id
stringlengths 9
10
| submitter
stringlengths 2
52
⌀ | authors
stringlengths 4
6.51k
| title
stringlengths 4
246
| comments
stringlengths 1
523
⌀ | journal-ref
stringlengths 4
345
⌀ | doi
stringlengths 11
120
⌀ | report-no
stringlengths 2
243
⌀ | categories
stringlengths 5
98
| license
stringclasses 9
values | abstract
stringlengths 33
3.33k
| versions
list | update_date
timestamp[s] | authors_parsed
list | prediction
stringclasses 1
value | probability
float64 0.95
1
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0402054 | Shujun Li Dr. | Shujun Li, Guanrong Chen and Xuanqin Mou | On the Security of the Yi-Tan-Siew Chaos-Based Cipher | 5 pages, 3 figures, IEEEtrans.cls v 1.6 | IEEE Trans. CAS-II, vol. 51, no. 12, pp. 665-669, 2004 | 10.1109/TCSII.2004.838657 | null | cs.CR cs.PF nlin.CD | null | This paper presents a comprehensive analysis on the security of the
Yi-Tan-Siew chaotic cipher proposed in [IEEE TCAS-I 49(12):1826-1829 (2002)]. A
differential chosen-plaintext attack and a differential chosen-ciphertext
attack are suggested to break the sub-key K, under the assumption that the time
stamp can be altered by the attacker, which is reasonable in such attacks.
Also, some security Problems about the sub-keys $\alpha$ and $\beta$ are
clarified, from both theoretical and experimental points of view. Further
analysis shows that the security of this cipher is independent of the use of
the chaotic tent map, once the sub-key $K$ is removed via the proposed
suggested differential chosen-plaintext attack.
| [
{
"version": "v1",
"created": "Tue, 24 Feb 2004 08:28:21 GMT"
},
{
"version": "v2",
"created": "Tue, 30 Nov 2004 09:47:22 GMT"
},
{
"version": "v3",
"created": "Wed, 1 Dec 2004 07:11:38 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Li",
"Shujun",
""
],
[
"Chen",
"Guanrong",
""
],
[
"Mou",
"Xuanqin",
""
]
]
| new_dataset | 0.997983 |
cs/0403021 | Jim Gray | Tom Barclay, Wyman Chong, Jim Gray | A Quick Look at SATA Disk Performance | null | null | null | MSR-TR-2003-70, Oct. 2003 | cs.DB cs.PF | null | We have been investigating the use of low-cost, commodity components for
multi-terabyte SQL Server databases. Dubbed storage bricks, these servers are
white box PCs containing the largest ATA drives, value-priced AMD or Intel
processors, and inexpensive ECC memory. One issue has been the wiring mess, air
flow problems, length restrictions, and connector failures created by seven or
more parallel ATA (PATA) ribbon cables and drives in]a tower or 3U rack-mount
chassis. Large capacity Serial ATA (SATA) drives have recently become widely
available for the PC environment at a reasonable price. In addition to being
faster, the SATA connectors seem more reliable, have a more reasonable length
restriction (1m) and allow better airflow. We tested two drive brands along
with two RAID controllers to evaluate SATA drive performance and reliablility.
This paper documents our results so far.
| [
{
"version": "v1",
"created": "Fri, 12 Mar 2004 10:42:25 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Barclay",
"Tom",
""
],
[
"Chong",
"Wyman",
""
],
[
"Gray",
"Jim",
""
]
]
| new_dataset | 0.99955 |
cs/0403023 | Abdelhamid S. Abdelhamid | Ahmed A. Belal, Abdelhamid S. Abdelhamid | Secure Transmission of Sensitive data using multiple channels | 5 pages | null | null | null | cs.CR | null | A new scheme for transmitting sensitive data is proposed, the proposed scheme
depends on partitioning the output of a block encryption module using the
Chinese Remainder Theorem among a set of channels. The purpose of using the
Chinese Remainder Theorem is to hide the cipher text in order to increase the
difficulty of attacking the cipher. The theory, implementation and the security
of this scheme are described in this paper.
| [
{
"version": "v1",
"created": "Sun, 14 Mar 2004 19:58:01 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Belal",
"Ahmed A.",
""
],
[
"Abdelhamid",
"Abdelhamid S.",
""
]
]
| new_dataset | 0.985945 |
cs/0403028 | Manuel Carro | Manuel Carro | An Application of Rational Trees in a Logic Programming Interpreter for
a Procedural Language | LaTeX2e, 13 pages, 2 tables, 11 figures (several of them, text). Yet
unpublished | null | null | null | cs.DS cs.LO | null | We describe here a simple application of rational trees to the implementation
of an interpreter for a procedural language written in a logic programming
language. This is possible in languages designed to support rational trees
(such as Prolog II and its descendants), but also in traditional Prolog, whose
data structures are initially based on Herbrand terms, but in which
implementations often omit the occurs check needed to avoid the creation of
infinite data structures. We provide code implementing two interpreters, one of
which needs non-occurs-check unification, which makes it faster (and more
economic). We provide experimental data supporting this, and we argue that
rational trees are interesting enough as to receive thorough support inside the
language.
| [
{
"version": "v1",
"created": "Tue, 16 Mar 2004 16:48:38 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Carro",
"Manuel",
""
]
]
| new_dataset | 0.956251 |
cs/0404011 | Francesco Calimeri | G. Ianni, F. Calimeri, A. Pietramala, M.C. Santoro | Parametric external predicates for the DLV System | 10 pages | null | null | null | cs.AI | null | This document describes syntax, semantics and implementation guidelines in
order to enrich the DLV system with the possibility to make external C function
calls. This feature is realized by the introduction of parametric external
predicates, whose extension is not specified through a logic program but
implicitly computed through external code.
| [
{
"version": "v1",
"created": "Mon, 5 Apr 2004 17:15:45 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ianni",
"G.",
""
],
[
"Calimeri",
"F.",
""
],
[
"Pietramala",
"A.",
""
],
[
"Santoro",
"M. C.",
""
]
]
| new_dataset | 0.993752 |
cs/0404013 | Kevin Lai | Kevin Lai, Bernardo A. Huberman, and Leslie Fine | Tycoon: A Distributed Market-based Resource Allocation System | null | null | null | null | cs.DC cs.MA | null | P2P clusters like the Grid and PlanetLab enable in principle the same
statistical multiplexing efficiency gains for computing as the Internet
provides for networking. The key unsolved problem is resource allocation.
Existing solutions are not economically efficient and require high latency to
acquire resources. We designed and implemented Tycoon, a market based
distributed resource allocation system based on an Auction Share scheduling
algorithm. Preliminary results show that Tycoon achieves low latency and high
fairness while providing incentives for truth-telling on the part of strategic
users.
| [
{
"version": "v1",
"created": "Mon, 5 Apr 2004 19:54:30 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lai",
"Kevin",
""
],
[
"Huberman",
"Bernardo A.",
""
],
[
"Fine",
"Leslie",
""
]
]
| new_dataset | 0.998681 |
cs/0404018 | Jiyou Jia | Jiyou Jia | NLML--a Markup Language to Describe the Unlimited English Grammar | 15 Pages, 2 Figures, 3 Tables submitted to German Conference for
Artificial Intelligence 2004 Ulm | null | null | null | cs.CL cs.AI | null | In this paper we present NLML (Natural Language Markup Language), a markup
language to describe the syntactic and semantic structure of any grammatically
correct English expression. At first the related works are analyzed to
demonstrate the necessity of the NLML: simple form, easy management and direct
storage. Then the description of the English grammar with NLML is introduced in
details in three levels: sentences (with different complexities, voices, moods,
and tenses), clause (relative clause and noun clause) and phrase (noun phrase,
verb phrase, prepositional phrase, adjective phrase, adverb phrase and
predicate phrase). At last the application fields of the NLML in NLP are shown
with two typical examples: NLOJM (Natural Language Object Modal in Java) and
NLDB (Natural Language Database).
| [
{
"version": "v1",
"created": "Wed, 7 Apr 2004 06:54:45 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Jia",
"Jiyou",
""
]
]
| new_dataset | 0.999684 |
cs/0404025 | Atsushi Fujii | Atsushi Fujii, Makoto Iwayama, and Noriko Kando | Test Collections for Patent-to-Patent Retrieval and Patent Map
Generation in NTCIR-4 Workshop | 4 pages, Proceedings of the 4th International Conference on Language
Resources and Evaluation (to appear) | Proceedings of the 4th International Conference on Language
Resources and Evaluation (LREC-2004), pp.1643-1646, May. 2004. | null | null | cs.CL | null | This paper describes the Patent Retrieval Task in the Fourth NTCIR Workshop,
and the test collections produced in this task. We perform the invalidity
search task, in which each participant group searches a patent collection for
the patents that can invalidate the demand in an existing claim. We also
perform the automatic patent map generation task, in which the patents
associated with a specific topic are organized in a multi-dimensional matrix.
| [
{
"version": "v1",
"created": "Sat, 10 Apr 2004 08:43:31 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Fujii",
"Atsushi",
""
],
[
"Iwayama",
"Makoto",
""
],
[
"Kando",
"Noriko",
""
]
]
| new_dataset | 0.979705 |
cs/0404026 | Darran Nathan | Darran Nathan, Eva Rosdiana, Chua Beng Koon | DAB Content Annotation and Receiver Hardware Control with XML | 6 pages, 7 figures | null | null | null | cs.GL cs.CL | null | The Eureka-147 Digital Audio Broadcasting (DAB) standard defines the 'dynamic
labels' data field for holding information about the transmission content.
However, this information does not follow a well-defined structure since it is
designed to carry text for direct output to displays, for human interpretation.
This poses a problem when machine interpretation of DAB content information is
desired. Extensible Markup Language (XML) was developed to allow for the
well-defined, structured machine-to-machine exchange of data over computer
networks. This article proposes a novel technique of machine-interpretable DAB
content annotation and receiver hardware control, involving the utilisation of
XML as metadata in the transmitted DAB frames.
| [
{
"version": "v1",
"created": "Sun, 11 Apr 2004 08:36:04 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Nathan",
"Darran",
""
],
[
"Rosdiana",
"Eva",
""
],
[
"Koon",
"Chua Beng",
""
]
]
| new_dataset | 0.998417 |
cs/0404038 | Douglas Powell | D. B. Powell | 2-Sat Sub-Clauses and the Hypernodal Structure of the 3-Sat Problem | 16 pages; 8 figures | null | null | null | cs.CC cs.AI | null | Like simpler graphs, nested (hypernodal) graphs consist of two components: a
set of nodes and a set of edges, where each edge connects a pair of nodes. In
the hypernodal graph model, however, a node may contain other graphs, so that a
node may be contained in a graph that it contains. The inherently recursive
structure of the hypernodal graph model aptly characterizes both the structure
and dynamic of the 3-sat problem, a broadly applicable, though intractable,
computer science problem. In this paper I first discuss the structure of the
3-sat problem, analyzing the relation of 3-sat to 2-sat, a related, though
tractable problem. I then discuss sub-clauses and sub-clause thresholds and the
transformation of sub-clauses into implication graphs, demonstrating how
combinations of implication graphs are equivalent to hypernodal graphs. I
conclude with a brief discussion of the use of hypernodal graphs to model the
3-sat problem, illustrating how hypernodal graphs model both the conditions for
satisfiability and the process by which particular 3-sat assignments either
succeed or fail.
| [
{
"version": "v1",
"created": "Tue, 20 Apr 2004 08:23:43 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Powell",
"D. B.",
""
]
]
| new_dataset | 0.998784 |
cs/0404041 | Jiyou Jia | Jiyou Jia | NLOMJ--Natural Language Object Model in Java | 11 pages, 1 figure. Submitted to ICICP04 | null | null | null | cs.CL cs.PL | null | In this paper we present NLOMJ--a natural language object model in Java with
English as the experiment language. This modal describes the grammar elements
of any permissible expression in a natural language and their complicated
relations with each other with the concept "Object" in OOP(Object Oriented
Programming). Directly mapped to the syntax and semantics of the natural
language, it can be used in information retrieval as a linguistic method.
Around the UML diagram of the NLOMJ the important classes(Sentence, Clause and
Phrase) and their sub classes are introduced and their syntactic and semantic
meanings are explained.
| [
{
"version": "v1",
"created": "Wed, 21 Apr 2004 06:30:28 GMT"
},
{
"version": "v2",
"created": "Mon, 6 Feb 2006 15:05:13 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Jia",
"Jiyou",
""
]
]
| new_dataset | 0.999297 |
cs/0404051 | Jiang Qiu | Jorge Lobo, Gisela Mendez, Stuart R. Taylor | Knowledge And The Action Description Language A | Appeared in Theory and Practice of Logic Programming, vol. 1, no. 2,
2001 | Theory and Practice of Logic Programming, vol. 1, no. 2, 2001 | null | null | cs.AI | null | We introduce Ak, an extension of the action description language A (Gelfond
and Lifschitz, 1993) to handle actions which affect knowledge. We use sensing
actions to increase an agent's knowledge of the world and non-deterministic
actions to remove knowledge. We include complex plans involving conditionals
and loops in our query language for hypothetical reasoning. We also present a
translation of Ak domain descriptions into epistemic logic programs.
| [
{
"version": "v1",
"created": "Sat, 24 Apr 2004 14:16:04 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lobo",
"Jorge",
""
],
[
"Mendez",
"Gisela",
""
],
[
"Taylor",
"Stuart R.",
""
]
]
| new_dataset | 0.998125 |
cs/0405015 | Darran Nathan | Darran Nathan, Kelvin Lim Mun Kit, Kelly Choo Hon Min, Philip Wong Jit
Chin, Andreas Weisensee | A High-Level Reconfigurable Computing Platform Software Frameworks | 4 pages, 8 figures | null | null | null | cs.AR | null | Reconfigurable computing refers to the use of processors, such as Field
Programmable Gate Arrays (FPGAs), that can be modified at the hardware level to
take on different processing tasks. A reconfigurable computing platform
describes the hardware and software base on top of which modular extensions can
be created, depending on the desired application. Such reconfigurable computing
platforms can take on varied designs and implementations, according to the
constraints imposed and features desired by the scope of applications. This
paper introduces a PC-based reconfigurable computing platform software
frameworks that is flexible and extensible enough to abstract the different
hardware types and functionality that different PCs may have. The requirements
of the software platform, architectural issues addressed, rationale behind the
decisions made, and frameworks design implemented are discussed.
| [
{
"version": "v1",
"created": "Wed, 5 May 2004 01:56:22 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Nathan",
"Darran",
""
],
[
"Kit",
"Kelvin Lim Mun",
""
],
[
"Min",
"Kelly Choo Hon",
""
],
[
"Chin",
"Philip Wong Jit",
""
],
[
"Weisensee",
"Andreas",
""
]
]
| new_dataset | 0.983878 |
cs/0405020 | Joel Friedman | Joel Friedman | A proof of Alon's second eigenvalue conjecture and related problems | To appear in Memoirs of the American Mathematical Society. 118 pages.
This newer version should have a two page glossary | null | null | null | cs.DM math.CO | null | In this paper we show the following conjecture of Noga Alon. Fix a positive
integer d>2 and real epsilon > 0; consider the probability that a random
d-regular graph on n vertices has the second eigenvalue of its adjacency matrix
greater than 2 sqrt(d-1) + epsilon; then this probability goes to zero as n
tends to infinity.
