id
stringlengths 9
10
| submitter
stringlengths 2
52
⌀ | authors
stringlengths 4
6.51k
| title
stringlengths 4
246
| comments
stringlengths 1
523
⌀ | journal-ref
stringlengths 4
345
⌀ | doi
stringlengths 11
120
⌀ | report-no
stringlengths 2
243
⌀ | categories
stringlengths 5
98
| license
stringclasses 9
values | abstract
stringlengths 33
3.33k
| versions
list | update_date
timestamp[s] | authors_parsed
list | prediction
stringclasses 1
value | probability
float64 0.95
1
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0009017 | Christof Monz | Christof Monz, Maarten de Rijke | A Tableau Calculus for Pronoun Resolution | 16 pages | In: N.V. Murray (ed.) Automated Reasoning with Analytic Tableaux
and Related Methods. Lecture Notes in Artificial Intelligence 1617, Springer,
1999, pages 247-262 | null | null | cs.CL cs.AI | null | We present a tableau calculus for reasoning in fragments of natural language.
We focus on the problem of pronoun resolution and the way in which it
complicates automated theorem proving for natural language processing. A method
for explicitly manipulating contextual information during deduction is
proposed, where pronouns are resolved against this context during deduction. As
a result, pronoun resolution and deduction can be interleaved in such a way
that pronouns are only resolved if this is licensed by a deduction rule; this
helps us to avoid the combinatorial complexity of total pronoun disambiguation.
| [
{
"version": "v1",
"created": "Thu, 21 Sep 2000 14:49:19 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Monz",
"Christof",
""
],
[
"de Rijke",
"Maarten",
""
]
]
| new_dataset | 0.99349 |
cs/0009029 | Matthew Huntbach | Matthew Huntbach | The Concurrent Language Aldwych | Presented at RULE 2000, First International Workshop on Rule-Based
Programming, Montreal, Canada | null | null | null | cs.PL | null | Aldwych is proposed as the foundation of a general purpose language for
parallel applications. It works on a rule-based principle, and has aspects
variously of concurrent functional, logic and object-oriented languages, yet it
forms an integrated whole. It is intended to be applicable both for small-scale
parallel programming, and for large-scale open systems.
| [
{
"version": "v1",
"created": "Fri, 29 Sep 2000 14:24:39 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Huntbach",
"Matthew",
""
]
]
| new_dataset | 0.999785 |
cs/0010013 | Igor Sobrado Delgado | Diego Rodriguez (University of Oviedo), Igor Sobrado (University of
Oviedo) | A Public-key based Information Management Model for Mobile Agents | 7 pages, 0 PostScript figures, uses IEEE/LaTeX macros
IEEEtran.{bst|cls} | null | null | FFUOV-00/04 | cs.CR cs.DC cs.IR cs.NI | null | Mobile code based computing requires development of protection schemes that
allow digital signature and encryption of data collected by the agents in
untrusted hosts. These algorithms could not rely on carrying encryption keys if
these keys could be stolen or used to counterfeit data by hostile hosts and
agents. As a consequence, both information and keys must be protected in a way
that only authorized hosts, that is the host that provides information and the
server that has sent the mobile agent, could modify (by changing or removing)
retrieved data. The data management model proposed in this work allows the
information collected by the agents to be protected against handling by other
hosts in the information network. It has been done by using standard public-key
cryptography modified to support protection of data in distributed environments
without requiring an interactive protocol with the host that has dropped the
agent. Their significance stands on the fact that it is the first model that
supports a full-featured protection of mobile agents allowing remote hosts to
change its own information if required before agent returns to its originating
server.
| [
{
"version": "v1",
"created": "Mon, 9 Oct 2000 20:17:35 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Rodriguez",
"Diego",
"",
"University of Oviedo"
],
[
"Sobrado",
"Igor",
"",
"University of\n Oviedo"
]
]
| new_dataset | 0.965753 |
cs/0010014 | Sergei Skorik | Sergei Skorik and Frederic Berthommier | On a cepstrum-based speech detector robust to white noise | 4 pages pdf format, requires Acrobat Reader v 4.0 or later | null | null | null | cs.CL cs.CV cs.HC | null | We study effects of additive white noise on the cepstral representation of
speech signals. Distribution of each individual cepstrum coefficient of speech
is shown to depend strongly on noise and to overlap significantly with the
cepstrum distribution of noise. Based on these studies, we suggest a scalar
quantity, V, equal to the sum of weighted cepstral coefficients, which is able
to classify frames containing speech against noise-like frames. The
distributions of V for speech and noise frames are reasonably well separated
above SNR = 5 dB, demonstrating the feasibility of robust speech detector based
on V.
| [
{
"version": "v1",
"created": "Tue, 10 Oct 2000 17:33:02 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Skorik",
"Sergei",
""
],
[
"Berthommier",
"Frederic",
""
]
]
| new_dataset | 0.982126 |
cs/0010032 | Stefan Brass | Stefan Brass, Juergen Dix, Teodor C. Przymusinski | Super Logic Programs | 47 pages, revised version of the paper submitted 10/2000 | null | null | null | cs.AI cs.LO | null | The Autoepistemic Logic of Knowledge and Belief (AELB) is a powerful
nonmonotic formalism introduced by Teodor Przymusinski in 1994. In this paper,
we specialize it to a class of theories called `super logic programs'. We argue
that these programs form a natural generalization of standard logic programs.
In particular, they allow disjunctions and default negation of arbibrary
positive objective formulas.
Our main results are two new and powerful characterizations of the static
semant ics of these programs, one syntactic, and one model-theoretic. The
syntactic fixed point characterization is much simpler than the fixed point
construction of the static semantics for arbitrary AELB theories. The
model-theoretic characterization via Kripke models allows one to construct
finite representations of the inherently infinite static expansions.
Both characterizations can be used as the basis of algorithms for query
answering under the static semantics. We describe a query-answering interpreter
for super programs which we developed based on the model-theoretic
characterization and which is available on the web.
| [
{
"version": "v1",
"created": "Wed, 25 Oct 2000 13:32:51 GMT"
},
{
"version": "v2",
"created": "Sat, 30 Mar 2002 12:12:52 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Brass",
"Stefan",
""
],
[
"Dix",
"Juergen",
""
],
[
"Przymusinski",
"Teodor C.",
""
]
]
| new_dataset | 0.99607 |
cs/0011010 | Dale E. Parson | Dale Parson, Bryan Schlieder, Paul Beatty | Extension Language Automation of Embedded System Debugging | In M. Ducasse (ed), proceedings of the Fourth International Workshop
on Automated Debugging (AADebug 2000), August 2000, Munich. cs.SE/0010035 | null | null | null | cs.SE cs.PL | null | Embedded systems contain several layers of target processing abstraction.
These layers include electronic circuit, binary machine code, mnemonic assembly
code, and high-level procedural and object-oriented abstractions. Physical and
temporal constraints and artifacts within physically embedded systems make it
impossible for software engineers to operate at a single layer of processor
abstraction. The Luxdbg embedded system debugger exposes these layers to
debugger users, and it adds an additional layer, the extension language layer,
that allows users to extend both the debugger and its target processor
capabilities. Tcl is Luxdbg's extension language. Luxdbg users can apply Tcl to
automate interactive debugging steps, to redirect and to interconnect target
processor input-output facilities, to schedule multiple processor execution, to
log and to react to target processing exceptions, and to automate target system
testing. Inclusion of an extension language like Tcl in a debugger promises
additional advantages for distributed debugging, where debuggers can pass
extension language expressions across computer networks.
| [
{
"version": "v1",
"created": "Mon, 6 Nov 2000 23:16:22 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Parson",
"Dale",
""
],
[
"Schlieder",
"Bryan",
""
],
[
"Beatty",
"Paul",
""
]
]
| new_dataset | 0.990296 |
cs/0012007 | Yasuhiro Ajiro | Yasuhiro Ajiro and Kazunori Ueda | Kima - an Automated Error Correction System for Concurrent Logic
Programs | In M. Ducasse (ed), proceedings of the Fourth International Workshop
on Automated Debugging (AADEBUG 2000), August 2000, Munich. cs.SE/0010035 | null | null | null | cs.SE cs.PL | null | We have implemented Kima, an automated error correction system for concurrent
logic programs. Kima corrects near-misses such as wrong variable occurrences in
the absence of explicit declarations of program properties. Strong
moding/typing and constraint-based analysis are turning to play fundamental
roles in debugging concurrent logic programs as well as in establishing the
consistency of communication protocols and data types. Mode/type analysis of
Moded Flat GHC is a constraint satisfaction problem with many simple mode/type
constraints, and can be solved efficiently. We proposed a simple and efficient
technique which, given a non-well-moded/typed program, diagnoses the
``reasons'' of inconsistency by finding minimal inconsistent subsets of
mode/type constraints. Since each constraint keeps track of the symbol
occurrence in the program, a minimal subset also tells possible sources of
program errors. Kima realizes automated correction by replacing symbol
occurrences around the possible sources and recalculating modes and types of
the rewritten programs systematically. As long as bugs are near-misses, Kima
proposes a rather small number of alternatives that include an intended
program.
| [
{
"version": "v1",
"created": "Wed, 13 Dec 2000 08:48:06 GMT"
},
{
"version": "v2",
"created": "Thu, 4 Jan 2001 13:28:06 GMT"
},
{
"version": "v3",
"created": "Fri, 5 Jan 2001 07:38:41 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ajiro",
"Yasuhiro",
""
],
[
"Ueda",
"Kazunori",
""
]
]
| new_dataset | 0.99166 |
cs/0101002 | David J. Murray | David J. Murray (Lehigh University), Dale E. Parson (Lucent
Technologies) | Automated Debugging In Java Using OCL And JDI | In M. Ducasse (ed), proceedings of the Fourth International Workshop
on Automated Debugging (AADEBUG 2000), August 2000, Munich. See cs.SE/0010035 | null | null | null | cs.SE cs.PL | null | Correctness constraints provide a foundation for automated debugging within
object-oriented systems. This paper discusses a new approach to incorporating
correctness constraints into Java development environments. Our approach uses
the Object Constraint Language ("OCL") as a specification language and the Java
Debug Interface ("JDI") as a verification API. OCL provides a standard language
for expressing object-oriented constraints that can integrate with Unified
Modeling Language ("UML") software models. JDI provides a standard Java API
capable of supporting type-safe and side effect free runtime constraint
evaluation. The resulting correctness constraint mechanism: (1) entails no
programming language modifications; (2) requires neither access nor changes to
existing source code; and (3) works with standard off-the-shelf Java virtual
machines ("VMs"). A prototype correctness constraint auditor is presented to
demonstrate the utility of this mechanism for purposes of automated debugging.
| [
{
"version": "v1",
"created": "Wed, 3 Jan 2001 22:48:24 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Murray",
"David J.",
"",
"Lehigh University"
],
[
"Parson",
"Dale E.",
"",
"Lucent\n Technologies"
]
]
| new_dataset | 0.988172 |
cs/0101030 | Ming-Yang Kao | Ming-Yang Kao | Tree Contractions and Evolutionary Trees | null | SIAM Journal on Computing, 27(6):1592--1616, December 1998 | null | null | cs.CE cs.DS | null | An evolutionary tree is a rooted tree where each internal vertex has at least
two children and where the leaves are labeled with distinct symbols
representing species. Evolutionary trees are useful for modeling the
evolutionary history of species. An agreement subtree of two evolutionary trees
is an evolutionary tree which is also a topological subtree of the two given
trees. We give an algorithm to determine the largest possible number of leaves
in any agreement subtree of two trees T_1 and T_2 with n leaves each. If the
maximum degree d of these trees is bounded by a constant, the time complexity
is O(n log^2(n)) and is within a log(n) factor of optimal. For general d, this
algorithm runs in O(n d^2 log(d) log^2(n)) time or alternatively in O(n d
sqrt(d) log^3(n)) time.
| [
{
"version": "v1",
"created": "Fri, 26 Jan 2001 21:36:30 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kao",
"Ming-Yang",
""
]
]
| new_dataset | 0.967106 |
cs/0101035 | Paul M. Aoki | Allison Woodruff, Paul M. Aoki, Amy Hurst, Margaret H. Szymanski | The Guidebook, the Friend, and the Room: Visitor Experience in a
Historic House | null | Extended Abstracts, ACM SIGCHI Conf. on Human Factors in Computing
Systems, Seattle, WA, March 2001, 273-274. ACM Press. | 10.1145/634067.634229 | null | cs.HC | null | In this paper, we describe an electronic guidebook prototype and report on a
study of its use in a historic house. Supported by mechanisms in the guidebook,
visitors constructed experiences that had a high degree of interaction with
three entities: the guidebook, their companions, and the house and its
contents. For example, we found that most visitors played audio descriptions
played through speakers (rather than using headphones or reading textual
descriptions) to facilitate communication with their companions.
| [
{
"version": "v1",
"created": "Sun, 28 Jan 2001 07:14:46 GMT"
},
{
"version": "v2",
"created": "Fri, 2 Feb 2001 04:48:43 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Woodruff",
"Allison",
""
],
[
"Aoki",
"Paul M.",
""
],
[
"Hurst",
"Amy",
""
],
[
"Szymanski",
"Margaret H.",
""
]
]
| new_dataset | 0.999501 |
cs/0102005 | Hsueh-I. Lu | Richie Chih-Nan Chuang, Ashim Garg, Xin He, Ming-Yang Kao, Hsueh-I Lu | Compact Encodings of Planar Graphs via Canonical Orderings and Multiple
Parentheses | 24 pages; 3 figures; a preliminary version appeared in the
Proceedings of ICALP'98, LNCS 1443, pp. 118-129. (The 2nd version contains
some minor changes.) | null | null | null | cs.DS cs.DM | null | Let G be a plane graph of n nodes, m edges, f faces, and no self-loop. G need
not be connected or simple (i.e., free of multiple edges). We give three sets
of coding schemes for G which all take O(m+n) time for encoding and decoding.
Our schemes employ new properties of canonical orderings for planar graphs and
new techniques of processing strings of multiple types of parentheses.
For applications that need to determine in O(1) time the adjacency of two
nodes and the degree of a node, we use 2m+(5+1/k)n + o(m+n) bits for any
constant k > 0 while the best previous bound by Munro and Raman is 2m+8n +
o(m+n). If G is triconnected or triangulated, our bit count decreases to 2m+3n
+ o(m+n) or 2m+2n + o(m+n), respectively. If G is simple, our bit count is
(5/3)m+(5+1/k)n + o(n) for any constant k > 0. Thus, if a simple G is also
triconnected or triangulated, then 2m+2n + o(n) or 2m+n + o(n) bits suffice,
respectively.
If only adjacency queries are supported, the bit counts for a general G and a
simple G become 2m+(14/3)n + o(m+n) and (4/3)m+5n + o(n), respectively.
If we only need to reconstruct G from its code, a simple and triconnected G
uses roughly 2.38m + O(1) bits while the best previous bound by He, Kao, and Lu
is 2.84m.
| [
{
"version": "v1",
"created": "Wed, 7 Feb 2001 16:46:24 GMT"
},
{
"version": "v2",
"created": "Thu, 8 Feb 2001 13:29:26 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Chuang",
"Richie Chih-Nan",
""
],
[
"Garg",
"Ashim",
""
],
[
"He",
"Xin",
""
],
[
"Kao",
"Ming-Yang",
""
],
[
"Lu",
"Hsueh-I",
""
]
]
| new_dataset | 0.988869 |
cs/0102020 | Theriault Alain | Anja Belz (CCSRC, SRI International) | Multi-Syllable Phonotactic Modelling | 11 pages, 4 tables, 9 figures, workshop | Jason Eisner, Lauri Karttunen and Alain Theriault (eds.),
Finite-State Phonology: Proceedings of the 5th Workshop of the ACL Special
Interest Group in Computational Phonology (SIGPHON), pp. 46-56. Luxembourg,
August 2000 | null | null | cs.CL | null | This paper describes a novel approach to constructing phonotactic models. The
underlying theoretical approach to phonological description is the
multisyllable approach in which multiple syllable classes are defined that
reflect phonotactically idiosyncratic syllable subcategories. A new
finite-state formalism, OFS Modelling, is used as a tool for encoding,
automatically constructing and generalising phonotactic descriptions.
