id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
3
62.8k
title
stringlengths
1
382
comments
stringlengths
1
1.15k
journal-ref
stringlengths
1
557
doi
stringlengths
7
153
report-no
stringlengths
1
509
categories
stringlengths
5
125
license
stringclasses
9 values
abstract
stringlengths
6
6.09k
versions
listlengths
1
187
update_date
timestamp[s]
authors_parsed
sequencelengths
1
2.83k
cs/0610094
Ali Mesbah
Ali Mesbah and Arie van Deursen
Migrating Multi-page Web Applications to Single-page AJAX Interfaces
null
Proceedings of the 11th European Conference on Software Maintenance and Reengineering (CSMR'07), IEEE Computer Society, 2007
null
TUD-SERG-2006-018
cs.SE
null
Recently, a new web development technique for creating interactive web applications, dubbed AJAX, has emerged. In this new model, the single-page web interface is composed of individual components which can be updated/replaced independently. With the rise of AJAX web applications classical multi-page web applications are becoming legacy systems. If until a year ago, the concern revolved around migrating legacy systems to web-based settings, today we have a new challenge of migrating web applications to single-page AJAX applications. Gaining an understanding of the navigational model and user interface structure of the source application is the first step in the migration process. In this paper, we explore how reverse engineering techniques can help analyze classic web applications for this purpose. Our approach, using a schema-based clustering technique, extracts a navigational model of web applications, and identifies candidate user interface components to be migrated to a single-page AJAX interface. Additionally, results of a case study, conducted to evaluate our tool, are presented.
[ { "version": "v1", "created": "Sun, 15 Oct 2006 07:36:19 GMT" }, { "version": "v2", "created": "Wed, 3 Jan 2007 14:17:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Mesbah", "Ali", "" ], [ "van Deursen", "Arie", "" ] ]
cs/0610095
Omer Gim\'enez Mr.
Omer Gim\'enez
Solving planning domains with polytree causal graphs is NP-complete
null
null
null
null
cs.AI cs.CC
null
We show that solving planning domains on binary variables with polytree causal graph is \NP-complete. This is in contrast to a polynomial-time algorithm of Domshlak and Brafman that solves these planning domains for polytree causal graphs of bounded indegree.
[ { "version": "v1", "created": "Mon, 16 Oct 2006 06:18:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Giménez", "Omer", "" ] ]
cs/0610096
Sandrine Blazy
Sandrine Blazy (CEDRIC)
Partial Evaluation for Program Comprehension
null
Dans ACM Computing Surveys, Symposium on partial evaluation 30, 3 es (1998)
null
null
cs.SE
null
Program comprehension is the most tedious and time consuming task of software maintenance, an important phase of the software life cycle. This is particularly true while maintaining scientific application programs that have been written in Fortran for decades and that are still vital in various domains even though more modern languages are used to implement their user interfaces. Very often, programs have evolved as their application domains increase continually and have become very complex due to extensive modifications. This generality in programs is implemented by input variables whose value does not vary in the context of a given application. Thus, it is very interesting for the maintainer to propagate such information, that is to obtain a simplified program, which behaves like the initial one when used according to the restriction. We have adapted partial evaluation for program comprehension. Our partial evaluator performs mainly two tasks: constant propagation and statements simplification. It includes an interprocedural alias analysis. As our aim is program comprehension rather than optimization, there are two main differences with classical partial evaluation. We do not change the original
[ { "version": "v1", "created": "Mon, 16 Oct 2006 09:05:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Blazy", "Sandrine", "", "CEDRIC" ] ]
cs/0610098
Joseph Y. Halpern
Joseph Y. Halpern and Yoram Moses
Characterizing Solution Concepts in Games Using Knowledge-Based Programs
To appear, IJCAI 2007
null
null
null
cs.GT cs.DC cs.MA
null
We show how solution concepts in games such as Nash equilibrium, correlated equilibrium, rationalizability, and sequential equilibrium can be given a uniform definition in terms of \emph{knowledge-based programs}. Intuitively, all solution concepts are implementations of two knowledge-based programs, one appropriate for games represented in normal form, the other for games represented in extensive form. These knowledge-based programs can be viewed as embodying rationality. The representation works even if (a) information sets do not capture an agent's knowledge, (b) uncertainty is not represented by probability, or (c) the underlying game is not common knowledge.
[ { "version": "v1", "created": "Mon, 16 Oct 2006 13:00:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Halpern", "Joseph Y.", "" ], [ "Moses", "Yoram", "" ] ]
cs/0610101
Dario Tamascelli
Diego de Falco and Dario Tamascelli
Entropy generation in a model of reversible computation
13 pages, 6 figures
RAIRO-Inf.Theor.Appl. 40, (2006) 93-105
10.1051/ita:2006013
null
cs.CC quant-ph
null
We present a model in which, due to the quantum nature of the signals controlling the implementation time of successive unitary computational steps, \emph{physical} irreversibility appears in the execution of a \emph{logically} reversible computation.
[ { "version": "v1", "created": "Tue, 17 Oct 2006 08:51:43 GMT" } ]
2007-05-23T00:00:00
[ [ "de Falco", "Diego", "" ], [ "Tamascelli", "Dario", "" ] ]
cs/0610109
Mohamed El Baker Nassar
Mohamed El Baker Nassar (INRIA Lorraine - LORIA), Radu State (INRIA Lorraine - LORIA), Olivier Festor (INRIA Lorraine - LORIA)
Intrusion detection mechanisms for VoIP applications
null
Dans Third annual VoIP security workshop (VSW'06) (2006)
null
null
cs.NI
null
VoIP applications are emerging today as an important component in business and communication industry. In this paper, we address the intrusion detection and prevention in VoIP networks and describe how a conceptual solution based on the Bayes inference approach can be used to reinforce the existent security mechanisms. Our approach is based on network monitoring and analyzing of the VoIP-specific traffic. We give a detailed example on attack detection using the SIP signaling protocol.
[ { "version": "v1", "created": "Wed, 18 Oct 2006 16:44:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Nassar", "Mohamed El Baker", "", "INRIA Lorraine - LORIA" ], [ "State", "Radu", "", "INRIA\n Lorraine - LORIA" ], [ "Festor", "Olivier", "", "INRIA Lorraine - LORIA" ] ]
cs/0610113
Juan J. Merelo Pr.
A.M. Mora, J.J. Merelo, C. Millan, J. Torrecillas, J.L.J. Laredo
CHAC. A MOACO Algorithm for Computation of Bi-Criteria Military Unit Path in the Battlefield
null
Published in Proceedings of the Workshop on Nature Inspired Cooperative Strategies for Optimization. NICSO'2006, Pelta & Krasnogor, (eds) pp 85-98, Jun. 2006
null
null
cs.MA cs.CC
null
In this paper we propose a Multi-Objective Ant Colony Optimization (MOACO) algorithm called CHAC, which has been designed to solve the problem of finding the path on a map (corresponding to a simulated battlefield) that minimizes resources while maximizing safety. CHAC has been tested with two different state transition rules: an aggregative function that combines the heuristic and pheromone information of both objectives and a second one that is based on the dominance concept of multiobjective optimization problems. These rules have been evaluated in several different situations (maps with different degree of difficulty), and we have found that they yield better results than a greedy algorithm (taken as baseline) in addition to a military behaviour that is also better in the tactical sense. The aggregative function, in general, yields better results than the one based on dominance.
[ { "version": "v1", "created": "Thu, 19 Oct 2006 10:41:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Mora", "A. M.", "" ], [ "Merelo", "J. J.", "" ], [ "Millan", "C.", "" ], [ "Torrecillas", "J.", "" ], [ "Laredo", "J. L. J.", "" ] ]
cs/0610116
Tuomo Kakkonen
Tuomo Kakkonen
DepAnn - An Annotation Tool for Dependency Treebanks
null
Proceedings of the 11th ESSLLI Student Session at the 18th European Summer School in Logic, Language and Information (ESSLLI 2006), pp. 214-225. Malaga, Spain, 2006
null
null
cs.CL
null
DepAnn is an interactive annotation tool for dependency treebanks, providing both graphical and text-based annotation interfaces. The tool is aimed for semi-automatic creation of treebanks. It aids the manual inspection and correction of automatically created parses, making the annotation process faster and less error-prone. A novel feature of the tool is that it enables the user to view outputs from several parsers as the basis for creating the final tree to be saved to the treebank. DepAnn uses TIGER-XML, an XML-based general encoding format for both, representing the parser outputs and saving the annotated treebank. The tool includes an automatic consistency checker for sentence structures. In addition, the tool enables users to build structures manually, add comments on the annotations, modify the tagsets, and mark sentences for further revision.
[ { "version": "v1", "created": "Thu, 19 Oct 2006 17:42:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Kakkonen", "Tuomo", "" ] ]
cs/0610117
Jeremy Avigad
Jeremy Avigad and Yimu Yin
Quantifier elimination for the reals with a predicate for the powers of two
null
null
null
null
cs.LO
null
In 1985, van den Dries showed that the theory of the reals with a predicate for the integer powers of two admits quantifier elimination in an expanded language, and is hence decidable. He gave a model-theoretic argument, which provides no apparent bounds on the complexity of a decision procedure. We provide a syntactic argument that yields a procedure that is primitive recursive, although not elementary. In particular, we show that it is possible to eliminate a single block of existential quantifiers in time $2^0_{O(n)}$, where $n$ is the length of the input formula and $2_k^x$ denotes $k$-fold iterated exponentiation.
[ { "version": "v1", "created": "Thu, 19 Oct 2006 17:39:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Avigad", "Jeremy", "" ], [ "Yin", "Yimu", "" ] ]
cs/0610118
Tuomo Kakkonen
Tuomo Kakkonen, Niko Myller, Erkki Sutinen
Applying Part-of-Seech Enhanced LSA to Automatic Essay Grading
null
Proceedings of the 4th IEEE International Conference on Information Technology: Research and Education (ITRE 2006). Tel Aviv, Israel, 2006
null
null
cs.IR cs.CL
null
Latent Semantic Analysis (LSA) is a widely used Information Retrieval method based on "bag-of-words" assumption. However, according to general conception, syntax plays a role in representing meaning of sentences. Thus, enhancing LSA with part-of-speech (POS) information to capture the context of word occurrences appears to be theoretically feasible extension. The approach is tested empirically on a automatic essay grading system using LSA for document similarity comparisons. A comparison on several POS-enhanced LSA models is reported. Our findings show that the addition of contextual information in the form of POS tags can raise the accuracy of the LSA-based scoring models up to 10.77 per cent.
[ { "version": "v1", "created": "Thu, 19 Oct 2006 17:50:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Kakkonen", "Tuomo", "" ], [ "Myller", "Niko", "" ], [ "Sutinen", "Erkki", "" ] ]
cs/0610119
Elad Hazan
Elad Hazan
Approximate Convex Optimization by Online Game Playing
null
null
null
null
cs.DS
null
Lagrangian relaxation and approximate optimization algorithms have received much attention in the last two decades. Typically, the running time of these methods to obtain a $\epsilon$ approximate solution is proportional to $\frac{1}{\epsilon^2}$. Recently, Bienstock and Iyengar, following Nesterov, gave an algorithm for fractional packing linear programs which runs in $\frac{1}{\epsilon}$ iterations. The latter algorithm requires to solve a convex quadratic program every iteration - an optimization subroutine which dominates the theoretical running time. We give an algorithm for convex programs with strictly convex constraints which runs in time proportional to $\frac{1}{\epsilon}$. The algorithm does NOT require to solve any quadratic program, but uses gradient steps and elementary operations only. Problems which have strictly convex constraints include maximum entropy frequency estimation, portfolio optimization with loss risk constraints, and various computational problems in signal processing. As a side product, we also obtain a simpler version of Bienstock and Iyengar's result for general linear programming, with similar running time. We derive these algorithms using a new framework for deriving convex optimization algorithms from online game playing algorithms, which may be of independent interest.
[ { "version": "v1", "created": "Thu, 19 Oct 2006 22:10:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Hazan", "Elad", "" ] ]
cs/0610122
Philippe Langlois
Philippe Langlois (LP2A-DALI), Nicolas Louvet (LP2A-DALI)
Faithful Polynomial Evaluation with Compensated Horner Algorithm
null
null
null
null
cs.NA cs.MS
null
This paper presents two sufficient conditions to ensure a faithful evaluation of polynomial in IEEE-754 floating point arithmetic. Faithfulness means that the computed value is one of the two floating point neighbours of the exact result; it can be satisfied using a more accurate algorithm than the classic Horner scheme. One condition here provided is an apriori bound of the polynomial condition number derived from the error analysis of the compensated Horner algorithm. The second condition is both dynamic and validated to check at the running time the faithfulness of a given evaluation. Numerical experiments illustrate the behavior of these two conditions and that associated running time over-cost is really interesting.
[ { "version": "v1", "created": "Fri, 20 Oct 2006 11:22:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Langlois", "Philippe", "", "LP2A-DALI" ], [ "Louvet", "Nicolas", "", "LP2A-DALI" ] ]
cs/0610123
Lutz Strassburger
Lutz Strassburger (INRIA Futurs)
Proof Nets and the Identity of Proofs
null
null
null
null
cs.LO
null
These are the notes for a 5-lecture-course given at ESSLLI 2006 in Malaga, Spain. The URL of the school is http://esslli2006.lcc.uma.es/ . This version slightly differs from the one which has been distributed at the school because typos have been removed and comments and suggestions by students have been worked in. The course is intended to be introductory. That means no prior knowledge of proof nets is required. However, the student should be familiar with the basics of propositional logic, and should have seen formal proofs in some formal deductive system (e.g., sequent calculus, natural deduction, resolution, tableaux, calculus of structures, Frege-Hilbert-systems, ...). It is probably helpful if the student knows already what cut elimination is, but this is not strictly necessary. In these notes, I will introduce the concept of ``proof nets'' from the viewpoint of the problem of the identity of proofs. I will proceed in a rather informal way. The focus will be more on presenting ideas than on presenting technical details. The goal of the course is to give the student an overview of the theory of proof nets and make the vast amount of literature on the topic easier accessible to the beginner. For introducing the basic concepts of the theory, I will in the first part of the course stick to the unit-free multiplicative fragment of linear logic because of its rather simple notion of proof nets. In the second part of the course we will see proof nets for more sophisticated logics. This is a basic introduction into proof nets from the perspective of the identity of proofs. We discuss how deductive proofs can be translated into proof nets and what a correctness criterion is.