We prove the conjecture for a number of notions of random d-regular graph,
including models for d odd. We also estimate the aforementioned probability
more precisely, showing in many cases and models (but not all) that it decays
like a polynomial in 1/n.
| [
{
"version": "v1",
"created": "Wed, 5 May 2004 16:42:26 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Friedman",
"Joel",
""
]
]
| new_dataset | 0.99038 |
cs/0405022 | Eric Weber | Ryan Harkins, Eric Weber and Andrew Westmeyer | Encryption Schemes using Finite Frames and Hadamard Arrays | 14 pages, 11 figures | null | null | null | cs.CR | null | We propose a cipher similar to the One Time Pad and McEliece cipher based on
a subband coding scheme. The encoding process is an approximation to the One
Time Pad encryption scheme. We present results of numerical experiments which
suggest that a brute force attack to the proposed scheme does not result in all
possible plaintexts, as the One Time Pad does, but still the brute force attack
does not compromise the system. However, we demonstrate that the cipher is
vulnerable to a chosen-plaintext attack.
| [
{
"version": "v1",
"created": "Thu, 6 May 2004 16:33:04 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Harkins",
"Ryan",
""
],
[
"Weber",
"Eric",
""
],
[
"Westmeyer",
"Andrew",
""
]
]
| new_dataset | 0.997096 |
cs/0405038 | Riccardo Pucella | Riccardo Pucella | Deductive Algorithmic Knowledge | 28 pages. A preliminary version of this paper appeared in the
Proceedings of the 8th International Symposium on Artificial Intelligence and
Mathematics, AI&M 22-2004, 2004 | Journal of Logic and Computation 16 (2), pp. 287-309, 2006 | null | null | cs.AI cs.LO | null | The framework of algorithmic knowledge assumes that agents use algorithms to
compute the facts they explicitly know. In many cases of interest, a deductive
system, rather than a particular algorithm, captures the formal reasoning used
by the agents to compute what they explicitly know. We introduce a logic for
reasoning about both implicit and explicit knowledge with the latter defined
with respect to a deductive system formalizing a logical theory for agents. The
highly structured nature of deductive systems leads to very natural
axiomatizations of the resulting logic when interpreted over any fixed
deductive system. The decision problem for the logic, in the presence of a
single agent, is NP-complete in general, no harder than propositional logic. It
remains NP-complete when we fix a deductive system that is decidable in
nondeterministic polynomial time. These results extend in a straightforward way
to multiple agents.
| [
{
"version": "v1",
"created": "Tue, 11 May 2004 18:01:39 GMT"
},
{
"version": "v2",
"created": "Fri, 17 Jun 2005 02:43:07 GMT"
},
{
"version": "v3",
"created": "Wed, 18 Jan 2006 19:08:22 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Pucella",
"Riccardo",
""
]
]
| new_dataset | 0.950844 |
cs/0405042 | Ted Herman | T. Herman, S. Tixeuil | A Distributed TDMA Slot Assignment Algorithm for Wireless Sensor
Networks | null | null | null | TR04-02 University of Iowa Department of Computer Science | cs.DC cs.NI | null | Wireless sensor networks benefit from communication protocols that reduce
power requirements by avoiding frame collision. Time Division Media Access
methods schedule transmission in slots to avoid collision, however these
methods often lack scalability when implemented in \emph{ad hoc} networks
subject to node failures and dynamic topology. This paper reports a distributed
algorithm for TDMA slot assignment that is self-stabilizing to transient faults
and dynamic topology change. The expected local convergence time is O(1) for
any size network satisfying a constant bound on the size of a node
neighborhood.
| [
{
"version": "v1",
"created": "Wed, 12 May 2004 14:53:29 GMT"
},
{
"version": "v2",
"created": "Wed, 19 May 2004 16:59:48 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Herman",
"T.",
""
],
[
"Tixeuil",
"S.",
""
]
]
| new_dataset | 0.999548 |
cs/0405066 | Riccardo Pucella | Riccardo Pucella and Vicky Weissman | A Logic for Reasoning about Digital Rights | 21 pages. Appeared in the Proceedings of the 15th IEEE Computer
Security Foundations Workshop, pp. 282-294, 2002 | null | null | null | cs.CR cs.LO | null | We present a logic for reasoning about licenses, which are ``terms of use''
for digital resources. The logic provides a language for writing both
properties of licenses and specifications that govern a client's actions. We
discuss the complexity of checking properties and specifications written in our
logic and propose a technique for verification. A key feature of our approach
is that it is essentially parameterized by the language in which the licenses
are written, provided that this language can be given a trace-based semantics.
We consider two license languages to illustrate this flexibility.
| [
{
"version": "v1",
"created": "Tue, 18 May 2004 18:22:33 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Pucella",
"Riccardo",
""
],
[
"Weissman",
"Vicky",
""
]
]
| new_dataset | 0.991504 |
cs/0405081 | Riccardo Pucella | Riccardo Pucella | An Analysis of Lambek's Production Machines | 13 pages, 1 figure | RAIRO Informatique Theorique et Applications, 31 (5), pp. 483-497,
1997 | null | null | cs.LO | null | Lambek's production machines may be used to generate and recognize sentences
in a subset of the language described by a production grammar. We determine in
this paper the subset of the language of a grammar generated and recognized by
such machines.
| [
{
"version": "v1",
"created": "Sun, 23 May 2004 19:22:10 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Pucella",
"Riccardo",
""
]
]
| new_dataset | 0.971171 |
cs/0405088 | Jiang Qiu | Paul Tarau, Veronica Dahl | High-Level Networking With Mobile Code And First Order AND-Continuations | Appeared in Theory and Practice of Logic Programming, vol. 1, no. 3,
2001 | Theory and Practice of Logic Programming, vol. 1, no. 3, 2001 | null | null | cs.PL | null | We describe a scheme for moving living code between a set of distributed
processes coordinated with unification based Linda operations, and its
application to building a comprehensive Logic programming based Internet
programming framework. Mobile threads are implemented by capturing first order
continuations in a compact data structure sent over the network. Code is
fetched lazily from its original base turned into a server as the continuation
executes at the remote site. Our code migration techniques, in combination with
a dynamic recompilation scheme, ensure that heavily used code moves up smoothly
on a speed hierarchy while volatile dynamic code is kept in a quickly updatable
form. Among the examples, we describe how to build programmable client and
server components (Web servers, in particular) and mobile agents.
| [
{
"version": "v1",
"created": "Mon, 24 May 2004 12:41:07 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Tarau",
"Paul",
""
],
[
"Dahl",
"Veronica",
""
]
]
| new_dataset | 0.993118 |
cs/0406012 | Jiang Qiu | Seng Wai Loke, Andrew Davison | Secure Prolog-Based Mobile Code | Appeared in Theory and Practice of Logic Programming, vol. 1, no. 3,
2001 | Theory and Practice of Logic Programming, vol. 1, no. 3, 2001 | null | null | cs.PL | null | LogicWeb mobile code consists of Prolog-like rules embedded in Web pages,
thereby adding logic programming behaviour to those pages. Since LogicWeb
programs are downloaded from foreign hosts and executed locally, there is a
need to protect the client from buggy or malicious code. A security model is
crucial for making LogicWeb mobile code safe to execute. This paper presents
such a model, which supports programs of varying trust levels by using
different resource access policies. The implementation of the model derives
from an extended operational semantics for the LogicWeb language, which
provides a precise meaning of safety.
| [
{
"version": "v1",
"created": "Mon, 7 Jun 2004 07:01:53 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Loke",
"Seng Wai",
""
],
[
"Davison",
"Andrew",
""
]
]
| new_dataset | 0.999768 |
cs/0407003 | Miguel Mosteiro | Michael A. Bender, Martin Farach-Colton, Miguel Mosteiro | Insertion Sort is O(n log n) | 6 pages, Latex. In Proceedings of the Third International Conference
on Fun With Algorithms, FUN 2004 | null | null | null | cs.DS | null | Traditional Insertion Sort runs in O(n^2) time because each insertion takes
O(n) time. When people run Insertion Sort in the physical world, they leave
gaps between items to accelerate insertions. Gaps help in computers as well.
This paper shows that Gapped Insertion Sort has insertion times of O(log n)
with high probability, yielding a total running time of O(n log n) with high
probability.
| [
{
"version": "v1",
"created": "Thu, 1 Jul 2004 15:50:26 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Bender",
"Michael A.",
""
],
[
"Farach-Colton",
"Martin",
""
],
[
"Mosteiro",
"Miguel",
""
]
]
| new_dataset | 0.973193 |
cs/0407007 | Dirk Leinders | Dirk Leinders (1), Jerzy Tyszkiewicz (2), Jan Van den Bussche (1) ((1)
Limburgs Universitair Centrum, Diepenbeek, Belgium, (2) Institute of
Informatics, Warsaw University, Warsaw, Poland) | The semijoin algebra and the guarded fragment | 11 pages, 2 figures | null | null | null | cs.DB cs.LO | null | The semijoin algebra is the variant of the relational algebra obtained by
replacing the join operator by the semijoin operator. We discuss some
interesting connections between the semijoin algebra and the guarded fragment
of first-order logic. We also provide an Ehrenfeucht-Fraisse game,
characterizing the discerning power of the semijoin algebra. This game gives a
method for showing that certain queries are not expressible in the semijoin
algebra.
| [
{
"version": "v1",
"created": "Fri, 2 Jul 2004 15:44:32 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Leinders",
"Dirk",
""
],
[
"Tyszkiewicz",
"Jerzy",
""
],
[
"Bussche",
"Jan Van den",
""
]
]
| new_dataset | 0.998104 |
cs/0407020 | Rina Panigrahy | Rina Panigrahy | Minimum Enclosing Polytope in High Dimensions | Submitted to SODA05 | null | null | null | cs.CG | null | We study the problem of covering a given set of $n$ points in a high,
$d$-dimensional space by the minimum enclosing polytope of a given arbitrary
shape. We present algorithms that work for a large family of shapes, provided
either only translations and no rotations are allowed, or only rotation about a
fixed point is allowed; that is, one is allowed to only scale and translate a
given shape, or scale and rotate the shape around a fixed point. Our algorithms
start with a polytope guessed to be of optimal size and iteratively moves it
based on a greedy principle: simply move the current polytope directly towards
any outside point till it touches the surface. For computing the minimum
enclosing ball, this gives a simple greedy algorithm with running time
$O(nd/\eps)$ producing a ball of radius $1+\eps$ times the optimal. This simple
principle generalizes to arbitrary convex shape when only translations are
allowed, requiring at most $O(1/\eps^2)$ iterations. Our algorithm implies that
{\em core-sets} of size $O(1/\eps^2)$ exist not only for minimum enclosing ball
but also for any convex shape with a fixed orientation. A {\em Core-Set} is a
small subset of $poly(1/\eps)$ points whose minimum enclosing polytope is
almost as large as that of the original points. Although we are unable to
combine our techniques for translations and rotations for general shapes, for
the min-cylinder problem, we give an algorithm similar to the one in
\cite{HV03}, but with an improved running time of $2^{O(\frac{1}{\eps^2}\log
\frac{1}{\eps})} nd$.
| [
{
"version": "v1",
"created": "Thu, 8 Jul 2004 19:03:32 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Panigrahy",
"Rina",
""
]
]
| new_dataset | 0.992128 |
cs/0407051 | G. Gordon Worley III | G Gordon Worley III | Bug shallowness in open-source, Macintosh software | added description of bug shallowness; corrected abstract (5 pages,
PDF only (no LaTeX)) | Worley III, G Gordon. "Bug shallowness in open-source, Macintosh
software". Advanced Developers Hands On Conference 19. 2004 | null | null | cs.SE | null | Central to the power of open-source software is bug shallowness, the relative
ease of finding and fixing bugs. The open-source movement began with Unix
software, so many users were also programmers capable of finding and fixing
bugs given the source code. But as the open-source movement reaches the
Macintosh platform, bugs may not be shallow because few Macintosh users are
programmers. Based on reports from open-source developers, I, however, conclude
that that bugs are as shallow in open-source, Macintosh software as in any
other open-source software.
| [
{
"version": "v1",
"created": "Tue, 20 Jul 2004 13:04:36 GMT"
},
{
"version": "v2",
"created": "Thu, 29 Jul 2004 23:08:15 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Worley",
"G Gordon",
"III"
]
]
| new_dataset | 0.999683 |
cs/0408018 | Viktor Kuncak | Viktor Kuncak, Martin Rinard | On Role Logic | 20 pages. Our later SAS 2004 result builds on this work | null | null | MIT CSAIL 925 | cs.PL cs.LO | null | We present role logic, a notation for describing properties of relational
structures in shape analysis, databases, and knowledge bases. We construct role
logic using the ideas of de Bruijn's notation for lambda calculus, an encoding
of first-order logic in lambda calculus, and a simple rule for implicit
arguments of unary and binary predicates. The unrestricted version of role
logic has the expressive power of first-order logic with transitive closure.
Using a syntactic restriction on role logic formulas, we identify a natural
fragment RL^2 of role logic. We show that the RL^2 fragment has the same
expressive power as two-variable logic with counting C^2 and is therefore
decidable. We present a translation of an imperative language into the
decidable fragment RL^2, which allows compositional verification of programs
that manipulate relational structures. In addition, we show how RL^2 encodes
boolean shape analysis constraints and an expressive description logic.
| [
{
"version": "v1",
"created": "Thu, 5 Aug 2004 23:01:20 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kuncak",
"Viktor",
""
],
[
"Rinard",
"Martin",
""
]
]
| new_dataset | 0.997738 |
cs/0408027 | Henning Christiansen | Henning Christiansen | CHR Grammars | 36 pp. To appear in TPLP, 2005 | null | null | null | cs.CL cs.PL | null | A grammar formalism based upon CHR is proposed analogously to the way
Definite Clause Grammars are defined and implemented on top of Prolog. These
grammars execute as robust bottom-up parsers with an inherent treatment of
ambiguity and a high flexibility to model various linguistic phenomena. The
formalism extends previous logic programming based grammars with a form of
context-sensitive rules and the possibility to include extra-grammatical
hypotheses in both head and body of grammar rules. Among the applications are
straightforward implementations of Assumption Grammars and abduction under
integrity constraints for language analysis. CHR grammars appear as a powerful
tool for specification and implementation of language processors and may be
proposed as a new standard for bottom-up grammars in logic programming.