Language-independent prototype models are constructed which are instantiated on
the basis of data sets of phonological strings, and generalised with a
clustering algorithm. The resulting approach enables the automatic construction
of phonotactic models that encode arbitrarily close approximations of a
language's set of attested phonological forms. The approach is applied to the
construction of multi-syllable word-level phonotactic models for German,
English and Dutch.
| [
{
"version": "v1",
"created": "Thu, 22 Feb 2001 21:05:01 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Belz",
"Anja",
"",
"CCSRC, SRI International"
]
]
| new_dataset | 0.992283 |
cs/0102030 | Roberto Bagnara | Patricia M. Hill, Roberto Bagnara, Enea Zaffanella | Soundness, Idempotence and Commutativity of Set-Sharing | 48 pages | null | null | null | cs.PL | null | It is important that practical data-flow analyzers are backed by reliably
proven theoretical results. Abstract interpretation provides a sound
mathematical framework and necessary generic properties for an abstract domain
to be well-defined and sound with respect to the concrete semantics. In logic
programming, the abstract domain Sharing is a standard choice for sharing
analysis for both practical work and further theoretical study. In spite of
this, we found that there were no satisfactory proofs for the key properties of
commutativity and idempotence that are essential for Sharing to be well-defined
and that published statements of the soundness of Sharing assume the
occurs-check. This paper provides a generalization of the abstraction function
for Sharing that can be applied to any language, with or without the
occurs-check. Results for soundness, idempotence and commutativity for abstract
unification using this abstraction function are proven.
| [
{
"version": "v1",
"created": "Tue, 27 Feb 2001 14:54:34 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Hill",
"Patricia M.",
""
],
[
"Bagnara",
"Roberto",
""
],
[
"Zaffanella",
"Enea",
""
]
]
| new_dataset | 0.970581 |
cs/0103013 | Masaki Murata | Masaki Murata, Masao Utiyama, Qing Ma, Hiromi Ozaku, and Hitoshi
Isahara | CRL at Ntcir2 | 11 pages. Computation and Language. This paper describes our results
of information retrieval in the NTCIR2 contest | null | null | null | cs.CL | null | We have developed systems of two types for NTCIR2. One is an enhenced version
of the system we developed for NTCIR1 and IREX. It submitted retrieval results
for JJ and CC tasks. A variety of parameters were tried with the system. It
used such characteristics of newspapers as locational information in the CC
tasks. The system got good results for both of the tasks. The other system is a
portable system which avoids free parameters as much as possible. The system
submitted retrieval results for JJ, JE, EE, EJ, and CC tasks. The system
automatically determined the number of top documents and the weight of the
original query used in automatic-feedback retrieval. It also determined
relevant terms quite robustly. For EJ and JE tasks, it used document expansion
to augment the initial queries. It achieved good results, except on the CC
tasks.
| [
{
"version": "v1",
"created": "Mon, 12 Mar 2001 09:36:50 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Murata",
"Masaki",
""
],
[
"Utiyama",
"Masao",
""
],
[
"Ma",
"Qing",
""
],
[
"Ozaku",
"Hiromi",
""
],
[
"Isahara",
"Hitoshi",
""
]
]
| new_dataset | 0.999694 |
cs/0103018 | Claudio Gutierrez | Volker Diekert, Claudio Gutierrez, Christian Hagenah | The Existential Theory of Equations with Rational Constraints in Free
Groups is PSPACE-Complete | 45 pages. LaTeX source | null | null | null | cs.DS cs.LO | null | It is known that the existential theory of equations in free groups is
decidable. This is a famous result of Makanin. On the other hand it has been
shown that the scheme of his algorithm is not primitive recursive. In this
paper we present an algorithm that works in polynomial space, even in the more
general setting where each variable has a rational constraint, that is, the
solution has to respect a specification given by a regular word language. Our
main result states that the existential theory of equations in free groups with
rational constraints is PSPACE-complete. We obtain this result as a corollary
of the corresponding statement about free monoids with involution.
| [
{
"version": "v1",
"created": "Mon, 26 Mar 2001 15:58:40 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Diekert",
"Volker",
""
],
[
"Gutierrez",
"Claudio",
""
],
[
"Hagenah",
"Christian",
""
]
]
| new_dataset | 0.998099 |
cs/0104006 | Menno van Zaanen | Menno van Zaanen | ABL: Alignment-Based Learning | 7 pages | Proceedings of the 18th International Conference on Computational
Linguistics (COLING); Saarbrucken, Germany. pages 961-967 | null | null | cs.LG cs.CL | null | This paper introduces a new type of grammar learning algorithm, inspired by
string edit distance (Wagner and Fischer, 1974). The algorithm takes a corpus
of flat sentences as input and returns a corpus of labelled, bracketed
sentences. The method works on pairs of unstructured sentences that have one or
more words in common. When two sentences are divided into parts that are the
same in both sentences and parts that are different, this information is used
to find parts that are interchangeable. These parts are taken as possible
constituents of the same type. After this alignment learning step, the
selection learning step selects the most probable constituents from all
possible constituents.
This method was used to bootstrap structure on the ATIS corpus (Marcus et
al., 1993) and on the OVIS (Openbaar Vervoer Informatie Systeem (OVIS) stands
for Public Transport Information System.) corpus (Bonnema et al., 1997). While
the results are encouraging (we obtained up to 89.25 % non-crossing brackets
precision), this paper will point out some of the shortcomings of our approach
and will suggest possible solutions.
| [
{
"version": "v1",
"created": "Tue, 3 Apr 2001 14:20:26 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"van Zaanen",
"Menno",
""
]
]
| new_dataset | 0.99778 |
cs/0105005 | Llu\'is Padr\'o | J. Daud\'e, L. Padr\'o and G. Rigau (TALP Research Center, Universitat
Polit\`ecnica de Catalunya) | A Complete WordNet1.5 to WordNet1.6 Mapping | 6 pages, 5 figures. To appear in proceedings of NAACL'01 Workshop on
WordNet and Other Lexical Resources | null | null | null | cs.CL | null | We describe a robust approach for linking already existing lexical/semantic
hierarchies. We use a constraint satisfaction algorithm (relaxation labelling)
to select --among a set of candidates-- the node in a target taxonomy that
bests matches each node in a source taxonomy. In this paper we present the
complete mapping of the nominal, verbal, adjectival and adverbial parts of
WordNet 1.5 onto WordNet 1.6.
| [
{
"version": "v1",
"created": "Fri, 4 May 2001 08:55:02 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Daudé",
"J.",
"",
"TALP Research Center, Universitat\n Politècnica de Catalunya"
],
[
"Padró",
"L.",
"",
"TALP Research Center, Universitat\n Politècnica de Catalunya"
],
[
"Rigau",
"G.",
"",
"TALP Research Center, Universitat\n Politècnica de Catalunya"
]
]
| new_dataset | 0.972665 |
cs/0105014 | Wen Chen | W. Chen | Errata and supplements to: Orthonormal RBF Wavelet and Ridgelet-like
Series and Transforms for High-Dimensional Problems | Welcome any comments to [email protected] | null | null | null | cs.NA cs.CE | null | In recent years some attempts have been done to relate the RBF with wavelets
in handling high dimensional multiscale problems. To the author's knowledge,
however, the orthonormal and bi-orthogonal RBF wavelets are still missing in
the literature. By using the nonsingular general solution and singular
fundamental solution of differential operator, recently the present author,
refer. 3, made some substantial headway to derive the orthonormal RBF wavelets
series and transforms. The methodology can be generalized to create the RBF
wavelets by means of the orthogonal convolution kernel function of various
integral operators. In particular, it is stressed that the presented RBF
wavelets does not apply the tensor product to handle multivariate problems at
all.
This note is to correct some errata in reference 3 and also to supply a few
latest advances in the study of orthornormal RBF wavelet transforms.
| [
{
"version": "v1",
"created": "Mon, 7 May 2001 16:53:05 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Chen",
"W.",
""
]
]
| new_dataset | 0.98824 |
cs/0105023 | Dupuy Sylvain | Sylvain Dupuy, Arjan Egges, Vincent Legendre and Pierre Nugues | Generating a 3D Simulation of a Car Accident from a Written Description
in Natural Language: the CarSim System | 8 pages, ACL 2001, Workshop on Temporal and Spatial Information
Processing | null | null | null | cs.CL | null | This paper describes a prototype system to visualize and animate 3D scenes
from car accident reports, written in French. The problem of generating such a
3D simulation can be divided into two subtasks: the linguistic analysis and the
virtual scene generation. As a means of communication between these two
modules, we first designed a template formalism to represent a written accident
report. The CarSim system first processes written reports, gathers relevant
information, and converts it into a formal description. Then, it creates the
corresponding 3D scene and animates the vehicles.
| [
{
"version": "v1",
"created": "Mon, 14 May 2001 09:05:45 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Dupuy",
"Sylvain",
""
],
[
"Egges",
"Arjan",
""
],
[
"Legendre",
"Vincent",
""
],
[
"Nugues",
"Pierre",
""
]
]
| new_dataset | 0.999083 |
cs/0106014 | Viacheslav Wolfengagen | Viacheslav Wolfengagen | L.T.Kuzin: Research Program | 10 pages | Proceedings of the 1st International Workshop on Computer Science
and Information Technologies CSIT'99. Moscow, Russia, January 18--22, 1999.
Vol. 1, pp. 97--106 | null | null | cs.DM cs.AI cs.SE | null | Lev T. Kuzin (1928--1997) is one of the founders of modern cybernetics and
information science in Russia. He was awarded and honored the USSR State Prize
for inspiring vision into the future of technical cybernetics and his invention
and innovation of key technologies.
The last years he interested in the computational models of geometrical and
algebraic nature and their applications in various branches of computer science
and information technologies. In the recent years the interest in computation
models based on object notion has grown tremendously stimulating an interest to
Kuzin's ideas. This year of 50th Anniversary of Cybernetics and on the occasion
of his 70th birthday on September 12, 1998 seems especially appropriate for
discussing Kuzin's Research Program.
| [
{
"version": "v1",
"created": "Fri, 8 Jun 2001 17:42:12 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Wolfengagen",
"Viacheslav",
""
]
]
| new_dataset | 0.99594 |
cs/0106032 | David Eppstein | David Eppstein | Hinged Kite Mirror Dissection | 8 pages, 7 figures | null | null | null | cs.CG math.MG | null | Any two polygons of equal area can be partitioned into congruent sets of
polygonal pieces, and in many cases one can connect the pieces by flexible
hinges while still allowing the connected set to form both polygons. However it
is open whether such a hinged dissection always exists. We solve a special case
of this problem, by showing that any asymmetric polygon always has a hinged
dissection to its mirror image. Our dissection forms a chain of kite-shaped
pieces, found by a circle-packing algorithm for quadrilateral mesh generation.
A hinged mirror dissection of a polygon with n sides can be formed with O(n)
kites in O(n log n) time.
| [
{
"version": "v1",
"created": "Wed, 13 Jun 2001 20:42:09 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Eppstein",
"David",
""
]
]
| new_dataset | 0.999431 |
cs/0106046 | Floris Geerts | Floris Geerts | Expressing the cone radius in the relational calculus with real
polynomial constraints | 9 pages | null | null | null | cs.DB cs.LO | null | We show that there is a query expressible in first-order logic over the reals
that returns, on any given semi-algebraic set A, for every point a radius
around which A is conical. We obtain this result by combining famous results
from calculus and real algebraic geometry, notably Sard's theorem and Thom's
first isotopy lemma, with recent algorithmic results by Rannou.
| [
{
"version": "v1",
"created": "Thu, 21 Jun 2001 16:33:18 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Geerts",
"Floris",
""
]
]
| new_dataset | 0.993661 |
cs/0107011 | Angelo Monti | Andrea E.F. Clementi, Angelo Monti, and Riccardo Silvestri | Distributed Broadcast in Wireless Networks with Unknown Topology | 27 pages, 1 figure, 1 table | null | null | null | cs.DS cs.DM | null | A multi-hop synchronous wirelss network is said to be unknown if the nodes
have no knowledge of the topology. A basic task in wireless network is that of
broadcasting a message (created by a fixed source node) to all nodes of the
network. The multi-broadcast that consists in performing a set of r independent
broadcasts. In this paper, we study the completion and the termination time of
distributed protocols for both the (single) broadcast and the multi-broadcast
operations on unknown networks as functions of the number of nodes n, the
maximum eccentricity D, the maximum in-degree Delta, and the congestion c of
the networks. We establish new connections between these operations and some
combinatorial concepts, such as selective families, strongly-selective families
(also known as superimposed codes), and pairwise r-different families. Such
connections, combined with a set of new lower and upper bounds on the size of
the above families, allow us to derive new lower bounds and new distributed
protocols for the broadcast and multi-broadcast operations. In particular, our
upper bounds are almost tight and improve exponentially over the previous
bounds when D and Delta are polylogarithmic in n. Network topologies having
``small'' eccentricity and ``small'' degree (such as bounded-degree expanders)
are often used in practice to achieve efficient communication.
| [
{
"version": "v1",
"created": "Fri, 6 Jul 2001 16:18:37 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Clementi",
"Andrea E. F.",
""
],
[
"Monti",
"Angelo",
""
],
[
"Silvestri",
"Riccardo",
""
]
]
| new_dataset | 0.998239 |
cs/0107015 | Pontus Svenson | Pontus Svenson | From Neel to NPC: Colouring Small Worlds | 4 pages, 6 figures | null | null | null | cs.CC cond-mat.stat-mech | null | In this note, we present results for the colouring problem on small world
graphs created by rewiring square, triangular, and two kinds of cubic (with
coordination numbers 5 and 6) lattices. As the rewiring parameter p tends to 1,
we find the expected crossover to the behaviour of random graphs with
corresponding connectivity. However, for the cubic lattices there is a region
near p=0 for which the graphs are colourable. This could in principle be used
as an additional heuristic for solving real world colouring or scheduling
problems. Small worlds with connectivity 5 and p ~ 0.1 provide an interesting
ensemble of graphs whose colourability is hard to determine. For square
lattices, we get good data collapse plotting the fraction of colourable graphs
against the rescaled parameter parameter $p N^{-\nu}$ with $\nu = 1.35$. No
such collapse can be obtained for the data from lattices with coordination
number 5 or 6.
| [
{
"version": "v1",
"created": "Wed, 11 Jul 2001 12:13:18 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Svenson",
"Pontus",
""
]
]
| new_dataset | 0.999757 |
cs/0107034 | Judith Beumer | Elizabeth D. Dolan | NEOS Server 4.0 Administrative Guide | 45 pages including front matter, 3 figures | null | null | ANL/MCS-TM-250 | cs.DC | null | The NEOS Server 4.0 provides a general Internet-based client/server as a link
between users and software applications. The administrative guide covers the
fundamental principals behind the operation of the NEOS Server, installation
and trouble-shooting of the Server software, and implementation details of
potential interest to a NEOS Server administrator. The guide also discusses
making new software applications available through the Server, including areas
of concern to remote solver administrators such as maintaining security,
providing usage instructions, and enforcing reasonable restrictions on jobs.