[ { "version": "v1", "created": "Fri, 20 Oct 2006 11:35:05 GMT" }, { "version": "v2", "created": "Mon, 20 Nov 2006 14:41:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Strassburger", "Lutz", "", "INRIA Futurs" ] ]
cs/0610124
Tuomo Kakkonen
Tuomo Kakkonen
Dependency Treebanks: Methods, Annotation Schemes and Tools
null
Proceedings of the 15th Nordic Conference of Computational Linguistics (NODALIDA 2005), pp. 94-104. Joensuu, Finland, 2005
null
null
cs.CL
null
In this paper, current dependencybased treebanks are introduced and analyzed. The methods used for building the resources, the annotation schemes applied, and the tools used (such as POS taggers, parsers and annotation software) are discussed.
[ { "version": "v1", "created": "Fri, 20 Oct 2006 11:48:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Kakkonen", "Tuomo", "" ] ]
cs/0610125
Radoslaw Hofman
Radoslaw Hofman
Report on article: P=NP Linear programming formulation of the Traveling Salesman Problem
This version contain more figures, and clearer way to explain counter example idea for k dimensions
null
null
null
cs.CC cs.DM cs.DS
null
This article presents counter examples for three articles claiming that P=NP. Articles for which it applies are: Moustapha Diaby "P = NP: Linear programming formulation of the traveling salesman problem" and "Equality of complexity classes P and NP: Linear programming formulation of the quadratic assignment problem", and also Sergey Gubin "A Polynomial Time Algorithm for The Traveling Salesman Problem"
[ { "version": "v1", "created": "Fri, 20 Oct 2006 14:01:22 GMT" }, { "version": "v2", "created": "Wed, 25 Oct 2006 13:41:20 GMT" }, { "version": "v3", "created": "Thu, 26 Oct 2006 12:00:02 GMT" }, { "version": "v4", "created": "Thu, 2 Nov 2006 11:19:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Hofman", "Radoslaw", "" ] ]
cs/0610126
Marcus Hutter
Marcus Hutter and Shane Legg
Fitness Uniform Optimization
25 double-column pages, 12 figures
IEEE Transactions on Evolutionary Computation, 10:5 (2006) 568-589
10.1109/TEVC.2005.863127
IDSIA-16-06
cs.NE cs.LG
null
In evolutionary algorithms, the fitness of a population increases with time by mutating and recombining individuals and by a biased selection of more fit individuals. The right selection pressure is critical in ensuring sufficient optimization progress on the one hand and in preserving genetic diversity to be able to escape from local optima on the other hand. Motivated by a universal similarity relation on the individuals, we propose a new selection scheme, which is uniform in the fitness values. It generates selection pressure toward sparsely populated fitness regions, not necessarily toward higher fitness, as is the case for all other selection schemes. We show analytically on a simple example that the new selection scheme can be much more effective than standard selection schemes. We also propose a new deletion scheme which achieves a similar result via deletion and show how such a scheme preserves genetic diversity more effectively than standard approaches. We compare the performance of the new schemes to tournament selection and random deletion on an artificial deceptive problem and a range of NP-hard problems: traveling salesman, set covering and satisfiability.
[ { "version": "v1", "created": "Fri, 20 Oct 2006 16:37:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Hutter", "Marcus", "" ], [ "Legg", "Shane", "" ] ]
cs/0610127
Serban Vlad E.
Serban E. Vlad
The intersection and the union of the asynchronous systems
The 14-th Conference on Applied and Industrial Mathematics CAIM 2006, Satellite Conference of ICM2006, Chisinau, Moldova, August 17-19, 2006
null
null
null
cs.GL
null
The asynchronous systems $f$ are the models of the asynchronous circuits from digital electrical engineering. They are multi-valued functions that associate to each input $u:\mathbf{R}\to \{0,1\}^{m}$ a set of states $x\in f(u),$ where $x:\mathbf{R}\to \{0,1\}^{n}.$ The intersection of the systems allows adding supplementary conditions in modeling and the union of the systems allows considering the validity of one of two systems in modeling, for example when testing the asynchronous circuits and the circuit is supposed to be 'good' or 'bad'. The purpose of the paper is that of analyzing the intersection and the union against the initial/final states, initial/final time, initial/final state functions, subsystems, dual systems, inverse systems, Cartesian product of systems, parallel connection and serial connection of systems.
[ { "version": "v1", "created": "Fri, 20 Oct 2006 21:33:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Vlad", "Serban E.", "" ] ]
cs/0610129
Haluk Bingol
Ismail Gunes, Haluk Bingol
Community Detection in Complex Networks Using Agents
5 pages
null
null
null
cs.MA cs.CY
null
Community structure identification has been one of the most popular research areas in recent years due to its applicability to the wide scale of disciplines. To detect communities in varied topics, there have been many algorithms proposed so far. However, most of them still have some drawbacks to be addressed. In this paper, we present an agent-based based community detection algorithm. The algorithm that is a stochastic one makes use of agents by forcing them to perform biased moves in a smart way. Using the information collected by the traverses of these agents in the network, the network structure is revealed. Also, the network modularity is used for determining the number of communities. Our algorithm removes the need for prior knowledge about the network such as number of the communities or any threshold values. Furthermore, the definite community structure is provided as a result instead of giving some structures requiring further processes. Besides, the computational and time costs are optimized because of using thread like working agents. The algorithm is tested on three network data of different types and sizes named Zachary karate club, college football and political books. For all three networks, the real network structures are identified in almost every run.
[ { "version": "v1", "created": "Mon, 23 Oct 2006 06:34:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Gunes", "Ismail", "" ], [ "Bingol", "Haluk", "" ] ]
cs/0610133
Thomas Silverston
Thomas Silverston and Olivier Fourmaux
P2P IPTV Measurement: A Comparison Study
10 pages
null
null
null
cs.NI cs.MM
null
With the success of P2P file sharing, new emerging P2P applications arise on the Internet for streaming content like voice (VoIP) or live video (IPTV). Nowadays, there are lots of works measuring P2P file sharing or P2P telephony systems, but there is still no comprehensive study about P2P IPTV, whereas it should be massively used in the future. During the last FIFA world cup, we measured network traffic generated by P2P IPTV applications like PPlive, PPstream, TVants and Sopcast. In this paper we analyze some of our results during the same games for the applications. We focus on traffic statistics and churn of peers within these P2P networks. Our objectives are threefold: we point out the traffic generated to understand the impact they will have on the network, we try to infer the mechanisms of such applications and highlight differences, and we give some insights about the users' behavior.
[ { "version": "v1", "created": "Mon, 23 Oct 2006 13:55:28 GMT" }, { "version": "v2", "created": "Thu, 2 Nov 2006 14:23:31 GMT" }, { "version": "v3", "created": "Mon, 15 Jan 2007 13:34:09 GMT" }, { "version": "v4", "created": "Thu, 19 Apr 2007 13:45:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Silverston", "Thomas", "" ], [ "Fourmaux", "Olivier", "" ] ]
cs/0610137
Silvano Dal Zilio
Lucia Acciai (LIF), Michele Boreale, Silvano Dal Zilio (LIF)
A Concurrent Calculus with Atomic Transactions
29 pages
null
null
null
cs.LO cs.DC
null
The Software Transactional Memory (STM) model is an original approach for controlling concurrent accesses to ressources without the need for explicit lock-based synchronization mechanisms. A key feature of STM is to provide a way to group sequences of read and write actions inside atomic blocks, similar to database transactions, whose whole effect should occur atomically. In this paper, we investigate STM from a process algebra perspective and define an extension of asynchronous CCS with atomic blocks of actions. Our goal is not only to set a formal ground for reasoning on STM implementations but also to understand how this model fits with other concurrency control mechanisms. We also view this calculus as a test bed for extending process calculi with atomic transactions. This is an interesting direction for investigation since, for the most part, actual works that mix transactions with process calculi consider compensating transactions, a model that lacks all the well-known ACID properties. We show that the addition of atomic transactions results in a very expressive calculus, enough to easily encode other concurrent primitives such as guarded choice and multiset-synchronization (\`{a} la join-calculus). The correctness of our encodings is proved using a suitable notion of bisimulation equivalence. The equivalence is then applied to prove interesting ``laws of transactions'' and to obtain a simple normal form for transactions.
[ { "version": "v1", "created": "Tue, 24 Oct 2006 08:26:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Acciai", "Lucia", "", "LIF" ], [ "Boreale", "Michele", "", "LIF" ], [ "Zilio", "Silvano Dal", "", "LIF" ] ]
cs/0610140
Leonid Makarov
Leonid Makarov and Peter Komarov
Constant for associative patterns ensemble
6 pages
null
null
null
cs.AI
null
Creation procedure of associative patterns ensemble in terms of formal logic with using neural net-work (NN) model is formulated. It is shown that the associative patterns set is created by means of unique procedure of NN work which having individual parameters of entrance stimulus transformation. It is ascer-tained that the quantity of the selected associative patterns possesses is a constant.
[ { "version": "v1", "created": "Tue, 24 Oct 2006 16:27:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Makarov", "Leonid", "" ], [ "Komarov", "Peter", "" ] ]
cs/0610149
Anna Frid
A. Frid
Canonical decomposition of catenation of factorial languages
Submitted
null
null
null
cs.LO
null
According to a previous result by S. V. Avgustinovich and the author, each factorial language admits a unique canonical decomposition to a catenation of factorial languages. In this paper, we analyze the appearance of the canonical decomposition of a catenation of two factorial languages whose canonical decompositions are given.
[ { "version": "v1", "created": "Thu, 26 Oct 2006 06:38:30 GMT" }, { "version": "v2", "created": "Fri, 8 Dec 2006 06:11:17 GMT" }, { "version": "v3", "created": "Wed, 31 Jan 2007 07:56:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Frid", "A.", "" ] ]
cs/0610155
Ping Li
Ping Li, Trevor J. Hastie, Kenneth W. Church
Nonlinear Estimators and Tail Bounds for Dimension Reduction in $l_1$ Using Cauchy Random Projections
null
null
null
null
cs.DS cs.IR cs.LG
null
For dimension reduction in $l_1$, the method of {\em Cauchy random projections} multiplies the original data matrix $\mathbf{A} \in\mathbb{R}^{n\times D}$ with a random matrix $\mathbf{R} \in \mathbb{R}^{D\times k}$ ($k\ll\min(n,D)$) whose entries are i.i.d. samples of the standard Cauchy C(0,1). Because of the impossibility results, one can not hope to recover the pairwise $l_1$ distances in $\mathbf{A}$ from $\mathbf{B} = \mathbf{AR} \in \mathbb{R}^{n\times k}$, using linear estimators without incurring large errors. However, nonlinear estimators are still useful for certain applications in data stream computation, information retrieval, learning, and data mining. We propose three types of nonlinear estimators: the bias-corrected sample median estimator, the bias-corrected geometric mean estimator, and the bias-corrected maximum likelihood estimator. The sample median estimator and the geometric mean estimator are asymptotically (as $k\to \infty$) equivalent but the latter is more accurate at small $k$. We derive explicit tail bounds for the geometric mean estimator and establish an analog of the Johnson-Lindenstrauss (JL) lemma for dimension reduction in $l_1$, which is weaker than the classical JL lemma for dimension reduction in $l_2$. Asymptotically, both the sample median estimator and the geometric mean estimators are about 80% efficient compared to the maximum likelihood estimator (MLE). We analyze the moments of the MLE and propose approximating the distribution of the MLE by an inverse Gaussian.
[ { "version": "v1", "created": "Fri, 27 Oct 2006 07:08:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Li", "Ping", "" ], [ "Hastie", "Trevor J.", "" ], [ "Church", "Kenneth W.", "" ] ]
cs/0610156
Fadi Badra
Mathieu D'Aquin (INRIA Lorraine - LORIA, KMI), Fadi Badra (INRIA Lorraine - LORIA), Sandrine Lafrogne (INRIA Lorraine - LORIA), Jean Lieber (INRIA Lorraine - LORIA), Amedeo Napoli (INRIA Lorraine - LORIA), Laszlo Szathmary (INRIA Lorraine - LORIA)
Adaptation Knowledge Discovery from a Case Base
null
Proceedings of the 17th European Conference on Artificial Intelligence (ECAI-06), Trento G. Brewka (Ed.) (2006) 795--796
null
null
cs.AI
null
In case-based reasoning, the adaptation step depends in general on domain-dependent knowledge, which motivates studies on adaptation knowledge acquisition (AKA). CABAMAKA is an AKA system based on principles of knowledge discovery from databases. This system explores the variations within the case base to elicit adaptation knowledge. It has been successfully tested in an application of case-based decision support to breast cancer treatment.
[ { "version": "v1", "created": "Fri, 27 Oct 2006 10:08:32 GMT" } ]
2007-05-23T00:00:00
[ [ "D'Aquin", "Mathieu", "", "INRIA Lorraine - LORIA, KMI" ], [ "Badra", "Fadi", "", "INRIA\n Lorraine - LORIA" ], [ "Lafrogne", "Sandrine", "", "INRIA Lorraine - LORIA" ], [ "Lieber", "Jean", "", "INRIA Lorraine - LORIA" ], [ "Napoli", "Amedeo", "", "INRIA Lorraine - LORIA" ], [ "Szathmary", "Laszlo", "", "INRIA Lorraine - LORIA" ] ]
cs/0610158
Babajide Afolabi
Babajide Afolabi (LORIA), Odile Thiery (LORIA)
Considering users' behaviours in improving the responses of an information base
null
Dans I International Conference on Multidisciplinary Information Sciences and Technologies (2006)
null
null
cs.LG cs.IR
null
In this paper, our aim is to propose a model that helps in the efficient use of an information system by users, within the organization represented by the IS, in order to resolve their decisional problems. In other words we want to aid the user within an organization in obtaining the information that corresponds to his needs (informational needs that result from his decisional problems). This type of information system is what we refer to as economic intelligence system because of its support for economic intelligence processes of the organisation. Our assumption is that every EI process begins with the identification of the decisional problem which is translated into an informational need. This need is then translated into one or many information search problems (ISP). We also assumed that an ISP is expressed in terms of the user's expectations and that these expectations determine the activities or the behaviors of the user, when he/she uses an IS. The model we are proposing is used for the conception of the IS so that the process of retrieving of solution(s) or the responses given by the system to an ISP is based on these behaviours and correspond to the needs of the user.