To appear in Theory and Practice of Logic Programming (TPLP), 2005
| [
{
"version": "v1",
"created": "Thu, 12 Aug 2004 11:15:17 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Christiansen",
"Henning",
""
]
]
| new_dataset | 0.960739 |
cs/0408029 | Jason Cantarella | Jason Cantarella and Michael Piatek | Tsnnls: A solver for large sparse least squares problems with
non-negative variables | 7 pages, 2 figures | null | null | null | cs.MS | null | The solution of large, sparse constrained least-squares problems is a staple
in scientific and engineering applications. However, currently available codes
for such problems are proprietary or based on MATLAB. We announce a freely
available C implementation of the fast block pivoting algorithm of Portugal,
Judice, and Vicente. Our version is several times faster than Matstoms' MATLAB
implementation of the same algorithm. Further, our code matches the accuracy of
MATLAB's built-in lsqnonneg function.
| [
{
"version": "v1",
"created": "Fri, 13 Aug 2004 21:25:42 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Cantarella",
"Jason",
""
],
[
"Piatek",
"Michael",
""
]
]
| new_dataset | 0.999254 |
cs/0408041 | Ali Eftekhari | Ali Eftekhari | Fractal geometry of literature: first attempt to Shakespeare's works | 26 pages, 7 figures, 3 tables | null | null | null | cs.CL cs.CC | null | It was demonstrated that there is a geometrical order in the structure of
literature. Fractal geometry as a modern mathematical approach and a new
geometrical viewpoint on natural objects including both processes and
structures was employed for analysis of literature. As the first study, the
works of William Shakespeare were chosen as the most important items in western
literature. By counting the number of letters applied in a manuscript, it is
possible to study the whole manuscript statistically. A novel method based on
basic assumption of fractal geometry was proposed for the calculation of
fractal dimensions of the literature. The results were compared with Zipf's
law. Zipf's law was successfully used for letters instead of words. Two new
concepts namely Zipf's dimension and Zipf's order were also introduced. It was
found that changes of both fractal dimension and Zipf's dimension are similar
and dependent on the manuscript length. Interestingly, direct plotting the data
obtained in semi-logarithmic and logarithmic forms also led to a power-law.
| [
{
"version": "v1",
"created": "Tue, 17 Aug 2004 10:14:22 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Eftekhari",
"Ali",
""
]
]
| new_dataset | 0.99913 |
cs/0408044 | Michael Thielscher | Michael Thielscher | FLUX: A Logic Programming Method for Reasoning Agents | null | null | null | null | cs.AI | null | FLUX is a programming method for the design of agents that reason logically
about their actions and sensor information in the presence of incomplete
knowledge. The core of FLUX is a system of Constraint Handling Rules, which
enables agents to maintain an internal model of their environment by which they
control their own behavior. The general action representation formalism of the
fluent calculus provides the formal semantics for the constraint solver. FLUX
exhibits excellent computational behavior due to both a carefully restricted
expressiveness and the inference paradigm of progression.
| [
{
"version": "v1",
"created": "Thu, 19 Aug 2004 14:47:51 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Thielscher",
"Michael",
""
]
]
| new_dataset | 0.99442 |
cs/0408061 | Aristides Vagelatos | Ch. Tsalidis (1), A. Vagelatos (2) and G. Orphanos (1) ((1) Neurosoft
S.A. (2) RACTI) | An electronic dictionary as a basis for NLP tools: The Greek case | Traitement Automatique des Langues Naturelles (TALN) 2004, Fez,
Morocco | null | null | CTI T.R.: 2004.04.03 | cs.CL | null | The existence of a Dictionary in electronic form for Modern Greek (MG) is
mandatory if one is to process MG at the morphological and syntactic levels
since MG is a highly inflectional language with marked stress and a spelling
system with many characteristics carried over from Ancient Greek. Moreover,
such a tool becomes necessary if one is to create efficient and sophisticated
NLP applications with substantial linguistic backing and coverage. The present
paper will focus on the deployment of such an electronic dictionary for Modern
Greek, which was built in two phases: first it was constructed to be the basis
for a spelling correction schema and then it was reconstructed in order to
become the platform for the deployment of a wider spectrum of NLP tools.
| [
{
"version": "v1",
"created": "Thu, 26 Aug 2004 13:17:38 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Tsalidis",
"Ch.",
""
],
[
"Vagelatos",
"A.",
""
],
[
"Orphanos",
"G.",
""
]
]
| new_dataset | 0.986702 |
cs/0409003 | Karthik Narayanaswami | Parth Bhawalkar, Victor Bigio, Adam Davis, Karthik Narayanaswami, Femi
Olumoko | ScheduleNanny: Using GPS to Learn the User's Significant Locations,
Travel Times and Schedule | 7 pages, 10 figures. Adaptive & Ubiquitous Computing | null | null | null | cs.AI cs.CV cs.HC | null | As computing technology becomes more pervasive, personal devices such as the
PDA, cell-phone, and notebook should use context to determine how to act.
Location is one form of context that can be used in many ways. We present a
multiple-device system that collects and clusters GPS data into significant
locations. These locations are then used to determine travel times and a
probabilistic model of the user's schedule, which is used to intelligently
alert the user. We evaluate our system and suggest how it should be integrated
with a variety of applications.
| [
{
"version": "v1",
"created": "Thu, 2 Sep 2004 15:28:53 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Bhawalkar",
"Parth",
""
],
[
"Bigio",
"Victor",
""
],
[
"Davis",
"Adam",
""
],
[
"Narayanaswami",
"Karthik",
""
],
[
"Olumoko",
"Femi",
""
]
]
| new_dataset | 0.997397 |
cs/0409006 | Dumitru Vulcanov | Dumitru N. Vulcanov, Valentina D. Vulcanov (The West University of
Timisoara, Romania) | Maple+GrTensorII libraries for cosmology | LaTeX LLNCS style, 8 pages, accepted for SYNASC 2004 - 6th
International Symposium on Symbolic and Numeric Algorithms for Scientific
Computing, Timisoara, Romania, September 26-30 2004 | null | null | null | cs.SC gr-qc | null | The article mainly presents some results in using MAPLE platform for computer
algebra and GrTensorII package in doing calculations for theoretical and
numerical cosmology
| [
{
"version": "v1",
"created": "Sat, 4 Sep 2004 12:52:22 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Vulcanov",
"Dumitru N.",
"",
"The West University of\n Timisoara, Romania"
],
[
"Vulcanov",
"Valentina D.",
"",
"The West University of\n Timisoara, Romania"
]
]
| new_dataset | 0.990725 |
cs/0409009 | Dirk Beyer | Dirk Beyer (University of California, Berkeley), Andreas Noack
(Brandenburg University of Technology) | CrocoPat 2.1 Introduction and Reference Manual | 19 pages + cover, 2 eps figures, uses llncs.cls and
cs_techrpt_cover.sty, for downloading the source code, binaries, and RML
examples, see http://www.software-systemtechnik.de/CrocoPat/ | null | null | UCB//CSD-04-1338 | cs.PL cs.DM cs.DS cs.SE | null | CrocoPat is an efficient, powerful and easy-to-use tool for manipulating
relations of arbitrary arity, including directed graphs. This manual provides
an introduction to and a reference for CrocoPat and its programming language
RML. It includes several application examples, in particular from the analysis
of structural models of software systems.
| [
{
"version": "v1",
"created": "Tue, 7 Sep 2004 09:44:18 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Beyer",
"Dirk",
"",
"University of California, Berkeley"
],
[
"Noack",
"Andreas",
"",
"Brandenburg University of Technology"
]
]
| new_dataset | 0.999525 |
cs/0409031 | Patrick C. McGuire | Patrick C. McGuire, Javier Gomez-Elvira, Jose Antonio
Rodriguez-Manfredi, Eduardo Sebastian-Martinez, Jens Ormo, Enrique
Diaz-Martinez, Helge Ritter, Markus Oesker, Robert Haschke and Joerg Ontrup | Field Geology with a Wearable Computer: First Results of the Cyborg
Astrobiologist System | 7 pages, 6 figures. Submitted to ICRA'2005 (Int'l Conf. on Robotics &
Automation, IEEE), April 18-22, 2005, Barcelona, Spain | null | null | null | cs.CV astro-ph cs.RO | null | We present results from the first geological field tests of the `Cyborg
Astrobiologist', which is a wearable computer and video camcorder system that
we are using to test and train a computer-vision system towards having some of
the autonomous decision-making capabilities of a field-geologist. The Cyborg
Astrobiologist platform has thus far been used for testing and development of
these algorithms and systems: robotic acquisition of quasi-mosaics of images,
real-time image segmentation, and real-time determination of interesting points
in the image mosaics. The hardware and software systems function reliably, and
the computer-vision algorithms are adequate for the first field tests. In
addition to the proof-of-concept aspect of these field tests, the main result
of these field tests is the enumeration of those issues that we can improve in
the future, including: dealing with structural shadow and microtexture, and
also, controlling the camera's zoom lens in an intelligent manner. Nonetheless,
despite these and other technical inadequacies, this Cyborg Astrobiologist
system, consisting of a camera-equipped wearable-computer and its
computer-vision algorithms, has demonstrated its ability of finding genuinely
interesting points in real-time in the geological scenery, and then gathering
more information about these interest points in an automated manner.
| [
{
"version": "v1",
"created": "Wed, 15 Sep 2004 15:38:59 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"McGuire",
"Patrick C.",
""
],
[
"Gomez-Elvira",
"Javier",
""
],
[
"Rodriguez-Manfredi",
"Jose Antonio",
""
],
[
"Sebastian-Martinez",
"Eduardo",
""
],
[
"Ormo",
"Jens",
""
],
[
"Diaz-Martinez",
"Enrique",
""
],
[
"Ritter",
"Helge",
""
],
[
"Oesker",
"Markus",
""
],
[
"Haschke",
"Robert",
""
],
[
"Ontrup",
"Joerg",
""
]
]
| new_dataset | 0.999049 |
cs/0409036 | Manoj Kumar | Sunder Lal and Manoj Kumar | A Directed Signature Scheme and its Applications | 9 Pages, No figures. Presented in the National Conference on
Information Security, New Delhi- India, Jan-2003 | null | null | null | cs.CR | null | This paper presents a directed signature scheme with the property that the
signature can be verified only with the help of signer or signature receiver.
We also propose its applications to share verification of signatures and to
threshold cryptosystems.
| [
{
"version": "v1",
"created": "Sun, 19 Sep 2004 03:12:02 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lal",
"Sunder",
""
],
[
"Kumar",
"Manoj",
""
]
]
| new_dataset | 0.99889 |
cs/0409046 | Amar Isli | Amar Isli | A TCSP-like decidable constraint language generalising existing cardinal
direction relations | in Proceedings of the ECAI Workshop on Spatial and Temporal
Reasoning, pp. 135-139, Valencia, Spain, 2004 | null | null | null | cs.AI cs.LO | null | We define a quantitative constraint language subsuming two calculi well-known
in QSR (Qualitative Spatial Reasoning): Frank's cone-shaped and
projection-based calculi of cardinal direction relations. We show how to solve
a CSP (Constraint Satisfaction Problem) expressed in the language.
| [
{
"version": "v1",
"created": "Fri, 24 Sep 2004 15:12:58 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Isli",
"Amar",
""
]
]
| new_dataset | 0.99489 |
cs/0409049 | Manoj Kumar | Sunder lal and Manoj Kumar | A Directed -Threshold Multi-Signature Scheme | 12 pages, no figures | null | null | null | cs.CR | null | In this paper, we propose a Directed Threshold Multi-Signature Scheme. In
this threshold signature scheme, any malicious set of signers cannot
impersonate any other set of signers to forge the signatures. In case of
forgery, it is possible to trace the signing set. This threshold signature
scheme is applicable when the message is sensitive to the signature receiver;
and the signatures are generated by the cooperation of a number of people from
a given group of senders.
| [
{
"version": "v1",
"created": "Sat, 25 Sep 2004 12:53:47 GMT"
},
{
"version": "v2",
"created": "Sun, 3 Oct 2004 14:55:42 GMT"
},
{
"version": "v3",
"created": "Tue, 2 Nov 2004 12:31:27 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"lal",
"Sunder",
""
],
[
"Kumar",
"Manoj",
""
]
]
| new_dataset | 0.979054 |
cs/0409050 | Manoj Kumar | Sunder Lal and Manoj Kumar | Some Applications of Directed Signature Scheme | 12 pages, no figures, this paper provides some application of
directed signature scheme | null | null | null | cs.CR | null | Directed signature scheme is applicable when the signed message contains
information sensitive to the receiver, because only receiver can directly
verify the signature and that he/she can prove its validity to any third party,
whenever necessary. This paper presents two applications of directed signature
scheme. (i) Directed –Delegated Signature Scheme. This scheme combines
the idea of proxy signatures with directed signature scheme. (ii) Allocation of
registration number. This scheme proposes a registration scheme in which the
registration number cannot be forged and misused.
| [
{
"version": "v1",
"created": "Sun, 26 Sep 2004 13:18:16 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lal",
"Sunder",
""
],
[
"Kumar",
"Manoj",
""
]
]
| new_dataset | 0.999075 |
cs/0410010 | Amit K. Awasthi | Amit K. Awasthi and Sunder Lal | A New Proxy Ring Signature Scheme | RMS 2004, Agra, INDIA | Proceeding of RMS 2004, Page 29 | null | null | cs.CR math.RA | null | The concept of ring signature was introduced by Rivest, Shamir and Tauman.
This signature is considered to be a simplified group signature from which
identity of signer is ambiguous although verifier knows the group to which
signer belong. In this paper we introduce a new proxy ring signature scheme.
| [
{
"version": "v1",
"created": "Tue, 5 Oct 2004 18:58:33 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Awasthi",
"Amit K.",
""
],
[
"Lal",
"Sunder",
""
]
]
| new_dataset | 0.999002 |
cs/0410011 | Amit K. Awasthi | Amit K Awasthi | Comment on A dynamic ID-based Remote User Authentication Scheme | 3 pages. Available at : http://gfcr.org | Transaction on Cryptology, Vol. 01, Issue 02, Page 15-17, Sep 2004 | null | null | cs.CR | null | Since 1981, when Lamport introduced the remote user authentication scheme
using table, a plenty of schemes had been proposed with tables or without table
using. Recently Das et al. proposed a dynamic id-based remote user
authentication scheme. They claimed that their scheme is secure against
ID-theft, and can resist the reply attacks, forgery attacks, insider attacks an
so on. In this paper we show that Das et al's scheme is completly insecure and
using of this scheme is like an open server access without password.
| [
{
"version": "v1",
"created": "Tue, 5 Oct 2004 21:54:03 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Awasthi",
"Amit K",
""
]
]
| new_dataset | 0.998098 |
cs/0410022 | Paul Piwek | P. Piwek, B. Krenn, M. Schroeder, M. Grice, S. Baumann and H. Pirker | RRL: A Rich Representation Language for the Description of Agent
Behaviour in NECA | 7 pages, 4 figures | In Proceedings of the AAMAS-02 Workshop ``Embodied conversational
agents - let's specify and evaluate them!'', July 16 2002, Bologna, Italy. | null | null | cs.MM cs.MA | null | In this paper, we describe the Rich Representation Language (RRL) which is
used in the NECA system. The NECA system generates interactions between two or
more animated characters. The RRL is an XML compliant framework for
representing the information that is exchanged at the interfaces between the
various NECA system modules. The full XML Schemas for the RRL are available at
http://www.ai.univie.ac.at/NECA/RRL
| [
{
"version": "v1",
"created": "Mon, 11 Oct 2004 12:34:02 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Piwek",
"P.",
""
],
[
"Krenn",
"B.",
""
],
[
"Schroeder",
"M.",
""
],
[
"Grice",
"M.",
""
],
[
"Baumann",
"S.",
""
],
[
"Pirker",
"H.",
""
]
]
| new_dataset | 0.999719 |
cs/0410051 | Alex Vinokur | Alex Vinokur | Turing Machine with Faults, Failures and Recovery | 8 pages; C++ Simulator has been developed | null | null | null | cs.LO | null | A Turing machine with faults, failures and recovery (TMF) is described. TMF
is (weakly) non-deterministic Turing machine consisting of five semi-infinite
tapes (Master Tape, Synchro Tape, Backup Tape, Backup Synchro Tape, User Tape)
and four controlling components (Program, Daemon, Apparatus, User).
