortunately, their proof is invalid. We re-establish their theorem. Generalizing robust reductions, we note that robustly strong reductions are built from two restrictions, robust underproductivity and robust overproductivity, both of which have been separately studied before in other contexts. By systematically analyzing the power of these reductions, we explore the extent to which each restriction weakens the power of reductions. We show that one of these reductions yields a new, strong form of the Karp-Lipton Theorem.
[ { "version": "v1", "created": "Tue, 29 Jun 1999 18:26:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Cai", "Jin-Yi", "" ], [ "Hemaspaandra", "Lane A.", "" ], [ "Wechsung", "Gerd", "" ] ]
cs/9906034
Davide Turcato
Davide Turcato, Paul McFetridge, Fred Popowich, Janine Toole
A Unified Example-Based and Lexicalist Approach to Machine Translation
11 pages, to be presented at the 8th International Conference on Theoretical and Methodological Issues in Machine Translation (TMI-99)
null
null
null
cs.CL
null
We present an approach to Machine Translation that combines the ideas and methodologies of the Example-Based and Lexicalist theoretical frameworks. The approach has been implemented in a multilingual Machine Translation system.
[ { "version": "v1", "created": "Wed, 30 Jun 1999 23:06:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Turcato", "Davide", "" ], [ "McFetridge", "Paul", "" ], [ "Popowich", "Fred", "" ], [ "Toole", "Janine", "" ] ]
cs/9907003
Steven Bird
Steven Bird and Mark Liberman
Annotation graphs as a framework for multidimensional linguistic data analysis
10 pages, 10 figures, Towards Standards and Tools for Discourse Tagging, Proceedings of the Workshop. pp. 1-10. Association for Computational Linguistics
null
null
null
cs.CL
null
In recent work we have presented a formal framework for linguistic annotation based on labeled acyclic digraphs. These `annotation graphs' offer a simple yet powerful method for representing complex annotation structures incorporating hierarchy and overlap. Here, we motivate and illustrate our approach using discourse-level annotations of text and speech data drawn from the CALLHOME, COCONUT, MUC-7, DAMSL and TRAINS annotation schemes. With the help of domain specialists, we have constructed a hybrid multi-level annotation for a fragment of the Boston University Radio Speech Corpus which includes the following levels: segment, word, breath, ToBI, Tilt, Treebank, coreference and named entity. We show how annotation graphs can represent hybrid multi-level structures which derive from a diverse set of file formats. We also show how the approach facilitates substantive comparison of multiple annotations of a single signal based on different theoretical models. The discussion shows how annotation graphs open the door to wide-ranging integration of tools, formats and corpora.
[ { "version": "v1", "created": "Mon, 5 Jul 1999 14:51:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Bird", "Steven", "" ], [ "Liberman", "Mark", "" ] ]
cs/9907004
Anand Venkataraman
Anand Venkataraman
MAP Lexicon is useful for segmentation and word discovery in child-directed speech
Because of rather fundamental changes to the underlying model proposed in the paper, it has been withdrawn from the archive.
null
null
null
cs.CL cs.LG
null
Because of rather fundamental changes to the underlying model proposed in the paper, it has been withdrawn from the archive.
[ { "version": "v1", "created": "Tue, 6 Jul 1999 01:44:00 GMT" }, { "version": "v2", "created": "Thu, 14 Oct 1999 00:31:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Venkataraman", "Anand", "" ] ]
cs/9907005
Eirik Fossgaard
Eirik Fossgaard
Alternative Local Discriminant Bases Using Empirical Expectation and Variance Estimation
11 pages
null
null
null
cs.NA
null
We propose alternative discriminant measures for selecting the best basis among a large collection of orthonormal bases for classification purposes. A generalization of the Local Discriminant Basis Algorithm of Saito and Coifman is constructed. The success of these new methods is evaluated and compared to earlier methods in experiments.
[ { "version": "v1", "created": "Tue, 6 Jul 1999 11:48:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Fossgaard", "Eirik", "" ] ]
cs/9907006
Erik Tjong Kim Sang
Erik F. Tjong Kim Sang and Jorn Veenstra
Representing Text Chunks
7 pages
EACL'99, Bergen
null
null
cs.CL
null
Dividing sentences in chunks of words is a useful preprocessing step for parsing, information extraction and information retrieval. (Ramshaw and Marcus, 1995) have introduced a "convenient" data representation for chunking by converting it to a tagging task. In this paper we will examine seven different data representations for the problem of recognizing noun phrase chunks. We will show that the the data representation choice has a minor influence on chunking performance. However, equipped with the most suitable data representation, our memory-based learning chunker was able to improve the best published chunking results for a standard data set.
[ { "version": "v1", "created": "Tue, 6 Jul 1999 12:44:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Sang", "Erik F. Tjong Kim", "" ], [ "Veenstra", "Jorn", "" ] ]
cs/9907007
Atsushi Fujii
Atsushi Fujii and Tetsuya Ishikawa
Cross-Language Information Retrieval for Technical Documents
9 pages, 5 Postscript figures, uses colacl.sty and psfig.tex
Proceedings of the Joint ACL SIGDAT Conference on Empirical Methods in Natural Language Processing and Very Large Corpora, pp.29-37, 1999
null
null
cs.CL
null
This paper proposes a Japanese/English cross-language information retrieval (CLIR) system targeting technical documents. Our system first translates a given query containing technical terms into the target language, and then retrieves documents relevant to the translated query. The translation of technical terms is still problematic in that technical terms are often compound words, and thus new terms can be progressively created simply by combining existing base words. In addition, Japanese often represents loanwords based on its phonogram. Consequently, existing dictionaries find it difficult to achieve sufficient coverage. To counter the first problem, we use a compound word translation method, which uses a bilingual dictionary for base words and collocational statistics to resolve translation ambiguity. For the second problem, we propose a transliteration method, which identifies phonetic equivalents in the target language. We also show the effectiveness of our system using a test collection for CLIR.
[ { "version": "v1", "created": "Tue, 6 Jul 1999 16:25:46 GMT" }, { "version": "v2", "created": "Wed, 7 Jul 1999 09:12:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Fujii", "Atsushi", "" ], [ "Ishikawa", "Tetsuya", "" ] ]
cs/9907008
Janine Toole
Janine Toole, Fred Popowich, Devlan Nicholson, Davide Turcato, Paul McFetridge
Explanation-based Learning for Machine Translation
12 pages, 3 figures, To appear in Proceedings of the 8th International Conference on Theoretical and Methodological Issues in Machine Translation
null
null
null
cs.CL
null
In this paper we present an application of explanation-based learning (EBL) in the parsing module of a real-time English-Spanish machine translation system designed to translate closed captions. We discuss the efficiency/coverage trade-offs available in EBL and introduce the techniques we use to increase coverage while maintaining a high level of space and time efficiency. Our performance results indicate that this approach is effective.
[ { "version": "v1", "created": "Tue, 6 Jul 1999 18:35:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Toole", "Janine", "" ], [ "Popowich", "Fred", "" ], [ "Nicholson", "Devlan", "" ], [ "Turcato", "Davide", "" ], [ "McFetridge", "Paul", "" ] ]
cs/9907010
David Elworthy
David Elworthy
Language Identification With Confidence Limits
8 pages; needs colacl.sty. Appeared in Proceedings of the Sixth Workshop on Very Large Corpora (COLING-ACL 98)
null
null
null
cs.CL
null
A statistical classification algorithm and its application to language identification from noisy input are described. The main innovation is to compute confidence limits on the classification, so that the algorithm terminates when enough evidence to make a clear decision has been made, and so avoiding problems with categories that have similar characteristics. A second application, to genre identification, is briefly examined. The results show that some of the problems of other language identification techniques can be avoided, and illustrate a more important point: that a statistical language process can be used to provide feedback about its own success rate.
[ { "version": "v1", "created": "Wed, 7 Jul 1999 09:28:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Elworthy", "David", "" ] ]
cs/9907011
Ming-Yang Kao
Zhi-Zhong Chen and Ming-Yang Kao
Reducing Randomness via Irrational Numbers
null
SIAM Journal on Computing, 29(4):1247--1256, 2000
null
null
cs.DS cs.DM
null
We propose a general methodology for testing whether a given polynomial with integer coefficients is identically zero. The methodology evaluates the polynomial at efficiently computable approximations of suitable irrational points. In contrast to the classical technique of DeMillo, Lipton, Schwartz, and Zippel, this methodology can decrease the error probability by increasing the precision of the approximations instead of using more random bits. Consequently, randomized algorithms that use the classical technique can generally be improved using the new methodology. To demonstrate the methodology, we discuss two nontrivial applications. The first is to decide whether a graph has a perfect matching in parallel. Our new NC algorithm uses fewer random bits while doing less work than the previously best NC algorithm by Chari, Rohatgi, and Srinivasan. The second application is to test the equality of two multisets of integers. Our new algorithm improves upon the previously best algorithms by Blum and Kannan and can speed up their checking algorithm for sorting programs on a large range of inputs.
[ { "version": "v1", "created": "Wed, 7 Jul 1999 23:39:27 GMT" }, { "version": "v2", "created": "Wed, 15 Nov 2000 14:39:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Chen", "Zhi-Zhong", "" ], [ "Kao", "Ming-Yang", "" ] ]
cs/9907012
Guido Minnen
Guido Minnen (University of Sussex)
Selective Magic HPSG Parsing
9 pages, LaTeX with 4 postscript figures (uses avm.sty, eaclap.sty and psfig-scale.sty)
Proceedings of EACL99, Bergen, Norway, June 8-11
null
null
cs.CL
null
We propose a parser for constraint-logic grammars implementing HPSG that combines the advantages of dynamic bottom-up and advanced top-down control. The parser allows the user to apply magic compilation to specific constraints in a grammar which as a result can be processed dynamically in a bottom-up and goal-directed fashion. State of the art top-down processing techniques are used to deal with the remaining constraints. We discuss various aspects concerning the implementation of the parser as part of a grammar development system.
[ { "version": "v1", "created": "Thu, 8 Jul 1999 09:46:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Minnen", "Guido", "", "University of Sussex" ] ]
cs/9907013
Guido Minnen
John Carroll, Guido Minnen (University of Sussex), Ted Briscoe (Cambridge University)
Corpus Annotation for Parser Evaluation
7 pages, LaTeX (uses eaclap.sty)
Proceedings of the EACL99 workshop on Linguistically Interpreted Corpora (LINC), Bergen, Norway, June 12
null
null
cs.CL
null
We describe a recently developed corpus annotation scheme for evaluating parsers that avoids shortcomings of current methods. The scheme encodes grammatical relations between heads and dependents, and has been used to mark up a new public-domain corpus of naturally occurring English text. We show how the corpus can be used to evaluate the accuracy of a robust parser, and relate the corpus to extant resources.
[ { "version": "v1", "created": "Thu, 8 Jul 1999 10:08:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Carroll", "John", "", "University of Sussex" ], [ "Minnen", "Guido", "", "University of Sussex" ], [ "Briscoe", "Ted", "", "Cambridge University" ] ]
cs/9907016
Jim Gray
Tom Barclay Jim Gray Don Slutz
Microsoft TerraServer: A Spatial Data Warehouse
Original MSword format at http://research.microsoft.com/~gray/papers/MS_TR_99_30_TerraServer.doc
null
null
Microsoft Research Technical Report MSR-TR-99-29
cs.DB cs.DL
null
The TerraServer stores aerial, satellite, and topographic images of the earth in a SQL database available via the Internet. It is the world's largest online atlas, combining five terabytes of image data from the United States Geological Survey (USGS) and SPIN-2. This report describes the system-redesign based on our experience over the last year. It also reports usage and operations results over the last year -- over 2 billion web hits and over 20 Terabytes of imagry served over the Internet. Internet browsers provide intuitive spatial and text interfaces to the data. Users need no special hardware, software, or knowledge to locate and browse imagery. This paper describes how terabytes of "Internet unfriendly" geo-spatial images were scrubbed and edited into hundreds of millions of "Internet friendly" image tiles and loaded into a SQL data warehouse. Microsoft TerraServer demonstrates that general-purpose relational database technology can manage large scale image repositories, and shows that web browsers can be a good geospatial image presentation system.
[ { "version": "v1", "created": "Fri, 9 Jul 1999 21:30:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Slutz", "Tom Barclay Jim Gray Don", "" ] ]
cs/9907017
Davide Turcato
Davide Turcato, Paul McFetridge, Fred Popowich and Janine Toole
A Bootstrap Approach to Automatically Generating Lexical Transfer Rules
8 pages, 1 figure, to be presented at Machine Translation Summit VII, September 13-17, 1999, Singapore
null
null
null
cs.CL
null
We describe a method for automatically generating Lexical Transfer Rules (LTRs) from word equivalences using transfer rule templates. Templates are skeletal LTRs, unspecified for words. New LTRs are created by instantiating a template with words, provided that the words belong to the appropriate lexical categories required by the template. We define two methods for creating an inventory of templates and using them to generate new LTRs. A simpler method consists of extracting a finite set of templates from a sample of hand coded LTRs and directly using them in the generation process. A further method consists of abstracting over the initial finite set of templates to define higher level templates, where bilingual equivalences are defined in terms of correspondences involving phrasal categories. Phrasal templates are then mapped onto sets of lexical templates with the aid of grammars. In this way an infinite set of lexical templates is recursively defined. New LTRs are created by parsing input words, matching a template at the phrasal level and using the corresponding lexical categories to instantiate the lexical template. The definition of an infinite set of templates enables the automatic creation of LTRs for multi-word, non-compositional word equivalences of any cardinality.