[ { "version": "v1", "created": "Fri, 27 Oct 2006 16:02:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Afolabi", "Babajide", "", "LORIA" ], [ "Thiery", "Odile", "", "LORIA" ] ]
cs/0610163
Rajiv Ranjan Mr.
Rajiv Ranjan, Aaron Harwood and Rajkumar Buyya
A Taxonomy of Peer-to-Peer Based Complex Queries: a Grid perspective
null
null
null
null
cs.NI cs.DC cs.DS
null
Grid superscheduling requires support for efficient and scalable discovery of resources. Resource discovery activities involve searching for the appropriate resource types that match the user's job requirements. To accomplish this goal, a resource discovery system that supports the desired look-up operation is mandatory. Various kinds of solutions to this problem have been suggested, including the centralised and hierarchical information server approach. However, both of these approaches have serious limitations in regards to scalability, fault-tolerance and network congestion. To overcome these limitations, organising resource information using Peer-to-Peer (P2P) network model has been proposed. Existing approaches advocate an extension to structured P2P protocols, to support the Grid resource information system (GRIS). In this paper, we identify issues related to the design of such an efficient, scalable, fault-tolerant, consistent and practical GRIS system using a P2P network model. We compile these issues into various taxonomies in sections III and IV. Further, we look into existing works that apply P2P based network protocols to GRIS. We think that this taxonomy and its mapping to relevant systems would be useful for academic and industry based researchers who are engaged in the design of scalable Grid systems.
[ { "version": "v1", "created": "Mon, 30 Oct 2006 08:30:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Ranjan", "Rajiv", "" ], [ "Harwood", "Aaron", "" ], [ "Buyya", "Rajkumar", "" ] ]
cs/0610164
Bageshri Karkare
Bageshri Karkare (Sathe) and Uday Khedker
Complexity of Data Flow Analysis for Non-Separable Frameworks
Published in the International Conference on Programming Languages and Compilers (PLC) 2006, Las Vegas, U.S.A
null
null
null
cs.PL
null
The complexity of round robin method of intraprocedural data flow analysis is measured in number of iterations over the control flow graph. Existing complexity bounds realistically explain the complexity of only Bit-vector frameworks which are separable. In this paper we define the complexity bounds for non-separable frameworks by quantifying the interdependences among the data flow information of program entities using an Entity Dependence Graph.
[ { "version": "v1", "created": "Mon, 30 Oct 2006 08:39:04 GMT" }, { "version": "v2", "created": "Tue, 31 Oct 2006 09:09:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Karkare", "Bageshri", "", "Sathe" ], [ "Khedker", "Uday", "" ] ]
cs/0610166
Thierry Cachat
Thierry Cachat (LIAFA)
Tree Automata Make Ordinal Theory Easy
null
Foundations of Software Technology and Theoretical Computer Science, 26th International Conference, 2006, Proceedings. FSTTCS 2006 (2006) 286-297
null
null
cs.GT
null
We give a new simple proof of the decidability of the First Order Theory of (omega^omega^i,+) and the Monadic Second Order Theory of (omega^i,<), improving the complexity in both cases. Our algorithm is based on tree automata and a new representation of (sets of) ordinals by (infinite) trees.
[ { "version": "v1", "created": "Mon, 30 Oct 2006 11:05:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Cachat", "Thierry", "", "LIAFA" ] ]
cs/0610167
Adrian Paschke
Adrian Paschke
ECA-RuleML: An Approach combining ECA Rules with temporal interval-based KR Event/Action Logics and Transactional Update Logics
Republished in Paschke, A.: ECA-RuleML/ECA-LP: A Homogeneous Event-Condition-Action Logic Programming Language, Int. Conf. of Rule Markup Languages (RuleML'06), Athens, Georgia, USA, 2006
null
null
IBIS, TUM, Technical Report 11/05
cs.AI cs.LO cs.MA cs.SE
null
An important problem to be addressed within Event-Driven Architecture (EDA) is how to correctly and efficiently capture and process the event/action-based logic. This paper endeavors to bridge the gap between the Knowledge Representation (KR) approaches based on durable events/actions and such formalisms as event calculus, on one hand, and event-condition-action (ECA) reaction rules extending the approach of active databases that view events as instantaneous occurrences and/or sequences of events, on the other. We propose formalism based on reaction rules (ECA rules) and a novel interval-based event logic and present concrete RuleML-based syntax, semantics and implementation. We further evaluate this approach theoretically, experimentally and on an example derived from common industry use cases and illustrate its benefits.
[ { "version": "v1", "created": "Mon, 30 Oct 2006 11:56:08 GMT" }, { "version": "v2", "created": "Fri, 10 Nov 2006 06:44:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Paschke", "Adrian", "" ] ]
cs/0610168
Dele Oluwade PhD
Dele Oluwade
Presentation Theorems for Coded Character Sets
14 pages, including a page of symbols and a page containing a table
null
null
null
cs.DM
null
The notion of 'presentation', as used in combinatorial group theory, is applied to coded character sets(CCSs) - sets which facilitate the interchange of messages in a digital computer network(DCN) . By grouping each element of the set into two portions and using the idea of group presentation(whereby a group is specified by its set of generators and its set of relators), the presentation of a CCS is described. This is illustrated using the Extended Binary Coded Decimal Interchange Code(EBCDIC) which is one of the most popular CCSs in DCNs. Key words: Group presentation, coded character set, digital computer network
[ { "version": "v1", "created": "Mon, 30 Oct 2006 16:03:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Oluwade", "Dele", "" ] ]
cs/0610170
Istvan Szita
Istvan Szita and Andras Lorincz
Low-complexity modular policies: learning to play Pac-Man and a new framework beyond MDPs
23 pages
null
null
null
cs.LG cs.AI
null
In this paper we propose a method that learns to play Pac-Man. We define a set of high-level observation and action modules. Actions are temporally extended, and multiple action modules may be in effect concurrently. A decision of the agent is represented as a rule-based policy. For learning, we apply the cross-entropy method, a recent global optimization algorithm. The learned policies reached better score than the hand-crafted policy, and neared the score of average human players. We argue that learning is successful mainly because (i) the policy space includes the combination of individual actions and thus it is sufficiently rich, (ii) the search is biased towards low-complexity policies and low complexity solutions can be found quickly if they exist. Based on these principles, we formulate a new theoretical framework, which can be found in the Appendix as supporting material.
[ { "version": "v1", "created": "Mon, 30 Oct 2006 16:44:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Szita", "Istvan", "" ], [ "Lorincz", "Andras", "" ] ]
cs/0610172
DaoShun Wang
DaoShun Wang, Feng Yi, Xiaobo Li, Ping Luo and Yiqi Dai
On the Analysis and Generalization of Extended Visual Cryptography Schemes
null
null
null
null
cs.CR
null
An Extended Visual Cryptography Scheme (EVCS) was proposed by Ateniese et al. [3] to protect a binary secret image with meaningful (innocent-looking) shares. This is implemented by concatenating an extended matrix to each basis matrix. The minimum size of the extended matrix was obtained from a hypergraph coloring model and the scheme was designed for binary images only [3]. In this paper, we give a more concise derivation for this matrix extension for color images. Furthermore, we present a (k, n) scheme to protect multiple color images with meaningful shares. This scheme is an extension of the (n, n) VCS for multiple binary images proposed in Droste scheme [2].
[ { "version": "v1", "created": "Tue, 31 Oct 2006 03:43:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Wang", "DaoShun", "" ], [ "Yi", "Feng", "" ], [ "Li", "Xiaobo", "" ], [ "Luo", "Ping", "" ], [ "Dai", "Yiqi", "" ] ]
cs/0610173
Shi Xiao
Shi Xiao and Gaoxi Xiao
On Degree-Based Decentralized Search in Complex Networks
6 pages, 3 figs, shortly published by ECCS'06
null
null
null
cs.PF
null
Decentralized search aims to find the target node in a large network by using only local information. The applications of it include peer-to-peer file sharing, web search and anything else that requires locating a specific target in a complex system. In this paper, we examine the degree-based decentralized search method. Specifically, we evaluate the efficiency of the method in different cases with different amounts of available local information. In addition, we propose a simple refinement algorithm for significantly shortening the length of the route that has been found. Some insights useful for the future developments of efficient decentralized search schemes have been achieved.
[ { "version": "v1", "created": "Tue, 31 Oct 2006 10:09:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Xiao", "Shi", "" ], [ "Xiao", "Gaoxi", "" ] ]
cs/0610174
Marko Samer
Marko Samer, Stefan Szeider
A Fixed-Parameter Algorithm for #SAT with Parameter Incidence Treewidth
9 pages, 1 figure
null
null
null
cs.DS cs.CC cs.LO
null
We present an efficient fixed-parameter algorithm for #SAT parameterized by the incidence treewidth, i.e., the treewidth of the bipartite graph whose vertices are the variables and clauses of the given CNF formula; a variable and a clause are joined by an edge if and only if the variable occurs in the clause. Our algorithm runs in time O(4^k k l N), where k denotes the incidence treewidth, l denotes the size of a largest clause, and N denotes the number of nodes of the tree-decomposition.
[ { "version": "v1", "created": "Tue, 31 Oct 2006 12:58:36 GMT" }, { "version": "v2", "created": "Wed, 21 Feb 2007 20:56:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Samer", "Marko", "" ], [ "Szeider", "Stefan", "" ] ]
cs/0610175
Florentin Smarandache
Jean Dezert, Florentin Smarandache
DSmT: A new paradigm shift for information fusion
11 pages. Presented to Cogis06 International Conference, Paris, France, 2006
null
null
null
cs.AI
null
The management and combination of uncertain, imprecise, fuzzy and even paradoxical or high conflicting sources of information has always been and still remains of primal importance for the development of reliable information fusion systems. In this short survey paper, we present the theory of plausible and paradoxical reasoning, known as DSmT (Dezert-Smarandache Theory) in literature, developed for dealing with imprecise, uncertain and potentially highly conflicting sources of information. DSmT is a new paradigm shift for information fusion and recent publications have shown the interest and the potential ability of DSmT to solve fusion problems where Dempster's rule used in Dempster-Shafer Theory (DST) provides counter-intuitive results or fails to provide useful result at all. This paper is focused on the foundations of DSmT and on its main rules of combination (classic, hybrid and Proportional Conflict Redistribution rules). Shafer's model on which is based DST appears as a particular and specific case of DSm hybrid model which can be easily handled by DSmT as well. Several simple but illustrative examples are given throughout this paper to show the interest and the generality of this new theory.
[ { "version": "v1", "created": "Tue, 31 Oct 2006 14:50:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Dezert", "Jean", "" ], [ "Smarandache", "Florentin", "" ] ]
cs/0611005
Alberto Pepe Mr
Alberto Pepe and Joanne Yeomans
Protocols for Scholarly Communication
8 pages, to appear in Library and Information Systems in Astronomy V
null
null
CERN-OPEN-2006-053
cs.DL
null
CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should naturally guide authors towards OA publication and CERN wants to help reach a full open access publishing environment for the particle physics community and the related sciences in the next few years.
[ { "version": "v1", "created": "Wed, 1 Nov 2006 18:59:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Pepe", "Alberto", "" ], [ "Yeomans", "Joanne", "" ] ]
cs/0611006
Julian Togelius
Julian Togelius and Simon M. Lucas
Evolving controllers for simulated car racing
Won the CEC 2005 Best Student Paper Award
Proceedings of the 2005 Congress on Evolutionary Computation, pages 1906-1913
null
null
cs.NE cs.LG cs.RO
null
This paper describes the evolution of controllers for racing a simulated radio-controlled car around a track, modelled on a real physical track. Five different controller architectures were compared, based on neural networks, force fields and action sequences. The controllers use either egocentric (first person), Newtonian (third person) or no information about the state of the car (open-loop controller). The only controller that was able to evolve good racing behaviour was based on a neural network acting on egocentric inputs.
[ { "version": "v1", "created": "Thu, 2 Nov 2006 00:47:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Togelius", "Julian", "" ], [ "Lucas", "Simon M.", "" ] ]
cs/0611008
Radoslaw Hofman
Radoslaw Hofman
Why Linear Programming cannot solve large instances of NP-complete problems in polynomial time
null
null
null
null
cs.CC cs.DM cs.DS cs.NA
null
This article discusses ability of Linear Programming models to be used as solvers of NP-complete problems. Integer Linear Programming is known as NP-complete problem, but non-integer Linear Programming problems can be solved in polynomial time, what places them in P class. During past three years there appeared some articles using LP to solve NP-complete problems. This methods use large number of variables (O(n^9)) solving correctly almost all instances that can be solved in reasonable time. Can they solve infinitively large instances? This article gives answer to this question.
[ { "version": "v1", "created": "Thu, 2 Nov 2006 08:40:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Hofman", "Radoslaw", "" ] ]
cs/0611013
Osvaldo Oliveira Jr.
Osvaldo N. Oliveira Jr., Valtencir Zucolotto, Sandra M. Aluisio
Developing strategies to produce better scientific papers: a Recipe for non-native users of English
10 pages, 1 figure
null
null
null
cs.OH
null
In this paper we introduce the AMADEUS strategy, which has been used to produce scientific writing tools for non-native users of English for 15 years, and emphasize a learn-by-doing approach through which students and novice writers can improve their scientific writing. More specifically, we provide a 9-step recipe for the students to compile writing material according to a procedure that has proven efficient in scientific writing courses.