The administrative guide is intended both as an introduction to the NEOS Server
and as a reference for use when running the Server.
| [
{
"version": "v1",
"created": "Thu, 26 Jul 2001 15:19:00 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Dolan",
"Elizabeth D.",
""
]
]
| new_dataset | 0.997313 |
cs/0107035 | Andrei S. Lopatenko | A. Lopatenko | Semantic Web Content Accessibility Guidelines for Current Research
Information Systems (CRIS) | 25 pages | Second Interim Report of Extencion Centre, Vienna University of
Technology, 2001 | null | null | cs.NI cs.DL | null | The most exciting challenge for CRIS is to create a service for research
information which should be wide-spread, distributed and actual like Google,
but at the same time structured, trusted, with a complex search and navigation
similar to today CRIS application. The core technology for such a "new" CRIS is
the semantic web technology to integrate database contents with HTML and XML
web pages for being provided to the research interested public. One (at the
moment the best) possible way is to use RDF (Resource Description Framework)
which is also recommended by the W3 consortium.
| [
{
"version": "v1",
"created": "Sun, 29 Jul 2001 18:50:17 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lopatenko",
"A.",
""
]
]
| new_dataset | 0.995615 |
cs/0108002 | Paul Vitanyi | Sibsankar Haldar (Bell Labs) and Paul Vitanyi (CWI and University of
Amsterdam) | Bounded Concurrent Timestamp Systems Using Vector Clocks | LaTeX source, 35 pages; To apper in: J. Assoc. Comp. Mach | null | null | null | cs.DC | null | Shared registers are basic objects used as communication mediums in
asynchronous concurrent computation. A concurrent timestamp system is a higher
typed communication object, and has been shown to be a powerful tool to solve
many concurrency control problems. It has turned out to be possible to
construct such higher typed objects from primitive lower typed ones. The next
step is to find efficient constructions. We propose a very efficient wait-free
construction of bounded concurrent timestamp systems from 1-writer multireader
registers. This finalizes, corrects, and extends, a preliminary bounded
multiwriter construction proposed by the second author in 1986. That work
partially initiated the current interest in wait-free concurrent objects, and
introduced a notion of discrete vector clocks in distributed algorithms.
| [
{
"version": "v1",
"created": "Thu, 2 Aug 2001 17:13:48 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Haldar",
"Sibsankar",
"",
"Bell Labs"
],
[
"Vitanyi",
"Paul",
"",
"CWI and University of\n Amsterdam"
]
]
| new_dataset | 0.991861 |
cs/0108015 | Jeffrey M. Rosenfeld | Jeffrey M. Rosenfeld | Spiders and Crawlers and Bots, Oh My: The Economic Efficiency and Public
Policy of Contracts that Restrict Data Collection | 29th TPRC Conference, 2001 | null | null | TPRC-2001-XXX | cs.CY | null | Recent trends reveal the search by companies for a legal hook to prevent the
undesired and unauthorized copying of information posted on websites. In the
center of this controversy are metasites, websites that display prices for a
variety of vendors. Metasites function by implementing shopbots, which extract
pricing data from other vendors' websites. Technological mechanisms have proved
unsuccessful in blocking shopbots, and in response, websites have asserted a
variety of legal claims. Two recent cases, which rely on the troublesome
trespass to chattels doctrine, suggest that contract law may provide a less
demanding legal method of preventing the search of websites by data robots. If
blocking collection of pricing data is as simple as posting an online contract,
the question arises whether this end result is desirable and legally viable.
| [
{
"version": "v1",
"created": "Wed, 22 Aug 2001 23:34:37 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Rosenfeld",
"Jeffrey M.",
""
]
]
| new_dataset | 0.967686 |
cs/0108019 | Judith Beumer | E. Ong, E. Lusk, and W. Gropp | Scalable Unix Commands for Parallel Processors: A High-Performance
Implementation | 9 pages, 2 figures | in Recent Advances in Parallel Virtual Machine and Message Passing
Interface, eds. Y. Cotronis and J. Dongarra, Lecture Notes in Computer
Science, Vol. 2131, Springer-Verlag, pp. 410-418, Sept. 2001. | null | ANL/MCS-P885-0601 | cs.DC | null | We describe a family of MPI applications we call the Parallel Unix Commands.
These commands are natural parallel versions of common Unix user commands such
as ls, ps, and find, together with a few similar commands particular to the
parallel environment. We describe the design and implementation of these
programs and present some performance results on a 256-node Linux cluster. The
Parallel Unix Commands are open source and freely available.
| [
{
"version": "v1",
"created": "Mon, 27 Aug 2001 15:54:41 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ong",
"E.",
""
],
[
"Lusk",
"E.",
""
],
[
"Gropp",
"W.",
""
]
]
| new_dataset | 0.999202 |
cs/0109010 | Bonnie Webber | Bonnie Webber, Matthew Stone, Aravind Joshi and Alistair Knott | Anaphora and Discourse Structure | 45 pages, 17 figures. Revised resubmission to Computational
Linguistics | null | null | null | cs.CL | null | We argue in this paper that many common adverbial phrases generally taken to
signal a discourse relation between syntactically connected units within
discourse structure, instead work anaphorically to contribute relational
meaning, with only indirect dependence on discourse structure. This allows a
simpler discourse structure to provide scaffolding for compositional semantics,
and reveals multiple ways in which the relational meaning conveyed by adverbial
connectives can interact with that associated with discourse structure. We
conclude by sketching out a lexicalised grammar for discourse that facilitates
discourse interpretation as a product of compositional rules, anaphor
resolution and inference.
| [
{
"version": "v1",
"created": "Sun, 9 Sep 2001 16:41:59 GMT"
},
{
"version": "v2",
"created": "Fri, 13 Sep 2002 18:13:28 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Webber",
"Bonnie",
""
],
[
"Stone",
"Matthew",
""
],
[
"Joshi",
"Aravind",
""
],
[
"Knott",
"Alistair",
""
]
]
| new_dataset | 0.999535 |
cs/0109021 | Milton L. Mueller | Milton L. Mueller | Competing DNS Roots: Creative Destruction or Just Plain Destruction? | null | null | null | TPRC-2001-029 | cs.CY | null | The Internet Domain Name System (DNS) is a hierarchical name space that
enables the assignment of unique, mnemonic identifiers to Internet hosts and
the consistent mapping of these names to IP addresses. The root of the domain
name system is the top of the hierarchy and is currently managed by a
quasi-private centralized regulatory authority, the Internet Corporation for
Assigned Names and Numbers (ICANN). This paper identifies and discusses the
economic and policy issues raised by competing DNS roots. The paper provides a
precise definition of root-competition and shows that multiple roots are a
species of standards competition, in which network externalities play a major
role. The paper performs a structural analysis of the different forms that
competing DNS roots can take and their effects on end-user compatibility. It
then explores the policy implications of the various forms of competition.
The thesis of the paper is that root competition is caused by a severe
disjunction between the demand for and supply of top-level domain names. ICANN
has authorized a tiny number of new top-level domains (7) and subjected their
operators to excruciatingly slow and expensive contractual negotiations. The
growth of alternate DNS roots is an attempt to bypass that bottleneck. The
paper arrives at the policy conclusion that competition among DNS roots should
be permitted and is a healthy outlet for inefficiency or abuses of power by the
dominant root administrator.
| [
{
"version": "v1",
"created": "Mon, 17 Sep 2001 22:01:01 GMT"
},
{
"version": "v2",
"created": "Mon, 17 Sep 2001 23:01:32 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Mueller",
"Milton L.",
""
]
]
| new_dataset | 0.992323 |
cs/0109032 | Gerald Painkras | James Katz, Ronald E. Rice, and Philip Aspden | The Internet, 1995-2000: Access, Civic Involvement, and Social
Interaction | 29th TPRC Conference, 2001 | null | null | TPRC-2001-015 | cs.CY | null | Our research, which began fielding surveys in 1995, and which have been
repeated with variation in 1996, 1997 and 2000, was apparently the first to use
national random telephone survey methods to track social and community aspects
of Internet use, and to compare users and non-users. It also seems to be among
the first that used these methods to compare users with non-users in regards to
communication, social and community issues. The work has been largely supported
by grants from the Markle Foundation of New York City as well as the Robert
Wood Johnson Foundation.
Abridged, see full text for complete abstract.
| [
{
"version": "v1",
"created": "Tue, 18 Sep 2001 16:29:06 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Katz",
"James",
""
],
[
"Rice",
"Ronald E.",
""
],
[
"Aspden",
"Philip",
""
]
]
| new_dataset | 0.976767 |
cs/0109037 | Mark A. Lemley | Mark A. Lemley | Antitrust, Intellectual Property and Standard-Setting Organizations | 29th TPRC Conference 2001 | null | null | TPRC-2001-001 | cs.CY | null | Standard-setting organizations (SSOs) regularly encounter situations in which
one or more companies claim to own proprietary rights that cover a proposed
industry standard. The industry cannot adopt the standard without the
permission of the intellectual property owner (or owners).
How SSOs respond to those who assert intellectual property rights is
critically important. Whether or not private companies retain intellectual
property rights in group standards will determine whether a standard is "open"
or "closed." It will determine who can sell compliant products, and it may well
influence whether the standard adopted in the market is one chosen by a group
or one offered by a single company. SSO rules governing intellectual property
rights will also affect how standards change as technology improves.
Given the importance of SSO rules governing intellectual property rights,
there has been surprisingly little treatment of SSOs or their intellectual
property rules in the legal literature. My aim in this article is to fill that
void. To do so, I have surveyed the intellectual property policies of dozens of
SSOs, primarily but not exclusively in the computer networking and
telecommunications industries.
| [
{
"version": "v1",
"created": "Thu, 20 Sep 2001 00:15:10 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lemley",
"Mark A.",
""
]
]
| new_dataset | 0.999105 |
cs/0109040 | Srikanta Bedathur J. | B. J. Srikanta, Jayant Haritsa and Udaysankar Sen | The Building of BODHI, a Bio-diversity Database System | 29 pages, 5 figures | null | null | TR-2001-02 | cs.DB q-bio.PE | null | We have recently built a database system called BODHI, intended to store
plant bio-diversity information. It is based on an object-oriented modeling
approach and is developed completely around public-domain software. The unique
feature of BODHI is that it seamlessly integrates diverse types of data,
including taxonomic characteristics, spatial distributions, and genetic
sequences, thereby spanning the entire range from molecular to organism-level
information. A variety of sophisticated indexing strategies are incorporated to
efficiently access the various types of data, and a rule-based query processor
is employed for optimizing query execution. In this paper, we report on our
experiences in building BODHI and on its performance characteristics for a
representative set of queries.
| [
{
"version": "v1",
"created": "Thu, 20 Sep 2001 12:27:45 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Srikanta",
"B. J.",
""
],
[
"Haritsa",
"Jayant",
""
],
[
"Sen",
"Udaysankar",
""
]
]
| new_dataset | 0.998783 |
cs/0109043 | Harmeet Sawhney | Hokyu Lee and Harmeet Sawhney | PUC Autonomy and Policy Innovation: Local Telephone Competition in
Arkansas and New York | 29th TPRC Conference, 2001 | null | null | TPRC-2001-026 | cs.CY | null | In the pre-divestiture era, the regulatory environment in the U.S. was fairly
uniform and harmonious with the FCC setting the course and the accommodative
state PUCs making corresponding changes in their own policies. The divestiture
fractured this monolithic system as it forced the PUCs to respond to new forces
unleashed in their own backyards. Soon there was great diversity in the overall
regulatory landscape. Within this new environment, there is considerable
disparity among the PUCs in terms of their ability to implement new ideas. This
paper seeks to understand the structural factors that influence the latitude of
regulatory action by PUCs via a comparative study of local telephone
competition policy making in Arkansas and New York. The analysis suggests that
the presence or absence of countervailing forces determines the relative
autonomy the PUCs enjoy and thereby their ability to introduce new ideas into
their states.
| [
{
"version": "v1",
"created": "Fri, 21 Sep 2001 17:14:57 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lee",
"Hokyu",
""
],
[
"Sawhney",
"Harmeet",
""
]
]
| new_dataset | 0.962022 |
cs/0109048 | Patricia Aufderheide | Patricia Aufderheide | Competition and Commons: The Post-Telecom Act Public Interest, in and
after the AOLTW Merger | 29th TPRC Conference, 2001 | null | null | TPRC-2001-2030 | cs.CY | null | In asserting a competitive market environment as a justification for
regulatory forbearance, the Telecommunications Act of 1996 finally articulated
a clear standard for the FCC's public interest standard, one of the most
protean concepts in communications. This seeming clarity has not, however,
inhibited intense political conflict over the term. This paper examines public
and regulatory debate over the AOL Time Warner merger as an example of the way
in which the linkage between competitions and commons policy becomes relevant
to communications policy, particularly in relation to mass media, and discusses
interpretations of the public interest in the current FCC. The paper proposes
that the Telecom Act's goal of fostering economic competition among information
service providers, and the democratic ideal of nurturing public relationships
and behaviors can be linked. Competition policy that creates the opportunity
for untrammeled interactivity also provides a sine qua non to nurture the
social phenomenon of the commons. The linked concepts of competition and
commons could also provide useful ways to interpret the public interest in
policy arenas as spectrum allocation and intellectual property.
| [
{
"version": "v1",
"created": "Sat, 22 Sep 2001 19:25:55 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Aufderheide",
"Patricia",
""
]
]
| new_dataset | 0.995455 |
cs/0109049 | Walter S. Baer | Walter S. Baer | Signing Initiative Petitions Online: Possibilities, Problems and
Prospects | 29th TPRC Conference, 2001 | null | null | TPRC-2001-2054 | cs.CY | null | Many people expect the Internet to change American politics, most likely in
the direction of increasing direct citizen participation and forcing government
officials to respond more quickly to voter concerns. A recent California
initiative with these objectives would authorize use of encrypted digital
signatures over the Internet to qualify candidates, initiatives, and other
ballot measures. Proponents of Internet signature gathering say it will
significantly lower the cost of qualifying initiatives and thereby reduce the
influence of organized, well-financed interest groups. They also believe it
will increase both public participation in the political process and public
understanding about specific measures. However, opponents question whether
Internet security is adequate to prevent widespread abuse and argue that the
measure would create disadvantages for those who lack access to the Internet.
Beyond issues of security, cost, and access lie larger questions about the
effects of Internet signature gathering on direct democracy. Would it encourage
greater and more informed public participation in the political process? Or
would it flood voters with ballot measures and generally worsen current
problems with the initiative process itself? Because we lack good data on these
questions, answers to them today are largely conjectural. We can be fairly
sure, however, that Internet petition signing, like Internet voting, will have
unintended consequences.
| [
{
"version": "v1",
"created": "Sat, 22 Sep 2001 22:57:01 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Baer",
"Walter S.",
""
]
]
| new_dataset | 0.997353 |
cs/0109062 | Gerald Painkras | Rajni Gupta | India Attempts to Give a Jump-start to its Derailed Telecommunications
Liberalization Process | 29th TPRC Conference, 2001 | null | null | null | cs.CY | null | After the 1991 economic policy made a shift from a closed economic model to a
market-oriented model. The government invited private sector to participate in
reforming its telecom sector. However, the government took a half-hearted
approach in overhauling the legal and regulatory regime, suitable for
competitive regime or in framing the 1994 Telecom Policy.