[ { "version": "v1", "created": "Fri, 9 Jul 1999 22:39:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Turcato", "Davide", "" ], [ "McFetridge", "Paul", "" ], [ "Popowich", "Fred", "" ], [ "Toole", "Janine", "" ] ]
cs/9907018
Erik Demaine
Erik D. Demaine, Martin L. Demaine, David Eppstein, Greg N. Frederickson, Erich Friedman
Hinged Dissection of Polyominoes and Polyforms
27 pages, 39 figures. Accepted to Computational Geometry: Theory and Applications. v3 incorporates several comments by referees. v2 added many new results and a new coauthor (Frederickson)
null
null
null
cs.CG cs.DM
null
A hinged dissection of a set of polygons S is a collection of polygonal pieces hinged together at vertices that can be folded into any member of S. We present a hinged dissection of all edge-to-edge gluings of n congruent copies of a polygon P that join corresponding edges of P. This construction uses kn pieces, where k is the number of vertices of P. When P is a regular polygon, we show how to reduce the number of pieces to ceiling(k/2)*(n-1). In particular, we consider polyominoes (made up of unit squares), polyiamonds (made up of equilateral triangles), and polyhexes (made up of regular hexagons). We also give a hinged dissection of all polyabolos (made up of right isosceles triangles), which do not fall under the general result mentioned above. Finally, we show that if P can be hinged into Q, then any edge-to-edge gluing of n congruent copies of P can be hinged into any edge-to-edge gluing of n congruent copies of Q.
[ { "version": "v1", "created": "Sat, 10 Jul 1999 21:29:56 GMT" }, { "version": "v2", "created": "Wed, 13 Oct 1999 01:54:07 GMT" }, { "version": "v3", "created": "Sun, 23 Mar 2003 13:29:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Demaine", "Erik D.", "" ], [ "Demaine", "Martin L.", "" ], [ "Eppstein", "David", "" ], [ "Frederickson", "Greg N.", "" ], [ "Friedman", "Erich", "" ] ]
cs/9907019
Craig Bordelon
Craig Bordelon
A Reasonable C++ Wrappered Java Native Interface
27 pages, 18 figures; Submitted to Software Practice & Experience; Withdrawn after 3 month negotiation failed to reach compromise on copyright (Wiley Publisher vs. Telcordia Technologies); jH software inquiries to http://www.telcordia.com
null
null
null
cs.SE
null
A reasonable C++ Java Native Interface (JNI) technique termed C++ Wrappered JNI (C++WJ) is presented. The technique simplifies current error-prone JNI development by wrappering JNI calls. Provided development is done with the aid of a C++ compiler, C++WJ offers type checking and behind the scenes caching. A tool (jH) patterned on javah automates the creation of C++WJ classes. The paper presents the rationale behind the choices that led to C++WJ. Handling of Java class and interface hierarchy including Java type downcasts is discussed. Efficiency considerations in the C++WJ lead to two flavors of C++ classes: jtypes and Jtypes. A jtype is a lightweight less than full wrapper of a JNI object reference. A Jtype is a heavyweight full wrapper of a JNI object reference.
[ { "version": "v1", "created": "Mon, 12 Jul 1999 13:34:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Bordelon", "Craig", "" ] ]
cs/9907022
Satoru Kuroda
Satoru Kuroda
Weak length induction and slow growing depth boolean circuits
null
null
null
null
cs.LO
null
We define a hierarchy of circuit complexity classes LD^i, whose depth are the inverse of a function in Ackermann hierarchy. Then we introduce extremely weak versions of length induction and construct a bounded arithmetic theory L^i_2 whose provably total functions exactly correspond to functions computable by LD^i circuits. Finally, we prove a non-conservation result between L^i_2 and a weaker theory AC^0CA which corresponds to the class AC^0. Our proof utilizes KPT witnessing theorem.
[ { "version": "v1", "created": "Fri, 16 Jul 1999 08:41:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Kuroda", "Satoru", "" ] ]
cs/9907023
Devillers
Olivier Devillers
On Deletion in Delaunay Triangulation
15 pages 5 figures. in Proc. 15th Annu. ACM Sympos. Comput. Geom., 181--188, 1999
null
null
INRIA Research report 3451
cs.CG
null
This paper presents how the space of spheres and shelling may be used to delete a point from a $d$-dimensional triangulation efficiently. In dimension two, if k is the degree of the deleted vertex, the complexity is O(k log k), but we notice that this number only applies to low cost operations, while time consuming computations are only done a linear number of times. This algorithm may be viewed as a variation of Heller's algorithm, which is popular in the geographic information system community. Unfortunately, Heller algorithm is false, as explained in this paper.
[ { "version": "v1", "created": "Fri, 16 Jul 1999 13:25:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Devillers", "Olivier", "" ] ]
cs/9907024
Devillers
Olivier Devillers
Improved Incremental Randomized Delaunay Triangulation
19 pages, 7 figures Proc. 14th Annu. ACM Sympos. Comput. Geom., 106--115, 1998
null
null
INRIA Research Report 3298
cs.CG
null
We propose a new data structure to compute the Delaunay triangulation of a set of points in the plane. It combines good worst case complexity, fast behavior on real data, and small memory occupation. The location structure is organized into several levels. The lowest level just consists of the triangulation, then each level contains the triangulation of a small sample of the levels below. Point location is done by marching in a triangulation to determine the nearest neighbor of the query at that level, then the march restarts from that neighbor at the level below. Using a small sample (3%) allows a small memory occupation; the march and the use of the nearest neighbor to change levels quickly locate the query.
[ { "version": "v1", "created": "Fri, 16 Jul 1999 12:44:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Devillers", "Olivier", "" ] ]
cs/9907025
Devillers
Herve Bronnimann, Olivier Devillers
The union of unit balls has quadratic complexity, even if they all contain the origin
5 pages, 5 figures
null
null
null
cs.CG
null
We provide a lower bound construction showing that the union of unit balls in three-dimensional space has quadratic complexity, even if they all contain the origin. This settles a conjecture of Sharir.
[ { "version": "v1", "created": "Fri, 16 Jul 1999 15:20:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Bronnimann", "Herve", "" ], [ "Devillers", "Olivier", "" ] ]
cs/9907026
Tovena
Emanuele Pianta, Lucia M. Tovena
Mixing representation levels: The hybrid approach to automatic text generation
6 pages
Proceedings of the AISB'99 Workshop on ``Reference Architectures and Data Standards for NLP'', Edinburgh Scotland, April 1999, 8-13
null
null
cs.CL cs.AI
null
Natural language generation systems (NLG) map non-linguistic representations into strings of words through a number of steps using intermediate representations of various levels of abstraction. Template based systems, by contrast, tend to use only one representation level, i.e. fixed strings, which are combined, possibly in a sophisticated way, to generate the final text. In some circumstances, it may be profitable to combine NLG and template based techniques. The issue of combining generation techniques can be seen in more abstract terms as the issue of mixing levels of representation of different degrees of linguistic abstraction. This paper aims at defining a reference architecture for systems using mixed representations. We argue that mixed representations can be used without abandoning a linguistically grounded approach to language generation.
[ { "version": "v1", "created": "Fri, 16 Jul 1999 15:43:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Pianta", "Emanuele", "" ], [ "Tovena", "Lucia M.", "" ] ]
cs/9907027
Andrea Schaerf
Krzysztof R. Apt and Andrea Schaerf
The Alma Project, or How First-Order Logic Can Help Us in Imperative Programming
25 pages
null
null
null
cs.LO cs.PL
null
The aim of the Alma project is the design of a strongly typed constraint programming language that combines the advantages of logic and imperative programming. The first stage of the project was the design and implementation of Alma-0, a small programming language that provides a support for declarative programming within the imperative programming framework. It is obtained by extending a subset of Modula-2 by a small number of features inspired by the logic programming paradigm. In this paper we discuss the rationale for the design of Alma-0, the benefits of the resulting hybrid programming framework, and the current work on adding constraint processing capabilities to the language. In particular, we discuss the role of the logical and customary variables, the interaction between the constraint store and the program, and the need for lists.
[ { "version": "v1", "created": "Mon, 19 Jul 1999 09:36:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Apt", "Krzysztof R.", "" ], [ "Schaerf", "Andrea", "" ] ]
cs/9907028
Devillers
Olivier Devillers and Franco P. Preparata
Further Results on Arithmetic Filters for Geometric Predicates
7 pages 2 figures presented at the 15th European Workshop Comput. Geom., 113--116, 1999 improve previous results (in other paper)
Comput. Geom. Theory Appl. 1999 13:141-148
null
INRIA Research report 3528
cs.CG
null
An efficient technique to solve precision problems consists in using exact computations. For geometric predicates, using systematically expensive exact computations can be avoided by the use of filters. The predicate is first evaluated using rounding computations, and an error estimation gives a certificate of the validity of the result. In this note, we studies the statistical efficiency of filters for cosphericity predicate with an assumption of regular distribution of the points. We prove that the expected value of the polynomial corresponding to the in sphere test is greater than epsilon with probability O(epsilon log 1/epsilon) improving the results of a previous paper by the same authors.
[ { "version": "v1", "created": "Mon, 19 Jul 1999 15:09:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Devillers", "Olivier", "" ], [ "Preparata", "Franco P.", "" ] ]
cs/9907029
Devillers
Olivier Devillers and Franco P. Preparata
A Probabilistic Analysis of the Power of Arithmetic Filters
22 pages 7 figures Results for in sphere test inproved in cs.CG/9907028
Discrete and Computational Geometry, 20:523--547, 1998
null
INRIA Research report 2971
cs.CG
null
The assumption of real-number arithmetic, which is at the basis of conventional geometric algorithms, has been seriously challenged in recent years, since digital computers do not exhibit such capability. A geometric predicate usually consists of evaluating the sign of some algebraic expression. In most cases, rounded computations yield a reliable result, but sometimes rounded arithmetic introduces errors which may invalidate the algorithms. The rounded arithmetic may produce an incorrect result only if the exact absolute value of the algebraic expression is smaller than some (small) varepsilon, which represents the largest error that may arise in the evaluation of the expression. The threshold varepsilon depends on the structure of the expression and on the adopted computer arithmetic, assuming that the input operands are error-free. A pair (arithmetic engine,threshold) is an "arithmetic filter". In this paper we develop a general technique for assessing the efficacy of an arithmetic filter. The analysis consists of evaluating both the threshold and the probability of failure of the filter. To exemplify the approach, under the assumption that the input points be chosen randomly in a unit ball or unit cube with uniform density, we analyze the two important predicates "which-side" and "insphere". We show that the probability that the absolute values of the corresponding determinants be no larger than some positive value V, with emphasis on small V, is Theta(V) for the which-side predicate, while for the insphere predicate it is Theta(V^(2/3)) in dimension 1, O(sqrt(V)) in dimension 2, and O(sqrt(V) ln(1/V)) in higher dimensions. Constants are small, and are given in the paper.
[ { "version": "v1", "created": "Mon, 19 Jul 1999 15:22:19 GMT" }, { "version": "v2", "created": "Wed, 21 Jul 1999 07:27:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Devillers", "Olivier", "" ], [ "Preparata", "Franco P.", "" ] ]
cs/9907032
Clare Dixon
Michael Fisher (1), Clare Dixon (1), Martin Peim (2) ((1) Department of Computing and Mathematics, Manchester Metropolitan University, Manchester, UK, (2) Department of Computer Science, Victoria University of Manchester, Manchester, UK)
Clausal Temporal Resolution
35 pages, 0 figures Expanded related work, corrected typos, expanded proofs
null
null
null
cs.LO cs.AI
null
In this article, we examine how clausal resolution can be applied to a specific, but widely used, non-classical logic, namely discrete linear temporal logic. Thus, we first define a normal form for temporal formulae and show how arbitrary temporal formulae can be translated into the normal form, while preserving satisfiability. We then introduce novel resolution rules that can be applied to formulae in this normal form, provide a range of examples and examine the correctness and complexity of this approach is examined and. This clausal resolution approach. Finally, we describe related work and future developments concerning this work.
[ { "version": "v1", "created": "Wed, 21 Jul 1999 15:48:06 GMT" }, { "version": "v2", "created": "Fri, 14 Apr 2000 10:13:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Fisher", "Michael", "" ], [ "Dixon", "Clare", "" ], [ "Peim", "Martin", "" ] ]
cs/9907033
Joerg Rothe
Lane A. Hemaspaandra and Joerg Rothe
Unambiguous Computation: Boolean Hierarchies and Sparse Turing-Complete Sets
27 pages
SIAM Journal on Computing vol. 26, no. 3, pp. 634--653, 1997
null
earlier version appeared as University of Rochester TR-94-483
cs.CC
null
It is known that for any class C closed under union and intersection, the Boolean closure of C, the Boolean hierarchy over C, and the symmetric difference hierarchy over C all are equal. We prove that these equalities hold for any complexity class closed under intersection; in particular, they thus hold for unambiguous polynomial time (UP). In contrast to the NP case, we prove that the Hausdorff hierarchy and the nested difference hierarchy over UP both fail to capture the Boolean closure of UP in some relativized worlds. Karp and Lipton proved that if nondeterministic polynomial time has sparse Turing-complete sets, then the polynomial hierarchy collapses. We establish the first consequences from the assumption that unambiguous polynomial time has sparse Turing-complete sets: (a) UP is in Low_2, where Low_2 is the second level of the low hierarchy, and (b) each level of the unambiguous polynomial hierarchy is contained one level lower in the promise unambiguous polynomial hierarchy than is otherwise known to be the case.