[ { "version": "v1", "created": "Fri, 3 Nov 2006 14:07:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Oliveira", "Osvaldo N.", "Jr." ], [ "Zucolotto", "Valtencir", "" ], [ "Aluisio", "Sandra M.", "" ] ]
cs/0611014
Rainer Luetticke
Erik Braun, Rainer Luetticke, Ingo Gloeckner, Hermann Helbig
Interactive Problem Solving in Prolog
4 pages, 1 figure, accepted for publication: Interactive computer aided learning (ICL) 2006, International Conference in Villach (Austria). Paper was not published because the authors were not able to participate on the conference
null
null
null
cs.HC cs.CY cs.PL
null
This paper presents an environment for solving Prolog problems which has been implemented as a module for the virtual laboratory VILAB. During the problem solving processes the learners get fast adaptive feedback. As a result analysing the learner's actions the system suggests the use of suitable auxiliary predicates which will also be checked for proper implementation. The focus of the environment has been set on robustness and the integration in VILAB.
[ { "version": "v1", "created": "Fri, 3 Nov 2006 14:34:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Braun", "Erik", "" ], [ "Luetticke", "Rainer", "" ], [ "Gloeckner", "Ingo", "" ], [ "Helbig", "Hermann", "" ] ]
cs/0611018
Riccardo Pucella
Hubie Chen
Logic Column 17: A Rendezvous of Logic, Complexity, and Algebra
30 pages
null
null
null
cs.LO
null
This article surveys recent advances in applying algebraic techniques to constraint satisfaction problems.
[ { "version": "v1", "created": "Fri, 3 Nov 2006 21:51:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Chen", "Hubie", "" ] ]
cs/0611020
Joy Bose
J. Bose, S.B. Furber, J.L. Shapiro
An associative memory for the on-line recognition and prediction of temporal sequences
Published in IJCNN 2005, Montreal, Canada
null
10.1109/IJCNN.2005.1556028
null
cs.NE cs.AI
null
This paper presents the design of an associative memory with feedback that is capable of on-line temporal sequence learning. A framework for on-line sequence learning has been proposed, and different sequence learning models have been analysed according to this framework. The network model is an associative memory with a separate store for the sequence context of a symbol. A sparse distributed memory is used to gain scalability. The context store combines the functionality of a neural layer with a shift register. The sensitivity of the machine to the sequence context is controllable, resulting in different characteristic behaviours. The model can store and predict on-line sequences of various types and length. Numerical simulations on the model have been carried out to determine its properties.
[ { "version": "v1", "created": "Sun, 5 Nov 2006 01:15:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Bose", "J.", "" ], [ "Furber", "S. B.", "" ], [ "Shapiro", "J. L.", "" ] ]
cs/0611021
Serban Vlad E.
Serban E. Vlad
Relatively inertial delays
the Eleventh Symposium of Mathematics and its Applications, November 2-5, 2006, Timisoara, Romania
null
null
null
cs.OH
null
The paper studies the relatively inertial delays that represent one of the most important concepts in the modeling of the asynchronous circuits.
[ { "version": "v1", "created": "Sun, 5 Nov 2006 08:31:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Vlad", "Serban E.", "" ] ]
cs/0611022
Anurag Ganguli
Anurag Ganguli, Jorge Cortes, Francesco Bullo
Multirobot rendezvous with visibility sensors in nonconvex environments
21 pages
null
null
null
cs.RO
null
This paper presents a coordination algorithm for mobile autonomous robots. Relying upon distributed sensing the robots achieve rendezvous, that is, they move to a common location. Each robot is a point mass moving in a nonconvex environment according to an omnidirectional kinematic model. Each robot is equipped with line-of-sight limited-range sensors, i.e., a robot can measure the relative position of any object (robots or environment boundary) if and only if the object is within a given distance and there are no obstacles in-between. The algorithm is designed using the notions of robust visibility, connectivity-preserving constraint sets, and proximity graphs. Simulations illustrate the theoretical results on the correctness of the proposed algorithm, and its performance in asynchronous setups and with sensor measurement and control errors.
[ { "version": "v1", "created": "Mon, 6 Nov 2006 02:50:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Ganguli", "Anurag", "" ], [ "Cortes", "Jorge", "" ], [ "Bullo", "Francesco", "" ] ]
cs/0611023
Surender Baswana
Surender Baswana
Faster Streaming algorithms for graph spanners
16 pages
null
null
null
cs.DS
null
Given an undirected graph $G=(V,E)$ on $n$ vertices, $m$ edges, and an integer $t\ge 1$, a subgraph $(V,E_S)$, $E_S\subseteq E$ is called a $t$-spanner if for any pair of vertices $u,v \in V$, the distance between them in the subgraph is at most $t$ times the actual distance. We present streaming algorithms for computing a $t$-spanner of essentially optimal size-stretch trade offs for any undirected graph. Our first algorithm is for the classical streaming model and works for unweighted graphs only. The algorithm performs a single pass on the stream of edges and requires $O(m)$ time to process the entire stream of edges. This drastically improves the previous best single pass streaming algorithm for computing a $t$-spanner which requires $\theta(mn^{\frac{2}{t}})$ time to process the stream and computes spanner with size slightly larger than the optimal. Our second algorithm is for {\em StreamSort} model introduced by Aggarwal et al. [FOCS 2004], which is the streaming model augmented with a sorting primitive. The {\em StreamSort} model has been shown to be a more powerful and still very realistic model than the streaming model for massive data sets applications. Our algorithm, which works of weighted graphs as well, performs $O(t)$ passes using $O(\log n)$ bits of working memory only. Our both the algorithms require elementary data structures.
[ { "version": "v1", "created": "Mon, 6 Nov 2006 03:09:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Baswana", "Surender", "" ] ]
cs/0611024
Tony Lee T.
Tony T. Lee and Tong Ye
A Relational Approach to Functional Decomposition of Logic Circuits
29 pages, 12 figures, submitted to Discrete Applied Mathematics
null
null
null
cs.DM cs.LG
null
Functional decomposition of logic circuits has profound influence on all quality aspects of the cost-effective implementation of modern digital systems. In this paper, a relational approach to the decomposition of logic circuits is proposed. This approach is parallel to the normalization of relational databases, they are governed by the same concepts of functional dependency (FD) and multi-valued dependency (MVD). It is manifest that the functional decomposition of switching function actually exploits the same idea and serves a similar purpose as database normalization. Partitions play an important role in the decomposition. The interdependency of two partitions can be represented by a bipartite graph. We demonstrate that both FD and MVD can be represented by bipartite graphs with specific topological properties, which are delineated by partitions of minterms. It follows that our algorithms are procedures of constructing those specific bipartite graphs of interest to meet the information-lossless criteria of functional decomposition.
[ { "version": "v1", "created": "Mon, 6 Nov 2006 08:43:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Lee", "Tony T.", "" ], [ "Ye", "Tong", "" ] ]
cs/0611025
Javier Larrosa
Javier Larrosa, Federico Heras, Simon de Givry
A Logical Approach to Efficient Max-SAT solving
null
null
null
null
cs.AI cs.LO
null
Weighted Max-SAT is the optimization version of SAT and many important problems can be naturally encoded as such. Solving weighted Max-SAT is an important problem from both a theoretical and a practical point of view. In recent years, there has been considerable interest in finding efficient solving techniques. Most of this work focus on the computation of good quality lower bounds to be used within a branch and bound DPLL-like algorithm. Most often, these lower bounds are described in a procedural way. Because of that, it is difficult to realize the {\em logic} that is behind. In this paper we introduce an original framework for Max-SAT that stresses the parallelism with classical SAT. Then, we extend the two basic SAT solving techniques: {\em search} and {\em inference}. We show that many algorithmic {\em tricks} used in state-of-the-art Max-SAT solvers are easily expressable in {\em logic} terms with our framework in a unified manner. Besides, we introduce an original search algorithm that performs a restricted amount of {\em weighted resolution} at each visited node. We empirically compare our algorithm with a variety of solving alternatives on several benchmarks. Our experiments, which constitute to the best of our knowledge the most comprehensive Max-sat evaluation ever reported, show that our algorithm is generally orders of magnitude faster than any competitor.
[ { "version": "v1", "created": "Mon, 6 Nov 2006 12:39:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Larrosa", "Javier", "" ], [ "Heras", "Federico", "" ], [ "de Givry", "Simon", "" ] ]
cs/0611026
Susanne Salmon-Alt
Susanne Salmon-Alt (ATILF), Laurent Romary (INRIA Lorraine - LORIA), Jean-Marie Pierrel (ATILF)
Un mod\`ele g\'en\'erique d'organisation de corpus en ligne: application \`a la FReeBank
null
Traitement Automatique des Langues (TAL) 45 (2006) 145-169
null
null
cs.CL
null
The few available French resources for evaluating linguistic models or algorithms on other linguistic levels than morpho-syntax are either insufficient from quantitative as well as qualitative point of view or not freely accessible. Based on this fact, the FREEBANK project intends to create French corpora constructed using manually revised output from a hybrid Constraint Grammar parser and annotated on several linguistic levels (structure, morpho-syntax, syntax, coreference), with the objective to make them available on-line for research purposes. Therefore, we will focus on using standard annotation schemes, integration of existing resources and maintenance allowing for continuous enrichment of the annotations. Prior to the actual presentation of the prototype that has been implemented, this paper describes a generic model for the organization and deployment of a linguistic resource archive, in compliance with the various works currently conducted within international standardization initiatives (TEI and ISO/TC 37/SC 4).
[ { "version": "v1", "created": "Mon, 6 Nov 2006 14:37:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Salmon-Alt", "Susanne", "", "ATILF" ], [ "Romary", "Laurent", "", "INRIA Lorraine - LORIA" ], [ "Pierrel", "Jean-Marie", "", "ATILF" ] ]
cs/0611031
Scot Anderson
Scot Anderson, Peter Revesz
Efficient Threshold Aggregation of Moving Objects
Technical report on spatiotemporal aggregation prior to journal submission
null
null
null
cs.DB
null
Calculating aggregation operators of moving point objects, using time as a continuous variable, presents unique problems when querying for congestion in a moving and changing (or dynamic) query space. We present a set of congestion query operators, based on a threshold value, that estimate the following 5 aggregation operations in d-dimensions. 1) We call the count of point objects that intersect the dynamic query space during the query time interval, the CountRange. 2) We call the Maximum (or Minimum) congestion in the dynamic query space at any time during the query time interval, the MaxCount (or MinCount). 3) We call the sum of time that the dynamic query space is congested, the ThresholdSum. 4) We call the number of times that the dynamic query space is congested, the ThresholdCount. And 5) we call the average length of time of all the time intervals when the dynamic query space is congested, the ThresholdAverage. These operators rely on a novel approach to transforming the problem of selection based on position to a problem of selection based on a threshold. These operators can be used to predict concentrations of migrating birds that may carry disease such as Bird Flu and hence the information may be used to predict high risk areas. On a smaller scale, those operators are also applicable to maintaining safety in airplane operations. We present the theory of our estimation operators and provide algorithms for exact operators. The implementations of those operators, and experiments, which include data from more than 7500 queries, indicate that our estimation operators produce fast, efficient results with error under 5%.
[ { "version": "v1", "created": "Tue, 7 Nov 2006 18:23:34 GMT" }, { "version": "v2", "created": "Tue, 1 May 2007 19:19:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Anderson", "Scot", "" ], [ "Revesz", "Peter", "" ] ]
cs/0611033
Maria Naya Plasencia
Maria Naya Plasencia (INRIA Rocquencourt)
Cryptanalyse de Achterbahn-128/80
null
null
null
null
cs.CR
null
This paper presents two attacks against Achterbahn-128/80, the last version of one of the stream cipher proposals in the eSTREAM project. The attack against the 80-bit variant, Achterbahn-80, has complexity 2^{56.32}. The attack against Achterbahn-128 requires 2^{75.4} operations and 2^{61} keystream bits. These attacks are based on an improvement of the attack due to Hell and Johansson against Achterbahn version 2 and also on an algorithm that makes profit of the short lengths of the constituent registers. ***** Ce papier pr\'{e}sente deux attaques sur Achterbahn-128/80, la derni\`{e}re version d'un des algorithmes propos\'{e}s dans le cadre de eSTREAM. L'attaque sur la version de 80 bits, Achterbahn-80, est en 2^{56.32}. L'attaque sur Achterbahn-128 a besoin de 2^{75.4} calculs et 2^{61} bits de suite chiffrante. Ces attaques sont bas\'{e}es sur une am\'{e}lioration de l'attaque propos\'{e}e par Hell et Johansson sur la version 2 d'Achterbahn et aussi sur un algorithme qui tire profit des petites longueurs des registres.
[ { "version": "v1", "created": "Wed, 8 Nov 2006 07:48:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Plasencia", "Maria Naya", "", "INRIA Rocquencourt" ] ]
cs/0611035
Claudio Bettini
Claudio Bettini, X. Sean Wang, Sushil Jajodia
The Role of Quasi-identifiers in k-Anonymity Revisited
17 pages. Submitted for publication
null
null
RT-11-06
cs.DB cs.CR
null
The concept of k-anonymity, used in the recent literature to formally evaluate the privacy preservation of published tables, was introduced based on the notion of quasi-identifiers (or QI for short). The process of obtaining k-anonymity for a given private table is first to recognize the QIs in the table, and then to anonymize the QI values, the latter being called k-anonymization. While k-anonymization is usually rigorously validated by the authors, the definition of QI remains mostly informal, and different authors seem to have different interpretations of the concept of QI. The purpose of this paper is to provide a formal underpinning of QI and examine the correctness and incorrectness of various interpretations of QI in our formal framework. We observe that in cases where the concept has been used correctly, its application has been conservative; this note provides a formal understanding of the conservative nature in such cases.