Computational process consists of three phases (Program Phase, Failure Phase,
Repair Phase). C++ Simulator of a Turing machine with faults, failures and
recovery has been developed.
| [
{
"version": "v1",
"created": "Wed, 20 Oct 2004 12:43:35 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Vinokur",
"Alex",
""
]
]
| new_dataset | 0.999583 |
cs/0410056 | Haibin Wang | Haibin Wang, Florentin Smarandache, Yanqing Zhang, Rajshekhar
Sunderraman | Interval Neutrosophic Logics: Theory and Applications | 18 pages, 4 figures | null | null | null | cs.LO | null | In this paper, we present the interval neutrosophic logics which generalizes
the fuzzy logic, paraconsistent logic, intuitionistic fuzzy logic and many
other non-classical and non-standard logics. We will give the formal definition
of interval neutrosophic propositional calculus and interval neutrosophic
predicate calculus. Then we give one application of interval neutrosophic
logics to do approximate reasoning.
| [
{
"version": "v1",
"created": "Thu, 21 Oct 2004 20:24:28 GMT"
},
{
"version": "v2",
"created": "Wed, 3 Nov 2004 20:18:23 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Wang",
"Haibin",
""
],
[
"Smarandache",
"Florentin",
""
],
[
"Zhang",
"Yanqing",
""
],
[
"Sunderraman",
"Rajshekhar",
""
]
]
| new_dataset | 0.954159 |
cs/0410071 | Patrick C. McGuire | Patrick C. McGuire, Jens Ormo, Enrique Diaz-Martinez, Jose Antonio
Rodriguez-Manfredi, Javier Gomez-Elvira, Helge Ritter, Markus Oesker, Joerg
Ontrup, (Centro de Astrobiologia, Madrid; University of Bielefeld) | The Cyborg Astrobiologist: First Field Experience | 29 pages, 10 figures (in press) | Int.J.Astrobiol. 3 (2004) 189-207 | 10.1017/S147355040500220X | null | cs.CV astro-ph cs.AI cs.CE cs.HC cs.RO cs.SE q-bio.NC | null | We present results from the first geological field tests of the `Cyborg
Astrobiologist', which is a wearable computer and video camcorder system that
we are using to test and train a computer-vision system towards having some of
the autonomous decision-making capabilities of a field-geologist and
field-astrobiologist. The Cyborg Astrobiologist platform has thus far been used
for testing and development of these algorithms and systems: robotic
acquisition of quasi-mosaics of images, real-time image segmentation, and
real-time determination of interesting points in the image mosaics. The
hardware and software systems function reliably, and the computer-vision
algorithms are adequate for the first field tests. In addition to the
proof-of-concept aspect of these field tests, the main result of these field
tests is the enumeration of those issues that we can improve in the future,
including: first, detection and accounting for shadows caused by 3D jagged
edges in the outcrop; second, reincorporation of more sophisticated
texture-analysis algorithms into the system; third, creation of hardware and
software capabilities to control the camera's zoom lens in an intelligent
manner; and fourth, development of algorithms for interpretation of complex
geological scenery. Nonetheless, despite these technical inadequacies, this
Cyborg Astrobiologist system, consisting of a camera-equipped wearable-computer
and its computer-vision algorithms, has demonstrated its ability of finding
genuinely interesting points in real-time in the geological scenery, and then
gathering more information about these interest points in an automated manner.
| [
{
"version": "v1",
"created": "Wed, 27 Oct 2004 09:14:01 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"McGuire",
"Patrick C.",
""
],
[
"Ormo",
"Jens",
""
],
[
"Diaz-Martinez",
"Enrique",
""
],
[
"Rodriguez-Manfredi",
"Jose Antonio",
""
],
[
"Gomez-Elvira",
"Javier",
""
],
[
"Ritter",
"Helge",
""
],
[
"Oesker",
"Markus",
""
],
[
"Ontrup",
"Joerg",
""
]
]
| new_dataset | 0.999078 |
cs/0411002 | Alex Vinokur | Alex Vinokur | Fibonacci-Like Polynomials Produced by m-ary Huffman Codes for
Absolutely Ordered Sequences | 10 pages, 2 tables | null | null | null | cs.DM math.NT | null | Fibonacci-like polynomials produced by m-ary Huffman codes for absolutely
ordered sequences have been described.
| [
{
"version": "v1",
"created": "Mon, 1 Nov 2004 17:03:38 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Vinokur",
"Alex",
""
]
]
| new_dataset | 0.999821 |
cs/0411005 | Manoj Kumar | Sunder Lal and Manoj Kumar | A Directed Threshold - Signature Scheme | 10 Pages, No figures | null | null | null | cs.CR | null | Directed signature is the solution of such problems when the signed message
contains information sensitive to the signature receiver. Generally, in many
application of directed signature, the signer is generally a single person. But
when the message is on behalf of an organization, a valid sensitive message may
require the approval of several people. Threshold signature schemes are used to
solve these problems. This paper presents a threshold directed signature
scheme.
| [
{
"version": "v1",
"created": "Tue, 2 Nov 2004 13:42:51 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lal",
"Sunder",
""
],
[
"Kumar",
"Manoj",
""
]
]
| new_dataset | 0.999505 |
cs/0411020 | Vedran Kordic | A. Albagul and Wahyudi | Dynamic Modelling and Adaptive Traction Control for Mobile Robots | null | International Journal of Advanced Robotic Systems, Volume 1,
Number 3, September 2004, pp.149-154 | null | null | cs.RO | null | Mobile robots have received a great deal of research in recent years. A
significant amount of research has been published in many aspects related to
mobile robots. Most of the research is devoted to design and develop some
control techniques for robot motion and path planning. A large number of
researchers have used kinematic models to develop motion control strategy for
mobile robots. Their argument and assumption that these models are valid if the
robot has low speed, low acceleration and light load. However, dynamic
modelling of mobile robots is very important as they are designed to travel at
higher speed and perform heavy duty work. This paper presents and discusses a
new approach to develop a dynamic model and control strategy for wheeled mobile
robot which I modelled as a rigid body that roles on two wheels and a castor.
The motion control strategy consists of two levels. The first level is dealing
with the dynamic of the system and denoted as Low level controller. The second
level is developed to take care of path planning and trajectory generation.
| [
{
"version": "v1",
"created": "Mon, 8 Nov 2004 20:44:03 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Albagul",
"A.",
""
],
[
"Wahyudi",
"",
""
]
]
| new_dataset | 0.983414 |
cs/0411024 | Vedran Kordic | Alex Ellery | Space Robotics Part 2: Space-based Manipulators | null | International Journal of Advanced Robotic Systems, ISSN 1729-8806,
Volume 1, Number 3 (2004), pp.213-216 | null | null | cs.RO | null | In this second of three short papers, I introduce some of the basic concepts
of space robotics with an emphasis on some specific challenging areas of
research that are peculiar to the application of robotics to space
infrastructure development. The style of these short papers is pedagogical and
the concepts in this paper are developed from fundamental manipulator robotics.
This second paper considers the application of space manipulators to on-orbit
servicing (OOS), an application which has considerable commercial application.
I provide some background to the notion of robotic on-orbit servicing and
explore how manipulator control algorithms may be modified to accommodate space
manipulators which operate in the micro-gravity of space.
| [
{
"version": "v1",
"created": "Mon, 8 Nov 2004 20:28:48 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ellery",
"Alex",
""
]
]
| new_dataset | 0.988841 |
cs/0411025 | Vedran Kordic | Yoseph Bar-Cohen | Bionic Humans Using EAP as Artificial Muscles Reality and Challenges | null | International Journal of Advanced Robotic Systems, ISSN 1729-8806,
Volume 1, Number 3 (2004), pp.217-222 | null | null | cs.RO cs.AI | null | For many years, the idea of a human with bionic muscles immediately conjures
up science fiction images of a TV series superhuman character that was
implanted with bionic muscles and portrayed with strength and speed far
superior to any normal human. As fantastic as this idea may seem, recent
developments in electroactive polymers (EAP) may one day make such bionics
possible. Polymers that exhibit large displacement in response to stimulation
that is other than electrical signal were known for many years. Initially, EAP
received relatively little attention due to their limited actuation capability.
However, in the recent years, the view of the EAP materials has changed due to
the introduction of effective new materials that significantly surpassed the
capability of the widely used piezoelectric polymer, PVDF. As this technology
continues to evolve, novel mechanisms that are biologically inspired are
expected to emerge. EAP materials can potentially provide actuation with
lifelike response and more flexible configurations. While further improvements
in performance and robustness are still needed, there already have been several
reported successes. In recognition of the need for cooperation in this
multidisciplinary field, the author initiated and organized a series of
international forums that are leading to a growing number of research and
development projects and to great advances in the field. In 1999, he challenged
the worldwide science and engineering community of EAP experts to develop a
robotic arm that is actuated by artificial muscles to win a wrestling match
against a human opponent. In this paper, the field of EAP as artificial muscles
will be reviewed covering the state of the art, the challenges and the vision
for the progress in future years.
| [
{
"version": "v1",
"created": "Mon, 8 Nov 2004 20:32:11 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Bar-Cohen",
"Yoseph",
""
]
]
| new_dataset | 0.982249 |
cs/0411028 | Ignatios Souvatzis | Ignatios Souvatzis | A machine-independent port of the SR language run-time system to the
NetBSD operating system | presented at 3rd European BSD Conference, Karlsruhe, Germany, 2004
Oct. 29-31; 4 pages | Juergen Egeling (Ed.): Proceedings of the 3rd European BSD
Conference, Karlsruhe, Germany 2004, p.181 | null | null | cs.DC cs.PL | null | SR (synchronizing resources) is a PASCAL - style language enhanced with
constructs for concurrent programming developed at the University of Arizona in
the late 1980s. MPD (presented in Gregory Andrews' book about Foundations of
Multithreaded, Parallel, and Distributed Programming) is its successor,
providing the same language primitives with a different syntax. The run-time
system (in theory, identical) of both languages provides the illusion of a
multiprocessor machine on a single single- or multi- CPU Unix-like system or a
(local area) network of Unix-like machines. Chair V of the Computer Science
Department of the University of Bonn is operating a laboratory for a practical
course in parallel programming consisting of computing nodes running
NetBSD/arm, normally used via PVM, MPI etc. We are considering to offer SR and
MPD for this, too. As the original language distributions are only targeted at
a few commercial Unix systems, some porting effort is needed, outlined in the
SR porting guide. The integrated POSIX threads support of NetBSD-2.0 should
allow us to use library primitives provided for NetBSD's phtread system to
implement the primitives needed by the SR run-time system, thus implementing 13
target CPUs at once and automatically making use of SMP on VAX, Alpha, PowerPC,
Sparc, 32-bit Intel and 64 bit AMD CPUs.
This paper describes work in progress.
| [
{
"version": "v1",
"created": "Wed, 10 Nov 2004 12:39:12 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Souvatzis",
"Ignatios",
""
]
]
| new_dataset | 0.999291 |
cs/0411030 | Paolo D'Arco | Pina Bergamo, Paolo D'Arco, Alfredo De Santis, and Ljupco Kocarev | Security of public key cryptosystems based on Chebyshev Polynomials | Submitted for publication | null | null | null | cs.CR | null | Chebyshev polynomials have been recently proposed for designing public-key
systems. Indeed, they enjoy some nice chaotic properties, which seem to be
suitable for use in Cryptography. Moreover, they satisfy a semi-group property,
which makes possible implementing a trapdoor mechanism. In this paper we study
a public key cryptosystem based on such polynomials, which provides both
encryption and digital signature. The cryptosystem works on real numbers and is
quite efficient. Unfortunately, from our analysis it comes up that it is not
secure. We describe an attack which permits to recover the corresponding
plaintext from a given ciphertext. The same attack can be applied to produce
forgeries if the cryptosystem is used for signing messages. Then, we point out
that also other primitives, a Diffie-Hellman like key agreement scheme and an
authentication scheme, designed along the same lines of the cryptosystem, are
not secure due to the aforementioned attack. We close the paper by discussing
the issues and the possibilities of constructing public key cryptosystems on
real numbers.
| [
{
"version": "v1",
"created": "Wed, 10 Nov 2004 15:29:57 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Bergamo",
"Pina",
""
],
[
"D'Arco",
"Paolo",
""
],
[
"De Santis",
"Alfredo",
""
],
[
"Kocarev",
"Ljupco",
""
]
]
| new_dataset | 0.989168 |
cs/0411043 | Ioan Raicu | Ioan Raicu, Loren Schwiebert, Scott Fowler, Sandeep K.S. Gupta | e3D: An Energy-Efficient Routing Algorithm for Wireless Sensor Networks | Accepted for publication at IEEE ISSNIP 2004 (The International
Conference on Intelligent Sensors, Sensor Networks and Information
Processing), Melbourne, Australia, December 2004. 6 pages | null | null | null | cs.NI | null | One of the limitations of wireless sensor nodes is their inherent limited
energy resource. Besides maximizing the lifetime of the sensor node, it is
preferable to distribute the energy dissipated throughout the wireless sensor
network in order to minimize maintenance and maximize overall system
performance. Any communication protocol that involves synchronization of peer
nodes incurs some overhead for setting up the communication. We introduce a new
algorithm, e3D (energy-efficient Distributed Dynamic Diffusion routing
algorithm), and compare it to two other algorithms, namely directed, and random
clustering communication. We take into account the setup costs and analyze the
energy-efficiency and the useful lifetime of the system. In order to better
understand the characteristics of each algorithm and how well e3D really
performs, we also compare e3D with its optimum counterpart and an optimum
clustering algorithm. The benefit of introducing these ideal algorithms is to
show the upper bound on performance at the cost of an astronomical prohibitive
synchronization costs. We compare the algorithms in terms of system lifetime,
power dissipation distribution, cost of synchronization, and simplicity of the
algorithm. Our simulation results show that e3D performs comparable to its
optimal counterpart while having significantly less overhead.
| [
{
"version": "v1",
"created": "Fri, 12 Nov 2004 22:40:07 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Raicu",
"Ioan",
""
],
[
"Schwiebert",
"Loren",
""
],
[
"Fowler",
"Scott",
""
],
[
"Gupta",
"Sandeep K. S.",
""
]
]
| new_dataset | 0.995753 |
cs/0411053 | Didier Donsez | Areski Flissi (JACQUARD Ur-F Lifl), Philippe Merle (JACQUARD Ur-F
Lifl) | Vers un environnement multi personnalites pour la configuration et le
deploiement d'applications a base de composants logiciels | null | DECOR04 (2004) 3-14 | null | null | cs.NI | null | The multiplication of architecture description languages, component models
and platforms implies a serious dilemma for component based software
architects. On the one hand, they have to choose a language to describe
concrete configurations which will be automatically deployed on execution
platforms. On the other hand, they wish to capitalize their software
architectures independently of any description languages or platforms. To solve
this problem, we propose a multi personalities environment for the
configuration and the deployment of component based applications. This
environment is composed of a core capturing a canonical model of configuration
and deployment, and a set of personalities tailored to languages and platforms.