[ { "version": "v1", "created": "Mon, 26 Jul 1999 10:09:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Hemaspaandra", "Lane A.", "" ], [ "Rothe", "Joerg", "" ] ]
cs/9907034
Joerg Rothe
Lane A. Hemaspaandra, Zhigen Jiang, Joerg Rothe and Osamu Watanabe
Polynomial-Time Multi-Selectivity
40 pages
Journal of Universal Computer Science vol. 3, no. 3, pp. 197--229, 1997
null
earlier version appeared as FSU Jena TR Math/Inf/96/11
cs.CC
null
We introduce a generalization of Selman's P-selectivity that yields a more flexible notion of selectivity, called (polynomial-time) multi-selectivity, in which the selector is allowed to operate on multiple input strings. Since our introduction of this class, it has been used to prove the first known (and optimal) lower bounds for generalized selectivity-like classes in terms of EL_2, the second level of the extended low hierarchy. We study the resulting selectivity hierarchy, denoted by SH, which we prove does not collapse. In particular, we study the internal structure and the properties of SH and completely establish, in terms of incomparability and strict inclusion, the relations between our generalized selectivity classes and Ogihara's P-mc (polynomial-time membership-comparable) classes. Although SH is a strictly increasing infinite hierarchy, we show that the core results that hold for the P-selective sets and that prove them structurally simple also hold for SH. In particular, all sets in SH have small circuits; the NP sets in SH are in Low_2, the second level of the low hierarchy within NP; and SAT cannot be in SH unless P = NP. Finally, it is known that P-Sel, the class of P-selective sets, is not closed under union or intersection. We provide an extended selectivity hierarchy that is based on SH and that is large enough to capture those closures of the P-selective sets, and yet, in contrast with the P-mc classes, is refined enough to distinguish them.
[ { "version": "v1", "created": "Sun, 25 Jul 1999 20:55:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Hemaspaandra", "Lane A.", "" ], [ "Jiang", "Zhigen", "" ], [ "Rothe", "Joerg", "" ], [ "Watanabe", "Osamu", "" ] ]
cs/9907035
Joerg Rothe
Lane A. Hemaspaandra, Joerg Rothe and Gerd Wechsung
Easy Sets and Hard Certificate Schemes
26 pages
Acta Informatica vol. 34, no 11, pp. 859--879, 1997
null
earlier version appeared as FSU Jena TR Math/95/5
cs.CC
null
Can easy sets only have easy certificate schemes? In this paper, we study the class of sets that, for all NP certificate schemes (i.e., NP machines), always have easy acceptance certificates (i.e., accepting paths) that can be computed in polynomial time. We also study the class of sets that, for all NP certificate schemes, infinitely often have easy acceptance certificates. In particular, we provide equivalent characterizations of these classes in terms of relative generalized Kolmogorov complexity, showing that they are robust. We also provide structural conditions---regarding immunity and class collapses---that put upper and lower bounds on the sizes of these two classes. Finally, we provide negative results showing that some of our positive claims are optimal with regard to being relativizable. Our negative results are proven using a novel observation: we show that the classical ``wide spacing'' oracle construction technique yields instant non-bi-immunity results. Furthermore, we establish a result that improves upon Baker, Gill, and Solovay's classical result that NP \neq P = NP \cap coNP holds in some relativized world.
[ { "version": "v1", "created": "Sun, 25 Jul 1999 21:05:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Hemaspaandra", "Lane A.", "" ], [ "Rothe", "Joerg", "" ], [ "Wechsung", "Gerd", "" ] ]
cs/9907036
Joerg Rothe
Edith Hemaspaandra, Lane A. Hemaspaandra and Joerg Rothe
Exact Analysis of Dodgson Elections: Lewis Carroll's 1876 Voting System is Complete for Parallel Access to NP
22 pages
Journal of the ACM vol. 44, no. 6, pp. 806--825, 1997
null
earlier version appeared as University of Rochester TR-96-640
cs.CC
null
In 1876, Lewis Carroll proposed a voting system in which the winner is the candidate who with the fewest changes in voters' preferences becomes a Condorcet winner---a candidate who beats all other candidates in pairwise majority-rule elections. Bartholdi, Tovey, and Trick provided a lower bound---NP-hardness---on the computational complexity of determining the election winner in Carroll's system. We provide a stronger lower bound and an upper bound that matches our lower bound. In particular, determining the winner in Carroll's system is complete for parallel access to NP, i.e., it is complete for $\thetatwo$, for which it becomes the most natural complete problem known. It follows that determining the winner in Carroll's elections is not NP-complete unless the polynomial hierarchy collapses.
[ { "version": "v1", "created": "Sun, 25 Jul 1999 21:16:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Hemaspaandra", "Edith", "" ], [ "Hemaspaandra", "Lane A.", "" ], [ "Rothe", "Joerg", "" ] ]
cs/9907037
Joerg Rothe
Lane A. Hemaspaandra, Zhigen Jiang, Joerg Rothe and Osamu Watanabe
Boolean Operations, Joins, and the Extended Low Hierarchy
12 pages
Theoretical Computer Science vol. 205, no. 1-2, pp. 317--327, 1998
null
earlier version appeared as University of Rochester TR-96-627
cs.CC
null
We prove that the join of two sets may actually fall into a lower level of the extended low hierarchy than either of the sets. In particular, there exist sets that are not in the second level of the extended low hierarchy, EL_2, yet their join is in EL_2. That is, in terms of extended lowness, the join operator can lower complexity. Since in a strong intuitive sense the join does not lower complexity, our result suggests that the extended low hierarchy is unnatural as a complexity measure. We also study the closure properties of EL_ and prove that EL_2 is not closed under certain Boolean operations. To this end, we establish the first known (and optimal) EL_2 lower bounds for certain notions generalizing Selman's P-selectivity, which may be regarded as an interesting result in its own right.
[ { "version": "v1", "created": "Sun, 25 Jul 1999 21:30:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Hemaspaandra", "Lane A.", "" ], [ "Jiang", "Zhigen", "" ], [ "Rothe", "Joerg", "" ], [ "Watanabe", "Osamu", "" ] ]
cs/9907038
Joerg Rothe
Lane A. Hemaspaandra and Joerg Rothe
A Second Step Towards Complexity-Theoretic Analogs of Rice's Theorem
14 pages. To appear in Theoretical Computer Science
null
null
earlier version appeared as University of Rochester TR-97-662
cs.CC
null
Rice's Theorem states that every nontrivial language property of the recursively enumerable sets is undecidable. Borchert and Stephan initiated the search for complexity-theoretic analogs of Rice's Theorem. In particular, they proved that every nontrivial counting property of circuits is UP-hard, and that a number of closely related problems are SPP-hard. The present paper studies whether their UP-hardness result itself can be improved to SPP-hardness. We show that their UP-hardness result cannot be strengthened to SPP-hardness unless unlikely complexity class containments hold. Nonetheless, we prove that every P-constructibly bi-infinite counting property of circuits is SPP-hard. We also raise their general lower bound from unambiguous nondeterminism to constant-ambiguity nondeterminism.
[ { "version": "v1", "created": "Sun, 25 Jul 1999 21:39:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Hemaspaandra", "Lane A.", "" ], [ "Rothe", "Joerg", "" ] ]
cs/9907039
Joerg Rothe
Edith Hemaspaandra, Lane A. Hemaspaandra and Joerg Rothe
Raising NP Lower Bounds to Parallel NP Lower Bounds
14 pages
SIGACT News vol. 28, no. 2, pp. 2--13, 1997
null
earlier version appeared as University of Rochester TR-97-658
cs.CC
null
A decade ago, a beautiful paper by Wagner developed a ``toolkit'' that in certain cases allows one to prove problems hard for parallel access to NP. However, the problems his toolkit applies to most directly are not overly natural. During the past year, problems that previously were known only to be NP-hard or coNP-hard have been shown to be hard even for the class of sets solvable via parallel access to NP. Many of these problems are longstanding and extremely natural, such as the Minimum Equivalent Expression problem (which was the original motivation for creating the polynomial hierarchy), the problem of determining the winner in the election system introduced by Lewis Carroll in 1876, and the problem of determining on which inputs heuristic algorithms perform well. In the present article, we survey this recent progress in raising lower bounds.
[ { "version": "v1", "created": "Sun, 25 Jul 1999 21:47:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Hemaspaandra", "Edith", "" ], [ "Hemaspaandra", "Lane A.", "" ], [ "Rothe", "Joerg", "" ] ]
cs/9907040
Joerg Rothe
Joerg Rothe and Lane A. Hemaspaandra
Characterizations of the Existence of Partial and Total One-Way Permutations
12 pages; An extended abstract of this paper was presented at the Third Italian Conference on Algorithms and Complexity
null
null
null
cs.CC cs.CR
null
In this note, we study the easy certificate classes introduced by Hemaspaandra, Rothe, and Wechsung, with regard to the question of whether or not surjective one-way functions exist. This is an important open question in cryptology. We show that the existence of partial one-way permutations can be characterized by separating P from the class of UP sets that, for all unambiguous polynomial-time Turing machines accepting them, always have easy (i.e., polynomial-time computable) certificates. This extends results of Grollmann and Selman. By Gr\"adel's recent results about one-way functions, this also links statements about easy certificates of NP sets with statements in finite model theory. Similarly, there exist surjective poly-one one-way functions if and only if there is a set L in P such that not all FewP machines accepting L always have easy certificates. We also establish a condition necessary and sufficient for the existence of (total) one-way permutations.
[ { "version": "v1", "created": "Mon, 26 Jul 1999 10:42:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Rothe", "Joerg", "" ], [ "Hemaspaandra", "Lane A.", "" ] ]
cs/9907041
Joerg Rothe
Bernd Borchert, Lane A. Hemaspaandra and Joerg Rothe
Restrictive Acceptance Suffices for Equivalence Problems
14 pages; to appear in Proc. FCT'99
null
null
Revises Friedrich-Schiller-Universit\"at Jena Technical Report Math/Inf/96/13
cs.CC
null
One way of suggesting that an NP problem may not be NP-complete is to show that it is in the class UP. We suggest an analogous new approach---weaker in strength of evidence but more broadly applicable---to suggesting that concrete~NP problems are not NP-complete. In particular we introduce the class EP, the subclass of NP consisting of those languages accepted by NP machines that when they accept always have a number of accepting paths that is a power of two. Since if any NP-complete set is in EP then all NP sets are in EP, it follows---with whatever degree of strength one believes that EP differs from NP---that membership in EP can be viewed as evidence that a problem is not NP-complete. We show that the negation equivalence problem for OBDDs (ordered binary decision diagrams) and the interchange equivalence problem for 2-dags are in EP. We also show that for boolean negation the equivalence problem is in EP^{NP}, thus tightening the existing NP^{NP} upper bound. We show that FewP, bounded ambiguity polynomial time, is contained in EP, a result that is not known to follow from the previous SPP upper bound. For the three problems and classes just mentioned with regard to EP, no proof of membership/containment in UP is known, and for the problem just mentioned with regard to EP^{NP}, no proof of membership in UP^{NP} is known. Thus, EP is indeed a tool that gives evidence against NP-completeness in natural cases where UP cannot currently be applied.
[ { "version": "v1", "created": "Mon, 26 Jul 1999 10:50:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Borchert", "Bernd", "" ], [ "Hemaspaandra", "Lane A.", "" ], [ "Rothe", "Joerg", "" ] ]
cs/9907042
Scott Nicholson
Scott Nicholson
Raising Reliability of Web Search Tool Research through Replication and Chaos Theory
null
null
null
null
cs.IR cs.DL
null
Because the World Wide Web is a dynamic collection of information, the Web search tools (or "search engines") that index the Web are dynamic. Traditional information retrieval evaluation techniques may not provide reliable results when applied to the Web search tools. This study is the result of ten replications of the classic 1996 Ding and Marchionini Web search tool research. It explores the effects that replication can have on transforming unreliable results from one iteration into replicable and therefore reliable results after multiple iterations.
[ { "version": "v1", "created": "Tue, 27 Jul 1999 16:42:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Nicholson", "Scott", "" ] ]
cs/9907043
Christoph Best
Christoph Best (ZIB, Berlin, and J. v. Neumann Institute, Juelich)
A simple C++ library for manipulating scientific data sets as structured data
22 pages, LaTeX. Also available at http://www.zib.de/PaperWeb/abstracts/TR-98-06/
null
null
TR 98-06 (ZIB Berlin)
cs.CE cs.DB
null
Representing scientific data sets efficiently on external storage usually involves converting them to a byte string representation using specialized reader/writer routines. The resulting storage files are frequently difficult to interpret without these specialized routines as they do not contain information about the logical structure of the data. Avoiding such problems usually involves heavy-weight data format libraries or data base systems. We present a simple C++ library that allows to create and access data files that store structured data. The structure of the data is described by a data type that can be built from elementary data types (integer and floating-point numbers, byte strings) and composite data types (arrays, structures, unions). An abstract data access class presents the data to the application. Different actual data file structures can be implemented under this layer. This method is particularly suited to applications that require complex data structures, e.g. molecular dynamics simulations. Extensions such as late type binding and object persistence are discussed.
[ { "version": "v1", "created": "Fri, 30 Jul 1999 08:35:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Best", "Christoph", "", "ZIB, Berlin, and J. v. Neumann Institute, Juelich" ] ]
cs/9908001
Zvi Marx
Zvika Marx (1 and 2), Ido Dagan (1), Eli Shamir (2) ((1) Bar-Ilan University, (2) The Hebrew University of Jerusalem)
Detecting Sub-Topic Correspondence through Bipartite Term Clustering
html with 3 gif figures; generated from 7 pages MS-Word file
Proceedings of ACL'99 Workshop on Unsupervised Learning in Natural Language Processing, 1999, pp 45-51
null
null
cs.CL
null
This paper addresses a novel task of detecting sub-topic correspondence in a pair of text fragments, enhancing common notions of text similarity. This task is addressed by coupling corresponding term subsets through bipartite clustering. The paper presents a cost-based clustering scheme and compares it with a bipartite version of the single-link method, providing illustrating results.