[ { "version": "v1", "created": "Wed, 8 Nov 2006 15:03:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Bettini", "Claudio", "" ], [ "Wang", "X. Sean", "" ], [ "Jajodia", "Sushil", "" ] ]
cs/0611036
Annie Bouyer
Anne Durand (CRAI), Pierre Drap (CRAI), Elise Meyer (CRAI), Pierre Grussenmeyer (CRAI), Jean-Pierre Perrin (CRAI)
Intra-site Level Cultural Heritage Documentation: Combination of Survey, Modeling and Imagery Data in a Web Information System
null
null
null
null
cs.DL
null
Cultural heritage documentation induces the use of computerized techniques to manage and preserve the information produced. Geographical information systems have proved their potentialities in this scope, but they are not always adapted for the management of features at the scale of a particular archaeological site. Moreover, computer applications in archaeology are often technology driven and software constrained. Thus, we propose a tool that tries to avoid these difficulties. We are developing an information system that works over the Internet and that is joined with a web site. Aims are to assist the work of archaeological sites managers and to be a documentation tool about these sites, dedicated to everyone. We devote therefore our system both to the professionals who are in charge of the site, and to the general public who visits it or who wants to have information on it. The system permits to do exploratory analyses of the data, especially at spatial and temporal levels. We propose to record metadata about the archaeological features in XML and to access these features through interactive 2D and 3D representations, and through queries systems (keywords and images). The 2D images, photos, or vectors are generated in SVG, while 3D models are generated in X3D. Archaeological features are also automatically integrated in a MySQL database. The web site is an exchange platform with the information system and is written in PHP. Our first application case is the medieval castle of Vianden, Luxembourg.
[ { "version": "v1", "created": "Wed, 8 Nov 2006 17:35:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Durand", "Anne", "", "CRAI" ], [ "Drap", "Pierre", "", "CRAI" ], [ "Meyer", "Elise", "", "CRAI" ], [ "Grussenmeyer", "Pierre", "", "CRAI" ], [ "Perrin", "Jean-Pierre", "", "CRAI" ] ]
cs/0611039
Maurice Margenstern
Maurice Margenstern, Guentcho Skordev
Substitutions for tilings $\{p,q\}$
null
null
null
2005-102 (Publications du LITA, local research reports)
cs.CG cs.DM
null
In this paper we consider tiling $\{p, q \}$ of the Euclidean space and of the hyperbolic space, and its dual graph $\Gamma_{q, p}$ from a combinatorial point of view. A substitution $\sigma_{q, p}$ on an appropriate finite alphabet is constructed. The homogeneity of graph $\Gamma_{q, p}$ and its generation function are the basic tools for the construction. The tree associated with substitution $\sigma_{q, p}$ is a spanning tree of graph $\Gamma_{q, p}$. Let $u_n$ be the number of tiles of tiling $\{p, q \}$ of generation $n$. The characteristic polynomial of the transition matrix of substitution $\sigma_{q, p}$ is a characteristic polynomial of a linear recurrence. The sequence $(u_n)_{n \geq 0}$ is a solution of this recurrence. The growth of sequence $(u_n)_{n \geq 0}$ is given by the dominant root of the characteristic polynomial.
[ { "version": "v1", "created": "Thu, 9 Nov 2006 07:53:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Margenstern", "Maurice", "" ], [ "Skordev", "Guentcho", "" ] ]
cs/0611041
Vladimir P. Gerdt
V. P. Gerdt
Groebner Bases Applied to Systems of Linear Difference Equations
10 pages, Particles and Nuclei, Letters, to appear
null
null
null
cs.SC
null
In this paper we consider systems of partial (multidimensional) linear difference equations. Specifically, such systems arise in scientific computing under discretization of linear partial differential equations and in computational high energy physics as recurrence relations for multiloop Feynman integrals. The most universal algorithmic tool for investigation of linear difference systems is based on their transformation into an equivalent Groebner basis form. We present an algorithm for this transformation implemented in Maple. The algorithm and its implementation can be applied to automatic generation of difference schemes for linear partial differential equations and to reduction of Feynman integrals. Some illustrative examples are given.
[ { "version": "v1", "created": "Thu, 9 Nov 2006 10:41:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Gerdt", "V. P.", "" ] ]
cs/0611042
Vita Hinze-Hoare
Vita Hinze-Hoare
CSCR:Computer Supported Collaborative Research
3 Pages, 2 figures
null
null
null
cs.HC cs.LG
null
It is suggested that a new area of CSCR (Computer Supported Collaborative Research) is distinguished from CSCW and CSCL and that the demarcation between the three areas could do with greater clarification and prescription.
[ { "version": "v1", "created": "Thu, 9 Nov 2006 21:10:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Hinze-Hoare", "Vita", "" ] ]
cs/0611044
Vladimir Migunov
Vladimir V. Migunov, Rustem R. Kafiyatullov
Protection of the information in a complex CAD system of renovation of industrial firms
6 pages, 2 figures, in Russian
null
null
null
cs.CE
null
The threats to security of the information originating owing to involuntary operations of the users of a CAD, and methods of its protection implemented in a complex CAD system of renovation of firms are considered: rollback, autosave, automatic backup copying and electronic subscript. The specificity of a complex CAD is reflected in necessity of rollback and autosave both of the draw and the parametric representations of its parts, which are the information models of the problem-oriented extensions of the CAD
[ { "version": "v1", "created": "Fri, 10 Nov 2006 07:43:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Migunov", "Vladimir V.", "" ], [ "Kafiyatullov", "Rustem R.", "" ] ]
cs/0611045
Vladimir Migunov
Vladimir V. Migunov
The evolution of the parametric models of drawings (modules) in the enterprises reconstruction CAD system
8 pages, no figures, in Russian
null
null
null
cs.CE
null
Progressing methods of drawings creating automation is discussed on the basis of so-called modules containing parametric representation of a part of the drawing and the geometrical elements. The stages of evolution of modular technology of automation of engineering are describing alternatives of applying of moduluss for simple association of elements of the drawing without parametric representation with an opportunity of its commenting, for graphic symbols creating in the schemas of automation and drawings of pipelines, for storage of the specific properties of elements, for development of the specialized parts of the project: the axonometric schemas, profiles of outboard pipe networks etc.
[ { "version": "v1", "created": "Fri, 10 Nov 2006 07:56:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Migunov", "Vladimir V.", "" ] ]
cs/0611046
Gian Luca Pozzato
Laura Giordano, Valentina Gliozzi, Nicola Olivetti, and Gian Luca Pozzato
Analytic Tableaux Calculi for KLM Logics of Nonmonotonic Reasoning
54 pages + appendix with proofs
null
null
null
cs.LO cs.AI
null
We present tableau calculi for some logics of nonmonotonic reasoning, as defined by Kraus, Lehmann and Magidor. We give a tableau proof procedure for all KLM logics, namely preferential, loop-cumulative, cumulative and rational logics. Our calculi are obtained by introducing suitable modalities to interpret conditional assertions. We provide a decision procedure for the logics considered, and we study their complexity.
[ { "version": "v1", "created": "Fri, 10 Nov 2006 16:49:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Giordano", "Laura", "" ], [ "Gliozzi", "Valentina", "" ], [ "Olivetti", "Nicola", "" ], [ "Pozzato", "Gian Luca", "" ] ]
cs/0611047
Adrian Paschke
Adrian Paschke
The Reaction RuleML Classification of the Event / Action / State Processing and Reasoning Space
The Reaction RuleML Classification of the Event / Action / State Processing and Reasoning Space extracted from Paschke, A.: ECA-RuleML: An Approach combining ECA Rules with temporal interval-based KR Event/Action Logics and Transactional Update Logics, Internet-based Information Systems, Technical University Munich, Technical Report 11 / 2005
null
null
Paschke, A.: The Reaction RuleML Classification of the Event / Action / State Processing and Reasoning Space, White Paper, October, 2006
cs.AI
null
Reaction RuleML is a general, practical, compact and user-friendly XML-serialized language for the family of reaction rules. In this white paper we give a review of the history of event / action /state processing and reaction rule approaches and systems in different domains, define basic concepts and give a classification of the event, action, state processing and reasoning space as well as a discussion of relevant / related work
[ { "version": "v1", "created": "Fri, 10 Nov 2006 22:03:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Paschke", "Adrian", "" ] ]
cs/0611049
Argyn Kuketayev
Argyn Kuketayev
On numerical stability of recursive present value computation method
6 pages, 2 tables
null
null
null
cs.CE cs.NA
null
We analyze numerical stability of a recursive computation scheme of present value (PV) amd show that the absolute error increases exponentially for positive discount rates. We show that reversing the direction of calculations in the recurrence equation yields a robust PV computation routine.
[ { "version": "v1", "created": "Mon, 13 Nov 2006 20:37:42 GMT" }, { "version": "v2", "created": "Wed, 28 Feb 2007 02:06:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Kuketayev", "Argyn", "" ] ]
cs/0611050
Hans-Rudolf Thomann
Hans-Rudolf Thomann
HowTo Authenticate and Encrypt
null
null
null
null
cs.CR
null
Recently, various side-channel attacks on widely used encryption methods have been discovered. Extensive research is currently undertaken to develop new types of combined encryption and authentication mechanisms. Developers of security systems ask whether to implement methods recommended by international standards or to choose one of the new proposals. We explain the nature of the attacks and how they can be avoided, and recommend a sound, provably secure solution: the CCM standard.
[ { "version": "v1", "created": "Mon, 13 Nov 2006 13:40:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Thomann", "Hans-Rudolf", "" ] ]
cs/0611052
Federico Ricci-Tersenghi
Dimitris Achlioptas and Federico Ricci-Tersenghi
On the Solution-Space Geometry of Random Constraint Satisfaction Problems
25 pages, work presented at STOC'06
null
null
null
cs.CC cond-mat.dis-nn
null
For a large number of random constraint satisfaction problems, such as random k-SAT and random graph and hypergraph coloring, there are very good estimates of the largest constraint density for which solutions exist. Yet, all known polynomial-time algorithms for these problems fail to find solutions even at much lower densities. To understand the origin of this gap we study how the structure of the space of solutions evolves in such problems as constraints are added. In particular, we prove that much before solutions disappear, they organize into an exponential number of clusters, each of which is relatively small and far apart from all other clusters. Moreover, inside each cluster most variables are frozen, i.e., take only one value. The existence of such frozen variables gives a satisfying intuitive explanation for the failure of the polynomial-time algorithms analyzed so far. At the same time, our results establish rigorously one of the two main hypotheses underlying Survey Propagation, a heuristic introduced by physicists in recent years that appears to perform extraordinarily well on random constraint satisfaction problems.
[ { "version": "v1", "created": "Mon, 13 Nov 2006 11:09:49 GMT" }, { "version": "v2", "created": "Fri, 15 Dec 2006 11:47:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Achlioptas", "Dimitris", "" ], [ "Ricci-Tersenghi", "Federico", "" ] ]
cs/0611055
Alexandre Courbot
Christophe Rippert (INRIA Futurs), Alexandre Courbot (INRIA Futurs), Gilles Grimaud (INRIA Futurs, LIFL)
A Low-Footprint Class Loading Mechanism for Embedded Java Virtual Machines
null
Dans 3rd ACM International Conference on the Principles and Practice of Programming in Java (2004)
null
null
cs.OS
null
This paper shows that it is possible to dramatically reduce the memory consumption of classes loaded in an embedded Java virtual machine without reducing its functionalities. We describe how to pack the constant pool by deleting entries which are only used during the class loading process. We present some benchmarks which demonstrate the efficiency of this mechanism. We finally suggest some additional optimizations which can be applied if some restrictions to the functionalities of the virtual machine can be tolerated.
[ { "version": "v1", "created": "Tue, 14 Nov 2006 10:11:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Rippert", "Christophe", "", "INRIA Futurs" ], [ "Courbot", "Alexandre", "", "INRIA Futurs" ], [ "Grimaud", "Gilles", "", "INRIA Futurs, LIFL" ] ]
cs/0611057
Laurent Thery
Laurent Thery (INRIA Sophia Antipolis)
Formalising Sylow's theorems in Coq
null
null
null
null
cs.LO
null
This report presents a formalisation of Sylow's theorems done in {\sc Coq}. The formalisation has been done in a couple of weeks on top of Georges Gonthier's {\sc ssreflect} \cite{ssreflect}. There were two ideas behind formalising Sylow's theorems. The first one was to get familiar with Georges way of doing proofs. The second one was to contribute to the collective effort to formalise a large subset of group theory in {\sc Coq} with some non-trivial proofs.}
[ { "version": "v1", "created": "Tue, 14 Nov 2006 12:58:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Thery", "Laurent", "", "INRIA Sophia Antipolis" ] ]
cs/0611060
Henk Moed
Henk F. Moed
The effect of 'Open Access' upon citation impact: An analysis of ArXiv's Condensed Matter Section
Version 13 November 2006. 16 pages, 6 figures, 2 tables
null
null
null
cs.DL cs.IR physics.soc-ph
null
This article statistically analyses how the citation impact of articles deposited in the Condensed Matter section of the preprint server ArXiv (hosted by Cornell University), and subsequently published in a scientific journal, compares to that of articles in the same journal that were not deposited in that archive. Its principal aim is to further illustrate and roughly estimate the effect of two factors, 'early view' and 'quality bias', upon differences in citation impact between these two sets of papers, using citation data from Thomson Scientific's Web of Science. It presents estimates for a number of journals in the field of condensed matter physics. In order to discriminate between an 'open access' effect and an early view effect, longitudinal citation data was analysed covering a time period as long as 7 years. Quality bias was measured by calculating ArXiv citation impact differentials at the level of individual authors publishing in a journal, taking into account co-authorship. The analysis provided evidence of a strong quality bias and early view effect. Correcting for these effects, there is in a sample of 6 condensed matter physics journals studied in detail, no sign of a general 'open access advantage' of papers deposited in ArXiv. The study does provide evidence that ArXiv accelerates citation, due to the fact that that ArXiv makes papers earlier available rather than that it makes papers freely available.