Competition was allowed in cellular and basis services. The ministry and the
incumbent (DOT) issued licenses to their competitors. Lack of transparency in
issuing licenses and unrealistic license fee derailed the reforms process and
led to wasteful litigation. The courts did not support the regulator and
virtually made its role redundant.
| [
{
"version": "v1",
"created": "Mon, 24 Sep 2001 14:20:39 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Gupta",
"Rajni",
""
]
]
| new_dataset | 0.978775 |
cs/0109063 | Richard Cawley | Richard Cawley | Universal service, specific services on generic networks, some logic
begins to emerge in the policy area | 29th TPRC Conference, 2001 | null | null | TPRC-2001-046 | cs.CY | null | It has proved to be difficult to translate the lessons from the literature on
universal service into the policy framework because of political interests and
regulatory capture. Neither the USA or Europe has made a very good job of
devising a clean framework and the WTO agreement is sparing in this area. A
number of pressures in the European context have enabled a more systematic
approach to emerge, that exploits the academic work. They include the need for
the European regulatory framework to encompass E. European countries where
network development and income levels are much lower, the desire to encompass
Internet within the universal service regulatory framework, a willingness to
design a framework that covers all communications networks and remove the
telecommunications bias, thereby forcing issues of economic neutrality to the
fore. The paper systematically goes through a number of key areas and
principles of regulation and how they are being designed to deal with a range
of national situations. They include, defining the scope of universal service
and the principles by which it might be modified in the light of technological
and economic developments; incorporating latitude for intervention outside this
defined scope, defining incentive and designation methods to encourage the
efficient supply of elements of universal service obligations, interpreting
affordability in the context of price and income levels that diverge
considerably, requiring both allocative efficiency and competitive neutrality,
formulating alternative financing methods including general government
financing and value added tax type methods which can co-exist and provide
comparative policy yardsticks.
| [
{
"version": "v1",
"created": "Mon, 24 Sep 2001 14:56:45 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Cawley",
"Richard",
""
]
]
| new_dataset | 0.959584 |
cs/0109074 | Susan Oberlander | Susan Oberlander | Indicators of Independence in Regulatory Commissions | 29th TPRC Conference, 2001 This revision has minor editorial changes | null | null | TPRC-2001-048 | cs.CY | null | Independent regulatory commissions such as the Federal Communications
Commission (FCC) must produce policies that reflect technical expertise, legal
precedent, and stakeholder input. Given these situational imperatives, how does
the FCC implement independence in its decision-making? This research explicates
some of the underlying rules, resources, and relationships within the
environment in which the agency is embedded that influence agency work
practices to operationalize independence. Research such as this may be helpful
in the creation of new, or for assessment of existing, regulatory commissions,
but only if great attention is paid not only to institutional structure, but
also to the practice of staff in the agency.
| [
{
"version": "v1",
"created": "Mon, 24 Sep 2001 18:54:27 GMT"
},
{
"version": "v2",
"created": "Mon, 22 Oct 2001 19:54:53 GMT"
},
{
"version": "v3",
"created": "Mon, 22 Oct 2001 20:19:22 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Oberlander",
"Susan",
""
]
]
| new_dataset | 0.987217 |
cs/0109075 | A. Michael Froomkin | A. Michael Froomkin and Mark A. Lemley | ICANN and Antitrust | 29th TPRC Conference, 2001 | null | null | TPRC-2001-041 | cs.CY | null | The Internet Corporation for Assigned Names and Numbers (ICANN) is a private
non-profit company which, pursuant to contracts with the US government, acts as
the de facto regulator for DNS policy. ICANN decides what TLDs will be made
available to users, and which registrars will be permitted to offer those TLDs
for sale. In this article we focus on a hitherto-neglected implication of
ICANN's assertion that it is a private rather than a public actor: its
potential liability under the U.S. antitrust laws, and the liability of those
who transact with it. ICANN argues that it is not as closely tied to the
government as NSI and IANA were in the days before ICANN was created. If this
is correct, it seems likely that ICANN will not benefit from the antitrust
immunity those actors enjoyed. Some of ICANN's regulatory actions may restrain
competition, e.g. its requirement that applicants for new gTLDs demonstrate
that their proposals would not enable competitive (alternate) roots and ICANN's
preventing certain types of non-price competition among registrars (requiring
the UDRP). ICANN's rule adoption process might be characterized as
anticompetitive collusion by existing registrars, who are likely not be subject
to the Noerr-Pennington lobbying exemption. Whether ICANN has in fact violated
the antitrust laws depends on whether it is an antitrust state actor, whether
the DNS is an essential facility, and on whether it can shelter under
precedents that protect standard-setting bodies. If (as seems likely) a private
ICANN and those who petition it are subject to antitrust law, everyone involved
in the process needs to review their conduct with an eye towards legal
liability. ICANN should act very differently with respect to both the UDRP and
the competitive roots if it is to avoid restraining trade.
| [
{
"version": "v1",
"created": "Mon, 24 Sep 2001 19:25:48 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Froomkin",
"A. Michael",
""
],
[
"Lemley",
"Mark A.",
""
]
]
| new_dataset | 0.999509 |
cs/0109090 | Sharon Strover | Sharon Strover, Michael Oden, Nobuya Inagaki | Telecommunications and rural economies: Findings from the Appalachian
region | 29th TPRC Conference | null | null | TPRC-2001-080 | cs.CY | null | This research investigates the relationship between telecommunications
infrastructure, economic conditions, and federal and state policies and
initiatives. It presents a detailed look at the telecommunications environment
of the Appalachian region, particularly focusing on broadband technologies. A
strong, positive association exists between telecommunications infrastructure
and economic status. The effects of federal and state universal service
policies are examined, as well as some of the ways states have leveraged their
own infrastructure to improve telecommunications capabilities in their region.
Other state and local telecommunications-related programs are noted.
| [
{
"version": "v1",
"created": "Mon, 24 Sep 2001 21:50:05 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Strover",
"Sharon",
""
],
[
"Oden",
"Michael",
""
],
[
"Inagaki",
"Nobuya",
""
]
]
| new_dataset | 0.999505 |
cs/0109091 | Craig McTaggart | Craig McTaggart | E PLURIBUS ENUM: Unifying International Telecommunications Networks and
Governance | 29th TPRC Conference, 2001 | null | null | TPRC-2001-064 | cs.CY cs.NI | null | ENUM effectively bridges the telephone and Internet worlds by placing
telephone numbers from the ITU Rec. E.164 public telecommunication numbering
plan into the Internet Domain Name System (DNS) as domain names. ENUM
potentially presents significant public policy issues at both the domestic and
international levels. Ultimately, it should not matter whether ENUM is
approached as a telecommunications issue or an Internet issue because: (1) they
are becoming the same thing technically, and (2) they engage the same global
public interests. For the same reasons as apply to traditional
telecommunications, and even to the Internet itself, public oversight of ENUM
naming, numbering, and addressing resources is justified both by technical
necessity and the interests of consumer protection (particularly personal
privacy) and competition at higher service layers. A single, coordinated global
DNS domain for at least Tier 0 (the international level) of the ENUM names
hierarchy should be designated by public authorities. Many of the technical
characteristics and policy considerations relevant at the ENUM Tier 0 and 1
zones are also directly applicable to the Internet's IP address space and DNS
root (or Tier 0) zone - key shared elements of the Internet's logical
infrastructure. Despite the fundamentally international nature of the
Internet's logical infrastructure layer, and the purported privatization of
administration of its IP address space and the DNS, Internet governance is not
yet truly international. The ENUM policy debate illustrates the need for
authoritative international public oversight of public communications network
logical infrastructure, including that of traditional telecommunications, the
Internet, and ENUM.
| [
{
"version": "v1",
"created": "Mon, 24 Sep 2001 21:53:55 GMT"
},
{
"version": "v2",
"created": "Mon, 1 Oct 2001 19:26:03 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"McTaggart",
"Craig",
""
]
]
| new_dataset | 0.999399 |
cs/0109096 | Tony Christensen | Tony Christensen, Peter McCormick | CyberCampaigns and Canadian Politics: Still Waiting? | 29th TPRC Conference, 2001 | null | null | TPRC-2001-058 | cs.CY | null | The early election call in the fall of 2000 provided the perfect opportunity
to study the impact the Internet has had on election campaigning in Canada.
With the explosion of use the Net has seen since the 1997 general election,
Canadian federal parties stood at the threshold of a new age in election
campaigning. Pundits such as Rheingold (1993) have argued that the Internet
will provide citizens with a way to bypass traditional media and gain
unmediated access to each parties political message as well as providing a
forum for citizens to engage the parties, and each other in deliberative
debate.
Through a longitudinal analysis of party web pages and telephone interviews
with party staffers, we analyze the role the Internet played in the election
campaigns of Canada's federal parties. Our findings indicate that the parties
are still focusing on providing online features that talk at the voter instead
of engaging them in any type of meaningful discourse. Most of these sites were
exceptionally similar in their structure and in the type of content they
provided. Generally, these sites served as digital archives for campaign
material created with other media in mind and despite the multimedia
capabilities of the Internet, these sites tended to be overwhelmingly text
oriented. In line with Stromer-Galley's (2000) discussion of why candidates in
the U.S. avoid online interaction, we also argue that little incentive exists
to motivate parties to engage in any meaningful interaction with voters online.
| [
{
"version": "v1",
"created": "Mon, 24 Sep 2001 22:42:52 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Christensen",
"Tony",
""
],
[
"McCormick",
"Peter",
""
]
]
| new_dataset | 0.996428 |
cs/0109102 | Eli Noam | Eli M. Noam | The Next Frontier for Openness: Wireless Communications | 29th TPRC Conference, 2001 | null | null | TPRC-2001-094 | cs.CY | null | For wireless communications, the FCC has fostered competition rather than
openness. This has permitted the emergence of vertically integrated end-to-end
providers, creating problems of reduced hardware innovation, software
applications, user choice, and content access. To deal with these emerging
issues and create multi-level forms of competition, one policy is likely to
suffice: a Carterfone for wireless, coupled with more unlicensed spectrum.
| [
{
"version": "v1",
"created": "Tue, 25 Sep 2001 00:27:34 GMT"
},
{
"version": "v2",
"created": "Thu, 27 Sep 2001 02:16:33 GMT"
},
{
"version": "v3",
"created": "Tue, 2 Oct 2001 22:37:53 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Noam",
"Eli M.",
""
]
]
| new_dataset | 0.999363 |
cs/0109107 | Dan L. Burk | Dan L. Burk and Mark A. Lemley | Is Patent Law Technology Specific? | 29th TPRC Conference, 2001 | null | null | TPRC-2001-002 | cs.CY | null | Although patent law purports to cover all manner of technologies, we have
noticed recent divergence in the standards applied to biotechnology and to
software patents: the Federal Circuit has applied a very permissive standard of
obviousness in biotechnology, but a highly restrictive disclosure requirement.
The opposite holds true for software patents, which seems to us exactly
contrary to sound policy for either industry. These patent standards are
grounded in the legal fiction of the "person having ordinary skill in the art"
or PHOSITA. We discuss the appropriateness of the PHOSITA standard, concluding
that it properly lends flexibility to the patent system. We then discuss the
difficulty of applying this standard in different industries, offering
suggestions as to how it might be modified to avoid the problems seen in
biotechnology and software patents.
| [
{
"version": "v1",
"created": "Tue, 25 Sep 2001 18:25:36 GMT"
},
{
"version": "v2",
"created": "Wed, 26 Sep 2001 18:18:15 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Burk",
"Dan L.",
""
],
[
"Lemley",
"Mark A.",
""
]
]
| new_dataset | 0.990578 |
cs/0109113 | Kyle Nicholas | Kyle Nicholas | Digital Arroyos: An Examination of State Policy and Regulated Market
Boundaries in Constructing Rural Internet Access | 29th TPRC Conference, 2001 | null | null | TPRC-2001-XXX | cs.CY | null | This focused study on state-level policy and access patterns contributes to a
fuller understanding of how these invisible barriers work to structure access
and define rural communities. Combining both quantitative and qualitative data,
this study examines the role of geo-policy barriers in one of the largest and
most rural states in the nation.
Expanded Area Service policies are state policies wherein phone customers can
expand their local calling area. Because useful Internet access requires a
flat-price connection, EAS policies can play a crucial role in connecting
citizens to one another. EAS policies (including Texas') tend to vary along
five dimensions (community of interest, customer scope, directionality, pricing
mechanism and policy scope). EAS policies that rely on regulated market
boundaries for definition can generate gross inequities in rural Internet
access. Interviews with Internet Service Providers in a case study of 25 rural
communities reveals that LATA and exchange boundaries, along with
geographically restricted infrastructure investments, curtail service provision
in remote areas. A statistical analysis of 1300 telephone exchanges, including
208 rural telephone exchanges in Texas reveals that the farther a community
lies from a metropolitan area the less likely they are to have reliable
Internet access
| [
{
"version": "v1",
"created": "Tue, 25 Sep 2001 18:15:00 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Nicholas",
"Kyle",
""
]
]
| new_dataset | 0.997952 |
cs/0110005 | Hirotada Kobayashi | Tomohiro Yamasaki, Hirotada Kobayashi, Hiroshi Imai | Two-way Quantum One-counter Automata | LaTeX2e, 14 pages, 3 figures | null | null | null | cs.CC quant-ph | null | After the first treatments of quantum finite state automata by Moore and
Crutchfield and by Kondacs and Watrous, a number of papers study the power of
quantum finite state automata and their variants. This paper introduces a model
of two-way quantum one-counter automata (2Q1CAs), combining the model of
two-way quantum finite state automata (2QFAs) by Kondacs and Watrous and the
model of one-way quantum one-counter automata (1Q1CAs) by Kravtsev. We give the
definition of 2Q1CAs with well-formedness conditions. It is proved that 2Q1CAs
are at least as powerful as classical two-way deterministic one-counter
automata (2D1CAs), that is, every language L recognizable by 2D1CAs is
recognized by 2Q1CAs with no error. It is also shown that several
non-context-free languages including {a^n b^{n^2}} and {a^n b^{2^n}} are
recognizable by 2Q1CAs with bounded error.
| [
{
"version": "v1",
"created": "Tue, 2 Oct 2001 11:51:19 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Yamasaki",
"Tomohiro",
""
],
[
"Kobayashi",
"Hirotada",
""
],
[
"Imai",
"Hiroshi",
""
]
]
| new_dataset | 0.999294 |
cs/0110010 | Zhe Dang | Zhe Dang | Pushdown Timed Automata: a Binary Reachability Characterization and
Safety Verification | 30 pages | null | null | null | cs.LO | null | We consider pushdown timed automata (PTAs) that are timed automata (with
dense clocks) augmented with a pushdown stack. A configuration of a PTA
includes a control state, dense clock values and a stack word. By using the
pattern technique, we give a decidable characterization of the binary
reachability (i.e., the set of all pairs of configurations such that one can
reach the other) of a PTA. Since a timed automaton can be treated as a PTA
without the pushdown stack, we can show that the binary reachability of a timed
automaton is definable in the additive theory of reals and integers. The
results can be used to verify a class of properties containing linear relations
over both dense variables and unbounded discrete variables. The properties
previously could not be verified using the classic region technique nor
expressed by timed temporal logics for timed automata and CTL$^*$ for pushdown
systems. The results are also extended to other generalizations of timed
automata.
| [
{
"version": "v1",
"created": "Tue, 2 Oct 2001 22:47:41 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Dang",
"Zhe",
""
]
]
| new_dataset | 0.996517 |
cs/0110014 | Steven Bird | Steven Bird, Gary Simons, Chu-Ren Huang | The Open Language Archives Community and Asian Language Resources | 8 pages, 2 figures | Proceedings of the Workshop on Language Resources in Asia, 6th
Natural Language Processing Pacific Rim Symposium (NLPRS), Tokyo, November
2001 | null | null | cs.CL cs.DL | null | The Open Language Archives Community (OLAC) is a new project to build a
worldwide system of federated language archives based on the Open Archives
Initiative and the Dublin Core Metadata Initiative. This paper aims to
disseminate the OLAC vision to the language resources community in Asia, and to
show language technologists and linguists how they can document their tools and
data in such a way that others can easily discover them. We describe OLAC and
the OLAC Metadata Set, then discuss two key issues in the Asian context:
language classification and multilingual resource classification.
| [
{
"version": "v1",
"created": "Wed, 3 Oct 2001 12:45:41 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Bird",
"Steven",
""
],
[
"Simons",
"Gary",
""
],
[
"Huang",
"Chu-Ren",
""
]
]
| new_dataset | 0.969363 |
cs/0110018 | Robert Cannon | Robert Cannon | ENUM: The Collision of Telephony and DNS Policy | 29th TPRC Conference, 2001 | null | null | TPRC-2001-XXX | cs.GL | null | ENUM marks either the convergence or collision of the public telephone
network with the Internet. ENUM is an innovation in the domain name system
(DNS). It starts with numerical domain names that are used to query DNS name
servers. The servers respond with address information found in DNS records.