[ { "version": "v1", "created": "Sun, 1 Aug 1999 14:02:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Marx", "Zvika", "", "1 and 2" ], [ "Dagan", "Ido", "" ], [ "Shamir", "Eli", "" ] ]
cs/9908003
Erik Demaine
Marshall Bern, Erik D. Demaine, David Eppstein, Eric Kuo, Andrea Mantler, Jack Snoeyink
Ununfoldable Polyhedra with Convex Faces
14 pages, 9 figures, LaTeX 2e. To appear in Computational Geometry: Theory and Applications. Major revision with two new authors, solving the open problem about triangular faces
Computational Geometry: Theory and Applications 24(2):51-62, February 2003
null
null
cs.CG cs.DM
null
Unfolding a convex polyhedron into a simple planar polygon is a well-studied problem. In this paper, we study the limits of unfoldability by studying nonconvex polyhedra with the same combinatorial structure as convex polyhedra. In particular, we give two examples of polyhedra, one with 24 convex faces and one with 36 triangular faces, that cannot be unfolded by cutting along edges. We further show that such a polyhedron can indeed be unfolded if cuts are allowed to cross faces. Finally, we prove that ``open'' polyhedra with triangular faces may not be unfoldable no matter how they are cut.
[ { "version": "v1", "created": "Tue, 3 Aug 1999 17:37:04 GMT" }, { "version": "v2", "created": "Mon, 27 Aug 2001 20:42:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Bern", "Marshall", "" ], [ "Demaine", "Erik D.", "" ], [ "Eppstein", "David", "" ], [ "Kuo", "Eric", "" ], [ "Mantler", "Andrea", "" ], [ "Snoeyink", "Jack", "" ] ]
cs/9908004
Patrik Simons
Patrik Simons
Extending the Stable Model Semantics with More Expressive Rules
18 pages, a shortened version will be published in the proceedings of the 5th International Conference on Logic Programming and Nonmonotonic Reasoning (LPNMR'99)
null
null
null
cs.LO cs.AI
null
The rules associated with propositional logic programs and the stable model semantics are not expressive enough to let one write concise programs. This problem is alleviated by introducing some new types of propositional rules. Together with a decision procedure that has been used as a base for an efficient implementation, the new rules supplant the standard ones in practical applications of the stable model semantics.
[ { "version": "v1", "created": "Fri, 6 Aug 1999 06:01:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Simons", "Patrik", "" ] ]
cs/9908005
Joseph O'Rourke
Roxana Cocan and Joseph O'Rourke
Polygonal Chains Cannot Lock in 4D
Major revision of the Aug. 1999 version, including: Proof extended to show trees cannot lock in 4D; new example of the implementation straightening a chain of n=100 vertices; improved time complexity for chain to O(n^2); fixed several minor technical errors. (Thanks to three referees.) 29 pages; 15 figures. v3: Reference updated
null
null
Smith Technical Report 063
cs.CG cs.DM
null
We prove that, in all dimensions d>=4, every simple open polygonal chain and every tree may be straightened, and every simple closed polygonal chain may be convexified. These reconfigurations can be achieved by algorithms that use polynomial time in the number of vertices, and result in a polynomial number of ``moves.'' These results contrast to those known for d=2, where trees can ``lock,'' and for d=3, where open and closed chains can lock.
[ { "version": "v1", "created": "Wed, 11 Aug 1999 16:09:59 GMT" }, { "version": "v2", "created": "Fri, 2 Feb 2001 21:48:48 GMT" }, { "version": "v3", "created": "Tue, 20 Feb 2001 19:10:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Cocan", "Roxana", "" ], [ "O'Rourke", "Joseph", "" ] ]
cs/9908006
Joseph O'Rourke
Joseph O'Rourke
Computational Geometry Column 36
To appear in SIGACT News and in Int. J. Comp. Geom. Appl., 1999. Replacement corrects disk-packing reference: [BDDH98] -> [BDEH98]
null
null
null
cs.CG
null
Two results in "computational origami" are illustrated.
[ { "version": "v1", "created": "Wed, 11 Aug 1999 17:14:00 GMT" }, { "version": "v2", "created": "Fri, 13 Aug 1999 13:46:20 GMT" } ]
2007-05-23T00:00:00
[ [ "O'Rourke", "Joseph", "" ] ]
cs/9908007
Joseph O'Rourke
Erik D. Demaine and Joseph O'Rourke
Computational Geometry Column 37
To appear in SIGACT News, and in Int. J. Comp. Geom. Appl., 1999
null
null
null
cs.CG
null
Open problems from the 15th Annual ACM Symposium on Computational Geometry.
[ { "version": "v1", "created": "Wed, 11 Aug 1999 17:19:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Demaine", "Erik D.", "" ], [ "O'Rourke", "Joseph", "" ] ]
cs/9908008
Dahlia Malkhi
Dahlia Malkhi, Michael Merritt and Ohad Rodeh
Secure Multicast in a WAN
preprint of a paper to appear in the Distributed Computing Journal
null
null
null
cs.CR cs.DC
null
A secure reliable multicast protocol enables a process to send a message to a group of recipients such that all correct destinations receive the same message, despite the malicious efforts of fewer than a third of the total number of processes, including the sender. This has been sh own to be a useful tool in building secure distributed services, albeit with a cost that typically grows linearly with the size of the system. For very large networks, for which this is prohibitive, we present two approaches for reducing the cost: First, we show a protocol whose cost is on the order of the number of tolerated failures. Secondly, we show how relaxing the consistency requirement to a probabilistic guarantee can reduce the associated cost, effectively to a constant.
[ { "version": "v1", "created": "Thu, 12 Aug 1999 17:40:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Malkhi", "Dahlia", "" ], [ "Merritt", "Michael", "" ], [ "Rodeh", "Ohad", "" ] ]
cs/9908009
Dahlia Malkhi
Dahlia Malkhi and Michael Reiter
Secure Execution of Java Applets using a Remote Playground
preprint of a paper to appear in IEEE Transactions on Software Engineering
null
null
null
cs.CR cs.NI
null
Mobile code presents a number of threats to machines that execute it. We introduce an approach for protecting machines and the resources they hold from mobile code, and describe a system based on our approach for protecting host machines from Java 1.1 applets. In our approach, each Java applet downloaded to the protected domain is rerouted to a dedicated machine (or set of machines), the {\em playground}, at which it is executed. Prior to execution the applet is transformed to use the downloading user's web browser as a graphics terminal for its input and output, and so the user has the illusion that the applet is running on her own machine. In reality, however, mobile code runs only in the sanitized environment of the playground, where user files cannot be mounted and from which only limited network connections are accepted by machines in the protected domain. Our playground thus provides a second level of defense against mobile code that circumvents language-based defenses. The paper presents the design and implementation of a playground for Java 1.1 applets, and discusses extensions of it for other forms of mobile code including Java 1.2.
[ { "version": "v1", "created": "Thu, 12 Aug 1999 17:50:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Malkhi", "Dahlia", "" ], [ "Reiter", "Michael", "" ] ]
cs/9908010
Dahlia Malkhi
Dahlia Malkhi, Yishay Mansour and Michael Reiter
On Propagating Updates in a Byzantine Environment
null
null
null
null
cs.DC cs.CR
null
We study how to efficiently diffuse updates to a large distributed system of data replicas, some of which may exhibit arbitrary (Byzantine) failures. We assume that strictly fewer than $t$ replicas fail, and that each update is initially received by at least $t$ correct replicas. The goal is to diffuse each update to all correct replicas while ensuring that correct replicas accept no updates generated spuriously by faulty replicas. To achieve reliable diffusion, each correct replica accepts an update only after receiving it from at least $t$ others. We provide the first analysis of epidemic-style protocols for such environments. This analysis is fundamentally different from known analyses for the benign case due to our treatment of fully Byzantine failures---which, among other things, precludes the use of digital signatures for authenticating forwarded updates. We propose two epidemic-style diffusion algorithms and two measures that characterize the efficiency of diffusion algorithms in general. We characterize both of our algorithms according to these measures, and also prove lower bounds with regards to these measures that show that our algorithms are close to optimal.
[ { "version": "v1", "created": "Thu, 12 Aug 1999 18:00:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Malkhi", "Dahlia", "" ], [ "Mansour", "Yishay", "" ], [ "Reiter", "Michael", "" ] ]
cs/9908011
Dahlia Malkhi
Dahlia Malkhi, Michael Reiter and Avishai Wool
The Load and Availability of Byzantine Quorum Systems
preprint of a paper to appear in the SIAM Journal of Computing
null
null
null
cs.DC cs.CR
null
Replicated services accessed via {\em quorums} enable each access to be performed at only a subset (quorum) of the servers, and achieve consistency across accesses by requiring any two quorums to intersect. Recently, $b$-masking quorum systems, whose intersections contain at least $2b+1$ servers, have been proposed to construct replicated services tolerant of $b$ arbitrary (Byzantine) server failures. In this paper we consider a hybrid fault model allowing benign failures in addition to the Byzantine ones. We present four novel constructions for $b$-masking quorum systems in this model, each of which has optimal {\em load} (the probability of access of the busiest server) or optimal availability (probability of some quorum surviving failures). To show optimality we also prove lower bounds on the load and availability of any $b$-masking quorum system in this model.
[ { "version": "v1", "created": "Thu, 12 Aug 1999 18:06:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Malkhi", "Dahlia", "" ], [ "Reiter", "Michael", "" ], [ "Wool", "Avishai", "" ] ]
cs/9908012
H. M. Gladney
H.M. Gladney
Safe Deals Between Strangers
31 pages, 6 figures
null
null
null
cs.CR cs.DL
null
E-business, information serving, and ubiquitous computing will create heavy request traffic from strangers or even incognitos. Such requests must be managed automatically. Two ways of doing this are well known: giving every incognito consumer the same treatment, and rendering service in return for money. However, different behavior will be often wanted, e.g., for a university library with different access policies for undergraduates, graduate students, faculty, alumni, citizens of the same state, and everyone else. For a data or process server contacted by client machines on behalf of users not previously known, we show how to provide reliable automatic access administration conforming to service agreements. Implementations scale well from very small collections of consumers and producers to immense client/server networks. Servers can deliver information, effect state changes, and control external equipment. Consumer privacy is easily addressed by the same protocol. We support consumer privacy, but allow servers to deny their resources to incognitos. A protocol variant even protects against statistical attacks by consortia of service organizations. One e-commerce application would put the consumer's tokens on a smart card whose readers are in vending kiosks. In e-business we can simplify supply chain administration. Our method can also be used in sensitive networks without introducing new security loopholes.
[ { "version": "v1", "created": "Tue, 17 Aug 1999 01:09:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Gladney", "H. M.", "" ] ]
cs/9908014
Kagan Tumer
David H. Wolpert and Kagan Tumer
An Introduction to Collective Intelligence
88 pages, 10 figs, 297 refs
null
null
NASA-ARC-IC-99-63
cs.LG adap-org cond-mat cs.DC cs.MA nlin.AO
null
This paper surveys the emerging science of how to design a ``COllective INtelligence'' (COIN). A COIN is a large multi-agent system where: (i) There is little to no centralized communication or control; and (ii) There is a provided world utility function that rates the possible histories of the full system. In particular, we are interested in COINs in which each agent runs a reinforcement learning (RL) algorithm. Rather than use a conventional modeling approach (e.g., model the system dynamics, and hand-tune agents to cooperate), we aim to solve the COIN design problem implicitly, via the ``adaptive'' character of the RL algorithms of each of the agents. This approach introduces an entirely new, profound design problem: Assuming the RL algorithms are able to achieve high rewards, what reward functions for the individual agents will, when pursued by those agents, result in high world utility? In other words, what reward functions will best ensure that we do not have phenomena like the tragedy of the commons, Braess's paradox, or the liquidity trap? Although still very young, research specifically concentrating on the COIN design problem has already resulted in successes in artificial domains, in particular in packet-routing, the leader-follower problem, and in variants of Arthur's El Farol bar problem. It is expected that as it matures and draws upon other disciplines related to COINs, this research will greatly expand the range of tasks addressable by human engineers. Moreover, in addition to drawing on them, such a fully developed scie nce of COIN design may provide much insight into other already established scientific fields, such as economics, game theory, and population biology.
[ { "version": "v1", "created": "Tue, 17 Aug 1999 22:49:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Wolpert", "David H.", "" ], [ "Tumer", "Kagan", "" ] ]
cs/9908015
Simon Buckingham Shum
Simon Buckingham Shum, Enrico Motta and John Domingue
Representing Scholarly Claims in Internet Digital Libraries: A Knowledge Modelling Approach
18 pages. Preprint, to appear: Proceedings of ECDL'99: Third European Conference on Research and Advanced Technology for Digital Libraries, Paris, France, September 22-24, 1999. Springer-Verlag Lecture Notes in Computer Science (Eds.) Serge Abiteboul and Anne-Marie Vercoustre
null
null
KMI-TR-80
cs.DL cs.AI cs.HC cs.IR
null
This paper is concerned with tracking and interpreting scholarly documents in distributed research communities. We argue that current approaches to document description, and current technological infrastructures particularly over the World Wide Web, provide poor support for these tasks. We describe the design of a digital library server which will enable authors to submit a summary of the contributions they claim their documents makes, and its relations to the literature. We describe a knowledge-based Web environment to support the emergence of such a community-constructed semantic hypertext, and the services it could provide to assist the interpretation of an idea or document in the context of its literature. The discussion considers in detail how the approach addresses usability issues associated with knowledge structuring environments.