[ { "version": "v1", "created": "Tue, 14 Nov 2006 14:48:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Moed", "Henk F.", "" ] ]
cs/0611061
Jan Dash
Jan W. Dash
Multivariate Integral Perturbation Techniques - I (Theory)
25 pages, 2 figures
null
null
null
cs.CE cs.NA
null
We present a quasi-analytic perturbation expansion for multivariate N-dimensional Gaussian integrals. The perturbation expansion is an infinite series of lower-dimensional integrals (one-dimensional in the simplest approximation). This perturbative idea can also be applied to multivariate Student-t integrals. We evaluate the perturbation expansion explicitly through 2nd order, and discuss the convergence, including enhancement using Pade approximants. Brief comments on potential applications in finance are given, including options, models for credit risk and derivatives, and correlation sensitivities.
[ { "version": "v1", "created": "Tue, 14 Nov 2006 16:58:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Dash", "Jan W.", "" ] ]
cs/0611062
Cas Cremers
Suzana Andova, Cas Cremers, Kristian Gjosteen, Sjouke Mauw, Stig F. Mjolsnes, Sasa Radomirovic
A framework for compositional verification of security protocols
null
null
null
null
cs.CR
null
Automatic security protocol analysis is currently feasible only for small protocols. Since larger protocols quite often are composed of many small protocols, compositional analysis is an attractive, but non-trivial approach. We have developed a framework for compositional analysis of a large class of security protocols. The framework is intended to facilitate automatic as well as manual verification of large structured security protocols. Our approach is to verify properties of component protocols in a multi-protocol environment, then deduce properties about the composed protocol. To reduce the complexity of multi-protocol verification, we introduce a notion of protocol independence and prove a number of theorems that enable analysis of independent component protocols in isolation. To illustrate the applicability of our framework to real-world protocols, we study a key establishment sequence in WiMax consisting of three subprotocols. Except for a small amount of trivial reasoning, the analysis is done using automatic tools.
[ { "version": "v1", "created": "Tue, 14 Nov 2006 18:49:08 GMT" }, { "version": "v2", "created": "Tue, 1 May 2007 10:36:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Andova", "Suzana", "" ], [ "Cremers", "Cas", "" ], [ "Gjosteen", "Kristian", "" ], [ "Mauw", "Sjouke", "" ], [ "Mjolsnes", "Stig F.", "" ], [ "Radomirovic", "Sasa", "" ] ]
cs/0611063
Anuj Kumar
Garud Iyengar and Anuj Kumar
Characterizing Optimal Adword Auctions
29 pages, work was presented at a) Second Workshop on Sponsored Search Auctions, Ann Arbor, MI b) INFORMS Annual Meeting, Pittsburgh c) Decision Sciences Seminar, Fuqua School of Business, Duke University
null
null
CORC Technical Report TR-2006-04 at Computational Optimization Research Center at Columbia University
cs.GT
null
We present a number of models for the adword auctions used for pricing advertising slots on search engines such as Google, Yahoo! etc. We begin with a general problem formulation which allows the privately known valuation per click to be a function of both the identity of the advertiser and the slot. We present a compact characterization of the set of all deterministic incentive compatible direct mechanisms for this model. This new characterization allows us to conclude that there are incentive compatible mechanisms for this auction with a multi-dimensional type-space that are {\em not} affine maximizers. Next, we discuss two interesting special cases: slot independent valuation and slot independent valuation up to a privately known slot and zero thereafter. For both of these special cases, we characterize revenue maximizing and efficiency maximizing mechanisms and show that these mechanisms can be computed with a worst case computational complexity $O(n^2m^2)$ and $O(n^2m^3)$ respectively, where $n$ is number of bidders and $m$ is number of slots. Next, we characterize optimal rank based allocation rules and propose a new mechanism that we call the customized rank based allocation. We report the results of a numerical study that compare the revenue and efficiency of the proposed mechanisms. The numerical results suggest that customized rank-based allocation rule is significantly superior to the rank-based allocation rules.
[ { "version": "v1", "created": "Wed, 15 Nov 2006 19:09:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Iyengar", "Garud", "" ], [ "Kumar", "Anuj", "" ] ]
cs/0611064
Sujay Sanghavi
Sujay Sanghavi, Loc Bui, R. Srikant
Distributed Link Scheduling with Constant Overhead
null
null
null
null
cs.NI cs.PF
null
This paper proposes a new class of simple, distributed algorithms for scheduling in wireless networks. The algorithms generate new schedules in a distributed manner via simple local changes to existing schedules. The class is parameterized by integers $k\geq 1$. We show that algorithm $k$ of our class achieves $k/(k+2)$ of the capacity region, for every $k\geq 1$. The algorithms have small and constant worst-case overheads: in particular, algorithm $k$ generates a new schedule using {\em (a)} time less than $4k+2$ round-trip times between neighboring nodes in the network, and {\em (b)} at most three control transmissions by any given node, for any $k$. The control signals are explicitly specified, and face the same interference effects as normal data transmissions. Our class of distributed wireless scheduling algorithms are the first ones guaranteed to achieve any fixed fraction of the capacity region while using small and constant overheads that do not scale with network size. The parameter $k$ explicitly captures the tradeoff between control overhead and scheduler throughput performance and provides a tuning knob protocol designers can use to harness this trade-off in practice.
[ { "version": "v1", "created": "Tue, 14 Nov 2006 22:58:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Sanghavi", "Sujay", "" ], [ "Bui", "Loc", "" ], [ "Srikant", "R.", "" ] ]
cs/0611066
Andrea Pasquinucci
Andrea Pasquinucci
A modular eballot system - V0.6
15 pages
null
null
null
cs.CR
null
We consider a reasonably simple voting system which can be implemented for web-based ballots. Simplicity, modularity and the requirement of compatibility with current web browsers leads to a system which satisfies a set of security requirements for a ballot system which is not complete but sufficient in many cases. Due to weak-eligibility and vote-selling, this system cannot be used for political or similar ballots.
[ { "version": "v1", "created": "Wed, 15 Nov 2006 09:33:58 GMT" }, { "version": "v2", "created": "Fri, 22 Dec 2006 16:29:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Pasquinucci", "Andrea", "" ] ]
cs/0611067
Andrea Pasquinucci
Andrea Pasquinucci
Implementing the modular eballot system V0.6
9 pages
null
null
null
cs.CR
null
We describe a practical implementation of the modular eballot system proposed in ref.[1]
[ { "version": "v1", "created": "Wed, 15 Nov 2006 09:57:10 GMT" }, { "version": "v2", "created": "Fri, 22 Dec 2006 16:33:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Pasquinucci", "Andrea", "" ] ]
cs/0611068
Sander Spek
Sander Spek, Eric Postma and H. Jaap van den Herik
Wikipedia: organisation from a bottom-up approach
Presented on the Research in Wikipedia workshop, of the WikiSym 2006
null
null
null
cs.DL cs.CY
null
Wikipedia can be considered as an extreme form of a self-managing team, as a means of labour division. One could expect that this bottom-up approach, with the absense of top-down organisational control, would lead to a chaos, but our analysis shows that this is not the case. In the Dutch Wikipedia, an integrated and coherent data structure is created, while at the same time users succeed in distributing roles by self-selection. Some users focus on an area of expertise, while others edit over the whole encyclopedic range. This constitutes our conclusion that Wikipedia, in general, is a successful example of a self-managing team.
[ { "version": "v1", "created": "Wed, 15 Nov 2006 10:27:09 GMT" }, { "version": "v2", "created": "Mon, 11 Dec 2006 10:38:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Spek", "Sander", "" ], [ "Postma", "Eric", "" ], [ "Herik", "H. Jaap van den", "" ] ]
cs/0611069
Guillaume Pitel
Guillaume Pitel (INRIA Lorraine - LORIA)
Scaling Construction Grammar up to Production Systems: the SCIM
null
Dans Scalable Natural Language Understanding 2006 (2006)
null
null
cs.CL
null
While a great effort has concerned the development of fully integrated modular understanding systems, few researches have focused on the problem of unifying existing linguistic formalisms with cognitive processing models. The Situated Constructional Interpretation Model is one of these attempts. In this model, the notion of "construction" has been adapted in order to be able to mimic the behavior of Production Systems. The Construction Grammar approach establishes a model of the relations between linguistic forms and meaning, by the mean of constructions. The latter can be considered as pairings from a topologically structured space to an unstructured space, in some way a special kind of production rules.
[ { "version": "v1", "created": "Wed, 15 Nov 2006 12:35:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Pitel", "Guillaume", "", "INRIA Lorraine - LORIA" ] ]
cs/0611071
Ramya Ravichandar
Ramya Ravichandar, James D. Arthur, Shawn A. Bohner
Capabilities Engineering: Constructing Change-Tolerant Systems
10 pages, 4 Figures, To Appear in Hawaii International Conference on System Sciences 2007
null
null
null
cs.SE
null
We propose a Capabilities-based approach for building long-lived, complex systems that have lengthy development cycles. User needs and technology evolve during these extended development periods, and thereby, inhibit a fixed requirements-oriented solution specification. In effect, for complex emergent systems, the traditional approach of baselining requirements results in an unsatisfactory system. Therefore, we present an alternative approach, Capabilities Engineering, which mathematically exploits the structural semantics of the Function Decomposition graph - a representation of user needs - to formulate Capabilities. For any given software system, the set of derived Capabilities embodies change-tolerant characteristics. More specifically, each individual Capability is a functional abstraction constructed to be highly cohesive and to be minimally coupled with its neighbors. Moreover, the Capability set is chosen to accommodate an incremental development approach, and to reflect the constraints of technology feasibility and implementation schedules. We discuss our validation activities to empirically prove that the Capabilities-based approach results in change-tolerant systems.
[ { "version": "v1", "created": "Wed, 15 Nov 2006 17:12:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Ravichandar", "Ramya", "" ], [ "Arthur", "James D.", "" ], [ "Bohner", "Shawn A.", "" ] ]
cs/0611074
Moustapha Diaby
Moustapha Diaby
On "P = NP: Linear Programming Formulation of the Traveling Salesman Problem": A reply to Hofman's Claim of a "Counter-Example"
7 pages; 5 figures
null
null
null
cs.CC cs.DM
null
We show that Hofman's claim of a "counter-example" to Diaby's LP formulation of the TSP is invalid.
[ { "version": "v1", "created": "Thu, 16 Nov 2006 03:16:04 GMT" }, { "version": "v2", "created": "Thu, 16 Nov 2006 22:33:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Diaby", "Moustapha", "" ] ]
cs/0611077
Mark Burgin
Mark Burgin and Eugene Eberbach
Evolutionary Optimization in an Algorithmic Setting
null
null
null
null
cs.NE cs.AI
null
Evolutionary processes proved very useful for solving optimization problems. In this work, we build a formalization of the notion of cooperation and competition of multiple systems working toward a common optimization goal of the population using evolutionary computation techniques. It is justified that evolutionary algorithms are more expressive than conventional recursive algorithms. Three subclasses of evolutionary algorithms are proposed here: bounded finite, unbounded finite and infinite types. Some results on completeness, optimality and search decidability for the above classes are presented. A natural extension of Evolutionary Turing Machine model developed in this paper allows one to mathematically represent and study properties of cooperation and competition in a population of optimized species.
[ { "version": "v1", "created": "Thu, 16 Nov 2006 03:27:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Burgin", "Mark", "" ], [ "Eberbach", "Eugene", "" ] ]
cs/0611078
Francoise Simonot-Lion
Fran\c{c}oise Simonot-Lion (INRIA Lorraine - LORIA), Fran\c{c}ois Simonot (IECN), Ye-Qiong Song (INRIA Lorraine - LORIA)
Safety Evaluation of Critical Applications Distributed on TDMA-Based Networks
null
Dans Third Taiwanese-French Conference on Information Technology, TFIT'2006 (2006)
null
null
cs.OH
null
Critical embedded systems have to provide a high level of dependability. In automotive domain, for example, TDMA protocols are largely recommended because of their deterministic behavior. Nevertheless, under the transient environmental perturbations, the loss of communication cycles may occur with a certain probability and, consequently, the system may fail. This paper analyzes the impact of the transient perturbations (especially due to Electromagnetic Interferences) on the dependability of systems distributed on TDMA-based networks. The dependability of such system is modeled as that of "consecutive-k-out-of-n:F" systems and we provide a efficient way for its evaluation.
[ { "version": "v1", "created": "Thu, 16 Nov 2006 09:48:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Simonot-Lion", "Françoise", "", "INRIA Lorraine - LORIA" ], [ "Simonot", "François", "", "IECN" ], [ "Song", "Ye-Qiong", "", "INRIA Lorraine - LORIA" ] ]
cs/0611080
Ying Jun Zhang Ph.D.
Ying Jun Zhang
A Multi-server Scheduling Framework for Resource Allocation in Wireless Multi-carrier Networks
null
null
null
null
cs.NA cs.CE cs.NI cs.PF
null
Multiuser resource allocation has recently been recognized as an effective methodology for enhancing the power and spectrum efficiency in OFDM (orthogonal frequency division multiplexing) systems. It is, however, not directly applicable to current packet-switched networks, because (i) most existing packet-scheduling schemes are based on a single-server model and do not serve multiple users at the same time; and (ii) the conventional separate design of MAC (medium access control) packet scheduling and PHY (physical) resource allocation yields inefficient resource utilization. In this paper, we propose a cross-layer resource allocation algorithm based on a novel multi-server scheduling framework to achieve overall high system power efficiency in packet-switched OFDM networks. Our contribution is four fold: (i) we propose and analyze a MPGPS (multi-server packetized general processor sharing) service discipline that serves multiple users at the same time and facilitates multiuser resource allocation; (ii) we present a MPGPS-based joint MAC-PHY resource allocation scheme that incorporates packet scheduling, subcarrier allocation, and power allocation in an integrated framework; (iii) by investigating the fundamental tradeoff between multiuser-diversity and queueing performance, we present an A-MPGPS (adaptive MPGPS) service discipline that strikes balance between power efficiency and queueing performance; and (iv) we extend MPGPS to an O-MPGPS (opportunistic MPGPS) service discipline to further enhance the resource utilization efficiency.