This can be telephone numbers, email addresses, fax numbers, SIP addresses, or
other information. The concept is to use a single number in order to obtain a
plethora of contact information.
By convention, the Internet Engineering Task Force (IETF) ENUM Working Group
determined that an ENUM number would be the same numerical string as a
telephone number. In addition, the assignee of an ENUM number would be the
assignee of that telephone number. But ENUM could work with any numerical
string or, in fact, any domain name. The IETF is already working on using E.212
numbers with ENUM. [Abridged]
| [
{
"version": "v1",
"created": "Thu, 4 Oct 2001 17:35:18 GMT"
},
{
"version": "v2",
"created": "Mon, 22 Oct 2001 21:02:46 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Cannon",
"Robert",
""
]
]
| new_dataset | 0.955782 |
cs/0110038 | Paul Vitanyi | Joel Seiferas (University of Rochester) and Paul Vitanyi (CWI and
University of Amsterdam) | Counting is Easy | null | J. Seiferas and P.M.B. Vitanyi, Counting is easy, J. Assoc. Comp.
Mach. 35 (1988), pp. 985-1000 | null | null | cs.CC cs.DS | null | For any fixed $k$, a remarkably simple single-tape Turing machine can
simulate $k$ independent counters in real time. Informally, a counter is a
storage unit that maintains a single integer (initially 0), incrementing it,
decrementing it, or reporting its sign (positive, negative, or zero) on
command. Any automaton that responds to each successive command as a counter
would is said to simulate a counter. (Only for a sign inquiry is the response
of interest, of course. And zeroness is the only real issue, since a simulator
can readily use zero detection to keep track of positivity and negativity in
finite-state control. In this paper we describe a remarkably simple real-time
simulation, based on just five simple rewriting rules, of any fixed number $k$
of independent counters. On a Turing machine with a single, binary work tape,
the simulation runs in real time, handling an arbitrary counter command at each
step. The space used by the simulation can be held to $(k+\epsilon) \log_2 n$
bits for the first $n$ commands, for any specified $\epsilon > 0$.
| [
{
"version": "v1",
"created": "Thu, 18 Oct 2001 13:21:01 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Seiferas",
"Joel",
"",
"University of Rochester"
],
[
"Vitanyi",
"Paul",
"",
"CWI and\n University of Amsterdam"
]
]
| new_dataset | 0.984417 |
cs/0110039 | Paul Vitanyi | Tao Jiang (McMaster University), Joel Seiferas (Rochester University),
and Paul Vitanyi (CWI and University of Amsterdam) | Two heads are better than two tapes | LaTeX, 16 pages. The final journal paper contains minor corrections
as well as some extra typos, but, also, some clarifying figures. A close copy
to that can be downloaded from http://www.cwi.nl/~paulv/complexity.html | T. Jiang, J. Seiferas and P.M.B. Vitanyi, Two heads are better
than two tapes, J. Assoc. Comp. Mach., 44:2(1997), 237--256 | null | null | cs.CC | null | We show that a Turing machine with two single-head one-dimensional tapes
cannot recognize the set {x2x'| x \in {0,1}^* and x' is a prefix of x} in real
time, although it can do so with three tapes, two two-dimensional tapes, or one
two-head tape, or in linear time with just one tape. In particular, this
settles the longstanding conjecture that a two-head Turing machine can
recognize more languages in real time if its heads are on the same
one-dimensional tape than if they are on separate one-dimensional tapes.
| [
{
"version": "v1",
"created": "Thu, 18 Oct 2001 14:58:26 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Jiang",
"Tao",
"",
"McMaster University"
],
[
"Seiferas",
"Joel",
"",
"Rochester University"
],
[
"Vitanyi",
"Paul",
"",
"CWI and University of Amsterdam"
]
]
| new_dataset | 0.996559 |
cs/0110052 | Nandlal L. Sarda | N. L. Sarda and Ankur Jain | Mragyati : A System for Keyword-based Searching in Databases | null | null | null | null | cs.DB | null | The web, through many search engine sites, has popularized the keyword-based
search paradigm, where a user can specify a string of keywords and expect to
retrieve relevant documents, possibly ranked by their relevance to the query.
Since a lot of information is stored in databases (and not as HTML documents),
it is important to provide a similar search paradigm for databases, where users
can query a database without knowing the database schema and database query
languages such as SQL. In this paper, we propose such a database search system,
which accepts a free-form query as a collection of keywords, translates it into
queries on the database using the database metadata, and presents query results
in a well-structured and browsable form. Th eysytem maps keywords onto the
database schema and uses inter-relationships (i.e., data semantics) among the
referred tables to generate meaningful query results. We also describe our
prototype for database search, called Mragyati. Th eapproach proposed here is
scalable, as it does not build an in-memory graph of the entire database for
searching for relationships among the objects selected by the user's query.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2001 08:55:57 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Sarda",
"N. L.",
""
],
[
"Jain",
"Ankur",
""
]
]
| new_dataset | 0.998155 |
cs/0110054 | Joseph O'Rourke | Erik D. Demaine, David Eppstein, Jeff Erickson, George W. Hart, Joseph
O'Rourke | Vertex-Unfoldings of Simplicial Manifolds | 12 pages, 7 figures, 10 references. Significant improvement of arXive
cs.CG/0107023 | null | null | Smith Technical Report 072 | cs.CG cs.DM | null | We present an algorithm to unfold any triangulated 2-manifold (in particular,
any simplicial polyhedron) into a non-overlapping, connected planar layout in
linear time. The manifold is cut only along its edges. The resulting layout is
connected, but it may have a disconnected interior; the triangles are connected
at vertices, but not necessarily joined along edges. We extend our algorithm to
establish a similar result for simplicial manifolds of arbitrary dimension.
| [
{
"version": "v1",
"created": "Sat, 27 Oct 2001 13:34:06 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Demaine",
"Erik D.",
""
],
[
"Eppstein",
"David",
""
],
[
"Erickson",
"Jeff",
""
],
[
"Hart",
"George W.",
""
],
[
"O'Rourke",
"Joseph",
""
]
]
| new_dataset | 0.998266 |
cs/0110059 | Joseph O'Rourke | Melody Donoso and Joseph O'Rourke | Nonorthogonal Polyhedra Built from Rectangles | 19 pages, 20 figures. Revised version makes two corrections: The
statement of the old Lemma 14 was incorrect. It has been corrected and merged
with Lemma 13 now. Second, Figure 19 (a skew quadrilateral) was incorrect,
and is now removed. It played no substantive role in the proofs | null | null | Smith Technical Report 073, Oct. 2001; revised May 2002 | cs.CG cs.DM | null | We prove that any polyhedron of genus zero or genus one built out of
rectangular faces must be an orthogonal polyhedron, but that there are
nonorthogonal polyhedra of genus seven all of whose faces are rectangles. This
leads to a resolution of a question posed by Biedl, Lubiw, and Sun [BLS99].
| [
{
"version": "v1",
"created": "Mon, 29 Oct 2001 19:26:05 GMT"
},
{
"version": "v2",
"created": "Tue, 7 May 2002 12:45:02 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Donoso",
"Melody",
""
],
[
"O'Rourke",
"Joseph",
""
]
]
| new_dataset | 0.999089 |
cs/0111011 | Giovambattista Ianni | Giovambattista Ianni | Sintesi di algoritmi con SKY | In italian | null | null | Unical Math. Dept. TR 11-2001 | cs.LO | null | This paper describes the semantics and ideas about SKY, a logic programming
language intended in order to specify algorithmic strategies for the evaluation
of problems.
| [
{
"version": "v1",
"created": "Tue, 6 Nov 2001 17:02:25 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ianni",
"Giovambattista",
""
]
]
| new_dataset | 0.973491 |
cs/0111023 | Martin Pokorny | M. Pokorny (1), M. Brooks (1), B. Glendenning (1), G. Harris (1), R.
Heald (1), F. Stauffer (1), J. Pisano (1) ((1) NRAO) | Distributed Control System for the Test Interferometer of the ALMA
Project | Submitted to ICALEPCS'01, San Jose, USA, November 2001, (THAT004) 3
pages, LaTeX | eConf C011127 (2001) THAT004 | null | null | cs.DC physics.ins-det | null | The control system (TICS) for the test interferometer being built to support
the development of the Atacama Large Millimeter Array (ALMA)will itself be a
prototype for the final ALMA array, providing a test for the distributed
control system under development. TICS will be based on the ALMA Common
Software (ACS) (developed at the European Southern Observatory), which provides
CORBA-based services and a device management framework for the control
software.
Simple device controllers will run on single board computers, one of which
(known as an LCU) is located at each antenna; whereas complex, compound device
controllers may run on centrally located computers. In either circumstance,
client programs may obtain direct CORBA references to the devices and their
properties. Monitor and control requests are sent to devices or properties,
which then process and forward the commands to the appropriate hardware devices
as required. Timing requirements are met by tagging commands with (future)
timestamps synchronized to a timing pulse, which is regulated by a central
reference generator, and is distributed to all hardware devices in the array.
Monitoring is provided through a publish/subscribe CORBA-based service.
| [
{
"version": "v1",
"created": "Fri, 9 Nov 2001 00:33:54 GMT"
},
{
"version": "v2",
"created": "Tue, 4 Dec 2001 21:16:57 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Pokorny",
"M.",
"",
"NRAO"
],
[
"Brooks",
"M.",
"",
"NRAO"
],
[
"Glendenning",
"B.",
"",
"NRAO"
],
[
"Harris",
"G.",
"",
"NRAO"
],
[
"Heald",
"R.",
"",
"NRAO"
],
[
"Stauffer",
"F.",
"",
"NRAO"
],
[
"Pisano",
"J.",
"",
"NRAO"
]
]
| new_dataset | 0.998919 |
cs/0111028 | Taurel | JM. Chaize, A. Goetz, WD. Klotz, J. Meyer, M. Perez, E. Taurel, P.
Verdier | The ESRF TANGO control system status | 3 pages | eConf C011127 (2001) TUAP004 | null | null | cs.DC | null | TANGO is an object oriented control system toolkit based on CORBA presently
under development at the ESRF. IN this paper, the TANGO philosophy is briefly
presented. All the existing tools developed around TANGO will also be
presented. This include a code genrator, a WEB interface to TANGO objects, an
administration tool and an interface to LabView. Finally, an xample of a TANGO
device server for OPC device is given.
| [
{
"version": "v1",
"created": "Fri, 9 Nov 2001 14:29:16 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Chaize",
"JM.",
""
],
[
"Goetz",
"A.",
""
],
[
"Klotz",
"WD.",
""
],
[
"Meyer",
"J.",
""
],
[
"Perez",
"M.",
""
],
[
"Taurel",
"E.",
""
],
[
"Verdier",
"P.",
""
]
]
| new_dataset | 0.999209 |
cs/0111031 | Robert W. Carey | Robert W. Carey, Kirby W. Fong, Randy J. Sanchez, Joseph D. Tappero,
John P. Woodruff | Large-Scale Corba-Distributed Software Framework for Nif Controls | 5 pages, 0 figures, ICALEPCS '01 | eConf C011127 (2001) THAI001 | null | THAI001 | cs.DC | null | The Integrated Computer Control System (ICCS) is based on a scalable software
framework that is distributed over some 325 computers throughout the NIF
facility. The framework provides templates and services at multiple levels of
abstraction for the construction of software applications that communicate via
CORBA (Common Object Request Broker Architecture). Various forms of
object-oriented software design patterns are implemented as templates to be
extended by application software. Developers extend the framework base classes
to model the numerous physical control points, thereby sharing the
functionality defined by the base classes. About 56,000 software objects each
individually addressed through CORBA are to be created in the complete ICCS.
Most objects have a persistent state that is initialized at system start-up and
stored in a database. Additional framework services are provided by centralized
server programs that implement events, alerts, reservations, message logging,
database/file persistence, name services, and process management. The ICCS
software framework approach allows for efficient construction of a software
system that supports a large number of distributed control points representing
a complex control application.
| [
{
"version": "v1",
"created": "Fri, 9 Nov 2001 16:40:09 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Carey",
"Robert W.",
""
],
[
"Fong",
"Kirby W.",
""
],
[
"Sanchez",
"Randy J.",
""
],
[
"Tappero",
"Joseph D.",
""
],
[
"Woodruff",
"John P.",
""
]
]
| new_dataset | 0.96048 |
cs/0111044 | Sheng Peng | S. Peng, R. Lambiase, B. Oerter, J. Smith | SNS Standard Power Supply Interface | PDF File | eConf C011127 (2001) THAP052 | null | null | cs.OH | null | The SNS has developed a standard power supply interface for the approximately
350 magnet power supplies in the SNS accumulator ring, Linac and transport
lines. Power supply manufacturers are providing supplies compatible with the
standard interface. The SNS standard consists of a VME based power supply
controller module (PSC) and a power supply interface unit (PSI) that mounts on
the power supply. Communication between the two is via a pair of multimode
fibers. This PSI/PSC system supports one 16-bit analog reference, four 16-bit
analog readbacks, fifteen digital commands and sixteen digital status bits in a
single fiber-isolated module. The system can send commands to the supplies and
read data from them synchronized to an external signal at up to a 10KHz rate.
The PSC time stamps and stores this data in a circular buffer so historical
data leading up to a fault event can be analyzed. The PSC contains a serial
port so that local testing of hardware can be accomplished with a laptop. This
paper concentrates on the software being provided to control the power supply.