[ { "version": "v1", "created": "Thu, 19 Aug 1999 09:51:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Shum", "Simon Buckingham", "" ], [ "Motta", "Enrico", "" ], [ "Domingue", "John", "" ] ]
cs/9908016
David Eppstein
Marshall Bern and David Eppstein
Quadrilateral Meshing by Circle Packing
12 pages, 10 figures. To appear in Int. J. Comp. Geom. & Appl. A preliminary version of this work was presented at the 6th Int. Meshing Roundtable, Park City, Utah, 1997
Int. J. Comp. Geom. & Appl. 10(4):347-360, Aug. 2000
null
null
cs.CG
null
We use circle-packing methods to generate quadrilateral meshes for polygonal domains, with guaranteed bounds both on the quality and the number of elements. We show that these methods can generate meshes of several types: (1) the elements form the cells of a Voronoi diagram, (2) all elements have two opposite right angles, (3) all elements are kites, or (4) all angles are at most 120 degrees. In each case the total number of elements is O(n), where n is the number of input vertices.
[ { "version": "v1", "created": "Thu, 19 Aug 1999 20:40:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Bern", "Marshall", "" ], [ "Eppstein", "David", "" ] ]
cs/9908017
Andreas Siebert
Andreas Siebert
A Differential Invariant for Zooming
5 pages, 7 figures
Proceedings 1999 International Conference on Image Processing, Kobe, 25-28 October 1999
null
null
cs.CV
null
This paper presents an invariant under scaling and linear brightness change. The invariant is based on differentials and therefore is a local feature. Rotationally invariant 2-d differential Gaussian operators up to third order are proposed for the implementation of the invariant. The performance is analyzed by simulating a camera zoom-out.
[ { "version": "v1", "created": "Thu, 26 Aug 1999 17:18:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Siebert", "Andreas", "" ] ]
cs/9908018
Rigo Michel
Michel Rigo
Construction of regular languages and recognizability of polynomials
11 pages
null
null
null
cs.CC
null
A generalization of numeration system in which the set N of the natural numbers is recognizable by finite automata can be obtained by describing a lexicographically ordered infinite regular language. Here we show that if P belonging to Q[x] is a polynomial such that P(N) is a subset of N then we can construct a numeration system in which the set of representations of P(N) is regular. The main issue in this construction is to setup a regular language with a density function equals to P(n+1)-P(n) for n large enough.
[ { "version": "v1", "created": "Fri, 27 Aug 1999 07:33:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Rigo", "Michel", "" ] ]
cs/9909001
David Eppstein
Marshall Bern, David Eppstein, Pankaj K. Agarwal, Nina Amenta, Paul Chew, Tamal Dey, David P. Dobkin, Herbert Edelsbrunner, Cindy Grimm, Leonidas J. Guibas, John Harer, Joel Hass, Andrew Hicks, Carroll K. Johnson, Gilad Lerman, David Letscher, Paul Plassmann, Eric Sedgwick, Jack Snoeyink, Jeff Weeks, Chee Yap, and Denis Zorin
Emerging Challenges in Computational Topology
20 pages
null
null
null
cs.CG math.GT
null
Here we present the results of the NSF-funded Workshop on Computational Topology, which met on June 11 and 12 in Miami Beach, Florida. This report identifies important problems involving both computation and topology.
[ { "version": "v1", "created": "Wed, 1 Sep 1999 20:33:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Bern", "Marshall", "" ], [ "Eppstein", "David", "" ], [ "Agarwal", "Pankaj K.", "" ], [ "Amenta", "Nina", "" ], [ "Chew", "Paul", "" ], [ "Dey", "Tamal", "" ], [ "Dobkin", "David P.", "" ], [ "Edelsbrunner", "Herbert", "" ], [ "Grimm", "Cindy", "" ], [ "Guibas", "Leonidas J.", "" ], [ "Harer", "John", "" ], [ "Hass", "Joel", "" ], [ "Hicks", "Andrew", "" ], [ "Johnson", "Carroll K.", "" ], [ "Lerman", "Gilad", "" ], [ "Letscher", "David", "" ], [ "Plassmann", "Paul", "" ], [ "Sedgwick", "Eric", "" ], [ "Snoeyink", "Jack", "" ], [ "Weeks", "Jeff", "" ], [ "Yap", "Chee", "" ], [ "Zorin", "Denis", "" ] ]
cs/9909002
Vincenzo Pallotta
Afzal Ballim and Vincenzo Pallotta
Semantic robust parsing for noun extraction from natural language queries
null
Proceedings of WPDI'99 (Workshop on Procedures in Discourse Interpretation),1999, Iasi - Romania
null
null
cs.CL
null
This paper describes how robust parsing techniques can be fruitful applied for building a query generation module which is part of a pipelined NLP architecture aimed at process natural language queries in a restricted domain. We want to show that semantic robustness represents a key issue in those NLP systems where it is more likely to have partial and ill-formed utterances due to various factors (e.g. noisy environments, low quality of speech recognition modules, etc...) and where it is necessary to succeed, even if partially, in extracting some meaningful information.
[ { "version": "v1", "created": "Thu, 2 Sep 1999 15:53:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Ballim", "Afzal", "" ], [ "Pallotta", "Vincenzo", "" ] ]
cs/9909003
Rabindra Narayan Behera
S. Mohanty (1) and R.N. Behera (2) ((1) Department of Computer Science and Application Utkal University, Bhubaneswar, India, (2) National Informatics Centre, Puri, India)
Iterative Deepening Branch and Bound
39 html pages + 4 gif files (fig1,fig1(a),fig2,fig3)
null
null
null
cs.AI
null
In tree search problem the best-first search algorithm needs too much of space . To remove such drawbacks of these algorithms the IDA* was developed which is both space and time cost efficient. But again IDA* can give an optimal solution for real valued problems like Flow shop scheduling, Travelling Salesman and 0/1 Knapsack due to their real valued cost estimates. Thus further modifications are done on it and the Iterative Deepening Branch and Bound Search Algorithms is developed which meets the requirements. We have tried using this algorithm for the Flow Shop Scheduling Problem and have found that it is quite effective.
[ { "version": "v1", "created": "Fri, 3 Sep 1999 10:31:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Mohanty", "S.", "" ], [ "Behera", "R. N.", "" ] ]
cs/9909004
Devillers
Jean-Daniel Boissonnat, Jurek Czyzowicz, Olivier Devillers, Jean-Marc Robert, Mariette Yvinec
Convex Tours of Bounded Curvature
11 pages, 5 figures, abstract presented at European Symposium on Algorithms 1993
null
null
INRIA Research report 2375
cs.CG
null
We consider the motion planning problem for a point constrained to move along a smooth closed convex path of bounded curvature. The workspace of the moving point is bounded by a convex polygon with m vertices, containing an obstacle in a form of a simple polygon with $n$ vertices. We present an O(m+n) time algorithm finding the path, going around the obstacle, whose curvature is the smallest possible.
[ { "version": "v1", "created": "Fri, 3 Sep 1999 15:09:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Boissonnat", "Jean-Daniel", "" ], [ "Czyzowicz", "Jurek", "" ], [ "Devillers", "Olivier", "" ], [ "Robert", "Jean-Marc", "" ], [ "Yvinec", "Mariette", "" ] ]
cs/9909005
Devillers
Jean-Daniel Boissonnat, Jurek Czyzowicz, Olivier Devillers, Jorge Urrutia, Mariette Yvinec
Computing largest circles separating two sets of segments
14 pages, 3 figures, abstract presented at 8th Canadian Conference on Computational Geometry, 1996
null
null
INRIA Research report 2705
cs.CG
null
A circle $C$ separates two planar sets if it encloses one of the sets and its open interior disk does not meet the other set. A separating circle is a largest one if it cannot be locally increased while still separating the two given sets. An Theta(n log n) optimal algorithm is proposed to find all largest circles separating two given sets of line segments when line segments are allowed to meet only at their endpoints. In the general case, when line segments may intersect $\Omega(n^2)$ times, our algorithm can be adapted to work in O(n alpha(n) log n) time and O(n \alpha(n)) space, where alpha(n) represents the extremely slowly growing inverse of the Ackermann function.
[ { "version": "v1", "created": "Fri, 3 Sep 1999 15:29:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Boissonnat", "Jean-Daniel", "" ], [ "Czyzowicz", "Jurek", "" ], [ "Devillers", "Olivier", "" ], [ "Urrutia", "Jorge", "" ], [ "Yvinec", "Mariette", "" ] ]
cs/9909008
Geoffrey McKim
Rob Kling, Geoffrey McKim
Not Just a Matter of Time: Field Differences and the Shaping of Electronic Media in Supporting Scientific Communication
Accepted for publication in the Journal of the American Society for Information Science. Version was reformatted with several minor text changes
null
null
null
cs.CY
null
The shift towards the use of electronic media in scholarly communication appears to be an inescapable imperative. However, these shifts are uneven, both with respect to field and with respect to the form of communication. Different scientific fields have developed and use distinctly different communicative forums, both in the paper and electronic arenas, and these forums play different communicative roles within the field. One common claim is that we are in the early stages of an electronic revolution, that it is only a matter of time before other fields catch up with the early adopters, and that all fields converge on a stable set of electronic forums. A social shaping of technology (SST) perspective helps us to identify important social forces centered around disciplinary constructions of trust and of legitimate communication that pull against convergence. This analysis concludes that communicative plurality and communicative heterogeneity are durable features of the scholarly landscape, and that we are likely to see field differences in the use of and meaning ascribed to communications forums persist, even as overall use of electronic communications technologies both in science and in society as a whole increases.
[ { "version": "v1", "created": "Tue, 7 Sep 1999 11:35:28 GMT" }, { "version": "v2", "created": "Sat, 29 Apr 2000 17:43:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Kling", "Rob", "" ], [ "McKim", "Geoffrey", "" ] ]
cs/9909009
Krzysztof R. Apt
Krzysztof R. Apt
The Rough Guide to Constraint Propagation
23 pages. To appear in the Proc. 5th International Conference on Principles and Practice of Constraint Programming as an invited talk
null
null
null
cs.AI cs.PL
null
We provide here a simple, yet very general framework that allows us to explain several constraint propagation algorithms in a systematic way. In particular, using the notions commutativity and semi-commutativity, we show how the well-known AC-3, PC-2, DAC and DPC algorithms are instances of a single generic algorithm. The work reported here extends and simplifies that of Apt, cs.AI/9811024.
[ { "version": "v1", "created": "Wed, 8 Sep 1999 13:50:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Apt", "Krzysztof R.", "" ] ]
cs/9909010
Krzysztof R. Apt
Krzysztof R. Apt and Eric Monfroy
Automatic Generation of Constraint Propagation Algorithms for Small Finite Domains
15 pages. To appear in the Proc. 5th International Conference on Principles and Practice of Constraint Programming
null
null
null
cs.AI cs.PL
null
We study here constraint satisfaction problems that are based on predefined, explicitly given finite constraints. To solve them we propose a notion of rule consistency that can be expressed in terms of rules derived from the explicit representation of the initial constraints. This notion of local consistency is weaker than arc consistency for constraints of arbitrary arity but coincides with it when all domains are unary or binary. For Boolean constraints rule consistency coincides with the closure under the well-known propagation rules for Boolean constraints. By generalizing the format of the rules we obtain a characterization of arc consistency in terms of so-called inclusion rules. The advantage of rule consistency and this rule based characterization of the arc consistency is that the algorithms that enforce both notions can be automatically generated, as CHR rules. So these algorithms could be integrated into constraint logic programming systems such as Eclipse. We illustrate the usefulness of this approach to constraint propagation by discussing the implementations of both algorithms and their use on various examples, including Boolean constraints, three valued logic of Kleene, constraints dealing with Waltz's language for describing polyhedreal scenes, and Allen's qualitative approach to temporal logic.
[ { "version": "v1", "created": "Wed, 8 Sep 1999 14:18:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Apt", "Krzysztof R.", "" ], [ "Monfroy", "Eric", "" ] ]
cs/9909011
Osnat Mokryn
Israel Cidon and Osnat Mokryn
Distributed Algorithms in Multihop Broadcast Networks
Apeared at the 12th International Symposium on DIStributed Computing, (DISC98)
null
null
Technical Report CC #241, Center for Communication and Information Technologies, Technion - Israel Institute of Technology
cs.DC cs.NI
null
Broadcast networks are often used in modern communication systems. A common broadcast network is a single hop shared media system, where a transmitted message is heard by all neighbors, such as some LAN networks. In this work we consider a more complex environment, in which a transmitted message is heard only by a group of neighbors, such as Ad-Hoc networks, satellite and radio networks, as well as wireless multistation backbone system for mobile communication. It is important to design efficient algorithms for such environments. Our main result is a new Leader Election algorithm, with O(n) time complexity and O(n*lg(n)) message transmission complexity. Our distributed solution uses a propagation of information with feedback (PIF) building block tuned to the broadcast media, and a special counting and joining approach for the election procedure phase. The latter is required for achieving the linear time. It is demonstrated that the broadcast model requires solutions which are different from the known point-to-point model.
[ { "version": "v1", "created": "Wed, 8 Sep 1999 14:49:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Cidon", "Israel", "" ], [ "Mokryn", "Osnat", "" ] ]
cs/9909012
Jan Willemson
Jan Willemson
Certificate Revocation Paradigms
Tech report on 14 pages, 2 figures
null
null
null
cs.CR
null
Research in the field of electronic signature confirmation has been active for some 20 years now. Unfortunately present certificate-based solutions also come from that age when no-one knew about online data transmission. The official standardized X.509 framework also depends heavily on offline operations, one of the most complicated ones being certificate revocation handling. This is done via huge Certificate Revocation Lists which are both inconvenient and expencive. Several improvements to these lists are proposed and in this report we try to analyze them briefly. We conclude that although it is possible to do better than in the original X.509 setting, none of the solutions presented this far is good enough.