This paper details the architecture of such an environment and describes the
personalities for the CORBA and Fractal component models.
| [
{
"version": "v1",
"created": "Wed, 17 Nov 2004 13:08:43 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Flissi",
"Areski",
"",
"JACQUARD Ur-F Lifl"
],
[
"Merle",
"Philippe",
"",
"JACQUARD Ur-F\n Lifl"
]
]
| new_dataset | 0.999643 |
cs/0411055 | Didier Donsez | Laurent Charles, Manuel Vacelet, Mohamed Chaari, Miguel Santana | SDS : Une infrastructure d'installation de logiciels libres pour des
organisations multi-sites | null | DECOR04 (2004) 37-48 | null | null | cs.NI | null | Les developpements logiciels sur les systemes UNIX font de plus en plus appel
aux logiciels libres. Nous proposons une solution de deploiement et de controle
de ces logiciels libres au sein d'une grande organisation. Nous nous attachons
particulierement a resoudre les problemes lies au deploiement multi-sites ainsi
qu'a la gestion de configuration de ces deploiements. L'originalite de notre
approche repose sur sa capacite a etre mise en oeuvre et controlee par les
utilisateurs plutot que par les administrateurs, sans necessiter d'expertise
particuliere, et par les possibilites de deploiement dans des environnements
heterogenes.
-----
Free and open source software is more and more used for software developments
on UNIX systems. We are proposing a solution to control the deployment of free
software in the context of a large corporation, focusing on multi-site
deployment and configuration management. The originality of our approach rests
on its ability to be implemented and controlled by users rather than
administrators, without requiring any particular expertise, and on its facility
to be deployed in heterogeneous environments.
| [
{
"version": "v1",
"created": "Wed, 17 Nov 2004 13:27:17 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Charles",
"Laurent",
""
],
[
"Vacelet",
"Manuel",
""
],
[
"Chaari",
"Mohamed",
""
],
[
"Santana",
"Miguel",
""
]
]
| new_dataset | 0.990745 |
cs/0411057 | Didier Donsez | Jasminka Matevska-Meyer, Sascha Olliges, Wilhelm Hasselbring | Runtime Reconfiguration of J2EE Applications | null | DECOR04 (2004) 77-84 | null | null | cs.NI | null | Runtime reconfiguration considered as "applying required changes to a running
system" plays an important role for providing high availability not only of
safety- and mission-critical systems, but also for commercial web-applications
offering professional services. Hereby, the main concerns are maintaining the
consistency of the running system during reconfiguration and minimizing its
down-time caused by the reconfiguration. This paper focuses on the platform
independent subsystem that realises deployment and redeployment of J2EE modules
based on the new J2EE Deployment API as a part of the implementation of our
proposed system architecture enabling runtime reconfiguration of
component-based systems. Our "controlled runtime redeployment" comprises an
extension of hot deployment and dynamic reloading, complemented by allowing for
structural change
| [
{
"version": "v1",
"created": "Wed, 17 Nov 2004 13:34:06 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Matevska-Meyer",
"Jasminka",
""
],
[
"Olliges",
"Sascha",
""
],
[
"Hasselbring",
"Wilhelm",
""
]
]
| new_dataset | 0.954184 |
cs/0411059 | Didier Donsez | Frederic Briclet (JACQUARD Ur-F Lifl), Christophe Contreras (JACQUARD
Ur-F Lifl), Philippe Merle (JACQUARD Ur-F Lifl) | OpenCCM : une infrastructure a composants pour le deploiement
d'applications a base de composants CORBA | null | DECOR04 (2004) 101-112 | null | null | cs.NI | null | Deployment of software components for building distributed applications
consists of the coordination of a set of basic tasks like uploading component
binaries to the execution sites, loading them in memory, instantiating
components, interconnecting their ports, setting their business and technical
attributes. The automation of the deployment process then requires the presence
of a software infrastructure distributed itself on the different execution
sites. This paper presents the characteristics of such an infrastructure for
the deployment of CORBA component-based applications. This latter is designed
and implemented in the context of our OpenCCM platform, an open source
implementation of the CORBA Component Model. The main characteristic lays on
the fact that this infrastructure is itself designed as a set of CORBA
component assemblies. This allows its dynamic assembly during its deployment
over the execution sites
| [
{
"version": "v1",
"created": "Wed, 17 Nov 2004 13:35:35 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Briclet",
"Frederic",
"",
"JACQUARD Ur-F Lifl"
],
[
"Contreras",
"Christophe",
"",
"JACQUARD\n Ur-F Lifl"
],
[
"Merle",
"Philippe",
"",
"JACQUARD Ur-F Lifl"
]
]
| new_dataset | 0.996911 |
cs/0411060 | Didier Donsez | Stephane Frenot (ARES UR-RA) | Gestion du deploiement de composants sur reseau P2P | null | DECOR04 (2004) 113-124 | null | null | cs.NI | null | The deployment of component-based applications relies on a centralized
directory to store the components. This paper describes an approach to
distribute software components to be deployed on a set of peers of a peer to
peer network in order to exploit some associated characteristics (load
balancing, fault-tolerance, self-organisation). The proposed architecture is
situated in the context of OSGI application deployment management. The software
components (bundles) are distributed among a set of nodes participating in the
execution of services. When a node wants to install a component which is not
deployed locally, the component is looked for and installed using a p2p
network.
-----
Le deploiement d'applications a composants repose sur une approche d'annuaire
centralise de stockage des composants. Cet article decrit une approche pour
distribuer les composants logiciels a deployer sur un ensemble de noeuds d'un
reseau pair-a-pair afin de pouvoir exploiter certaines caracteristiques
associees (equilibrage de charge, tolerance de panne, auto-organisation).
L'architecture proposee entre dans le cadre de la gestion du deploiement
d'applications sur le modele OSGi. Les composants logiciels (ou bundles) sont
repartis a travers un ensemble de noeuds participant a l'execution de services.
Lorsqu'un noeud veut installer un composant et si celui-ci n'est pas encore
deploye localement, il est recherche et installe en utilisant un reseau p2p
| [
{
"version": "v1",
"created": "Wed, 17 Nov 2004 13:36:17 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Frenot",
"Stephane",
"",
"ARES UR-RA"
]
]
| new_dataset | 0.995076 |
cs/0411062 | Didier Donsez | Didier Donsez (LSR - IMAG), Humberto Cervantes (LSR - IMAG), Mikael
Desertot (LSR - IMAG) | FROGi : Deploiement de composants Fractal sur OSGi | null | DECOR04 (2004) 147-158 | null | null | cs.NI | null | Cet article presente FROGi, une proposition visant a introduire le modele a
composants Fractal a l'interieur de la plateforme de services OSGi. La
motivation derriere ce travail est double. D'un cote, FROGi offre aux
developpeurs de services OSGi un modele a composants extensibles qui facilite
le developpement des bundles ; ces derniers restent toutefois compatibles avec
les bundles "patrimoniaux". D'un autre cote, FROGi beneficie de
l'infrastructure de deploiement que represente OSGi et qui facilite la
realisation du conditionnement et du deploiement de composants Fractal. Dans
FROGi, une application Fractal est conditionnee sous la forme d'un ou plusieurs
bundles et elle peut etre deployee de facon partielle et les activites de
deploiement peuvent avoir lieu de facon continue.
-- This paper presents FROGi, a proposal to introduce the Fractal component
model into the OSGi services platform. There are two motivations for this work.
The first one is to offer a flexible component model to the OSGi developers to
simplify bundle development. Bundles developed with FROGi are nevertheless
compatible with standard bundles. The second motivation is to leverage OSGi's
deployment capabilities to package and deploy Fractal components. In FROGi, a
Fractal application is packaged and delivered as a set of OSGi bundles; such an
application supports partial deployment and additionally, deployment activities
can occur continuously.
| [
{
"version": "v1",
"created": "Wed, 17 Nov 2004 13:43:11 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Donsez",
"Didier",
"",
"LSR - IMAG"
],
[
"Cervantes",
"Humberto",
"",
"LSR - IMAG"
],
[
"Desertot",
"Mikael",
"",
"LSR - IMAG"
]
]
| new_dataset | 0.9842 |
cs/0411063 | Christiane Lechner | Christiane Lechner, Dana Alic, Sascha Husa | From Tensor Equations to Numerical Code -- Computer Algebra Tools for
Numerical Relativity | LaTeX llncs style, 9 pages, 1 figure, to appaer in the proceedings of
"SYNASC 2004 - 6th International Symposium on Symbolic and Numeric Algorithms
for Scientific Computing", Timisoara, Romania, September 26-30 2004 | null | null | AEI-2004-108 | cs.SC | null | In this paper we present our recent work in developing a computer-algebra
tool for systems of partial differential equations (PDEs), termed "Kranc". Our
work is motivated by the problem of finding solutions of the Einstein equations
through numerical simulations. Kranc consists of Mathematica based
computer-algebra packages, that facilitate the task of dealing with symbolic
tensorial calculations and realize the conversion of systems of partial
differential evolution equations into parallelized C or Fortran code.
| [
{
"version": "v1",
"created": "Wed, 17 Nov 2004 14:30:18 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lechner",
"Christiane",
""
],
[
"Alic",
"Dana",
""
],
[
"Husa",
"Sascha",
""
]
]
| new_dataset | 0.995333 |
cs/0411066 | Alex Wiesmaier | V. Karatsiolis, M. Lippert and A. Wiesmaier | Using LDAP Directories for Management of PKI Processes | 9 pages, 1 figure | In Proceedings of Public Key Infrastructure: First European PKI
Workshop: Research and Applications, EuroPKI 2004, volume 3093 of Lecture
Notes in Computer Science, pages 126-134, June 2004 | null | null | cs.CR | null | We present a framework for extending the functionality of LDAP servers from
their typical use as a public directory in public key infrastructures. In this
framework the LDAP servers are used for administrating infrastructure
processes. One application of this framework is a method for providing
proof-of-possession, especially in the case of encryption keys. Another one is
the secure delivery of software personal security environments.
| [
{
"version": "v1",
"created": "Thu, 18 Nov 2004 19:00:35 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Karatsiolis",
"V.",
""
],
[
"Lippert",
"M.",
""
],
[
"Wiesmaier",
"A.",
""
]
]
| new_dataset | 0.981413 |
cs/0411075 | Darran Nathan | Andreas Weisensee, Darran Nathan | A Self-Reconfigurable Computing Platform Hardware Architecture | 5 pages, 6 figures | null | null | null | cs.AR cs.DC | null | Field Programmable Gate Arrays (FPGAs) have recently been increasingly used
for highly-parallel processing of compute intensive tasks. This paper
introduces an FPGA hardware platform architecture that is PC-based, allows for
fast reconfiguration over the PCI bus, and retains a simple physical hardware
design. The design considerations are first discussed, then the resulting
system architecture designed is illustrated. Finally, experimental results on
the FPGA resources utilized for this design are presented.
| [
{
"version": "v1",
"created": "Sat, 20 Nov 2004 06:31:32 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Weisensee",
"Andreas",
""
],
[
"Nathan",
"Darran",
""
]
]
| new_dataset | 0.999676 |
cs/0411082 | Didier Donsez | Jakub Kornas (SARDES Ur-Ra Imag), Matthieu Leclercq (SARDES Ur-Ra
Imag), Vivien Quema (SARDES Ur-Ra Imag), Jean-Bernard Stefani (SARDES Ur-Ra
Imag) | Support pour la reconfiguration d'implantation dans les applications a
composants Java | null | DECOR04 (2004) 171-184 | null | null | cs.NI | null | Nowadays, numerous component models are used for various purposes: to build
applications, middleware or even operating systems. Those models commonly
support structure reconfiguration, that is modification of application's
architecture at runtime. On the other hand, very few allow implementation
reconfiguration, that is runtime modification of the code of components
building the application. In this article we present the work we performed on
JULIA, a Java-based implementation of the FRACTAL component model, in order for
it to support implementation reconfigurations. We show how we overcame the
limitations of Java class loading mechanism to allow runtime modifications of
components' implementation and interfaces. We also describe the integration of
our solution with the JULIA ADL.
| [
{
"version": "v1",
"created": "Wed, 24 Nov 2004 10:27:39 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kornas",
"Jakub",
"",
"SARDES Ur-Ra Imag"
],
[
"Leclercq",
"Matthieu",
"",
"SARDES Ur-Ra\n Imag"
],
[
"Quema",
"Vivien",
"",
"SARDES Ur-Ra Imag"
],
[
"Stefani",
"Jean-Bernard",
"",
"SARDES Ur-Ra\n Imag"
]
]
| new_dataset | 0.96356 |
cs/0411093 | Vlady Ravelomanana | Vlady Ravelomanana (LIPN), Loys Thimonier (LARIA) | Forbidden Subgraphs in Connected Graphs | null | null | null | null | cs.DS cs.DM math.CO | null | Given a set $\xi=\{H_1,H_2,...\}$ of connected non acyclic graphs, a
$\xi$-free graph is one which does not contain any member of $% \xi$ as copy.
Define the excess of a graph as the difference between its number of edges and
its number of vertices. Let ${\gr{W}}_{k,\xi}$ be theexponential generating
function (EGF for brief) of connected $\xi$-free graphs of excess equal to $k$
($k \geq 1$). For each fixed $\xi$, a fundamental differential recurrence
satisfied by the EGFs ${\gr{W}}_{k,\xi}$ is derived. We give methods on how to
solve this nonlinear recurrence for the first few values of $k$ by means of
graph surgery. We also show that for any finite collection $\xi$ of non-acyclic
graphs, the EGFs ${\gr{W}}_{k,\xi}$ are always rational functions of the
generating function, $T$, of Cayley's rooted (non-planar) labelled trees. From
this, we prove that almost all connected graphs with $n$ nodes and $n+k$ edges
are $\xi$-free, whenever $k=o(n^{1/3})$ and $|\xi| < \infty$ by means of
Wright's inequalities and saddle point method. Limiting distributions are
derived for sparse connected $\xi$-free components that are present when a
random graph on $n$ nodes has approximately $\frac{n}{2}$ edges. In particular,
the probability distribution that it consists of trees, unicyclic components,
$...$, $(q+1)$-cyclic components all $\xi$-free is derived. Similar results are
also obtained for multigraphs, which are graphs where self-loops and
multiple-edges are allowed.
| [
{
"version": "v1",
"created": "Thu, 25 Nov 2004 09:32:25 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ravelomanana",
"Vlady",
"",
"LIPN"
],
[
"Thimonier",
"Loys",
"",
"LARIA"
]
]
| new_dataset | 0.99943 |
cs/0412011 | Archil Avaliani | Archil Avaliani | Successful E-Business Systems - Paypal | 6 pages, Accepted at IADIS Conference, Lisbon. But because nobody was
able to present this research paper, it didn't publish in proceedings.
Extended version was written at International University under supervision of
Prof.Keiichi Nakata. Keywords: PayPal, Payment Systems, E-business, Money
Transactions, PayPal Analyses | null | null | null | cs.OH | null | PayPal is an account-based system that allows anyone with an email address to
send and receive online payment s. This service is easy to use for customers.