It includes the EPICS driver; software to test hardware and power supplies via
the serial port and VME interface.
| [
{
"version": "v1",
"created": "Fri, 16 Nov 2001 20:33:36 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Peng",
"S.",
""
],
[
"Lambiase",
"R.",
""
],
[
"Oerter",
"B.",
""
],
[
"Smith",
"J.",
""
]
]
| new_dataset | 0.956598 |
cs/0111046 | AbdelAli Ed-Dbali | AbdelAli Ed-Dbali (1), Pierre Deransart (2), Mariza A. S. Bigonha (3),
Jose de Siqueira (3), Roberto da S. Bigonha (3) ((1) LIFO - University of
Orleans - France, (2) INRIA Rocquencourt - France, (3) DCC - UFMG - Brazil) | HyperPro An integrated documentation environment for CLP | In A. Kusalik (ed), Proceedings of the Eleventh International
Workshop on Logic Programming Environments (WLPE'01), December 1, 2001,
Paphos, Cyprus. cs.PL/0111042 | null | null | null | cs.PL cs.SE | null | The purpose of this paper is to present some functionalities of the HyperPro
System. HyperPro is a hypertext tool which allows to develop Constraint Logic
Programming (CLP) together with their documentation. The text editing part is
not new and is based on the free software Thot. A HyperPro program is a Thot
document written in a report style. The tool is designed for CLP but it can be
adapted to other programming paradigms as well. Thot offers navigation and
editing facilities and synchronized static document views. HyperPro has new
functionalities such as document exportations, dynamic views (projections),
indexes and version management. Projection is a mechanism for extracting and
exporting relevant pieces of code program or of document according to specific
criteria. Indexes are useful to find the references and occurrences of a
relation in a document, i.e., where its predicate definition is found and where
a relation is used in other programs or document versions and, to translate
hyper-texts links into paper references. It still lack importation facilities.
| [
{
"version": "v1",
"created": "Mon, 19 Nov 2001 16:50:49 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ed-Dbali",
"AbdelAli",
""
],
[
"Deransart",
"Pierre",
""
],
[
"Bigonha",
"Mariza A. S.",
""
],
[
"de Siqueira",
"Jose",
""
],
[
"Bigonha",
"Roberto da S.",
""
]
]
| new_dataset | 0.96336 |
cs/0111056 | Joerg Rothe | J\"org Rothe | Some Facets of Complexity Theory and Cryptography: A Five-Lectures
Tutorial | 57 pages, 17 figures, Lecture Notes for the 11th Jyvaskyla Summer
School | ACM Computing Surveys, volume 34, issue 4, pp. 504--549, December
2002 | null | null | cs.CC cs.CR | null | In this tutorial, selected topics of cryptology and of computational
complexity theory are presented. We give a brief overview of the history and
the foundations of classical cryptography, and then move on to modern
public-key cryptography. Particular attention is paid to cryptographic
protocols and the problem of constructing the key components of such protocols
such as one-way functions. A function is one-way if it is easy to compute, but
hard to invert. We discuss the notion of one-way functions both in a
cryptographic and in a complexity-theoretic setting. We also consider
interactive proof systems and present some interesting zero-knowledge
protocols. In a zero-knowledge protocol one party can convince the other party
of knowing some secret information without disclosing any bit of this
information. Motivated by these protocols, we survey some complexity-theoretic
results on interactive proof systems and related complexity classes.
| [
{
"version": "v1",
"created": "Wed, 21 Nov 2001 11:24:27 GMT"
},
{
"version": "v2",
"created": "Fri, 20 Dec 2002 10:13:18 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Rothe",
"Jörg",
""
]
]
| new_dataset | 0.990564 |
cs/0112009 | Vijay Ramachandran | Ming-Yang Kao and Vijay Ramachandran | DNA Self-Assembly For Constructing 3D Boxes | 15 pages, 3 figures. Extended abstract included in ISAAC 2001
proceedings | Algorithms and Computation, 12th International Symposium, ISAAC
2001 Proceedings. Springer LNCS 2223 (2001): 429-440 | null | null | cs.CC cs.CE | null | We propose a mathematical model of DNA self-assembly using 2D tiles to form
3D nanostructures. This is the first work to combine studies in self-assembly
and nanotechnology in 3D, just as Rothemund and Winfree did in the 2D case. Our
model is a more precise superset of their Tile Assembly Model that facilitates
building scalable 3D molecules. Under our model, we present algorithms to build
a hollow cube, which is intuitively one of the simplest 3D structures to
construct. We also introduce five basic measures of complexity to analyze these
algorithms. Our model and algorithmic techniques are applicable to more complex
2D and 3D nanostructures.
| [
{
"version": "v1",
"created": "Sat, 8 Dec 2001 21:36:28 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kao",
"Ming-Yang",
""
],
[
"Ramachandran",
"Vijay",
""
]
]
| new_dataset | 0.999586 |
cs/0112024 | Thomas Schmidt | B. Feustel, T.C. Schmidt | Media Objects in Time - A Multimedia Streaming System | 9 pdf pages | Computer Networks 37,6 (2001), pp. 729 - 737 | null | null | cs.NI cs.MM | null | The widespread availability of networked multimedia potentials embedded in an
infrastructure of qualitative superior kind gives rise to new approaches in the
areas of teleteaching and internet presentation: The distribution of
professionally styled multimedia streams has fallen in the realm of
possibility. This paper presents a prototype - both model and runtime
environment - of a time directed media system treating any kind of
presentational contribution as reusable media object components. The plug-in
free runtime system is based on a database and allows for a flexible support of
static media types as well as for easy extensions by streaming media servers.
The prototypic implementation includes a preliminary Web Authoring platform.
| [
{
"version": "v1",
"created": "Fri, 28 Dec 2001 20:19:09 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Feustel",
"B.",
""
],
[
"Schmidt",
"T. C.",
""
]
]
| new_dataset | 0.989685 |
cs/0202001 | Carlo Zaniolo | Faiz Arni, KayLiang Ong, Shalom Tsur and Haixun Wang, Carlo Zaniolo | The Deductive Database System LDL++ | null | null | null | null | cs.DB cs.AI | null | This paper describes the LDL++ system and the research advances that have
enabled its design and development. We begin by discussing the new nonmonotonic
and nondeterministic constructs that extend the functionality of the LDL++
language, while preserving its model-theoretic and fixpoint semantics. Then, we
describe the execution model and the open architecture designed to support
these new constructs and to facilitate the integration with existing DBMSs and
applications. Finally, we describe the lessons learned by using LDL++ on
various tested applications, such as middleware and datamining.
| [
{
"version": "v1",
"created": "Fri, 1 Feb 2002 05:00:24 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Arni",
"Faiz",
""
],
[
"Ong",
"KayLiang",
""
],
[
"Tsur",
"Shalom",
""
],
[
"Wang",
"Haixun",
""
],
[
"Zaniolo",
"Carlo",
""
]
]
| new_dataset | 0.976449 |
cs/0202002 | Robert Colvin | Ian Hayes, Robert Colvin, David Hemer, Paul Strooper, Ray Nickson | A Refinement Calculus for Logic Programs | 36 pages, 3 figures. To be published in Theory and Practice of Logic
Programming (TPLP) | null | null | null | cs.SE cs.LO | null | Existing refinement calculi provide frameworks for the stepwise development
of imperative programs from specifications. This paper presents a refinement
calculus for deriving logic programs. The calculus contains a wide-spectrum
logic programming language, including executable constructs such as sequential
conjunction, disjunction, and existential quantification, as well as
specification constructs such as general predicates, assumptions and universal
quantification. A declarative semantics is defined for this wide-spectrum
language based on executions. Executions are partial functions from states to
states, where a state is represented as a set of bindings. The semantics is
used to define the meaning of programs and specifications, including parameters
and recursion. To complete the calculus, a notion of correctness-preserving
refinement over programs in the wide-spectrum language is defined and
refinement laws for developing programs are introduced. The refinement calculus
is illustrated using example derivations and prototype tool support is
discussed.
| [
{
"version": "v1",
"created": "Mon, 4 Feb 2002 01:20:38 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Hayes",
"Ian",
""
],
[
"Colvin",
"Robert",
""
],
[
"Hemer",
"David",
""
],
[
"Strooper",
"Paul",
""
],
[
"Nickson",
"Ray",
""
]
]
| new_dataset | 0.965763 |
cs/0202003 | Paul Vitanyi | Paul Vitanyi (CWI and University of Amsterdam) | Simple Optimal Wait-free Multireader Registers | 11 pages LaTeX, 1 table, 2 pseudo-programs; previous version
published in Proc 16th International Symposium on DIStributed Computing (DISC
2002), Lecture Notes in Computer Science, Vol 2508, Springer-Verlag, Berlin,
118-132. New version eliminates error in the protocol (merges a split scan
operation that proved problematic) and defers the formal proof to a planned
future I/O automaton version | null | null | null | cs.DC | null | Multireader shared registers are basic objects used as communication medium
in asynchronous concurrent computation. We propose a surprisingly simple and
natural scheme to obtain several wait-free constructions of bounded 1-writer
multireader registers from atomic 1-writer 1-reader registers, that is easier
to prove correct than any previous construction. Our main construction is the
first symmetric pure timestamp one that is optimal with respect to the
worst-case local use of control bits; the other one is optimal with respect to
global use of control bits; both are optimal in time.
| [
{
"version": "v1",
"created": "Mon, 4 Feb 2002 17:29:15 GMT"
},
{
"version": "v2",
"created": "Wed, 23 Oct 2002 15:18:47 GMT"
},
{
"version": "v3",
"created": "Thu, 15 Dec 2005 14:32:14 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Vitanyi",
"Paul",
"",
"CWI and University of Amsterdam"
]
]
| new_dataset | 0.980207 |
cs/0202018 | Daniel Lehmann | Daniel Lehmann | Nonmonotonic Logics and Semantics | 28 pages. Misprint corrected 15/04/02 | Journal of Logic and Computation, Vol. 11 No.2, pp.229-256 2001 | null | Leibniz Center for Research in Computer Science TR-98-6 | cs.AI cs.LO math.LO | null | Tarski gave a general semantics for deductive reasoning: a formula a may be
deduced from a set A of formulas iff a holds in all models in which each of the
elements of A holds. A more liberal semantics has been considered: a formula a
may be deduced from a set A of formulas iff a holds in all of the "preferred"
models in which all the elements of A hold. Shoham proposed that the notion of
"preferred" models be defined by a partial ordering on the models of the
underlying language. A more general semantics is described in this paper, based
on a set of natural properties of choice functions. This semantics is here
shown to be equivalent to a semantics based on comparing the relative
"importance" of sets of models, by what amounts to a qualitative probability
measure. The consequence operations defined by the equivalent semantics are
then characterized by a weakening of Tarski's properties in which the
monotonicity requirement is replaced by three weaker conditions. Classical
propositional connectives are characterized by natural introduction-elimination
rules in a nonmonotonic setting. Even in the nonmonotonic setting, one obtains
classical propositional logic, thus showing that monotonicity is not required
to justify classical propositional connectives.
| [
{
"version": "v1",
"created": "Fri, 15 Feb 2002 12:49:11 GMT"
},
{
"version": "v2",
"created": "Mon, 15 Apr 2002 19:49:33 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lehmann",
"Daniel",
""
]
]
| new_dataset | 0.992008 |
cs/0202024 | Daniel Lehmann | Daniel Lehmann | A note on Darwiche and Pearl | A small unpublished remark on a paper by Darwiche and Pearl | null | null | null | cs.AI | null | It is shown that Darwiche and Pearl's postulates imply an interesting
property, not noticed by the authors.
| [
{
"version": "v1",
"created": "Mon, 18 Feb 2002 15:23:06 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lehmann",
"Daniel",
""
]
]
| new_dataset | 0.981023 |
cs/0202027 | Naren Ramakrishnan | Alex Verstak, Naren Ramakrishnan, Layne T. Watson, Jian He, Clifford
A. Shaffer, Kyung Kyoon Bae, Jing Jiang, William H. Tranter, Theodore S.
Rappaport | BSML: A Binding Schema Markup Language for Data Interchange in Problem
Solving Environments (PSEs) | null | null | null | null | cs.CE cs.SE | null | We describe a binding schema markup language (BSML) for describing data
interchange between scientific codes. Such a facility is an important
constituent of scientific problem solving environments (PSEs). BSML is designed
to integrate with a PSE or application composition system that views model
specification and execution as a problem of managing semistructured data. The
data interchange problem is addressed by three techniques for processing
semistructured data: validation, binding, and conversion. We present BSML and
describe its application to a PSE for wireless communications system design.
| [
{
"version": "v1",
"created": "Mon, 18 Feb 2002 16:01:03 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Verstak",
"Alex",
""
],
[
"Ramakrishnan",
"Naren",
""
],
[
"Watson",
"Layne T.",
""
],
[
"He",
"Jian",
""
],
[
"Shaffer",
"Clifford A.",
""
],
[
"Bae",
"Kyung Kyoon",
""
],
[
"Jiang",
"Jing",
""
],
[
"Tranter",
"William H.",
""
],
[
"Rappaport",
"Theodore S.",
""
]
]
| new_dataset | 0.999746 |
cs/0203009 | Judith Beumer | O. S. Matlin, E. Lusk, and W. McCune | SPINning Parallel Systems Software | 19 pages; 8 figures; 3 tables | null | null | ANL/MCS-P921-1201 | cs.LO cs.DC | null | We describe our experiences in using SPIN to verify parts of the Multi
Purpose Daemon (MPD) parallel process management system. MPD is a distributed
collection of processes connected by Unix network sockets. MPD is dynamic:
processes and connections among them are created and destroyed as MPD is
initialized, runs user processes, recovers from faults, and terminates. This
dynamic nature is easily expressible in the SPIN/PROMELA framework but poses
performance and scalability challenges. We present here the results of
expressing some of the parallel algorithms of MPD and executing both simulation
and verification runs with SPIN.
| [
{
"version": "v1",
"created": "Wed, 6 Mar 2002 18:15:03 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Matlin",
"O. S.",
""
],
[
"Lusk",
"E.",
""
],
[
"McCune",
"W.",
""
]
]
| new_dataset | 0.990851 |
cs/0203017 | Jack H. Lutz | Jack H. Lutz | The Dimensions of Individual Strings and Sequences | 31 pages | null | null | null | cs.CC | null | A constructive version of Hausdorff dimension is developed using constructive
supergales, which are betting strategies that generalize the constructive
supermartingales used in the theory of individual random sequences. This
constructive dimension is used to assign every individual (infinite, binary)
sequence S a dimension, which is a real number dim(S) in the interval [0,1].
Sequences that are random (in the sense of Martin-Lof) have dimension 1, while
sequences that are decidable, \Sigma^0_1, or \Pi^0_1 have dimension 0. It is
shown that for every \Delta^0_2-computable real number \alpha in [0,1] there is
a \Delta^0_2 sequence S such that \dim(S) = \alpha.
A discrete version of constructive dimension is also developed using
termgales, which are supergale-like functions that bet on the terminations of
(finite, binary) strings as well as on their successive bits. This discrete
dimension is used to assign each individual string w a dimension, which is a
nonnegative real number dim(w). The dimension of a sequence is shown to be the
limit infimum of the dimensions of its prefixes.
The Kolmogorov complexity of a string is proven to be the product of its
length and its dimension. This gives a new characterization of algorithmic
information and a new proof of Mayordomo's recent theorem stating that the
dimension of a sequence is the limit infimum of the average Kolmogorov
complexity of its first n bits.