[ { "version": "v1", "created": "Fri, 17 Sep 1999 08:00:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Willemson", "Jan", "" ] ]
cs/9909013
Jaap-Henk Hoepman
Jaap-Henk Hoepman
Self-stabilizing mutual exclusion on a ring, even if K=N
2 pages
null
null
null
cs.DC
null
We show that, contrary to common belief, Dijkstra's self-stabilizing mutual exclusion algorithm on a ring [Dij74,Dij82] also stabilizes when the number of states per node is one less than the number of nodes on the ring.
[ { "version": "v1", "created": "Tue, 21 Sep 1999 13:39:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Hoepman", "Jaap-Henk", "" ] ]
cs/9909014
Joseph Y. Halpern
Joseph Y. Halpern and Richard A. Shore
Reasoning About Common Knowledge with Infinitely Many Agents
Preliminary version appears in 14th IEEE Symposium on Logic in Computer Science, 1999. This is the full version
null
null
null
cs.LO cs.AI
null
Complete axiomatizations and exponential-time decision procedures are provided for reasoning about knowledge and common knowledge when there are infinitely many agents. The results show that reasoning about knowledge and common knowledge with infinitely many agents is no harder than when there are finitely many agents, provided that we can check the cardinality of certain set differences G - G', where G and G' are sets of agents. Since our complexity results are independent of the cardinality of the sets G involved, they represent improvements over the previous results even with the sets of agents involved are finite. Moreover, our results make clear the extent to which issues of complexity and completeness depend on how the sets of agents involved are represented.
[ { "version": "v1", "created": "Tue, 21 Sep 1999 20:43:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Halpern", "Joseph Y.", "" ], [ "Shore", "Richard A.", "" ] ]
cs/9909015
Joseph Y. Halpern
Francis C. Chu and Joseph Y. Halpern
A decision-theoretic approach to reliable message delivery
This is the full version of a paper that appears in the Proceedings of the 12th International Symposium on Distributed Computing, 1998, pp. 89-10
null
null
null
cs.DC
null
We argue that the tools of decision theory need to be taken more seriously in the specification and analysis of systems. We illustrate this by considering a simple problem involving reliable communication, showing how considerations of utility and probability can be used to decide when it is worth sending heartbeat messages and, if they are sent, how often they should be sent.
[ { "version": "v1", "created": "Tue, 21 Sep 1999 20:51:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Chu", "Francis C.", "" ], [ "Halpern", "Joseph Y.", "" ] ]
cs/9909016
Joseph Y. Halpern
Francis C. Chu, Joseph Y. Halpern, and Praveen Seshadri
Least expected cost query optimization: an exercise in utility
This paper appears in Proceedings of the Eighteenth Annual ACM Symposium on Principles of Database Systems, 1999, pp. 138--147
null
null
null
cs.DB
null
We identify two unreasonable, though standard, assumptions made by database query optimizers that can adversely affect the quality of the chosen evaluation plans. One assumption is that it is enough to optimize for the expected case---that is, the case where various parameters (like available memory) take on their expected value. The other assumption is that the parameters are constant throughout the execution of the query. We present an algorithm based on the ``System R''-style query optimization algorithm that does not rely on these assumptions. The algorithm we present chooses the plan of the least expected cost instead of the plan of least cost given some fixed value of the parameters. In execution environments that exhibit a high degree of variability, our techniques should result in better performance.
[ { "version": "v1", "created": "Tue, 21 Sep 1999 21:20:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Chu", "Francis C.", "" ], [ "Halpern", "Joseph Y.", "" ], [ "Seshadri", "Praveen", "" ] ]
cs/9909017
Devillers
Olivier Devillers, Asish Mukhopadhyay
Finding an ordinary conic and an ordinary hyperplane
7 pages, 2 figures
null
null
INRIA Research report 3517
cs.CG
null
Given a finite set of non-collinear points in the plane, there exists a line that passes through exactly two points. Such a line is called an ordinary line. An efficient algorithm for computing such a line was proposed by Mukhopadhyay et al. In this note we extend this result in two directions. We first show how to use this algorithm to compute an ordinary conic, that is, a conic passing through exactly five points, assuming that all the points do not lie on the same conic. Both our proofs of existence and the consequent algorithms are simpler than previous ones. We next show how to compute an ordinary hyperplane in three and higher dimensions.
[ { "version": "v1", "created": "Mon, 27 Sep 1999 11:55:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Devillers", "Olivier", "" ], [ "Mukhopadhyay", "Asish", "" ] ]
cs/9909018
Devillers
Olivier Devillers, Pierre-Maris Gandoin
Geometric compression for progressive transmission
16 pages, 10 figures
null
null
INRIA Research report 3766, in french
cs.CG cs.GR
null
The compression of geometric structures is a relatively new field of data compression. Since about 1995, several articles have dealt with the coding of meshes, using for most of them the following approach: the vertices of the mesh are coded in an order such that it contains partially the topology of the mesh. In the same time, some simple rules attempt to predict the position of the current vertex from the positions of its neighbours that have been previously coded. In this article, we describe a compression algorithm whose principle is completely different: the order of the vertices is used to compress their coordinates, and then the topology of the mesh is reconstructed from the vertices. This algorithm, particularly suited for terrain models, achieves compression factors that are slightly greater than those of the currently available algorithms, and moreover, it allows progressive and interactive transmission of the meshes.
[ { "version": "v1", "created": "Tue, 28 Sep 1999 06:56:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Devillers", "Olivier", "" ], [ "Gandoin", "Pierre-Maris", "" ] ]
cs/9909019
Alessio R. Lomuscio
A. R. Lomuscio, R. van der Meyden, M. D. Ryan
Knowledge in Multi-Agent Systems: Initial Configurations and Broadcast
32 Pages, 2 Figures. Submitted to Transactions of Computational Logic
null
null
null
cs.LO cs.AI
null
The semantic framework for the modal logic of knowledge due to Halpern and Moses provides a way to ascribe knowledge to agents in distributed and multi-agent systems. In this paper we study two special cases of this framework: full systems and hypercubes. Both model static situations in which no agent has any information about another agent's state. Full systems and hypercubes are an appropriate model for the initial configurations of many systems of interest. We establish a correspondence between full systems and hypercube systems and certain classes of Kripke frames. We show that these classes of systems correspond to the same logic. Moreover, this logic is also the same as that generated by the larger class of weakly directed frames. We provide a sound and complete axiomatization, S5WDn, of this logic. Finally, we show that under certain natural assumptions, in a model where knowledge evolves over time, S5WDn characterizes the properties of knowledge not just at the initial configuration, but also at all later configurations. In particular, this holds for homogeneous broadcast systems, which capture settings in which agents are initially ignorant of each others local states, operate synchronously, have perfect recall and can communicate only by broadcasting.
[ { "version": "v1", "created": "Thu, 30 Sep 1999 17:03:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Lomuscio", "A. R.", "" ], [ "van der Meyden", "R.", "" ], [ "Ryan", "M. D.", "" ] ]
cs/9909020
Harald Hempel
Lane A. Hemaspaandra, Harald Hempel, and Gerd Wechsung
Query Order
18 pages, 1 figure (earlier version appears as UR-CS-TR-95-596)
SIAM Journal on Computing, 28, 637-651, 1999
null
null
cs.CC
null
We study the effect of query order on computational power, and show that $\pjk$-the languages computable via a polynomial-time machine given one query to the jth level of the boolean hierarchy followed by one query to the kth level of the boolean hierarchy-equals $\redttnp{j+2k-1}$ if j is even and k is odd, and equals $\redttnp{j+2k}$ otherwise. Thus, unless the polynomial hierarchy collapses, it holds that for each $1\leq j \leq k$: $\pjk = \pkj \iff (j=k) \lor (j{is even} \land k=j+1)$. We extend our analysis to apply to more general query classes.
[ { "version": "v1", "created": "Thu, 30 Sep 1999 17:06:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Hemaspaandra", "Lane A.", "" ], [ "Hempel", "Harald", "" ], [ "Wechsung", "Gerd", "" ] ]
cs/9910001
Martin Grohe
Joerg Flum and Martin Grohe
Fixed-parameter tractability, definability, and model checking
To appear in SIAM Journal on Computing
null
null
null
cs.CC cs.LO
null
In this article, we study parameterized complexity theory from the perspective of logic, or more specifically, descriptive complexity theory. We propose to consider parameterized model-checking problems for various fragments of first-order logic as generic parameterized problems and show how this approach can be useful in studying both fixed-parameter tractability and intractability. For example, we establish the equivalence between the model-checking for existential first-order logic, the homomorphism problem for relational structures, and the substructure isomorphism problem. Our main tractability result shows that model-checking for first-order formulas is fixed-parameter tractable when restricted to a class of input structures with an excluded minor. On the intractability side, for every t >= 0 we prove an equivalence between model-checking for first-order formulas with t quantifier alternations and the parameterized halting problem for alternating Turing machines with t alternations. We discuss the close connection between this alternation hierarchy and Downey and Fellows' W-hierarchy. On a more abstract level, we consider two forms of definability, called Fagin definability and slicewise definability, that are appropriate for describing parameterized problems. We give a characterization of the class FPT of all fixed-parameter tractable problems in terms of slicewise definability in finite variable least fixed-point logic, which is reminiscent of the Immerman-Vardi Theorem characterizing the class PTIME in terms of definability in least fixed-point logic.
[ { "version": "v1", "created": "Fri, 1 Oct 1999 15:10:00 GMT" }, { "version": "v2", "created": "Mon, 19 Feb 2001 21:01:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Flum", "Joerg", "" ], [ "Grohe", "Martin", "" ] ]
cs/9910002
Harald Hempel
Edith Hemaspaandra, Lane A. Hemaspaandra, and Harald Hempel
What's Up with Downward Collapse: Using the Easy-Hard Technique to Link Boolean and Polynomial Hierarchy Collapses
37 pages. an extended abstract appeared in SIGACT News, 29, 10-22, 1998
null
null
UR-CS-TR-98-682
cs.CC
null
During the past decade, nine papers have obtained increasingly strong consequences from the assumption that boolean or bounded-query hierarchies collapse. The final four papers of this nine-paper progression actually achieve downward collapse---that is, they show that high-level collapses induce collapses at (what beforehand were thought to be) lower complexity levels. For example, for each $k\geq 2$ it is now known that if $\psigkone=\psigktwo$ then $\ph=\sigmak$. This article surveys the history, the results, and the technique---the so-called easy-hard method---of these nine papers.
[ { "version": "v1", "created": "Fri, 1 Oct 1999 15:45:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Hemaspaandra", "Edith", "" ], [ "Hemaspaandra", "Lane A.", "" ], [ "Hempel", "Harald", "" ] ]
cs/9910003
Harald Hempel
Edith Hemaspaandra, Lane A. Hemaspaandra, and Harald Hempel
R_{1-tt}^{SN}(NP) Distinguishes Robust Many-One and Turing Completeness
22 pages
Theory of Computing Systems, 31, 307-325, 1998
null
earlier version appears as UR-CS-TR-96-635
cs.CC
null
Do complexity classes have many-one complete sets if and only if they have Turing-complete sets? We prove that there is a relativized world in which a relatively natural complexity class-namely a downward closure of NP, \rsnnp - has Turing-complete sets but has no many-one complete sets. In fact, we show that in the same relativized world this class has 2-truth-table complete sets but lacks 1-truth-table complete sets. As part of the groundwork for our result, we prove that \rsnnp has many equivalent forms having to do with ordered and parallel access to $\np$ and $\npinterconp$.
[ { "version": "v1", "created": "Fri, 1 Oct 1999 18:55:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Hemaspaandra", "Edith", "" ], [ "Hemaspaandra", "Lane A.", "" ], [ "Hempel", "Harald", "" ] ]
cs/9910004
Harald Hempel
Edith Hemaspaandra, Lane A. Hemaspaandra, and Harald Hempel
An Introduction to Query Order
15 pages
Bulletin of the EATCS, 63, 93-107, 1997
null
earlier version appears as UR-CS-TR-97-665
cs.CC
null
Hemaspaandra, Hempel, and Wechsung [cs.CC/9909020] raised the following questions: If one is allowed one question to each of two different information sources, does the order in which one asks the questions affect the class of problems that one can solve with the given access? If so, which order yields the greater computational power? The answers to these questions have been learned-inasfar as they can be learned without resolving whether or not the polynomial hierarchy collapses-for both the polynomial hierarchy and the boolean hierarchy. In the polynomial hierarchy, query order never matters. In the boolean hierarchy, query order sometimes does not matter and, unless the polynomial hierarchy collapses, sometimes does matter. Furthermore, the study of query order has yielded dividends in seemingly unrelated areas, such as bottleneck computations and downward translation of equality. In this article, we present some of the central results on query order. The article is written in such a way as to encourage the reader to try his or her own hand at proving some of these results. We also give literature pointers to the quickly growing set of related results and applications.
[ { "version": "v1", "created": "Fri, 1 Oct 1999 19:08:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Hemaspaandra", "Edith", "" ], [ "Hemaspaandra", "Lane A.", "" ], [ "Hempel", "Harald", "" ] ]
cs/9910005
Harald Hempel
Edith Hemaspaandra, Lane A. Hemaspaandra, and Harald Hempel
Query Order and the Polynomial Hierarchy
14 pages
Journal of Universal Computer Science, 4, 574-588, 1998
null
earlier version appears as UR-CS-TR-96-634
cs.CC
null
Hemaspaandra, Hempel, and Wechsung [cs.CC/9909020] initiated the field of query order, which studies the ways in which computational power is affected by the order in which information sources are accessed. The present paper studies, for the first time, query order as it applies to the levels of the polynomial hierarchy. We prove that the levels of the polynomial hierarchy are order-oblivious. Yet, we also show that these ordered query classes form new levels in the polynomial hierarchy unless the polynomial hierarchy collapses. We prove that all leaf language classes - and thus essentially all standard complexity classes - inherit all order-obliviousness results that hold for P.