[ { "version": "v1", "created": "Thu, 16 Nov 2006 12:33:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Zhang", "Ying Jun", "" ] ]
cs/0611083
Vladimir Migunov
Vladimir V. Migunov
Environment of development of the programs of parametric creating of the drawings in CAD-system of renovation of the enterprises
5 pages, 3 figures, in Russian
null
null
null
cs.CE
null
The main ideas, data structures, structure and realization of operations with them in environment of development of the programs of parametric creating of the drawings are considered for the needs of the automated design engineering system of renovation of the enterprises. The example of such program and example of application of this environment for creating the drawing of the base for equipment in CAD-system TechnoCAD GlassX are presented
[ { "version": "v1", "created": "Fri, 17 Nov 2006 08:27:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Migunov", "Vladimir V.", "" ] ]
cs/0611085
Timothy McJunkin
Timothy R. McJunkin and Jill R. Scott
Fuzzy Logic Classification of Imaging Laser Desorption Fourier Transform Mass Spectrometry Data
null
null
null
null
cs.AI
null
A fuzzy logic based classification engine has been developed for classifying mass spectra obtained with an imaging internal source Fourier transform mass spectrometer (I^2LD-FTMS). Traditionally, an operator uses the relative abundance of ions with specific mass-to-charge (m/z) ratios to categorize spectra. An operator does this by comparing the spectrum of m/z versus abundance of an unknown sample against a library of spectra from known samples. Automated positioning and acquisition allow I^2LD-FTMS to acquire data from very large grids, this would require classification of up to 3600 spectrum per hour to keep pace with the acquisition. The tedious job of classifying numerous spectra generated in an I^2LD-FTMS imaging application can be replaced by a fuzzy rule base if the cues an operator uses can be encapsulated. We present the translation of linguistic rules to a fuzzy classifier for mineral phases in basalt. This paper also describes a method for gathering statistics on ions, which are not currently used in the rule base, but which may be candidates for making the rule base more accurate and complete or to form new rule bases based on data obtained from known samples. A spatial method for classifying spectra with low membership values, based on neighboring sample classifications, is also presented.
[ { "version": "v1", "created": "Fri, 17 Nov 2006 19:14:47 GMT" } ]
2007-05-23T00:00:00
[ [ "McJunkin", "Timothy R.", "" ], [ "Scott", "Jill R.", "" ] ]
cs/0611087
Vipul Mathur
Naresh Singhmar, Vipul Mathur, Varsha Apte, D. Manjunath
A Combined LIFO-Priority Scheme for Overload Control of E-commerce Web Servers
10 pages, 8 figures, presented at the International Infrastructure Survivability Workshop (affiliated with the 25th IEEE International Real-Time Systems Symposium), Lisbon, Portugal, December 2004
null
null
null
cs.PF
null
E-commerce Web-servers often face overload conditions during which revenue-generating requests may be dropped or abandoned due to an increase in the browsing requests. In this paper we present a simple, yet effective, mechanism for overload control of E-commerce Web-servers. We develop an E-commerce workload model that separates the browsing requests from revenue-generating transaction requests. During overload, we apply LIFO discipline in the browsing queues and use a dynamic priority model to service them. The transaction queues are given absolute priority over the browsing queues. This is called the LIFO-Pri scheduling discipline. Experimental results show that LIFO-Pri dramatically improves the overall Web-server throughput while also increasing the completion rate of revenue-generating requests. The Web-server was able to operate at nearly 60% of its maximum capacity even when offered load was 1.5 times its capacity. Further, when compared to a single queue FIFO system, there was a seven-fold increase in the number of completed revenue-generating requests during overload.
[ { "version": "v1", "created": "Fri, 17 Nov 2006 23:43:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Singhmar", "Naresh", "" ], [ "Mathur", "Vipul", "" ], [ "Apte", "Varsha", "" ], [ "Manjunath", "D.", "" ] ]
cs/0611088
James Oravec
Lawrence L. Larmore and James A. Oravec
T-Theory Applications to Online Algorithms for the Server Problem
19 figures 38 pages
null
null
null
cs.DS cs.DM
null
Although largely unnoticed by the online algorithms community, T-theory, a field of discrete mathematics, has contributed to the development of several online algorithms for the k-server problem. A brief summary of the k-server problem, and some important application concepts of T-theory, are given. Additionally, a number of known k-server results are restated using the established terminology of T-theory. Lastly, a previously unpublished 3-competitiveness proof, using T-theory, for the Harmonic algorithm for two servers is presented.
[ { "version": "v1", "created": "Sat, 18 Nov 2006 19:50:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Larmore", "Lawrence L.", "" ], [ "Oravec", "James A.", "" ] ]
cs/0611091
Elankovan Sundararajan Mr.
Elankovan Sundararajan, Aaron Harwood, Kotagiri Ramamohanarao
Lossy Bulk Synchronous Parallel Processing Model for Very Large Scale Grids
14 pages,15 figures
null
null
null
cs.DC cs.CC cs.PF
null
The performance of a parallel algorithm in a very large scale grid is significantly influenced by the underlying Internet protocols and inter-connectivity. Many grid programming platforms use TCP due to its reliability, usually with some optimizations to reduce its costs. However, TCP does not perform well in a high bandwidth and high delay network environment. On the other hand, UDP is the fastest protocol available because it omits connection setup process, acknowledgments and retransmissions sacrificing reliable transfer. Many new bulk data transfer schemes using UDP for data transmission such as RBUDP, Tsunami, and SABUL have been introduced and shown to have better performance compared to TCP. In this paper, we consider the use of UDP and examine the relationship between packet loss and speedup with respect to the number of grid nodes. Our measurement suggests that packet loss rates between 5%-15% on average are not uncommon between PlanetLab nodes that are widely distributed over the Internet. We show that transmitting multiple copies of same packet produces higher speedup. We show the minimum number of packet duplication required to maximize the possible speedup for a given number of nodes using a BSP based model. Our work demonstrates that by using an appropriate number of packet copies, we can increase performance of parallel program.
[ { "version": "v1", "created": "Mon, 20 Nov 2006 00:20:44 GMT" }, { "version": "v2", "created": "Wed, 20 Dec 2006 05:31:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Sundararajan", "Elankovan", "" ], [ "Harwood", "Aaron", "" ], [ "Ramamohanarao", "Kotagiri", "" ] ]
cs/0611092
Yishay Mor
Yishay Mor and Niall Winters
Design approaches in technology enhanced learning
null
null
null
null
cs.SE cs.CY
null
Design is a critical to the successful development of any interactive learning environment (ILE). Moreover, in technology enhanced learning (TEL), the design process requires input from many diverse areas of expertise. As such, anyone undertaking tool development is required to directly address the design challenge from multiple perspectives. We provide a motivation and rationale for design approaches for learning technologies that draws upon Simon's seminal proposition of Design Science (Simon, 1969). We then review the application of Design Experiments (Brown, 1992) and Design Patterns (Alexander et al., 1977) and argue that a patterns approach has the potential to address many of the critical challenges faced by learning technologists.
[ { "version": "v1", "created": "Mon, 20 Nov 2006 01:19:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Mor", "Yishay", "" ], [ "Winters", "Niall", "" ] ]
cs/0611094
Ravindra Guravannavar
Ravindra Guravannavar, S Sudarshan, Ajit A Diwan, Ch. Sobhan Babu
Reducing Order Enforcement Cost in Complex Query Plans
24 pages, 16 figures
null
null
null
cs.DB
null
Algorithms that exploit sort orders are widely used to implement joins, grouping, duplicate elimination and other set operations. Query optimizers traditionally deal with sort orders by using the notion of interesting orders. The number of interesting orders is unfortunately factorial in the number of participating attributes. Optimizer implementations use heuristics to prune the number of interesting orders, but the quality of the heuristics is unclear. Increasingly complex decision support queries and increasing use of covering indices, which provide multiple alternative sort orders for relations, motivate us to better address the problem of optimization with interesting orders. We show that even a simplified version of optimization with sort orders is NP-hard and provide principled heuristics for choosing interesting orders. We have implemented the proposed techniques in a Volcano-style cost-based optimizer, and our performance study shows significant improvements in estimated cost. We also executed our plans on a widely used commercial database system, and on PostgreSQL, and found that actual execution times for our plans were significantly better than for plans generated by those systems in several cases.
[ { "version": "v1", "created": "Mon, 20 Nov 2006 10:12:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Guravannavar", "Ravindra", "" ], [ "Sudarshan", "S", "" ], [ "Diwan", "Ajit A", "" ], [ "Babu", "Ch. Sobhan", "" ] ]
cs/0611098
Christian Lavault
Christian Lavault (IRISA / INRIA Rennes)
Analysis of an Efficient Distributed Algorithm for Mutual Exclusion (Average-Case Analysis of Path Reversal)
null
LNCS 634 (1992) 133-144
null
null
cs.DC cs.DS
null
The algorithm analysed by Na\"{i}mi, Trehe and Arnold was the very first distributed algorithm to solve the mutual exclusion problem in complete networks by using a dynamic logical tree structure as its basic distributed data structure, viz. a path reversal transformation in rooted n-node trees; besides, it was also the first one to achieve a logarithmic average-case message complexity. The present paper proposes a direct and general approach to compute the moments of the cost of path reversal. It basically uses one-one correspondences between combinatorial structures and the associated probability generating functions: the expected cost of path reversal is thus proved to be exactly $H_{n-1}$. Moreover, time and message complexity of the algorithm as well as randomized bounds on its worst-case message complexity in arbitrary networks are also given. The average-case analysis of path reversal and the analysis of this distributed algorithm for mutual exclusion are thus fully completed in the paper. The general techniques used should also prove available and fruitful when adapted to the most efficient recent tree-based distributed algorithms for mutual exclusion which require powerful tools, particularly for average-case analyses.
[ { "version": "v1", "created": "Mon, 20 Nov 2006 22:02:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Lavault", "Christian", "", "IRISA / INRIA Rennes" ] ]
cs/0611100
Mirco Mannucci Ph.D.
Mirco A. Mannucci, Rose M. Cherubin
Model Theory of Ultrafinitism I: Fuzzy Initial Segments of Arithmetics
31 pages, Tennenbaum Memorial invited talk
null
null
null
cs.LO
null
This article is the first of an intended series of works on the model theory of Ultrafinitism. It is roughly divided into two parts. The first one addresses some of the issues related to ultrafinitistic programs, as well as some of the core ideas proposed thus far. The second part of the paper presents a model of ultrafinitistic arithmetics based on the notion of fuzzy initial segments of the standard natural numbers series. We also introduce a proof theory and a semantics for ultrafinitism through which feasibly consistent theories can be treated on the same footing as their classically consistent counterparts. We conclude with a brief sketch of a foundational program, that aims at reproducing the transfinite within the finite realm.
[ { "version": "v1", "created": "Tue, 21 Nov 2006 03:05:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Mannucci", "Mirco A.", "" ], [ "Cherubin", "Rose M.", "" ] ]
cs/0611102
Hanno Langweg
Hanno Langweg and Tommy Kristiansen
Extending the Trusted Path in Client-Server Interaction
8 pages, 3 figures
null
null
null
cs.CR
null
We present a method to secure the complete path between a server and the local human user at a network node. This is useful for scenarios like internet banking, electronic signatures, or online voting. Protection of input authenticity and output integrity and authenticity is accomplished by a combination of traditional and novel technologies, e.g., SSL, ActiveX, and DirectX. Our approach does not require administrative privileges to deploy and is hence suitable for consumer applications. Results are based on the implementation of a proof-of-concept application for the Windows platform.
[ { "version": "v1", "created": "Tue, 21 Nov 2006 12:13:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Langweg", "Hanno", "" ], [ "Kristiansen", "Tommy", "" ] ]
cs/0611103
Petteri Kaski
Petteri Kaski
Barriers and local minima in energy landscapes of stochastic local search
null
null
null
null
cs.CC cond-mat.stat-mech
null
A local search algorithm operating on an instance of a Boolean constraint satisfaction problem (in particular, k-SAT) can be viewed as a stochastic process traversing successive adjacent states in an ``energy landscape'' defined by the problem instance on the n-dimensional Boolean hypercube. We investigate analytically the worst-case topography of such landscapes in the context of satisfiable k-SAT via a random ensemble of satisfiable ``k-regular'' linear equations modulo 2. We show that for each fixed k=3,4,..., the typical k-SAT energy landscape induced by an instance drawn from the ensemble has a set of 2^{\Omega(n)} local energy minima, each separated by an unconditional \Omega(n) energy barrier from each of the O(1) ground states, that is, solution states with zero energy. The main technical aspect of the analysis is that a random k-regular 0/1 matrix constitutes a strong boundary expander with almost full GF(2)-linear rank, a property which also enables us to prove a 2^{\Omega(n)} lower bound for the expected number of steps required by the focused random walk heuristic to solve typical instances drawn from the ensemble. These results paint a grim picture of the worst-case topography of k-SAT for local search, and constitute apparently the first rigorous analysis of the growth of energy barriers in a random ensemble of k-SAT landscapes as the number of variables n is increased.
[ { "version": "v1", "created": "Tue, 21 Nov 2006 12:52:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Kaski", "Petteri", "" ] ]
cs/0611107
Adam L. Buchsbaum
Adam L. Buchsbaum, Emden R. Gansner, Cecilia M. Procopiuc, Suresh Venkatasubramanian
Rectangular Layouts and Contact Graphs
28 pages, 13 figures, 55 references, 1 appendix
null
null
null
cs.DS cs.DM
null
Contact graphs of isothetic rectangles unify many concepts from applications including VLSI and architectural design, computational geometry, and GIS. Minimizing the area of their corresponding {\em rectangular layouts} is a key problem. We study the area-optimization problem and show that it is NP-hard to find a minimum-area rectangular layout of a given contact graph. We present O(n)-time algorithms that construct $O(n^2)$-area rectangular layouts for general contact graphs and $O(n\log n)$-area rectangular layouts for trees. (For trees, this is an $O(\log n)$-approximation algorithm.) We also present an infinite family of graphs (rsp., trees) that require $\Omega(n^2)$ (rsp., $\Omega(n\log n)$) area. We derive these results by presenting a new characterization of graphs that admit rectangular layouts using the related concept of {\em rectangular duals}. A corollary to our results relates the class of graphs that admit rectangular layouts to {\em rectangle of influence drawings}.