Every sequence that is random relative to any computable sequence of
coin-toss biases that converge to a real number \beta in (0,1) is shown to have
dimension \H(\beta), the binary entropy of \beta.
| [
{
"version": "v1",
"created": "Tue, 12 Mar 2002 20:28:19 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lutz",
"Jack H.",
""
]
]
| new_dataset | 0.98644 |
cs/0203019 | Rajkumar Buyya | Rajkumar Buyya and Manzur Murshed | GridSim: A Toolkit for the Modeling and Simulation of Distributed
Resource Management and Scheduling for Grid Computing | null | Concurrency and Computation: Practice and Experience, Wiley, May
2002 | null | null | cs.DC | null | Clusters, grids, and peer-to-peer (P2P) networks have emerged as popular
paradigms for next generation parallel and distributed computing. The
management of resources and scheduling of applications in such large-scale
distributed systems is a complex undertaking. In order to prove the
effectiveness of resource brokers and associated scheduling algorithms, their
performance needs to be evaluated under different scenarios such as varying
number of resources and users with different requirements. In a grid
environment, it is hard and even impossible to perform scheduler performance
evaluation in a repeatable and controllable manner as resources and users are
distributed across multiple organizations with their own policies. To overcome
this limitation, we have developed a Java-based discrete-event grid simulation
toolkit called GridSim. The toolkit supports modeling and simulation of
heterogeneous grid resources (both time- and space-shared), users and
application models. It provides primitives for creation of application tasks,
mapping of tasks to resources, and their management. To demonstrate suitability
of the GridSim toolkit, we have simulated a Nimrod-G like grid resource broker
and evaluated the performance of deadline and budget constrained cost- and
time-minimization scheduling algorithms.
| [
{
"version": "v1",
"created": "Thu, 14 Mar 2002 03:44:18 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Buyya",
"Rajkumar",
""
],
[
"Murshed",
"Manzur",
""
]
]
| new_dataset | 0.996718 |
cs/0203023 | Magnus Boman | David Lyback and Magnus Boman | Agent trade servers in financial exchange systems | 11 pages, 1 figure | null | null | null | cs.CE | null | New services based on the best-effort paradigm could complement the current
deterministic services of an electronic financial exchange. Four crucial
aspects of such systems would benefit from a hybrid stance: proper use of
processing resources, bandwidth management, fault tolerance, and exception
handling. We argue that a more refined view on Quality-of-Service control for
exchange systems, in which the principal ambition of upholding a fair and
orderly marketplace is left uncompromised, would benefit all interested
parties.
| [
{
"version": "v1",
"created": "Tue, 19 Mar 2002 10:05:58 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lyback",
"David",
""
],
[
"Boman",
"Magnus",
""
]
]
| new_dataset | 0.988558 |
cs/0204002 | Erik Demaine | Erik D. Demaine, Martin L. Demaine, Helena A. Verrill | Coin-Moving Puzzles | 25 pages, 33 figures. To appear in the book More Games of No Chance
edited by Richard Nowakowski and published by MSRI | null | null | null | cs.DM cs.CG cs.GT | null | We introduce a new family of one-player games, involving the movement of
coins from one configuration to another. Moves are restricted so that a coin
can be placed only in a position that is adjacent to at least two other coins.
The goal of this paper is to specify exactly which of these games are solvable.
By introducing the notion of a constant number of extra coins, we give tight
theorems characterizing solvable puzzles on the square grid and
equilateral-triangle grid. These existence results are supplemented by
polynomial-time algorithms for finding a solution.
| [
{
"version": "v1",
"created": "Sun, 31 Mar 2002 01:02:12 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Demaine",
"Erik D.",
""
],
[
"Demaine",
"Martin L.",
""
],
[
"Verrill",
"Helena A.",
""
]
]
| new_dataset | 0.99706 |
cs/0204006 | Steven Bird | Steven Bird, Kazuaki Maeda, Xiaoyi Ma, Haejoong Lee, Beth Randall, and
Salim Zayat | TableTrans, MultiTrans, InterTrans and TreeTrans: Diverse Tools Built on
the Annotation Graph Toolkit | 7 pages, 7 figures | Proceedings of the Third International Conference on Language
Resources and Evaluation, Paris: European Language Resources Association,
2002 | null | null | cs.CL cs.SD | null | Four diverse tools built on the Annotation Graph Toolkit are described. Each
tool associates linguistic codes and structures with time-series data. All are
based on the same software library and tool architecture. TableTrans is for
observational coding, using a spreadsheet whose rows are aligned to a signal.
MultiTrans is for transcribing multi-party communicative interactions recorded
using multi-channel signals. InterTrans is for creating interlinear text
aligned to audio. TreeTrans is for creating and manipulating syntactic trees.
This work demonstrates that the development of diverse tools and re-use of
software components is greatly facilitated by a common high-level application
programming interface for representing the data and managing input/output,
together with a common architecture for managing the interaction of multiple
components.
| [
{
"version": "v1",
"created": "Wed, 3 Apr 2002 17:18:49 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Bird",
"Steven",
""
],
[
"Maeda",
"Kazuaki",
""
],
[
"Ma",
"Xiaoyi",
""
],
[
"Lee",
"Haejoong",
""
],
[
"Randall",
"Beth",
""
],
[
"Zayat",
"Salim",
""
]
]
| new_dataset | 0.978569 |
cs/0204017 | Erik Demaine | Erik D. Demaine, Martin L. Demaine, Rudolf Fleischer | Solitaire Clobber | 14 pages. v2 fixes small typo | null | null | HKUST-TCSC-2002-05 | cs.DM cs.CG cs.GT | null | Clobber is a new two-player board game. In this paper, we introduce the
one-player variant Solitaire Clobber where the goal is to remove as many stones
as possible from the board by alternating white and black moves. We show that a
checkerboard configuration on a single row (or single column) can be reduced to
about n/4 stones. For boards with at least two rows and two columns, we show
that a checkerboard configuration can be reduced to a single stone if and only
if the number of stones is not a multiple of three, and otherwise it can be
reduced to two stones. We also show that in general it is NP-complete to decide
whether an arbitrary Clobber configuration can be reduced to a single stone.
| [
{
"version": "v1",
"created": "Tue, 9 Apr 2002 15:57:59 GMT"
},
{
"version": "v2",
"created": "Tue, 30 Jul 2002 21:03:40 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Demaine",
"Erik D.",
""
],
[
"Demaine",
"Martin L.",
""
],
[
"Fleischer",
"Rudolf",
""
]
]
| new_dataset | 0.99983 |
cs/0204025 | Steven Bird | Steven Bird | Phonology | 27 pages | In Ruslan Mitkov (ed) (2002). Oxford Handbook of Computational
Linguistics | null | null | cs.CL | null | Phonology is the systematic study of the sounds used in language, their
internal structure, and their composition into syllables, words and phrases.
Computational phonology is the application of formal and computational
techniques to the representation and processing of phonological information.
This chapter will present the fundamentals of descriptive phonology along with
a brief overview of computational phonology.
| [
{
"version": "v1",
"created": "Thu, 11 Apr 2002 11:22:43 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Bird",
"Steven",
""
]
]
| new_dataset | 0.988699 |
cs/0204056 | Magnus Boman | Magnus Boman, Markus Bylund, Fredrik Espinoza, Mats Danielson, David
Lyback | Trading Agents for Roaming Users | 5 pages, 1 figure | null | null | null | cs.CE | null | Some roaming users need services to manipulate autonomous processes. Trading
agents running on agent trade servers are used as a case in point. We present a
solution that provides the agent owners with means to upkeeping their desktop
environment, and maintaining their agent trade server processes, via a
briefcase service.
| [
{
"version": "v1",
"created": "Mon, 29 Apr 2002 12:20:11 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Boman",
"Magnus",
""
],
[
"Bylund",
"Markus",
""
],
[
"Espinoza",
"Fredrik",
""
],
[
"Danielson",
"Mats",
""
],
[
"Lyback",
"David",
""
]
]
| new_dataset | 0.99492 |
cs/0205016 | Han Jing | Jing Han, Jiming Liu and Qingsheng Cai | From Alife Agents to a Kingdom of N Queens | 13 pages, 9 figures, in 1999 international conference of Intelligent
Agent Technology. Nominated for the best paper award | in Jiming Liu and Ning Zhong (Eds.), Intelligent Agent Technology:
Systems, Methodologies, and Tools, page 110-120, The World Scientific
Publishing Co. Pte, Ltd., Nov. 1999 | null | null | cs.AI cs.DS cs.MA | null | This paper presents a new approach to solving N-queen problems, which
involves a model of distributed autonomous agents with artificial life (ALife)
and a method of representing N-queen constraints in an agent environment. The
distributed agents locally interact with their living environment, i.e., a
chessboard, and execute their reactive behaviors by applying their behavioral
rules for randomized motion, least-conflict position searching, and cooperating
with other agents etc. The agent-based N-queen problem solving system evolves
through selection and contest according to the rule of Survival of the Fittest,
in which some agents will die or be eaten if their moving strategies are less
efficient than others. The experimental results have shown that this system is
capable of solving large-scale N-queen problems. This paper also provides a
model of ALife agents for solving general CSPs.
| [
{
"version": "v1",
"created": "Mon, 13 May 2002 10:49:48 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Han",
"Jing",
""
],
[
"Liu",
"Jiming",
""
],
[
"Cai",
"Qingsheng",
""
]
]
| new_dataset | 0.991642 |
cs/0205017 | Georgios Petasis | Georgios Petasis, Vangelis Karkaletsis, Georgios Paliouras, Ion
Androutsopoulos, Constantine D. Spyropoulos | Ellogon: A New Text Engineering Platform | 7 pages, 9 figures. Will be presented to the Third International
Conference on Language Resources and Evaluation - LREC 2002 | null | null | null | cs.CL | null | This paper presents Ellogon, a multi-lingual, cross-platform, general-purpose
text engineering environment. Ellogon was designed in order to aid both
researchers in natural language processing, as well as companies that produce
language engineering systems for the end-user. Ellogon provides a powerful
TIPSTER-based infrastructure for managing, storing and exchanging textual data,
embedding and managing text processing components as well as visualising
textual data and their associated linguistic information. Among its key
features are full Unicode support, an extensive multi-lingual graphical user
interface, its modular architecture and the reduced hardware requirements.
| [
{
"version": "v1",
"created": "Mon, 13 May 2002 11:18:08 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Petasis",
"Georgios",
""
],
[
"Karkaletsis",
"Vangelis",
""
],
[
"Paliouras",
"Georgios",
""
],
[
"Androutsopoulos",
"Ion",
""
],
[
"Spyropoulos",
"Constantine D.",
""
]
]
| new_dataset | 0.998567 |
cs/0205019 | Wen Chen | W. Chen | Distance function wavelets - Part I: Helmholtz and convection-diffusion
transforms and series | Welcome any comments to [email protected] | null | null | null | cs.CE cs.NA | null | This report aims to present my research updates on distance function wavelets
(DFW) based on the fundamental solutions and the general solutions of the
Helmholtz, modified Helmholtz, and convection-diffusion equations, which
include the isotropic Helmholtz-Fourier (HF) transform and series, the
Helmholtz-Laplace (HL) transform, and the anisotropic convection-diffusion
wavelets and ridgelets. The latter is set to handle discontinuous and track
data problems. The edge effect of the HF series is addressed. Alternative
existence conditions for the DFW transforms are proposed and discussed. To
simplify and streamline the expression of the HF and HL transforms, a new
dimension-dependent function notation is introduced. The HF series is also used
to evaluate the analytical solutions of linear diffusion problems of arbitrary
dimensionality and geometry. The weakness of this report is lacking of rigorous
mathematical analysis due to the author's limited mathematical knowledge.
| [
{
"version": "v1",
"created": "Tue, 14 May 2002 13:43:47 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Chen",
"W.",
""
]
]
| new_dataset | 0.997901 |
cs/0205027 | Chung-chieh Shan | Chung-chieh Shan (Harvard University) | A variable-free dynamic semantics | 6 pages | Proceedings of the 13th Amsterdam Colloquium, ed. Robert van Rooy
and Martin Stokhof, 204-209 (2001) | null | null | cs.CL | null | I propose a variable-free treatment of dynamic semantics. By "dynamic
semantics" I mean analyses of donkey sentences ("Every farmer who owns a donkey
beats it") and other binding and anaphora phenomena in natural language where
meanings of constituents are updates to information states, for instance as
proposed by Groenendijk and Stokhof. By "variable-free" I mean denotational
semantics in which functional combinators replace variable indices and
assignment functions, for instance as advocated by Jacobson.
The new theory presented here achieves a compositional treatment of dynamic
anaphora that does not involve assignment functions, and separates the
combinatorics of variable-free semantics from the particular linguistic
phenomena it treats. Integrating variable-free semantics and dynamic semantics
gives rise to interactions that make new empirical predictions, for example
"donkey weak crossover" effects.
| [
{
"version": "v1",
"created": "Fri, 17 May 2002 09:33:52 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Shan",
"Chung-chieh",
"",
"Harvard University"
]
]
| new_dataset | 0.990179 |
cs/0205028 | Steven Bird | Edward Loper and Steven Bird | NLTK: The Natural Language Toolkit | 8 pages, 1 figure, Proceedings of the ACL Workshop on Effective Tools
and Methodologies for Teaching Natural Language Processing and Computational
Linguistics, Philadelphia, July 2002, Association for Computational
Linguistics | null | null | null | cs.CL | null | NLTK, the Natural Language Toolkit, is a suite of open source program
modules, tutorials and problem sets, providing ready-to-use computational
linguistics courseware. NLTK covers symbolic and statistical natural language
processing, and is interfaced to annotated corpora. Students augment and
replace existing components, learn structured programming by example, and
manipulate sophisticated models from the outset.
| [
{
"version": "v1",
"created": "Fri, 17 May 2002 12:51:00 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Loper",
"Edward",
""
],
[
"Bird",
"Steven",
""
]
]
| new_dataset | 0.996486 |
cs/0205063 | Wen Chen | W. Chen | Distance function wavelets - Part II: Extended results and conjectures | Welcome any comments to [email protected] | null | null | null | cs.CE cs.CG | null | Report II is concerned with the extended results of distance function
wavelets (DFW). The fractional DFW transforms are first addressed relating to
the fractal geometry and fractional derivative, and then, the discrete
Helmholtz-Fourier transform is briefly presented. The Green second identity may
be an alternative devise in developing the theoretical framework of the DFW
transform and series. The kernel solutions of the Winkler plate equation and
the Burger's equation are used to create the DFW transforms and series. Most
interestingly, it is found that the translation invariant monomial solutions of
the high-order Laplace equations can be used to make very simple harmonic
polynomial DFW series. In most cases of this study, solid mathematical analysis
is missing and results are obtained intuitively in the conjecture status.
| [
{
"version": "v1",
"created": "Fri, 24 May 2002 12:07:28 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Chen",
"W.",
""
]
]
| new_dataset | 0.996813 |
cs/0206016 | Wen Chen | W. Chen | Distance function wavelets - Part III: "Exotic" transforms and series | Welcome comments to [email protected] | null | null | null | cs.CE cs.CG | null | Part III of the reports consists of various unconventional distance function
wavelets (DFW). The dimension and the order of partial differential equation
(PDE) are first used as a substitute of the scale parameter in the DFW
transforms and series, especially with the space and time-space potential
problems. It is noted that the recursive multiple reciprocity formulation is
the DFW series. The Green second identity is used to avoid the singularity of
the zero-order fundamental solution in creating the DFW series. The fundamental
solutions of various composite PDEs are found very flexible and efficient to
handle a borad range of problems. We also discuss the underlying connections
between the crucial concepts of dimension, scale and the order of PDE through
the analysis of dissipative acoustic wave propagation. The shape parameter of
the potential problems is also employed as the "scale parameter" to create the
non-orthogonal DFW. This paper also briefly discusses and conjectures the DFW
correspondences of a variety of coordinate variable transforms and series.