[ { "version": "v1", "created": "Fri, 1 Oct 1999 19:20:07 GMT" }, { "version": "v2", "created": "Mon, 4 Oct 1999 12:46:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Hemaspaandra", "Edith", "" ], [ "Hemaspaandra", "Lane A.", "" ], [ "Hempel", "Harald", "" ] ]
cs/9910006
Harald Hempel
Lane A. Hemaspaandra, Harald Hempel, and Gerd Wechsung
Self-Specifying Machines
15 pages, to appear in IJFCS
null
null
earlier version appears as UR-CS-TR-97-654
cs.CC
null
We study the computational power of machines that specify their own acceptance types, and show that they accept exactly the languages that $\manyonesharp$-reduce to NP sets. A natural variant accepts exactly the languages that $\manyonesharp$-reduce to P sets. We show that these two classes coincide if and only if $\psone = \psnnoplusbigohone$, where the latter class denotes the sets acceptable via at most one question to $\sharpp$ followed by at most a constant number of questions to $\np$.
[ { "version": "v1", "created": "Fri, 1 Oct 1999 19:29:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Hemaspaandra", "Lane A.", "" ], [ "Hempel", "Harald", "" ], [ "Wechsung", "Gerd", "" ] ]
cs/9910007
Harald Hempel
Edith Hemaspaandra, Lane A. Hemaspaandra, and Harald Hempel
A Downward Collapse within the Polynomial Hierarchy
14 pages
SIAM Journal on Computing, 28, 383-393, 1999
null
earlier version appears as UR-CS-TR-96-630
cs.CC
null
Downward collapse (a.k.a. upward separation) refers to cases where the equality of two larger classes implies the equality of two smaller classes. We provide an unqualified downward collapse result completely within the polynomial hierarchy. In particular, we prove that, for k > 2, if $\psigkone = \psigktwo$ then $\sigmak = \pik = \ph$. We extend this to obtain a more general downward collapse result.
[ { "version": "v1", "created": "Fri, 1 Oct 1999 19:48:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Hemaspaandra", "Edith", "" ], [ "Hemaspaandra", "Lane A.", "" ], [ "Hempel", "Harald", "" ] ]
cs/9910008
Harald Hempel
Edith Hemaspaandra, Lane A. Hemaspaandra, and Harald Hempel
Translating Equality Downwards
13 pages, an extended abstract was presented at the 16th Symposium on Theoretical Aspects of Computer Science
null
null
earlier version appears as UR-CS-TR-97-657
cs.CC
null
Downward translation of equality refers to cases where a collapse of some pair of complexity classes would induce a collapse of some other pair of complexity classes that (a priori) one expects are smaller. Recently, the first downward translation of equality was obtained that applied to the polynomial hierarchy-in particular, to bounded access to its levels [cs.CC/9910007]. In this paper, we provide a much broader downward translation that extends not only that downward translation but also that translation's elegant enhancement by Buhrman and Fortnow. Our work also sheds light on previous research on the structure of refined polynomial hierarchies, and strengthens the connection between the collapse of bounded query hierarchies and the collapse of the polynomial hierarchy.
[ { "version": "v1", "created": "Fri, 1 Oct 1999 19:58:41 GMT" }, { "version": "v2", "created": "Mon, 4 Oct 1999 13:04:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Hemaspaandra", "Edith", "" ], [ "Hemaspaandra", "Lane A.", "" ], [ "Hempel", "Harald", "" ] ]
cs/9910009
Joseph O'Rourke
T. Biedl, E. Demaine, M. Demaine, S. Lazard, A. Lubiw, J. O'Rourke, M. Overmars, S. Robbins, I. Streinu, G. Toussaint, S. Whitesides
Locked and Unlocked Polygonal Chains in 3D
29 pages; This is a revised and expanded version of an abstract that appeared in Proc. 10th ACM-SIAM Sympos. Discrete Algorithms (SODA '98), Jan. 1998, pp. 866-867
null
null
Smith Tech. Rep. 060
cs.CG cs.DM
null
In this paper, we study movements of simple polygonal chains in 3D. We say that an open, simple polygonal chain can be straightened if it can be continuously reconfigured to a straight sequence of segments in such a manner that both the length of each link and the simplicity of the chain are maintained throughout the movement. The analogous concept for closed chains is convexification: reconfiguration to a planar convex polygon. Chains that cannot be straightened or convexified are called locked. While there are open chains in 3D that are locked, we show that if an open chain has a simple orthogonal projection onto some plane, it can be straightened. For closed chains, we show that there are unknotted but locked closed chains, and we provide an algorithm for convexifying a planar simple polygon in 3D. All our algorithms require only O(n) basic ``moves'' and run in linear time.
[ { "version": "v1", "created": "Fri, 8 Oct 1999 12:04:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Biedl", "T.", "" ], [ "Demaine", "E.", "" ], [ "Demaine", "M.", "" ], [ "Lazard", "S.", "" ], [ "Lubiw", "A.", "" ], [ "O'Rourke", "J.", "" ], [ "Overmars", "M.", "" ], [ "Robbins", "S.", "" ], [ "Streinu", "I.", "" ], [ "Toussaint", "G.", "" ], [ "Whitesides", "S.", "" ] ]
cs/9910010
Ronald de Wolf
Harry Buhrman (CWI, Amsterdam) and Ronald de Wolf (CWI and U of Amsterdam)
Communication Complexity Lower Bounds by Polynomials
16 pages LaTeX, no figures. 2nd version: rewritten and some results added
null
null
null
cs.CC quant-ph
null
The quantum version of communication complexity allows the two communicating parties to exchange qubits and/or to make use of prior entanglement (shared EPR-pairs). Some lower bound techniques are available for qubit communication complexity, but except for the inner product function, no bounds are known for the model with unlimited prior entanglement. We show that the log-rank lower bound extends to the strongest model (qubit communication + unlimited prior entanglement). By relating the rank of the communication matrix to properties of polynomials, we are able to derive some strong bounds for exact protocols. In particular, we prove both the "log-rank conjecture" and the polynomial equivalence of quantum and classical communication complexity for various classes of functions. We also derive some weaker bounds for bounded-error quantum protocols.
[ { "version": "v1", "created": "Tue, 12 Oct 1999 13:30:28 GMT" }, { "version": "v2", "created": "Fri, 28 Apr 2000 15:25:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Buhrman", "Harry", "", "CWI, Amsterdam" ], [ "de Wolf", "Ronald", "", "CWI and U of\n Amsterdam" ] ]
cs/9910011
Anand V. Raman
Anand Venkataraman
A statistical model for word discovery in child directed speech
48 pgs, 10 figs
null
null
null
cs.CL cs.LG
null
A statistical model for segmentation and word discovery in child directed speech is presented. An incremental unsupervised learning algorithm to infer word boundaries based on this model is described and results of empirical tests showing that the algorithm is competitive with other models that have been used for similar tasks are also presented.
[ { "version": "v1", "created": "Wed, 13 Oct 1999 03:25:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Venkataraman", "Anand", "" ] ]
cs/9910012
Mark Reynolds
M. Reynolds
The Complexity of Temporal Logic over the Reals
null
null
null
null
cs.LO cs.CC
null
It is shown that the decision problem for the temporal logic with until and since connectives over real-numbers time is PSPACE-complete.
[ { "version": "v1", "created": "Wed, 13 Oct 1999 04:04:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Reynolds", "M.", "" ] ]
cs/9910013
Michelangelo Grigni
Zhi-Zhong Chen, Michelangelo Grigni, Christos Papadimitriou
Map Graphs
46 pages, LaTeX with 41 PS figures; see http://www.mathcs.emory.edu/~mic/mapgraphs/ for hi-res figures
null
null
null
cs.DM cs.DS
null
We consider a modified notion of planarity, in which two nations of a map are considered adjacent when they share any point of their boundaries (not necessarily an edge, as planarity requires). Such adjacencies define a map graph. We give an NP characterization for such graphs, and a cubic time recognition algorithm for a restricted version: given a graph, decide whether it is realized by adjacencies in a map without holes, in which at most four nations meet at any point.
[ { "version": "v1", "created": "Wed, 13 Oct 1999 21:41:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Chen", "Zhi-Zhong", "" ], [ "Grigni", "Michelangelo", "" ], [ "Papadimitriou", "Christos", "" ] ]
cs/9910014
Randal E. Bryant
Randal E. Bryant, Steven German, Miroslav N. Velev
Processor Verification Using Efficient Reductions of the Logic of Uninterpreted Functions to Propositional Logic
46 pages
null
null
null
cs.LO cs.AR
null
The logic of equality with uninterpreted functions (EUF) provides a means of abstracting the manipulation of data by a processor when verifying the correctness of its control logic. By reducing formulas in this logic to propositional formulas, we can apply Boolean methods such as Ordered Binary Decision Diagrams (BDDs) and Boolean satisfiability checkers to perform the verification. We can exploit characteristics of the formulas describing the verification conditions to greatly simplify the propositional formulas generated. In particular, we exploit the property that many equations appear only in positive form. We can therefore reduce the set of interpretations of the function symbols that must be considered to prove that a formula is universally valid to those that are ``maximally diverse.'' We present experimental results demonstrating the efficiency of this approach when verifying pipelined processors using the method proposed by Burch and Dill.
[ { "version": "v1", "created": "Thu, 14 Oct 1999 22:41:39 GMT" }, { "version": "v2", "created": "Thu, 6 Jul 2000 21:32:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Bryant", "Randal E.", "" ], [ "German", "Steven", "" ], [ "Velev", "Miroslav N.", "" ] ]
cs/9910015
Naren Ramakrishnan
Naren Ramakrishnan
PIPE: Personalizing Recommendations via Partial Evaluation
null
null
null
null
cs.IR cs.AI
null
It is shown that personalization of web content can be advantageously viewed as a form of partial evaluation --- a technique well known in the programming languages community. The basic idea is to model a recommendation space as a program, then partially evaluate this program with respect to user preferences (and features) to obtain specialized content. This technique supports both content-based and collaborative approaches, and is applicable to a range of applications that require automatic information integration from multiple web sources. The effectiveness of this methodology is illustrated by two example applications --- (i) personalizing content for visitors to the Blacksburg Electronic Village (http://www.bev.net), and (ii) locating and selecting scientific software on the Internet. The scalability of this technique is demonstrated by its ability to interface with online web ontologies that index thousands of web pages.
[ { "version": "v1", "created": "Mon, 18 Oct 1999 15:47:29 GMT" }, { "version": "v2", "created": "Tue, 19 Oct 1999 19:52:12 GMT" }, { "version": "v3", "created": "Wed, 26 Apr 2000 03:05:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Ramakrishnan", "Naren", "" ] ]
cs/9910016
Juergen Dix
Juergen Dix, Mirco Nanni, VS Subrahmanian
Probabilistic Agent Programs
44 pages, 1 figure, Appendix
null
null
null
cs.AI
null
Agents are small programs that autonomously take actions based on changes in their environment or ``state.'' Over the last few years, there have been an increasing number of efforts to build agents that can interact and/or collaborate with other agents. In one of these efforts, Eiter, Subrahmanian amd Pick (AIJ, 108(1-2), pages 179-255) have shown how agents may be built on top of legacy code. However, their framework assumes that agent states are completely determined, and there is no uncertainty in an agent's state. Thus, their framework allows an agent developer to specify how his agents will react when the agent is 100% sure about what is true/false in the world state. In this paper, we propose the concept of a \emph{probabilistic agent program} and show how, given an arbitrary program written in any imperative language, we may build a declarative ``probabilistic'' agent program on top of it which supports decision making in the presence of uncertainty. We provide two alternative semantics for probabilistic agent programs. We show that the second semantics, though more epistemically appealing, is more complex to compute. We provide sound and complete algorithms to compute the semantics of \emph{positive} agent programs.
[ { "version": "v1", "created": "Thu, 21 Oct 1999 09:35:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Dix", "Juergen", "" ], [ "Nanni", "Mirco", "" ], [ "Subrahmanian", "VS", "" ] ]
cs/9910017
Jeff Erickson
Jeff Erickson
Finite-resolution hidden surface removal
10 pages, many figures; To appear in Proceedings of the 11th Annual ACM-SIAM Symposium on Discrete Algorithms, 2000; See also http://www.uiuc.edu/~jeffe/pubs/gridvis.html
null
null
null
cs.CG cs.GR
null
We propose a hybrid image-space/object-space solution to the classical hidden surface removal problem: Given n disjoint triangles in Real^3 and p sample points (``pixels'') in the xy-plane, determine the first triangle directly behind each pixel. Our algorithm constructs the sampled visibility map of the triangles with respect to the pixels, which is the subset of the trapezoids in a trapezoidal decomposition of the analytic visibility map that contain at least one pixel. The sampled visibility map adapts to local changes in image complexity, and its complexity is bounded both by the number of pixels and by the complexity of the analytic visibility map. Our algorithm runs in time O(n^{1+e} + n^{2/3+e}t^{2/3} + p), where t is the output size and e is any positive constant. This is nearly optimal in the worst case and compares favorably with the best output-sensitive algorithms for both ray casting and analytic hidden surface removal. In the special case where the pixels form a regular grid, a sweepline variant of our algorithm runs in time O(n^{1+e} + n^{2/3+e}t^{2/3} + t log p), which is usually sublinear in the number of pixels.