Members can instantaneously send money to anyone. Recipients are informed by
email that they have received a payment. PayPal is also available to people in
38 countries. This paper starts with introduction to the company and its
services. The information about the history and the current company situation
are covered. Later some interesting and different technical issues are
discussed. The Paper ends with analysis of the company and several future
recommendations.
| [
{
"version": "v1",
"created": "Fri, 3 Dec 2004 02:33:22 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Avaliani",
"Archil",
""
]
]
| new_dataset | 0.999612 |
cs/0412012 | Joanna Janik | Catherine Oriat (LSR - IMAG) | Jartege: a Tool for Random Generation of Unit Tests for Java Classes | null | null | null | RR-1069-I | cs.PL | null | This report presents Jartege, a tool which allows random generation of unit
tests for Java classes specified in JML. JML (Java Modeling Language) is a
specification language for Java which allows one to write invariants for
classes, and pre- and postconditions for operations. As in the JML-JUnit tool,
we use JML specifications on the one hand to eliminate irrelevant test cases,
and on the other hand as a test oracle. Jartege randomly generates test cases,
which consist of a sequence of constructor and method calls for the classes
under test. The random aspect of the tool can be parameterized by associating
weights to classes and operations, and by controlling the number of instances
which are created for each class under test. The practical use of Jartege is
illustrated by a small case study.
| [
{
"version": "v1",
"created": "Fri, 3 Dec 2004 12:19:16 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Oriat",
"Catherine",
"",
"LSR - IMAG"
]
]
| new_dataset | 0.999629 |
cs/0412013 | Jean-Christophe Dubacq | Jean-Christophe Dubacq (LIPN, GREYC), Veronique Terrier (GREYC) | Signals for Cellular Automata in dimension 2 or higher | null | LATIN 2002: Theoretical Informatics (2002) 451-464 | null | null | cs.CC cs.DC cs.DM math.CO | null | We investigate how increasing the dimension of the array can help to draw
signals on cellular automata.We show the existence of a gap of constructible
signals in any dimension. We exhibit two cellular automata in dimension 2 to
show that increasing the dimension allows to reduce the number of states
required for some constructions.
| [
{
"version": "v1",
"created": "Fri, 3 Dec 2004 16:35:17 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Dubacq",
"Jean-Christophe",
"",
"LIPN, GREYC"
],
[
"Terrier",
"Veronique",
"",
"GREYC"
]
]
| new_dataset | 0.994065 |
cs/0412050 | Vedran Kordic | Yongsheng Ou & Yangsheng Xu | Gyroscopically Stabilized Robot: Balance and Tracking | null | International Journal of Advanced Robotic Systems, Volume 1,
Number 1, March 2004, pp.23-32 | null | null | cs.RO | null | The single wheel, gyroscopically stabilized robot - Gyrover, is a dynamically
stable but statically unstable, underactuated system. In this paper, based on
the dynamic model of the robot, we investigate two classes of nonholonomic
constraints associated with the system. Then, based on the backstepping
technology, we propose a control law for balance control of Gyrover. Next,
through transferring the systems states from Cartesian coordinate to polar
coordinate, control laws for point-to-point control and line tracking in
Cartesian space are provided.
| [
{
"version": "v1",
"created": "Sat, 11 Dec 2004 12:38:11 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ou",
"Yongsheng",
""
],
[
"Xu",
"Yangsheng",
""
]
]
| new_dataset | 0.999515 |
cs/0412052 | Vedran Kordic | Olivier Michel | WebotsTM: Professional Mobile Robot Simulation | null | International Journal of Advanced Robotic Systems, Volume 1,
Number 1, March 2004, pp.39-42 | null | null | cs.RO | null | Cyberbotics Ltd. develops WebotsTM, a mobile robotics simulation software
that provides you with a rapid prototyping environment for modelling,
programming and simulating mobile robots. The provided robot libraries enable
you to transfer your control programs to several commercially available real
mobile robots. WebotsTM lets you define and modify a complete mobile robotics
setup, even several different robots sharing the same environment. For each
object, you can define a number of properties, such as shape, color, texture,
mass, friction, etc. You can equip each robot with a large number of available
sensors and actuators. You can program these robots using your favorite
development environment, simulate them and optionally transfer the resulting
programs onto your real robots. WebotsTM has been developed in collaboration
with the Swiss Federal Institute of Technology in Lausanne, thoroughly tested,
well documented and continuously maintained for over 7 years. It is now the
main commercial product available from Cyberbotics Ltd.
| [
{
"version": "v1",
"created": "Sat, 11 Dec 2004 12:45:08 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Michel",
"Olivier",
""
]
]
| new_dataset | 0.999757 |
cs/0412055 | Vedran Kordic | Alan P. Kypson and W. Randolph Chitwood Jr | Robotic Applications in Cardiac Surgery | null | International Journal of Advanced Robotic Systems, Volume 1,
Number 2, June 2004, pp.87-92 | null | null | cs.RO | null | Traditionally, cardiac surgery has been performed through a median
sternotomy, which allows the surgeon generous access to the heart and
surrounding great vessels. As a paradigm shift in the size and location of
incisions occurs in cardiac surgery, new methods have been developed to allow
the surgeon the same amount of dexterity and accessibility to the heart in
confined spaces and in a less invasive manner. Initially, long instruments
without pivot points were used, however, more recent robotic telemanipulation
systems have been applied that allow for improved dexterity, enabling the
surgeon to perform cardiac surgery from a distance not previously possible. In
this rapidly evolving field, we review the recent history and clinical results
of using robotics in cardiac surgery.
| [
{
"version": "v1",
"created": "Sat, 11 Dec 2004 12:52:58 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kypson",
"Alan P.",
""
],
[
"Chitwood",
"W. Randolph",
"Jr"
]
]
| new_dataset | 0.980848 |
cs/0412056 | Vedran Kordic | Nikita Pashenkov & Ryuichi Iwamasa | One-Chip Solution to Intelligent Robot Control: Implementing Hexapod
Subsumption Architecture Using a Contemporary Microprocessor | null | International Journal of Advanced Robotic Systems, Volume 1,
Number 2, June 2004, pp. 93-98 | null | null | cs.RO | null | This paper introduces a six-legged autonomous robot managed by a single
controller and a software core modeled on subsumption architecture. We begin by
discussing the features and capabilities of IsoPod, a new processor for
robotics which has enabled a streamlined implementation of our project. We
argue that this processor offers a unique set of hardware and software
features, making it a practical development platform for robotics in general
and for subsumption-based control architectures in particular. Next, we
summarize original ideas on subsumption architecture implementation for a
six-legged robot, as presented by its inventor Rodney Brooks in 1980s. A
comparison is then made to a more recent example of a hexapod control
architecture based on subsumption. The merits of both systems are analyzed and
a new subsumption architecture layout is formulated as a response. We conclude
with some remarks regarding the development of this project as a hint at new
potentials for intelligent robot design, opened by a recent development in
embedded controller market.
| [
{
"version": "v1",
"created": "Sat, 11 Dec 2004 12:55:30 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Pashenkov",
"Nikita",
""
],
[
"Iwamasa",
"Ryuichi",
""
]
]
| new_dataset | 0.974442 |
cs/0412069 | Vitorino Ramos Dr. | Vitorino Ramos, Jonathan Campbell, John Slater, John Gillespie, Ivan
F. Bendezu, Fionn Murtagh | Swarming around Shellfish Larvae | 11 pages, 4 figures,
http://alfa.ist.utl.pt/~cvrm/staff/vramos/ref_53.html, submitted to IbPRIA
2005, Portugal | null | null | null | cs.AI cs.CV | null | The collection of wild larvae seed as a source of raw material is a major sub
industry of shellfish aquaculture. To predict when, where and in what
quantities wild seed will be available, it is necessary to track the appearance
and growth of planktonic larvae. One of the most difficult groups to identify,
particularly at the species level are the Bivalvia. This difficulty arises from
the fact that fundamentally all bivalve larvae have a similar shape and colour.
Identification based on gross morphological appearance is limited by the
time-consuming nature of the microscopic examination and by the limited
availability of expertise in this field. Molecular and immunological methods
are also being studied. We describe the application of computational pattern
recognition methods to the automated identification and size analysis of
scallop larvae. For identification, the shape features used are binary
invariant moments; that is, the features are invariant to shift (position
within the image), scale (induced either by growth or differential image
magnification) and rotation. Images of a sample of scallop and non-scallop
larvae covering a range of maturities have been analysed. In order to overcome
the automatic identification, as well as to allow the system to receive new
unknown samples at any moment, a self-organized and unsupervised ant-like
clustering algorithm based on Swarm Intelligence is proposed, followed by
simple k-NNR nearest neighbour classification on the final map. Results achieve
a full recognition rate of 100% under several situations (k =1 or 3).
| [
{
"version": "v1",
"created": "Fri, 17 Dec 2004 13:30:30 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ramos",
"Vitorino",
""
],
[
"Campbell",
"Jonathan",
""
],
[
"Slater",
"John",
""
],
[
"Gillespie",
"John",
""
],
[
"Bendezu",
"Ivan F.",
""
],
[
"Murtagh",
"Fionn",
""
]
]
| new_dataset | 0.999404 |
cs/0412075 | Vitorino Ramos Dr. | Vitorino Ramos, Juan J. Merelo | Self-Organized Stigmergic Document Maps: Environment as a Mechanism for
Context Learning | 10 pages, 5 figures, at
http://alfa.ist.utl.pt/~cvrm/staff/vramos/ref_42.html | in AEB 2002, 1st Spanish Conference on Evolutionary and
Bio-Inspired Algorithms, E. Alba, F. Herrera, J.J. Merelo et al. (Eds.), pp.
284-293, Centro Univ. de Merida, Merida, Spain, 6-8 Feb. 2002 | null | null | cs.AI cs.DC | null | Social insect societies and more specifically ant colonies, are distributed
systems that, in spite of the simplicity of their individuals, present a highly
structured social organization. As a result of this organization, ant colonies
can accomplish complex tasks that in some cases exceed the individual
capabilities of a single ant. The study of ant colonies behavior and of their
self-organizing capabilities is of interest to knowledge retrieval/management
and decision support systems sciences, because it provides models of
distributed adaptive organization which are useful to solve difficult
optimization, classification, and distributed control problems, among others.
In the present work we overview some models derived from the observation of
real ants, emphasizing the role played by stigmergy as distributed
communication paradigm, and we present a novel strategy to tackle unsupervised
clustering as well as data retrieval problems. The present ant clustering
system (ACLUSTER) avoids not only short-term memory based strategies, as well
as the use of several artificial ant types (using different speeds), present in
some recent approaches. Moreover and according to our knowledge, this is also
the first application of ant systems into textual document clustering.
KEYWORDS: Swarm Intelligence, Ant Systems, Unsupervised Clustering, Data
Retrieval, Data Mining, Distributed Computing, Document Maps, Textual Document
Clustering.
| [
{
"version": "v1",
"created": "Fri, 17 Dec 2004 15:47:44 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ramos",
"Vitorino",
""
],
[
"Merelo",
"Juan J.",
""
]
]
| new_dataset | 0.992037 |
cs/0412078 | David Renault | D. Renault | The vertex-transitive TLF-planar graphs | Article : 23 pages, 15 figures Appendix : 13 pages, 72 figures
Submitted to Discrete Mathematics The appendix is accessible at
http://www.labri.fr/~renault/research/research.html | null | null | null | cs.DM | null | We consider the class of the topologically locally finite (in short TLF)
planar vertex-transitive graphs, a class containing in particular all the
one-ended planar Cayley graphs and the normal transitive tilings. We
characterize these graphs with a finite local representation and a special kind
of finite state automaton named labeling scheme. As a result, we are able to
enumerate and describe all TLF-planar vertex-transitive graphs of any given
degree. Also, we are able decide to whether any TLF-planar transitive graph is
Cayley or not.
| [
{
"version": "v1",
"created": "Fri, 17 Dec 2004 16:18:07 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Renault",
"D.",
""
]
]
| new_dataset | 0.981564 |
cs/0412079 | Vitorino Ramos Dr. | Vitorino Ramos | The MC2 Project [Machines of Collective Conscience]: A possible walk, up
to Life-like Complexity and Behaviour, from bottom, basic and simple
bio-inspired heuristics - a walk, up into the morphogenesis of information | 14 pages, Project at
http://alfa.ist.utl.pt/~cvrm/staff/vramos/MC2.html | at UTOPIA Biennial Art Exposition CATALOGUE, Cascais, Portugal,
July 12-22, 2001 | null | null | cs.AI cs.MM | null | Synergy (from the Greek word synergos), broadly defined, refers to combined
or co-operative effects produced by two or more elements (parts or
individuals). The definition is often associated with the holistic conviction
quote that "the whole is greater than the sum of its parts" (Aristotle, in
Metaphysics), or the whole cannot exceed the sum of the energies invested in
each of its parts (e.g. first law of thermodynamics) even if it is more
accurate to say that the functional effects produced by wholes are different
from what the parts can produce alone. Synergy is a ubiquitous phenomena in
nature and human societies alike. One well know example is provided by the
emergence of self-organization in social insects, via direct or indirect
interactions. The latter types are more subtle and defined as stigmergy to
explain task coordination and regulation in the context of nest reconstruction
in termites. An example, could be provided by two individuals, who interact
indirectly when one of them modifies the environment and the other responds to
the new environment at a later time. In other words, stigmergy could be defined
as a particular case of environmental or spatial synergy. The system is purely
holistic, and their properties are intrinsically emergent and autocatalytic. On
the present work we present a "machine" where there is no precommitment to any
particular representational scheme: the desired behaviour is distributed and
roughly specified simultaneously among many parts, but there is minimal
specification of the mechanism required to generate that behaviour, i.e. the
global behaviour evolves from the many relations of multiple simple behaviours.
| [
{
"version": "v1",
"created": "Fri, 17 Dec 2004 16:28:26 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ramos",
"Vitorino",
""
]
]
| new_dataset | 0.991078 |
cs/0412081 | Vitorino Ramos Dr. | Vitorino Ramos | Artificial Neoteny in Evolutionary Image Segmentation | 10 pages, 4 figures | SIARP 2000 - 5th IberoAmerican Symp. on Pattern Rec., F. Muge,
Moises P. and R. Caldas Pinto (Eds.), ISBN 972-97711-1-1, pp. 69-78, Lisbon,
Portugal, 11-13 Sep. 2000 | null | null | cs.AI cs.NE | null | Neoteny, also spelled Paedomorphosis, can be defined in biological terms as
the retention by an organism of juvenile or even larval traits into later life.