[ { "version": "v1", "created": "Tue, 21 Nov 2006 15:03:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Buchsbaum", "Adam L.", "" ], [ "Gansner", "Emden R.", "" ], [ "Procopiuc", "Cecilia M.", "" ], [ "Venkatasubramanian", "Suresh", "" ] ]
cs/0611108
Jon Feldman
Jon Feldman, S. Muthukrishnan, Anastasios Sidiropoulos, Cliff Stein, Zoya Svitkina
On the Complexity of Processing Massive, Unordered, Distributed Data
null
null
null
null
cs.CC cs.DC
null
An existing approach for dealing with massive data sets is to stream over the input in few passes and perform computations with sublinear resources. This method does not work for truly massive data where even making a single pass over the data with a processor is prohibitive. Successful log processing systems in practice such as Google's MapReduce and Apache's Hadoop use multiple machines. They efficiently perform a certain class of highly distributable computations defined by local computations that can be applied in any order to the input. Motivated by the success of these systems, we introduce a simple algorithmic model for massive, unordered, distributed (mud) computation. We initiate the study of understanding its computational complexity. Our main result is a positive one: any unordered function that can be computed by a streaming algorithm can also be computed with a mud algorithm, with comparable space and communication complexity. We extend this result to some useful classes of approximate and randomized streaming algorithms. We also give negative results, using communication complexity arguments to prove that extensions to private randomness, promise problems and indeterminate functions are impossible. We believe that the line of research we introduce in this paper has the potential for tremendous impact. The distributed systems that motivate our work successfully process data at an unprecedented scale, distributed over hundreds or even thousands of machines, and perform hundreds of such analyses each day. The mud model (and its generalizations) inspire a set of complexity-theoretic questions that lie at their heart.
[ { "version": "v1", "created": "Tue, 21 Nov 2006 16:11:06 GMT" }, { "version": "v2", "created": "Tue, 22 May 2007 14:35:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Feldman", "Jon", "" ], [ "Muthukrishnan", "S.", "" ], [ "Sidiropoulos", "Anastasios", "" ], [ "Stein", "Cliff", "" ], [ "Svitkina", "Zoya", "" ] ]
cs/0611110
Amine Chigani
Amine Chigani, James D. Arthur
The Implications of Network-Centric Software Systems on Software Architecture: A Critical Evaluation
6 pages, 2 figures, ACMSE Conference 2007
null
null
null
cs.SE
null
The purpose of this paper is to evaluate the impact of emerging network-centric software systems on the field of software architecture. We first develop an insight concerning the term "network-centric" by presenting its origin and its implications within the context of software architecture. On the basis of this insight, we present our definition of a network-centric framework and its distinguishing characteristics. We then enumerate the challenges that face the field of software architecture as software development shifts from a platform-centric to a network-centric model. In order to face these challenges, we propose a formal approach embodied in a new architectural style that supports overcoming these challenges at the architectural level. Finally, we conclude by presenting an illustrative example to demonstrate the usefulness of the concepts of network centricity, summarizing our contributions, and linking our approach to future work that needs to be done in this area.
[ { "version": "v1", "created": "Tue, 21 Nov 2006 19:23:32 GMT" }, { "version": "v2", "created": "Sat, 30 Dec 2006 03:38:50 GMT" }, { "version": "v3", "created": "Sat, 10 Feb 2007 21:30:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Chigani", "Amine", "" ], [ "Arthur", "James D.", "" ] ]
cs/0611113
Maurice H. T. Ling
Maurice HT Ling
An Anthological Review of Research Utilizing MontyLingua, a Python-Based End-to-End Text Processor
9 pages
Ling, Maurice HT. 2006. An Anthological Review of Research Utilizing MontyLingua, a Python-Based End-to-End Text Processor. The Python Papers 1 (1): 5-13
null
null
cs.CL
null
MontyLingua, an integral part of ConceptNet which is currently the largest commonsense knowledge base, is an English text processor developed using Python programming language in MIT Media Lab. The main feature of MontyLingua is the coverage for all aspects of English text processing from raw input text to semantic meanings and summary generation, yet each component in MontyLingua is loosely-coupled to each other at the architectural and code level, which enabled individual components to be used independently or substituted. However, there has been no review exploring the role of MontyLingua in recent research work utilizing it. This paper aims to review the use of and roles played by MontyLingua and its components in research work published in 19 articles between October 2004 and August 2006. We had observed a diversified use of MontyLingua in many different areas, both generic and domain-specific. Although the use of text summarizing component had not been observe, we are optimistic that it will have a crucial role in managing the current trend of information overload in future research.
[ { "version": "v1", "created": "Wed, 22 Nov 2006 03:24:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Ling", "Maurice HT", "" ] ]
cs/0611115
Ian Jermyn
Peter Horvath (INRIA Sophia Antipolis), Ian Jermyn (INRIA Sophia Antipolis), Zoltan Kato, Josiane Zerubia (INRIA Sophia Antipolis)
A higher-order active contour model of a `gas of circles' and its application to tree crown extraction
null
null
null
null
cs.CV
null
Many image processing problems involve identifying the region in the image domain occupied by a given entity in the scene. Automatic solution of these problems requires models that incorporate significant prior knowledge about the shape of the region. Many methods for including such knowledge run into difficulties when the topology of the region is unknown a priori, for example when the entity is composed of an unknown number of similar objects. Higher-order active contours (HOACs) represent one method for the modelling of non-trivial prior knowledge about shape without necessarily constraining region topology, via the inclusion of non-local interactions between region boundary points in the energy defining the model. The case of an unknown number of circular objects arises in a number of domains, e.g. medical, biological, nanotechnological, and remote sensing imagery. Regions composed of an a priori unknown number of circles may be referred to as a `gas of circles'. In this report, we present a HOAC model of a `gas of circles'. In order to guarantee stable circles, we conduct a stability analysis via a functional Taylor expansion of the HOAC energy around a circular shape. This analysis fixes one of the model parameters in terms of the others and constrains the rest. In conjunction with a suitable likelihood energy, we apply the model to the extraction of tree crowns from aerial imagery, and show that the new model outperforms other techniques.
[ { "version": "v1", "created": "Wed, 22 Nov 2006 13:44:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Horvath", "Peter", "", "INRIA Sophia Antipolis" ], [ "Jermyn", "Ian", "", "INRIA Sophia\n Antipolis" ], [ "Kato", "Zoltan", "", "INRIA Sophia Antipolis" ], [ "Zerubia", "Josiane", "", "INRIA Sophia Antipolis" ] ]
cs/0611117
Mikhail Nesterenko
Mark Miyashita and Mikhail Nesterenko
2FACE: Bi-Directional Face Traversal for Efficient Geometric Routing
null
null
null
null
cs.DC cs.DS cs.OS
null
We propose bi-directional face traversal algorithm $2FACE$ to shorten the path the message takes to reach the destination in geometric routing. Our algorithm combines the practicality of the best single-direction traversal algorithms with the worst case message complexity of $O(|E|)$, where $E$ is the number of network edges. We apply $2FACE$ to a variety of geometric routing algorithms. Our simulation results indicate that bi-directional face traversal decreases the latency of message delivery two to three times compared to single direction face traversal. The thus selected path approaches the shortest possible route. This gain in speed comes with a similar message overhead increase. We describe an algorithm which compensates for this message overhead by recording the preferable face traversal direction. Thus, if a source has several messages to send to the destination, the subsequent messages follow the shortest route. Our simulation results show that with most geometric routing algorithms the message overhead of finding the short route by bi-directional face traversal is compensated within two to four repeat messages.
[ { "version": "v1", "created": "Wed, 22 Nov 2006 19:28:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Miyashita", "Mark", "" ], [ "Nesterenko", "Mikhail", "" ] ]
cs/0611122
Adrian Paschke
Adrian Paschke, Martin Bichler
Knowledge Representation Concepts for Automated SLA Management
Paschke, A. and Bichler, M.: Knowledge Representation Concepts for Automated SLA Management, Int. Journal of Decision Support Systems (DSS), submitted 19th March 2006
null
null
null
cs.SE cs.AI cs.LO cs.PL
null
Outsourcing of complex IT infrastructure to IT service providers has increased substantially during the past years. IT service providers must be able to fulfil their service-quality commitments based upon predefined Service Level Agreements (SLAs) with the service customer. They need to manage, execute and maintain thousands of SLAs for different customers and different types of services, which needs new levels of flexibility and automation not available with the current technology. The complexity of contractual logic in SLAs requires new forms of knowledge representation to automatically draw inferences and execute contractual agreements. A logic-based approach provides several advantages including automated rule chaining allowing for compact knowledge representation as well as flexibility to adapt to rapidly changing business requirements. We suggest adequate logical formalisms for representation and enforcement of SLA rules and describe a proof-of-concept implementation. The article describes selected formalisms of the ContractLog KR and their adequacy for automated SLA management and presents results of experiments to demonstrate flexibility and scalability of the approach.
[ { "version": "v1", "created": "Thu, 23 Nov 2006 13:25:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Paschke", "Adrian", "" ], [ "Bichler", "Martin", "" ] ]
cs/0611124
Francis Bach
Jacob Abernethy, Francis Bach, Theodoros Evgeniou, Jean-Philippe Vert
Low-rank matrix factorization with attributes
12 pages, 2 figures
null
null
N-24/06/MM
cs.LG cs.AI cs.IR
null
We develop a new collaborative filtering (CF) method that combines both previously known users' preferences, i.e. standard CF, as well as product/user attributes, i.e. classical function approximation, to predict a given user's interest in a particular product. Our method is a generalized low rank matrix completion problem, where we learn a function whose inputs are pairs of vectors -- the standard low rank matrix completion problem being a special case where the inputs to the function are the row and column indices of the matrix. We solve this generalized matrix completion problem using tensor product kernels for which we also formally generalize standard kernel properties. Benchmark experiments on movie ratings show the advantages of our generalized matrix completion method over the standard matrix completion one with no information about movies or people, as well as over standard multi-task or single task learning methods.
[ { "version": "v1", "created": "Fri, 24 Nov 2006 08:49:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Abernethy", "Jacob", "" ], [ "Bach", "Francis", "" ], [ "Evgeniou", "Theodoros", "" ], [ "Vert", "Jean-Philippe", "" ] ]
cs/0611126
Mahmoud Fouz
Benjamin Doerr, Mahmoud Fouz
Hereditary Discrepancies in Different Numbers of Colors II
null
null
null
null
cs.DM
null
We bound the hereditary discrepancy of a hypergraph $\HH$ in two colors in terms of its hereditary discrepancy in $c$ colors. We show that $\herdisc(\HH,2) \le K c \herdisc(\HH,c)$, where $K$ is some absolute constant. This bound is sharp.
[ { "version": "v1", "created": "Fri, 24 Nov 2006 14:46:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Doerr", "Benjamin", "" ], [ "Fouz", "Mahmoud", "" ] ]
cs/0611128
Hasan Guclu
Hasan Guclu and Murat Yuksel
Scale-Free Overlay Topologies with Hard Cutoffs for Unstructured Peer-to-Peer Networks
19 pages, 12 figures, submitted to ICDCS 2007 (International Conference on Distributed Computing Systems 2007), one minor correction and formatting changes
null
null
null
cs.NI cs.DC
null
In unstructured peer-to-peer (P2P) networks, the overlay topology (or connectivity graph) among peers is a crucial component in addition to the peer/data organization and search. Topological characteristics have profound impact on the efficiency of search on such unstructured P2P networks as well as other networks. It has been well-known that search on small-world topologies of N nodes can be as efficient as O(ln N), while scale-free (power-law) topologies offer even better search efficiencies like as good as O(lnln N) for a range of degree distribution exponents. However, generation and maintenance of such scale-free topologies are hard to realize in a distributed and potentially uncooperative environments as in the P2P networks. A key limitation of scale-free topologies is the high load (i.e. high degree) on very few number of hub nodes. In a typical unstructured P2P network, peers are not willing to maintain high degrees/loads as they may not want to store large number of entries for construction of the overlay topology. So, to achieve fairness and practicality among all peers, hard cutoffs on the number of entries are imposed by the individual peers, which limits scale-freeness of the overall topology. Thus, efficiency of the flooding search reduces as the size of the hard cutoff does. We investigate construction of scale-free topologies with hard cutoffs (i.e. there are not any major hubs) and effect of these hard cutoffs on the search efficiency. Interestingly, we observe that the efficiency of normalized flooding and random walk search algorithms increases as the hard cutoff decreases.
[ { "version": "v1", "created": "Sat, 25 Nov 2006 21:49:55 GMT" }, { "version": "v2", "created": "Tue, 5 Dec 2006 02:44:00 GMT" }, { "version": "v3", "created": "Wed, 6 Dec 2006 18:21:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Guclu", "Hasan", "" ], [ "Yuksel", "Murat", "" ] ]
cs/0611132
Vladimir Migunov
Vladimir V. Migunov
The specifications making in complex CAD-system of renovation of the enterprises on the basis of modules in the drawing and electronic catalogues
8 pages, 4 figures, in Russian
null
null
null
cs.CE
null
The experience of automation of the specifications making of the projects of renovation of the industrial enterprises is described, being based on the special modules in the drawing containing the visible image and additional parameters, and electronic catalogues
[ { "version": "v1", "created": "Mon, 27 Nov 2006 04:31:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Migunov", "Vladimir V.", "" ] ]