[ { "version": "v1", "created": "Thu, 21 Oct 1999 21:51:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Erickson", "Jeff", "" ] ]
cs/9910018
Shie-Yuan Wang
S.Y. Wang
Decoupling Control from Data for TCP Congestion Control
Ph.D. Thesis, Harvard University, September 1999. This thesis's Chapter 3 about "TCP Trunking" will be published in IEEE ICNP'99 Proceedings. A condensed version of this thesis is currently submitted to a conference
null
null
null
cs.NI
null
Many applications want to use TCP congestion control to regulate the transmission rate of a data packet stream. A natural way to achieve this goal is to transport the data packet stream on a TCP connection. However, because TCP implements both congestion and error control, transporting a data packet stream directly using a TCP connection forces the data packet stream to be subject to TCP's other properties caused by TCP error control, which may be inappropriate for these applications. The TCP decoupling approach proposed in this thesis is a novel way of applying TCP congestion control to a data packet stream without actually transporting the data packet stream on a TCP connection. Instead, a TCP connection using the same network path as the data packet stream is set up separately and the transmission rate of the data packet stream is then associated with that of the TCP packets. Since the transmission rate of these TCP packets is under TCP congestion control, so is that of the data packet stream. Furthermore, since the data packet stream is not transported on a TCP connection, the regulated data packet stream is not subject to TCP error control. Because of this flexibility, the TCP decoupling approach opens up many new opportunities, solves old problems, and improves the performance of some existing applications. All of these advantages will be demonstrated in the thesis. This thesis presents the design, implementation, and analysis of the TCP decoupling approach, and its successful applications in TCP trunking, wireless communication, and multimedia streaming.
[ { "version": "v1", "created": "Thu, 21 Oct 1999 22:03:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Wang", "S. Y.", "" ] ]
cs/9910019
Roberto Baldoni
R.Baldoni, F. Quaglia, and M.Raynal
Consistent Checkpointing in Distributed Databases: Towards a Formal Approach
13 pages, 3 figures
null
null
Rapporto di Ricerca, Dipartimento di Informatica e Sistemistica, Universita' di Roma "La Sapienza"-(Italy) n. 27-97, July 1997
cs.DB cs.DC
null
Whether it is for audit or for recovery purposes, data checkpointing is an important problem of distributed database systems. Actually, transactions establish dependence relations on data checkpoints taken by data object managers. So, given an arbitrary set of data checkpoints (including at least a single data checkpoint from a data manager, and at most a data checkpoint from each data manager), an important question is the following one: ``Can these data checkpoints be members of a same consistent global checkpoint?''. This paper answers this question by providing a necessary and sufficient condition suited for database systems. Moreover, to show the usefulness of this condition, two {\em non-intrusive} data checkpointing protocols are derived from this condition. It is also interesting to note that this paper, by exhibiting ``correspondences'', establishes a bridge between the data object/transaction model and the process/message-passing model.
[ { "version": "v1", "created": "Fri, 22 Oct 1999 15:17:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Baldoni", "R.", "" ], [ "Quaglia", "F.", "" ], [ "Raynal", "M.", "" ] ]
cs/9910020
Atsushi Fujii
Atsushi Fujii, Kentaro Inui, Takenobu Tokunaga, and Hozumi Tanaka
Selective Sampling for Example-based Word Sense Disambiguation
25 pages, 14 Postscript figures
Computational Linguistics, Vol.24, No.4, pp.573-597, 1998
null
null
cs.CL
null
This paper proposes an efficient example sampling method for example-based word sense disambiguation systems. To construct a database of practical size, a considerable overhead for manual sense disambiguation (overhead for supervision) is required. In addition, the time complexity of searching a large-sized database poses a considerable problem (overhead for search). To counter these problems, our method selectively samples a smaller-sized effective subset from a given example set for use in word sense disambiguation. Our method is characterized by the reliance on the notion of training utility: the degree to which each example is informative for future example sampling when used for the training of the system. The system progressively collects examples by selecting those with greatest utility. The paper reports the effectiveness of our method through experiments on about one thousand sentences. Compared to experiments with other example sampling methods, our method reduced both the overhead for supervision and the overhead for search, without the degeneration of the performance of the system.
[ { "version": "v1", "created": "Sat, 23 Oct 1999 11:19:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Fujii", "Atsushi", "" ], [ "Inui", "Kentaro", "" ], [ "Tokunaga", "Takenobu", "" ], [ "Tanaka", "Hozumi", "" ] ]
cs/9910021
Prasan Roy
Prasan Roy, S. Seshadri, S. Sudarshan, Siddhesh Bhobe
Efficient and Extensible Algorithms for Multi Query Optimization
null
null
null
null
cs.DB
null
Complex queries are becoming commonplace, with the growing use of decision support systems. These complex queries often have a lot of common sub-expressions, either within a single query, or across multiple such queries run as a batch. Multi-query optimization aims at exploiting common sub-expressions to reduce evaluation cost. Multi-query optimization has hither-to been viewed as impractical, since earlier algorithms were exhaustive, and explore a doubly exponential search space. In this paper we demonstrate that multi-query optimization using heuristics is practical, and provides significant benefits. We propose three cost-based heuristic algorithms: Volcano-SH and Volcano-RU, which are based on simple modifications to the Volcano search strategy, and a greedy heuristic. Our greedy heuristic incorporates novel optimizations that improve efficiency greatly. Our algorithms are designed to be easily added to existing optimizers. We present a performance study comparing the algorithms, using workloads consisting of queries from the TPC-D benchmark. The study shows that our algorithms provide significant benefits over traditional optimization, at a very acceptable overhead in optimization time.
[ { "version": "v1", "created": "Mon, 25 Oct 1999 16:30:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Roy", "Prasan", "" ], [ "Seshadri", "S.", "" ], [ "Sudarshan", "S.", "" ], [ "Bhobe", "Siddhesh", "" ] ]
cs/9910022
Mark-Jan Nederhof
Mark-Jan Nederhof
Practical experiments with regular approximation of context-free languages
28 pages. To appear in Computational Linguistics 26(1), March 2000
null
null
null
cs.CL
null
Several methods are discussed that construct a finite automaton given a context-free grammar, including both methods that lead to subsets and those that lead to supersets of the original context-free language. Some of these methods of regular approximation are new, and some others are presented here in a more refined form with respect to existing literature. Practical experiments with the different methods of regular approximation are performed for spoken-language input: hypotheses from a speech recognizer are filtered through a finite automaton.
[ { "version": "v1", "created": "Mon, 25 Oct 1999 15:00:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Nederhof", "Mark-Jan", "" ] ]
cs/9910023
Alessio Guglielmi
Alessio Guglielmi
A System of Interaction and Structure
This is the authoritative version of the article, with readable pictures, in colour, also available at <http://cs.bath.ac.uk/ag/p/SystIntStr.pdf>. (The published version contains errors introduced by the editorial processing.) Web site for Deep Inference and the Calculus of Structures at <http://alessio.guglielmi.name/res/cos>
ACM Transactions on Computational Logic, Vol. 8 (1:1), 2007, pp. 1-64
10.1145/1182613.1182614
null
cs.LO
null
This paper introduces a logical system, called BV, which extends multiplicative linear logic by a non-commutative self-dual logical operator. This extension is particularly challenging for the sequent calculus, and so far it is not achieved therein. It becomes very natural in a new formalism, called the calculus of structures, which is the main contribution of this work. Structures are formulae submitted to certain equational laws typical of sequents. The calculus of structures is obtained by generalising the sequent calculus in such a way that a new top-down symmetry of derivations is observed, and it employs inference rules that rewrite inside structures at any depth. These properties, in addition to allow the design of BV, yield a modular proof of cut elimination.
[ { "version": "v1", "created": "Thu, 28 Oct 1999 09:17:34 GMT" }, { "version": "v2", "created": "Fri, 27 Sep 2002 13:51:53 GMT" }, { "version": "v3", "created": "Thu, 2 Sep 2004 08:40:28 GMT" }, { "version": "v4", "created": "Sat, 27 Jan 2007 13:02:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Guglielmi", "Alessio", "" ] ]
cs/9910024
Steven M. Robbins
Therese Biedl, Erik Demaine, Martin Demaine, Sylvain Lazard, Anna Lubiw, Joseph O'Rourke, Steve Robbins, Ileana Streinu, Godfried Toussaint, Sue Whitesides
On Reconfiguring Tree Linkages: Trees can Lock
16 pages, 6 figures Introduction reworked and references added, as the main open problem was recently closed
null
null
SOCS-00.7
cs.CG cs.DM
null
It has recently been shown that any simple (i.e. nonintersecting) polygonal chain in the plane can be reconfigured to lie on a straight line, and any simple polygon can be reconfigured to be convex. This result cannot be extended to tree linkages: we show that there are trees with two simple configurations that are not connected by a motion that preserves simplicity throughout the motion. Indeed, we prove that an $N$-link tree can have $2^{\Omega(N)}$ equivalence classes of configurations.
[ { "version": "v1", "created": "Mon, 1 Nov 1999 17:50:19 GMT" }, { "version": "v2", "created": "Fri, 29 Sep 2000 02:26:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Biedl", "Therese", "" ], [ "Demaine", "Erik", "" ], [ "Demaine", "Martin", "" ], [ "Lazard", "Sylvain", "" ], [ "Lubiw", "Anna", "" ], [ "O'Rourke", "Joseph", "" ], [ "Robbins", "Steve", "" ], [ "Streinu", "Ileana", "" ], [ "Toussaint", "Godfried", "" ], [ "Whitesides", "Sue", "" ] ]
cs/9911001
Jan Heering
Jan Heering, Paul Klint
Semantics of Programming Languages: A Tool-Oriented Approach
12 pages, 2 figures. Submitted to ACM SIGPLAN Notices
ACM SIGPLAN Notices V. 35(3) March 2000 pp. 39-48
null
SEN-R9920 (CWI, Amsterdam)
cs.PL
null
By paying more attention to semantics-based tool generation, programming language semantics can significantly increase its impact. Ultimately, this may lead to ``Language Design Assistants'' incorporating substantial amounts of semantic knowledge.
[ { "version": "v1", "created": "Thu, 4 Nov 1999 11:14:45 GMT" }, { "version": "v2", "created": "Fri, 26 Nov 1999 12:54:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Heering", "Jan", "" ], [ "Klint", "Paul", "" ] ]
cs/9911002
Rigo Michel
Michel Rigo
Numeration systems on a regular language: Arithmetic operations, Recognizability and Formal power series
34 pages; corrected typos, two sections concerning exponential case and relation with positional systems added
Theoret. Comput. Sci. 269 (2001) 469--498
null
null
cs.CC
null
Generalizations of numeration systems in which N is recognizable by a finite automaton are obtained by describing a lexicographically ordered infinite regular language L over a finite alphabet A. For these systems, we obtain a characterization of recognizable sets of integers in terms of rational formal series. We also show that, if the complexity of L is Theta (n^q) (resp. if L is the complement of a polynomial language), then multiplication by an integer k preserves recognizability only if k=t^{q+1} (resp. if k is not a power of the cardinality of A) for some integer t. Finally, we obtain sufficient conditions for the notions of recognizability and U-recognizability to be equivalent, where U is some positional numeration system related to a sequence of integers.
[ { "version": "v1", "created": "Mon, 8 Nov 1999 13:03:50 GMT" }, { "version": "v2", "created": "Thu, 20 Jan 2000 13:40:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Rigo", "Michel", "" ] ]
cs/9911003
David Eppstein
David Eppstein
Subgraph Isomorphism in Planar Graphs and Related Problems
27 pages, 6 figures. A preliminary version of this paper appeared at the 6th ACM-SIAM Symp. Discrete Algorithms, 1995
J. Graph Algorithms & Applications 3(3):1-27, 1999
null
null
cs.DS
null
We solve the subgraph isomorphism problem in planar graphs in linear time, for any pattern of constant size. Our results are based on a technique of partitioning the planar graph into pieces of small tree-width, and applying dynamic programming within each piece. The same methods can be used to solve other planar graph problems including connectivity, diameter, girth, induced subgraph isomorphism, and shortest paths.
[ { "version": "v1", "created": "Tue, 9 Nov 1999 18:58:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Eppstein", "David", "" ] ]
cs/9911004
Wolfgang Slany
Wolfgang Slany
Graph Ramsey games
47 pages; To actually play small but nontrivial game instances, go to http://www.dbai.tuwien.ac.at/proj/ramsey/
null
null
DBAI-TR-99-34
cs.CC cs.DM math.CO
null
We consider combinatorial avoidance and achievement games based on graph Ramsey theory: The players take turns in coloring still uncolored edges of a graph G, each player being assigned a distinct color, choosing one edge per move. In avoidance games, completing a monochromatic subgraph isomorphic to another graph A leads to immediate defeat or is forbidden and the first player that cannot move loses. In the avoidance+ variants, both players are free to choose more than one edge per move. In achievement games, the first player that completes a monochromatic subgraph isomorphic to A wins. Erdos & Selfridge (1973) were the first to identify some tractable subcases of these games, followed by a large number of further studies. We complete these investigations by settling the complexity of all unrestricted cases: We prove that general graph Ramsey avoidance, avoidance+, and achievement games and several variants thereof are PSPACE-complete. We ultra-strongly solve some nontrivial instances of graph Ramsey avoidance games that are based on symmetric binary Ramsey numbers and provide strong evidence that all other cases based on symmetric binary Ramsey numbers are effectively intractable. Keywords: combinatorial games, graph Ramsey theory, Ramsey game, PSPACE-completeness, complexity, edge coloring, winning strategy, achievement game, avoidance game, the game of Sim, Polya's enumeration formula, probabilistic counting, machine learning, heuristics, Java applet
[ { "version": "v1", "created": "Wed, 10 Nov 1999 11:28:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Slany", "Wolfgang", "" ] ]