In some species, all morphological development is retarded; the organism is
juvenilized but sexually mature. Such shifts of reproductive capability would
appear to have adaptive significance to organisms that exhibit it. In terms of
evolutionary theory, the process of paedomorphosis suggests that larval stages
and developmental phases of existing organisms may give rise, under certain
circumstances, to wholly new organisms. Although the present work does not
pretend to model or simulate the biological details of such a concept in any
way, these ideas were incorporated by a rather simple abstract computational
strategy, in order to allow (if possible) for faster convergence into simple
non-memetic Genetic Algorithms, i.e. without using local improvement procedures
(e.g. via Baldwin or Lamarckian learning). As a case-study, the Genetic
Algorithm was used for colour image segmentation purposes by using K-mean
unsupervised clustering methods, namely for guiding the evolutionary algorithm
in his search for finding the optimal or sub-optimal data partition. Average
results suggest that the use of neotonic strategies by employing juvenile
genotypes into the later generations and the use of linear-dynamic mutation
rates instead of constant, can increase fitness values by 58% comparing to
classical Genetic Algorithms, independently from the starting population
characteristics on the search space. KEYWORDS: Genetic Algorithms, Artificial
Neoteny, Dynamic Mutation Rates, Faster Convergence, Colour Image Segmentation,
Classification, Clustering.
| [
{
"version": "v1",
"created": "Fri, 17 Dec 2004 16:44:54 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ramos",
"Vitorino",
""
]
]
| new_dataset | 0.999419 |
cs/0412093 | Alasdair Earl | A. Earl, P. Clark, S. Thorn | ScotGrid: A Prototype Tier 2 Centre | 4 pages, 4 diagrams. Presented at Computing for High Energy and
Nuclear Physics 2004 (CHEP '04). Interlaken, Switzerland, September 2004 | null | null | null | cs.AR cs.DC | null | ScotGrid is a prototype regional computing centre formed as a collaboration
between the universities of Durham, Edinburgh and Glasgow as part of the UK's
national particle physics grid, GridPP. We outline the resources available at
the three core sites and our optimisation efforts for our user communities. We
discuss the work which has been conducted in extending the centre to embrace
new projects both from particle physics and new user communities and explain
our methodology for doing this.
| [
{
"version": "v1",
"created": "Mon, 20 Dec 2004 11:55:30 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Earl",
"A.",
""
],
[
"Clark",
"P.",
""
],
[
"Thorn",
"S.",
""
]
]
| new_dataset | 0.999748 |
cs/0501009 | Mircea Alexandru Popescu Moscu | Mircea Alexandru Popescu Moscu | On The Liniar Time Complexity of Finite Languages | null | null | null | null | cs.CC | null | The present paper presents and proves a proposition concerning the time
complexity of finite languages. It is shown herein, that for any finite
language (a language for which the set of words composing it is finite) there
is a Turing machine that computes the language in such a way that for any input
of length k the machine stops in, at most, k + 1 steps.
| [
{
"version": "v1",
"created": "Wed, 5 Jan 2005 19:13:05 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Moscu",
"Mircea Alexandru Popescu",
""
]
]
| new_dataset | 0.999235 |
cs/0501012 | Carl Lagoze | Carl Lagoze, Sandy Payette, Edwin Shin, Chris Wilper | Fedora: An Architecture for Complex Objects and their Relationships | 25 pages, 8 figures Draft of submission to Journal of Digital
Libraries Special Issue on Complex Objects | null | null | null | cs.DL cs.MM | null | The Fedora architecture is an extensible framework for the storage,
management, and dissemination of complex objects and the relationships among
them. Fedora accommodates the aggregation of local and distributed content into
digital objects and the association of services with objects. This al-lows an
object to have several accessible representations, some of them dy-namically
produced. The architecture includes a generic RDF-based relation-ship model
that represents relationships among objects and their components. Queries
against these relationships are supported by an RDF triple store. The
architecture is implemented as a web service, with all aspects of the complex
object architecture and related management functions exposed through REST and
SOAP interfaces. The implementation is available as open-source soft-ware,
providing the foundation for a variety of end-user applications for digital
libraries, archives, institutional repositories, and learning object systems.
| [
{
"version": "v1",
"created": "Fri, 7 Jan 2005 17:57:05 GMT"
},
{
"version": "v2",
"created": "Wed, 12 Jan 2005 13:16:45 GMT"
},
{
"version": "v3",
"created": "Fri, 25 Feb 2005 20:13:37 GMT"
},
{
"version": "v4",
"created": "Mon, 7 Mar 2005 15:14:47 GMT"
},
{
"version": "v5",
"created": "Fri, 29 Jul 2005 13:04:31 GMT"
},
{
"version": "v6",
"created": "Tue, 23 Aug 2005 13:26:04 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lagoze",
"Carl",
""
],
[
"Payette",
"Sandy",
""
],
[
"Shin",
"Edwin",
""
],
[
"Wilper",
"Chris",
""
]
]
| new_dataset | 0.997054 |
cs/0501013 | Shujun Li Dr. | Chengqing Li, Shujun Li, Der-Chyuan Lou and Dan Zhang | On the security of the Yen-Guo's domino signal encryption algorithm
(DSEA) | 11 pages, 5 figures | Journal of Systems and Software, vol. 79, no. 2, pp. 253-258, 2006 | 10.1016/j.jss.2005.04.021 | null | cs.CR cs.MM nlin.CD | null | Recently, a new domino signal encryption algorithm (DSEA) was proposed for
digital signal transmission, especially for digital images and videos. This
paper analyzes the security of DSEA, and points out the following weaknesses:
1) its security against the brute-force attack was overestimated; 2) it is not
sufficiently secure against ciphertext-only attacks, and only one ciphertext is
enough to get some information about the plaintext and to break the value of a
sub-key; 3) it is insecure against known/chosen-plaintext attacks, in the sense
that the secret key can be recovered from a number of continuous bytes of only
one known/chosen plaintext and the corresponding ciphertext. Experimental
results are given to show the performance of the proposed attacks, and some
countermeasures are discussed to improve DSEA.
| [
{
"version": "v1",
"created": "Sat, 8 Jan 2005 15:35:13 GMT"
},
{
"version": "v2",
"created": "Sun, 27 Aug 2006 17:27:34 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Li",
"Chengqing",
""
],
[
"Li",
"Shujun",
""
],
[
"Lou",
"Der-Chyuan",
""
],
[
"Zhang",
"Dan",
""
]
]
| new_dataset | 0.992067 |
cs/0501014 | Shujun Li Dr. | Shujun Li, Guanrong Chen, Albert Cheung, Bharat Bhargava and Kwok-Tung
Lo | On the Design of Perceptual MPEG-Video Encryption Algorithms | 10 pages, 5 figures, IEEEtran.cls | IEEE Transactions on Circuits and Systems for Video Technology,
vol. 17, no. 2, pp. 214-223, 2007 | 10.1109/TCSVT.2006.888840 | null | cs.MM cs.CR | null | In this paper, some existing perceptual encryption algorithms of MPEG videos
are reviewed and some problems, especially security defects of two recently
proposed MPEG-video perceptual encryption schemes, are pointed out. Then, a
simpler and more effective design is suggested, which selectively encrypts
fixed-length codewords (FLC) in MPEG-video bitstreams under the control of
three perceptibility factors. The proposed design is actually an encryption
configuration that can work with any stream cipher or block cipher. Compared
with the previously-proposed schemes, the new design provides more useful
features, such as strict size-preservation, on-the-fly encryption and multiple
perceptibility, which make it possible to support more applications with
different requirements. In addition, four different measures are suggested to
provide better security against known/chosen-plaintext attacks.
| [
{
"version": "v1",
"created": "Sat, 8 Jan 2005 15:55:30 GMT"
},
{
"version": "v2",
"created": "Thu, 31 Aug 2006 11:30:21 GMT"
},
{
"version": "v3",
"created": "Tue, 27 Mar 2007 17:12:49 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Li",
"Shujun",
""
],
[
"Chen",
"Guanrong",
""
],
[
"Cheung",
"Albert",
""
],
[
"Bhargava",
"Bharat",
""
],
[
"Lo",
"Kwok-Tung",
""
]
]
| new_dataset | 0.979646 |
cs/0502002 | Manoj Kumar | Manoj Kumar | Directed Threshold Multi – Signature Scheme without SDC | 13 pages | null | null | null | cs.CR | null | In this paper, we propose a Directed threshold multisignature scheme without
SDC. This signature scheme is applicable when the message is sensitive to the
signature receiver; and the signatures are generated by the cooperation of a
number of people from a given group of senders. In this scheme, any malicious
set of signers cannot impersonate any other set of signers to forge the
signatures. In case of forgery, it is possible to trace the signing set.
| [
{
"version": "v1",
"created": "Tue, 1 Feb 2005 06:29:56 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kumar",
"Manoj",
""
]
]
| new_dataset | 0.982645 |
cs/0502013 | Robert Hearn | Robert A. Hearn | Amazons is PSPACE-complete | 7 pages, 5 figures. For 2005 Combinatorial Game Theory Workshop at
BIRS | null | null | null | cs.CC cs.GT | null | Amazons is a board game which combines elements of Chess and Go. It has
become popular in recent years, and has served as a useful platform for both
game-theoretic study and AI games research. Buro showed that simple Amazons
endgames are NP-equivalent, leaving the complexity of the general case as an
open problem.
We settle this problem, by showing that deciding the outcome of an n x n
Amazons position is PSPACE-hard. We give a reduction from one of the
PSPACE-complete two-player formula games described by Schaefer. Since the
number of moves in an Amazons game is polynomially bounded (unlike Chess and
Go), Amazons is in PSPACE. It is thus on a par with other two-player,
bounded-move, perfect-information games such as Hex, Othello, and Kayles. Our
construction also provides an alternate proof that simple Amazons endgames are
NP-equivalent.
Our reduction uses a number of amazons polynomial in the input formula
length; a remaining open problem is the complexity of Amazons when only a
constant number of amazons is used.
| [
{
"version": "v1",
"created": "Wed, 2 Feb 2005 18:55:24 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Hearn",
"Robert A.",
""
]
]
| new_dataset | 0.998825 |
cs/0502025 | Hahnsang Kim | Hahnsang Kim, Theirry Turletti, Amar Bouali | EPspectra: A Formal Toolkit for Developing DSP Software Applications | 31 pages | null | null | null | cs.LO cs.SE | null | The software approach to developing Digital Signal Processing (DSP)
applications brings some great features such as flexibility, re-usability of
resources and easy upgrading of applications. However, it requires long and
tedious tests and verification phases because of the increasing complexity of
the software. This implies the need of a software programming environment
capable of putting together DSP modules and providing facilities to debug,
verify and validate the code. The objective of the work is to provide such
facilities as simulation and verification for developing DSP software
applications. This led us to develop an extension toolkit, Epspectra, built
upon Pspectra, one of the first toolkits available to design basic software
radio applications on standard PC workstations. In this paper, we first present
Epspectra, an Esterel-based extension of Pspectra that makes the design and
implementation of portable DSP applications easier. It allows drastic reduction
of testing and verification time while requiring relatively little expertise in
formal verification methods. Second, we demonstrate the use of Epspectra,
taking as an example the radio interface part of a GSM base station. We also
present the verification procedures for the three safety properties of the
implementation programs which have complex control-paths. These have to obey
strict scheduling rules. In addition, Epspectra achieves the verification of
the targeted application since the same model is used for the executable code
generation and for the formal verification.
| [
{
"version": "v1",
"created": "Fri, 4 Feb 2005 15:11:26 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kim",
"Hahnsang",
""
],
[
"Turletti",
"Theirry",
""
],
[
"Bouali",
"Amar",
""
]
]
| new_dataset | 0.996495 |
cs/0502031 | Riccardo Pucella | Riccardo Pucella | Logic Column 11: The Finite and the Infinite in Temporal Logic | 14 pages | SIGACT News, 36(1), pp. 86-99, 2005 | null | null | cs.LO | null | This article examines the interpretation of the LTL temporal operators over
finite and infinite sequences. This is used as the basis for deriving a sound
and complete axiomatization for Caret, a recent temporal logic for reasoning
about programs with nested procedure calls and returns.
| [
{
"version": "v1",
"created": "Sat, 5 Feb 2005 21:00:13 GMT"
},
{
"version": "v2",
"created": "Sun, 24 Apr 2005 17:51:57 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Pucella",
"Riccardo",
""
]
]
| new_dataset | 0.988996 |
cs/0502068 | John Tromp | John Tromp and Rudi Cilibrasi | Limits of Rush Hour Logic Complexity | null | null | null | null | cs.CC | null | Rush Hour Logic was introduced in [Flake&Baum99] as a model of computation
inspired by the ``Rush Hour'' toy puzzle, in which cars can move horizontally
or vertically within a parking lot. The authors show how the model supports
polynomial space computation, using certain car configurations as building
blocks to construct boolean circuits for a cpu and memory. They consider the
use of cars of length 3 crucial to their construction, and conjecture that cars
of size 2 only, which we'll call `Size 2 Rush Hour', do not support polynomial
space computation. We settle this conjecture by showing that the required
building blocks are constructible in Size 2 Rush Hour. Furthermore, we consider
Unit Rush Hour, which was hitherto believed to be trivial, show its relation to
maze puzzles, and provide empirical support for its hardness.
| [
{
"version": "v1",
"created": "Tue, 15 Feb 2005 14:22:35 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Tromp",
"John",
""
],
[
"Cilibrasi",
"Rudi",
""
]
]
| new_dataset | 0.998994 |
cs/0502070 | Erik Demaine | Erik D. Demaine and MohammadTaghi Hajiaghayi | Bidimensionality, Map Graphs, and Grid Minors | 12 pages | null | null | null | cs.DM cs.DS | null | In this paper we extend the theory of bidimensionality to two families of
graphs that do not exclude fixed minors: map graphs and power graphs. In both
cases we prove a polynomial relation between the treewidth of a graph in the
family and the size of the largest grid minor. These bounds improve the running
times of a broad class of fixed-parameter algorithms. Our novel technique of
using approximate max-min relations between treewidth and size of grid minors
is powerful, and we show how it can also be used, e.g., to prove a linear
relation between the treewidth of a bounded-genus graph and the treewidth of
its dual.
| [
{
"version": "v1",
"created": "Wed, 16 Feb 2005 19:01:50 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Demaine",
"Erik D.",
""
],
[
"Hajiaghayi",
"MohammadTaghi",
""
]
]
| new_dataset | 0.990993 |
cs/0502086 | Pierre-Yves Oudeyer | Pierre-Yves Oudeyer | The Self-Organization of Speech Sounds | null | Journal of Theoretical Biology 233 (2005) Issue 3, Pages 435-449 | null | null | cs.LG cs.AI cs.CL cs.NE cs.RO math.DS | null | The speech code is a vehicle of language: it defines a set of forms used by a
community to carry information. Such a code is necessary to support the
linguistic interactions that allow humans to communicate. How then may a speech
code be formed prior to the existence of linguistic interactions? Moreover, the
human speech code is discrete and compositional, shared by all the individuals
of a community but different across communities, and phoneme inventories are
characterized by statistical regularities. How can a speech code with these
properties form? We try to approach these questions in the paper, using the
"methodology of the artificial". We build a society of artificial agents, and
detail a mechanism that shows the formation of a discrete speech code without
pre-supposing the existence of linguistic capacities or of coordinated
interactions. The mechanism is based on a low-level model of sensory-motor
interactions. We show that the integration of certain very simple and non
language-specific neural devices leads to the formation of a speech code that
has properties similar to the human speech code. This result relies on the
self-organizing properties of a generic coupling between perception and
production within agents, and on the interactions between agents. The
artificial system helps us to develop better intuitions on how speech might
have appeared, by showing how self-organization might have helped natural
selection to find speech.
| [
{
"version": "v1",
"created": "Tue, 22 Feb 2005 09:51:16 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Oudeyer",
"Pierre-Yves",
""
]
]
| new_dataset | 0.989758 |
cs/0502090 | Achim Streit | A. Streit, D. Erwin, Th. Lippert, D. Mallmann, R. Menday, M. Rambadt,
M. Riedel, M. Romberg, B. Schuller, Ph. Wieder | UNICORE - From Project Results to Production Grids | 21 pages, 3 figures | null | null | null | cs.DC cs.OS | null | The UNICORE Grid-technology provides a seamless, secure and intuitive access
to distributed Grid resources. In this paper we present the recent evolution
from project results to production Grids. At the beginning UNICORE was
developed as a prototype software in two projects funded by the German research
ministry (BMBF). Over the following years, in various European-funded projects,
UNICORE evolved to a full-grown and well-tested Grid middleware system, which
today is used in daily production at many supercomputing centers worldwide.