Practically important, the anisotropic and inhomogeneous DFW's are developed by
using the geodesic distance variable. The DFW and the related basis functions
are also used in making the kernel distance sigmoidal functions, which are
potentially useful in the artificial neural network and machine learning. As or
even worse than the preceding two reports, this study scarifies mathematical
rigor and in turn unfetter imagination. Most results are intuitively obtained
without rigorous analysis. Follow-up research is still under way. The paper is
intended to inspire more research into this promising area.
| [
{
"version": "v1",
"created": "Mon, 10 Jun 2002 09:01:53 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Chen",
"W.",
""
]
]
| new_dataset | 0.993903 |
cs/0206024 | Denis Popel | Denis V. Popel and Anita Dani | Sierpinski Gaskets for Logic Functions Representation | 7 pages, 8 figures, 3 tables, experiments | ISMVL 2002 Proceedinds | null | null | cs.LO cs.DM | null | This paper introduces a new approach to represent logic functions in the form
of Sierpinski Gaskets. The structure of the gasket allows to manipulate with
the corresponding logic expression using recursive essence of fractals. Thus,
the Sierpinski gasket's pattern has myriad useful properties which can enhance
practical features of other graphic representations like decision diagrams. We
have covered possible applications of Sierpinski gaskets in logic design and
justified our assumptions in logic function minimization (both Boolean and
multiple-valued cases). The experimental results on benchmarks with advances in
the novel structure are considered as well.
| [
{
"version": "v1",
"created": "Sat, 15 Jun 2002 15:44:32 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Popel",
"Denis V.",
""
],
[
"Dani",
"Anita",
""
]
]
| new_dataset | 0.99581 |
cs/0206035 | Atsushi Fujii | Shigeto Higuchi, Masatoshi Fukui, Atsushi Fujii and Tetsuya Ishikawa | PRIME: A System for Multi-lingual Patent Retrieval | null | Proceedings of MT Summit VIII, pp.163-167, Sep. 2001 | null | null | cs.CL | null | Given the growing number of patents filed in multiple countries, users are
interested in retrieving patents across languages. We propose a multi-lingual
patent retrieval system, which translates a user query into the target
language, searches a multilingual database for patents relevant to the query,
and improves the browsing efficiency by way of machine translation and
clustering. Our system also extracts new translations from patent families
consisting of comparable patents, to enhance the translation dictionary.
| [
{
"version": "v1",
"created": "Mon, 24 Jun 2002 08:00:45 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Higuchi",
"Shigeto",
""
],
[
"Fukui",
"Masatoshi",
""
],
[
"Fujii",
"Atsushi",
""
],
[
"Ishikawa",
"Tetsuya",
""
]
]
| new_dataset | 0.996839 |
cs/0207006 | Wen Chen | W. Chen | Orthonormal RBF wavelet and ridgelet-like series and transforms for
high-dimensional problems | null | Int. J. Nonlinear Sci. & Numer. Simulation, 2(2), 155-160, 2001 | null | null | cs.SC | null | This paper developed a systematic strategy establishing RBF on the wavelet
analysis, which includes continuous and discrete RBF orthonormal wavelet
transforms respectively in terms of singular fundamental solutions and
nonsingular general solutions of differential operators. In particular, the
harmonic Bessel RBF transforms were presented for high-dimensional data
processing. It was also found that the kernel functions of convection-diffusion
operator are feasible to construct some stable ridgelet-like RBF transforms. We
presented time-space RBF transforms based on non-singular solution and
fundamental solution of time-dependent differential operators. The present
methodology was further extended to analysis of some known RBFs such as the MQ,
Gaussian and pre-wavelet kernel RBFs.
| [
{
"version": "v1",
"created": "Wed, 3 Jul 2002 15:34:39 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Chen",
"W.",
""
]
]
| new_dataset | 0.959987 |
cs/0207009 | Vince Grolmusz | Vince Grolmusz | Computing Elementary Symmetric Polynomials with a Sublinear Number of
Multiplications | 10 pages | null | null | null | cs.CC cs.DM cs.DS | null | Elementary symmetric polynomials $S_n^k$ are used as a benchmark for the
bounded-depth arithmetic circuit model of computation. In this work we prove
that $S_n^k$ modulo composite numbers $m=p_1p_2$ can be computed with much
fewer multiplications than over any field, if the coefficients of monomials
$x_{i_1}x_{i_2}... x_{i_k}$ are allowed to be 1 either mod $p_1$ or mod $p_2$
but not necessarily both. More exactly, we prove that for any constant $k$ such
a representation of $S_n^k$ can be computed modulo $p_1p_2$ using only
$\exp(O(\sqrt{\log n}\log\log n))$ multiplications on the most restricted
depth-3 arithmetic circuits, for $\min({p_1,p_2})>k!$. Moreover, the number of
multiplications remain sublinear while $k=O(\log\log n).$ In contrast, the
well-known Graham-Pollack bound yields an $n-1$ lower bound for the number of
multiplications even for the exact computation (not the representation) of
$S_n^2$. Our results generalize for other non-prime power composite moduli as
well. The proof uses the famous BBR-polynomial of Barrington, Beigel and
Rudich.
| [
{
"version": "v1",
"created": "Wed, 3 Jul 2002 14:32:21 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Grolmusz",
"Vince",
""
]
]
| new_dataset | 0.958385 |
cs/0207046 | Alexandre Tessier | Samir Ouis, Narendra Jussien, Patrice Boizumault | COINS: a constraint-based interactive solving system | 15 pages; Alexandre Tessier, editor; WLPE 2002,
http://xxx.lanl.gov/abs/cs.SE/0207052 | null | null | null | cs.SE | null | This paper describes the COINS (COnstraint-based INteractive Solving) system:
a conflict-based constraint solver. It helps understanding inconsistencies,
simulates constraint additions and/or retractions (without any propagation),
determines if a given constraint belongs to a conflict and provides diagnosis
tools (e.g. why variable v cannot take value val). COINS also uses
user-friendly representation of conflicts and explanations.
| [
{
"version": "v1",
"created": "Thu, 11 Jul 2002 16:25:20 GMT"
},
{
"version": "v2",
"created": "Fri, 12 Jul 2002 00:35:59 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ouis",
"Samir",
""
],
[
"Jussien",
"Narendra",
""
],
[
"Boizumault",
"Patrice",
""
]
]
| new_dataset | 0.963322 |
cs/0207048 | Alexandre Tessier | Francois Fages | CLPGUI: a generic graphical user interface for constraint logic
programming over finite domains | 16 pages; Alexandre Tessier, editor; WLPE 2002,
http://xxx.lanl.gov/abs/cs.SE/0207052 | null | null | null | cs.SE | null | CLPGUI is a graphical user interface for visualizing and interacting with
constraint logic programs over finite domains. In CLPGUI, the user can control
the execution of a CLP program through several views of constraints, of finite
domain variables and of the search tree. CLPGUI is intended to be used both for
teaching purposes, and for debugging and improving complex programs of
realworld scale. It is based on a client-server architecture for connecting the
CLP process to a Java-based GUI process. Communication by message passing
provides an open architecture which facilitates the reuse of graphical
components and the porting to different constraint programming systems.
Arbitrary constraints and goals can be posted incrementally from the GUI. We
propose several dynamic 2D and 3D visualizations of the search tree and of the
evolution of finite domain variables. We argue that the 3D representation of
search trees proposed in this paper provides the most appropriate visualization
of large search trees. We describe the current implementation of the
annotations and of the interactive execution model in GNU-Prolog, and report
some evaluation results.
| [
{
"version": "v1",
"created": "Thu, 11 Jul 2002 18:05:59 GMT"
},
{
"version": "v2",
"created": "Fri, 12 Jul 2002 00:40:26 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Fages",
"Francois",
""
]
]
| new_dataset | 0.999661 |
cs/0207062 | Wen Chen | W. Chen | Some addenda on distance function wavelets | null | null | null | null | cs.NA cs.CE | null | This report will add some supplements to the recently finished report series
on the distance function wavelets (DFW). First, we define the general distance
in terms of the Riesz potential, and then, the distance function Abel wavelets
are derived via the fractional integral and Laplacian. Second, the DFW Weyl
transform is found to be a shifted Laplace potential DFW. The DFW Radon
transform is also presented. Third, we present a conjecture on truncation error
formula of the multiple reciprocity Laplace DFW series and discuss its error
distributions in terms of node density distributions. Forth, we point out that
the Hermite distance function interpolation can be used to replace overlapping
in the domain decomposition in order to produce sparse matrix. Fifth, the shape
parameter is explained as a virtual extra axis contribution in terms of the
MQ-type Possion kernel. The report is concluded with some remarks on a range of
other issues.
| [
{
"version": "v1",
"created": "Mon, 15 Jul 2002 19:58:27 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Chen",
"W.",
""
]
]
| new_dataset | 0.985913 |
cs/0207077 | Rajkumar Buyya | Jahanzeb Sherwani, Nosheen Ali, Nausheen Lotia, Zahra Hayat, and
Rajkumar Buyya | Libra: An Economy driven Job Scheduling System for Clusters | 13 pages | null | null | Technical Report, July 2002, Dept. of Computer Science and Software
Engineering, The University of Melbourne | cs.DC cs.DS | null | Clusters of computers have emerged as mainstream parallel and distributed
platforms for high-performance, high-throughput and high-availability
computing. To enable effective resource management on clusters, numerous
cluster managements systems and schedulers have been designed. However, their
focus has essentially been on maximizing CPU performance, but not on improving
the value of utility delivered to the user and quality of services. This paper
presents a new computational economy driven scheduling system called Libra,
which has been designed to support allocation of resources based on the users?
quality of service (QoS) requirements. It is intended to work as an add-on to
the existing queuing and resource management system. The first version has been
implemented as a plugin scheduler to the PBS (Portable Batch System) system.
The scheduler offers market-based economy driven service for managing batch
jobs on clusters by scheduling CPU time according to user utility as determined
by their budget and deadline rather than system performance considerations. The
Libra scheduler ensures that both these constraints are met within an O(n)
run-time. The Libra scheduler has been simulated using the GridSim toolkit to
carry out a detailed performance analysis. Results show that the deadline and
budget based proportional resource allocation strategy improves the utility of
the system and user satisfaction as compared to system-centric scheduling
strategies.
| [
{
"version": "v1",
"created": "Mon, 22 Jul 2002 11:35:33 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Sherwani",
"Jahanzeb",
""
],
[
"Ali",
"Nosheen",
""
],
[
"Lotia",
"Nausheen",
""
],
[
"Hayat",
"Zahra",
""
],
[
"Buyya",
"Rajkumar",
""
]
]
| new_dataset | 0.998394 |
cs/0207079 | Ilia Ponomarenko | D. Grigoriev and I. Ponomarenko | On non-abelian homomorphic public-key cryptosystems | 15 pages, LaTeX | null | null | null | cs.CR | null | An important problem of modern cryptography concerns secret public-key
computations in algebraic structures. We construct homomorphic cryptosystems
being (secret) epimorphisms f:G --> H, where G, H are (publically known) groups
and H is finite. A letter of a message to be encrypted is an element h element
of H, while its encryption g element of G is such that f(g)=h. A homomorphic
cryptosystem allows one to perform computations (operating in a group G) with
encrypted information (without knowing the original message over H).
In this paper certain homomorphic cryptosystems are constructed for the first
time for non-abelian groups H (earlier, homomorphic cryptosystems were known
only in the Abelian case). In fact, we present such a system for any solvable
(fixed) group H.
| [
{
"version": "v1",
"created": "Tue, 23 Jul 2002 07:28:59 GMT"
},
{
"version": "v2",
"created": "Mon, 2 Sep 2002 11:51:17 GMT"
},
{
"version": "v3",
"created": "Wed, 4 Sep 2002 10:12:29 GMT"
},
{
"version": "v4",
"created": "Thu, 14 Nov 2002 10:04:31 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Grigoriev",
"D.",
""
],
[
"Ponomarenko",
"I.",
""
]
]
| new_dataset | 0.992342 |
cs/0207091 | Dina Q. Goldin | Fran\c{c}ois Bry (University of Munich, Germany) | An Almost Classical Logic for Logic Programming and Nonmonotonic
Reasoning | 16 pages. Originally published in proc. PCL 2002, a FLoC workshop;
eds. Hendrik Decker, Dina Goldin, Jorgen Villadsen, Toshiharu Waragai
(http://floc02.diku.dk/PCL/) | null | null | null | cs.LO | null | The model theory of a first-order logic called N^4 is introduced. N^4 does
not eliminate double negations, as classical logic does, but instead reduces
fourfold negations. N^4 is very close to classical logic: N^4 has two truth
values; implications in N^4 are material, like in classical logic; and negation
distributes over compound formulas in N^4 as it does in classical logic.
Results suggest that the semantics of normal logic programs is conveniently
formalized in N^4: Classical logic Herbrand interpretations generalize
straightforwardly to N^4; the classical minimal Herbrand model of a positive
logic program coincides with its unique minimal N^4 Herbrand model; the stable
models of a normal logic program and its so-called complete minimal N^4
Herbrand models coincide.
| [
{
"version": "v1",
"created": "Thu, 25 Jul 2002 17:40:14 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Bry",
"François",
"",
"University of Munich, Germany"
]
]
| new_dataset | 0.996621 |
cs/0208010 | Jim Gray | Tom Barclay, Jim Gray, Eric Strand, Steve Ekblad, Jeffrey Richter | TerraService.NET: An Introduction to Web Services | original at
http://research.microsoft.com/scripts/pubs/view.asp?TR_ID=MSR-TR-2002-53 | null | null | MSR-TR-2002-53 | cs.DL cs.DB | null | This article explores the design and construction of a geo-spatial Internet
web service application from the host web site perspective and from the
perspective of an application using the web service. The TerraService.NET web
service was added to the popular TerraServer database and web site with no
major structural changes to the database. The article discusses web service
design, implementation, and deployment concepts and design guidelines. Web
services enable applications that aggregate and interact with information and
resources from Internet-scale distributed servers. The article presents the
design of two USDA applications that interoperate with database and web service
resources in Fort Collins Colorado and the TerraService web service located in
Tukwila Washington.
| [
{
"version": "v1",
"created": "Wed, 7 Aug 2002 22:18:35 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Barclay",
"Tom",
""
],
[
"Gray",
"Jim",
""
],
[
"Strand",
"Eric",
""
],
[
"Ekblad",
"Steve",
""
],
[
"Richter",
"Jeffrey",
""
]
]
| new_dataset | 0.99917 |
cs/0208011 | Jim Gray | Jim Gray, Wyman Chong, Tom Barclay, Alex Szalay, Jan vandenBerg | TeraScale SneakerNet: Using Inexpensive Disks for Backup, Archiving, and
Data Exchange | original at
http://research.microsoft.com/scripts/pubs/view.asp?TR_ID=MSR-TR-2002-54 | null | null | MSR-TR-2002-54 | cs.NI cs.DC | null | Large datasets are most economically trnsmitted via parcel post given the
current economics of wide-area networking. This article describes how the Sloan
Digital Sky Survey ships terabyte scale datasets both within the US and to
Europe and Asia. We 3GT storage bricks (Ghz processor, GB ram, GbpsEthernet, TB
disk) for about 2k$ each. These bricks act as database servers on the LAN. They
are loaded at one site and read at the second site. The paper describes the
bricks, their economics, and some software issues that they raise.
| [
{
"version": "v1",
"created": "Wed, 7 Aug 2002 22:32:46 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Gray",
"Jim",
""
],
[
"Chong",
"Wyman",
""
],
[
"Barclay",
"Tom",
""
],
[
"Szalay",
"Alex",
""
],
[
"vandenBerg",
"Jan",
""
]
]
| new_dataset | 0.996142 |
cs/0208020 | Masaki Murata | Masaki Murata and Hitoshi Isahara | Using the DIFF Command for Natural Language Processing | 10 pages. Computation and Language. This paper is the rough English
translation of our Japanese papar | null | null | null | cs.CL | null | Diff is a software program that detects differences between two data sets and
is useful in natural language processing. This paper shows several examples of
the application of diff. They include the detection of differences between two
different datasets, extraction of rewriting rules, merging of two different
datasets, and the optimal matching of two different data sets. Since diff comes
with any standard UNIX system, it is readily available and very easy to use.
Our studies showed that diff is a practical tool for research into natural
language processing.
| [
{
"version": "v1",
"created": "Tue, 13 Aug 2002 03:39:20 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Murata",
"Masaki",
""
],
[
"Isahara",
"Hitoshi",
""
]
]
| new_dataset | 0.983133 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.