Beyond this production usage, the UNICORE technology serves as a solid basis in
many European and International research projects, which use existing UNICORE
components to implement advanced features, high level services, and support for
applications from a growing range of domains. In order to foster these ongoing
developments, UNICORE is available as open source under BSD licence at
SourceForge, where new releases are published on a regular basis. This paper is
a review of the UNICORE achievements so far and gives a glimpse on the UNICORE
roadmap.
| [
{
"version": "v1",
"created": "Thu, 24 Feb 2005 14:13:56 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Streit",
"A.",
""
],
[
"Erwin",
"D.",
""
],
[
"Lippert",
"Th.",
""
],
[
"Mallmann",
"D.",
""
],
[
"Menday",
"R.",
""
],
[
"Rambadt",
"M.",
""
],
[
"Riedel",
"M.",
""
],
[
"Romberg",
"M.",
""
],
[
"Schuller",
"B.",
""
],
[
"Wieder",
"Ph.",
""
]
]
| new_dataset | 0.988123 |
cs/0503009 | Valmir Barbosa | R. S. C. Leao, V. C. Barbosa | Minimal chordal sense of direction and circulant graphs | null | Lecture Notes in Computer Science 4162 (2006), 670-680 | 10.1007/11821069_58 | null | cs.DM | null | A sense of direction is an edge labeling on graphs that follows a globally
consistent scheme and is known to considerably reduce the complexity of several
distributed problems. In this paper, we study a particular instance of sense of
direction, called a chordal sense of direction (CSD). In special, we identify
the class of k-regular graphs that admit a CSD with exactly k labels (a minimal
CSD). We prove that connected graphs in this class are Hamiltonian and that the
class is equivalent to that of circulant graphs, presenting an efficient
(polynomial-time) way of recognizing it when the graphs' degree k is fixed.
| [
{
"version": "v1",
"created": "Thu, 3 Mar 2005 12:06:10 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Leao",
"R. S. C.",
""
],
[
"Barbosa",
"V. C.",
""
]
]
| new_dataset | 0.979818 |
cs/0503014 | Christian W. Straka | Christian W. Straka | ADF95: Tool for automatic differentiation of a FORTRAN code designed for
large numbers of independent variables | 24 pages, 2 figures, 4 tables, accepted in Computer Physics
Communications | null | 10.1016/j.cpc.2005.01.011 | null | cs.MS | null | ADF95 is a tool to automatically calculate numerical first derivatives for
any mathematical expression as a function of user defined independent
variables. Accuracy of derivatives is achieved within machine precision. ADF95
may be applied to any FORTRAN 77/90/95 conforming code and requires minimal
changes by the user. It provides a new derived data type that holds the value
and derivatives and applies forward differencing by overloading all FORTRAN
operators and intrinsic functions. An efficient indexing technique leads to a
reduced memory usage and a substantially increased performance gain over other
available tools with operator overloading. This gain is especially pronounced
for sparse systems with large number of independent variables. A wide class of
numerical simulations, e.g., those employing implicit solvers, can profit from
ADF95.
| [
{
"version": "v1",
"created": "Fri, 4 Mar 2005 19:20:04 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Straka",
"Christian W.",
""
]
]
| new_dataset | 0.963054 |
cs/0503016 | Xiaoming Liu | Xiaoming Liu, Lyudmila Balakireva, Patrick Hochstenbach, Herbert Van
de Sompel | File-based storage of Digital Objects and constituent datastreams:
XMLtapes and Internet Archive ARC files | 12 pages, 1 figures (camera-ready copy for ECDL 2005) | null | null | null | cs.DL | null | This paper introduces the write-once/read-many XMLtape/ARC storage approach
for Digital Objects and their constituent datastreams. The approach combines
two interconnected file-based storage mechanisms that are made accessible in a
protocol-based manner. First, XML-based representations of multiple Digital
Objects are concatenated into a single file named an XMLtape. An XMLtape is a
valid XML file; its format definition is independent of the choice of the
XML-based complex object format by which Digital Objects are represented. The
creation of indexes for both the identifier and the creation datetime of the
XML-based representation of the Digital Objects facilitates OAI-PMH-based
access to Digital Objects stored in an XMLtape. Second, ARC files, as
introduced by the Internet Archive, are used to contain the constituent
datastreams of the Digital Objects in a concatenated manner. An index for the
identifier of the datastream facilitates OpenURL-based access to an ARC file.
The interconnection between XMLtapes and ARC files is provided by conveying the
identifiers of ARC files associated with an XMLtape as administrative
information in the XMLtape, and by including OpenURL references to constituent
datastreams of a Digital Object in the XML-based representation of that Digital
Object.
| [
{
"version": "v1",
"created": "Mon, 7 Mar 2005 23:17:23 GMT"
},
{
"version": "v2",
"created": "Fri, 3 Jun 2005 17:27:36 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Liu",
"Xiaoming",
""
],
[
"Balakireva",
"Lyudmila",
""
],
[
"Hochstenbach",
"Patrick",
""
],
[
"Van de Sompel",
"Herbert",
""
]
]
| new_dataset | 0.997419 |
cs/0503024 | Dan Tufis I. | Dan Tufis, Radu Ion, Nancy Ide | Fine-Grained Word Sense Disambiguation Based on Parallel Corpora, Word
Alignment, Word Clustering and Aligned Wordnets | 7 pages in Proc. of COLING2005 | In proceedings of the 20th International Conference on
Computational Linguistics, COLING2004, Geneva, 2004, pp. 1312-1318 | null | null | cs.AI cs.CL | null | The paper presents a method for word sense disambiguation based on parallel
corpora. The method exploits recent advances in word alignment and word
clustering based on automatic extraction of translation equivalents and being
supported by available aligned wordnets for the languages in the corpus. The
wordnets are aligned to the Princeton Wordnet, according to the principles
established by EuroWordNet. The evaluation of the WSD system, implementing the
method described herein showed very encouraging results. The same system used
in a validation mode, can be used to check and spot alignment errors in
multilingually aligned wordnets as BalkaNet and EuroWordNet.
| [
{
"version": "v1",
"created": "Thu, 10 Mar 2005 11:49:51 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Tufis",
"Dan",
""
],
[
"Ion",
"Radu",
""
],
[
"Ide",
"Nancy",
""
]
]
| new_dataset | 0.990806 |
cs/0503048 | Arindam Mitra | Arindam Mitra | Is entanglement necessary to have unconditional security in quantum bit
commitment ? | Pdf. 2 pages. Revised | null | null | null | cs.CR | null | A simple un-entanglement based quantum bit commitment scheme is presented.
Although commitment is unconditionally secure but concealment is not.
| [
{
"version": "v1",
"created": "Mon, 21 Mar 2005 15:20:14 GMT"
},
{
"version": "v2",
"created": "Fri, 18 Nov 2005 15:39:44 GMT"
},
{
"version": "v3",
"created": "Fri, 31 Mar 2006 13:58:18 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Mitra",
"Arindam",
""
]
]
| new_dataset | 0.99439 |
cs/0503069 | Michael Nelson | Michael L. Nelson, Herbert Van de Sompel, Xiaoming Liu, Terry L.
Harrison, Nathan McFarland | mod_oai: An Apache Module for Metadata Harvesting | null | null | null | null | cs.DL | null | We describe mod_oai, an Apache 2.0 module that implements the Open Archives
Initiative Protocol for Metadata Harvesting (OAI-PMH). OAIPMH is the de facto
standard for metadata exchange in digital libraries and allows repositories to
expose their contents in a structured, application-neutral format with
semantics optimized for accurate incremental harvesting. Current
implementations of OAI-PMH are either separate applications that access an
existing repository, or are built-in to repository software packages. mod_oai
is different in that it optimizes harvesting web content by building OAI-PMH
capability into the Apache server. We discuss the implications of adding
harvesting capability to an Apache server and describe our initial experimental
results accessing a departmental web site using both web crawling and OAIPMH
harvesting techniques.
| [
{
"version": "v1",
"created": "Thu, 24 Mar 2005 14:38:26 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Nelson",
"Michael L.",
""
],
[
"Van de Sompel",
"Herbert",
""
],
[
"Liu",
"Xiaoming",
""
],
[
"Harrison",
"Terry L.",
""
],
[
"McFarland",
"Nathan",
""
]
]
| new_dataset | 0.970199 |
cs/0503073 | Viktor Toth | Viktor Toth | Tensor manipulation in GPL Maxima | 26 pages (some formulae fixed, terminology usage corrected, comments
added on improved tensor contraction algorithm) | null | null | null | cs.SC | null | GPL Maxima is an open-source computer algebra system based on DOE-MACSYMA.
GPL Maxima included two tensor manipulation packages from DOE-MACSYMA, but
these were in various states of disrepair. One of the two packages, CTENSOR,
implemented component-based tensor manipulation; the other, ITENSOR, treated
tensor symbols as opaque, manipulating them based on their index properties.
The present paper describes the state in which these packages were found, the
steps that were needed to make the packages fully functional again, and the new
functionality that was implemented to make them more versatile. A third
package, ATENSOR, was also implemented; fully compatible with the identically
named package in the commercial version of MACSYMA, ATENSOR implements abstract
tensor algebras.
| [
{
"version": "v1",
"created": "Sat, 26 Mar 2005 14:41:49 GMT"
},
{
"version": "v2",
"created": "Wed, 25 May 2005 16:52:58 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Toth",
"Viktor",
""
]
]
| new_dataset | 0.994473 |
cs/0504018 | Olivier Brunet | Olivier Brunet (Leibniz - IMAG) | A Rule-Based Logic for Quantum Information | null | null | null | null | cs.LO quant-ph | null | In the present article, we explore a new approach for the study of
orthomodular lattices, where we replace the problematic conjunction by a binary
operator, called the Sasaki projection. We present a characterization of
orthomodular lattices based on the use of an algebraic version of the Sasaki
projection operator (together with orthocomplementation) rather than on the
conjunction. We then define of a new logic, which we call Sasaki Orthologic,
which is closely related to quantum logic, and provide a rule-based definition
of this logic.
| [
{
"version": "v1",
"created": "Wed, 6 Apr 2005 08:11:00 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Brunet",
"Olivier",
"",
"Leibniz - IMAG"
]
]
| new_dataset | 0.98551 |
cs/0504040 | J?r?mie Leguay M. | Jeremie Leguay, Timur Friedman and Vania Conan | DTN Routing in a Mobility Pattern Space | 8 pages, preprint | null | null | null | cs.NI | null | Routing in Delay Tolerant Networks (DTNs) benefits considerably if one can
take advantage of knowledge concerning node mobility. The main contribution of
this paper is the definition of a generic routing scheme for DTNs using a
high-dimensional Euclidean space constructed upon nodes' mobility patterns. For
example, nodes are represented as points having as coordinates their
probability of being found in each possible location. We present simulation
results indicating that such a scheme can be beneficial in a scenario inspired
by studies done on real mobility traces. This work should open the way to
further use of the virtual space formalism in DTN routing.
| [
{
"version": "v1",
"created": "Mon, 11 Apr 2005 17:03:04 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Leguay",
"Jeremie",
""
],
[
"Friedman",
"Timur",
""
],
[
"Conan",
"Vania",
""
]
]
| new_dataset | 0.996935 |
cs/0504044 | Richard McClatchey | Michael Thomas, Conrad Steenberg, Frank van Lingen, Harvey Newman,
Julian Bunn, Arshad Ali, Richard McClatchey, Ashiq Anjum, Tahir Azim, Waqas
ur Rehman, Faisal Khan, Jang Uk In | JClarens: A Java Framework for Developing and Deploying Web Services for
Grid Computing | 8 pages, 4 figures. Paper at the 3rd IEEE International Conference on
Web Services (ICWS05). Florida, USA. July 2005 | null | null | null | cs.DC | null | High Energy Physics (HEP) and other scientific communities have adopted
Service Oriented Architectures (SOA) as part of a larger Grid computing effort.
This effort involves the integration of many legacy applications and
programming libraries into a SOA framework. The Grid Analysis Environment (GAE)
is such a service oriented architecture based on the Clarens Grid Services
Framework and is being developed as part of the Compact Muon Solenoid (CMS)
experiment at the Large Hadron Collider (LHC) at European Laboratory for
Particle Physics (CERN). Clarens provides a set of authorization, access
control, and discovery services, as well as XMLRPC and SOAP access to all
deployed services. Two implementations of the Clarens Web Services Framework
(Python and Java) offer integration possibilities for a wide range of
programming languages. This paper describes the Java implementation of the
Clarens Web Services Framework called JClarens. and several web services of
interest to the scientific and Grid community that have been deployed using
JClarens.
| [
{
"version": "v1",
"created": "Mon, 11 Apr 2005 21:45:07 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Thomas",
"Michael",
""
],
[
"Steenberg",
"Conrad",
""
],
[
"van Lingen",
"Frank",
""
],
[
"Newman",
"Harvey",
""
],
[
"Bunn",
"Julian",
""
],
[
"Ali",
"Arshad",
""
],
[
"McClatchey",
"Richard",
""
],
[
"Anjum",
"Ashiq",
""
],
[
"Azim",
"Tahir",
""
],
[
"Rehman",
"Waqas ur",
""
],
[
"Khan",
"Faisal",
""
],
[
"In",
"Jang Uk",
""
]
]
| new_dataset | 0.998729 |
cs/0504073 | Karim Seada | Karim Seada, Ahmed Helmy | Rendezvous Regions: A Scalable Architecture for Resource Discovery and
Service Location in Large-Scale Mobile Networks | null | null | null | null | cs.NI | null | In large-scale wireless networks such as mobile ad hoc and sensor networks,
efficient and robust service discovery and data-access mechanisms are both
essential and challenging. Rendezvous-based mechanisms provide a valuable
solution for provisioning a wide range of services. In this paper, we describe
Rendezvous Regions (RRs) - a novel scalable rendezvous-based architecture for
wireless networks. RR is a general architecture proposed for service location
and bootstrapping in ad hoc networks, in addition to data-centric storage,
configuration, and task assignment in sensor networks. In RR the network
topology is divided into geographical regions, where each region is responsible
for a set of keys representing the services or data of interest. Each key is
mapped to a region based on a hash-table-like mapping scheme. A few elected
nodes inside each region are responsible for maintaining the mapped
information. The service or data provider stores the information in the
corresponding region and the seekers retrieve it from there. We run extensive
detailed simulations, and high-level simulations and analysis, to investigate
the design space, and study the architecture in various environments including
node mobility and failures. We evaluate it against other approaches to identify
its merits and limitations. The results show high success rate and low overhead
even with dynamics. RR scales to large number of nodes and is highly robust and
efficient to node failures. It is also robust to node mobility and location
inaccuracy with a significant advantage over point-based rendezvous mechanisms.
| [
{
"version": "v1",
"created": "Fri, 15 Apr 2005 03:01:16 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Seada",
"Karim",
""
],
[
"Helmy",
"Ahmed",
""
]
]
| new_dataset | 0.999426 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.