id
stringlengths
9
10
submitter
stringlengths
2
52
authors
stringlengths
4
6.51k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
345
doi
stringlengths
11
120
report-no
stringlengths
2
243
categories
stringlengths
5
98
license
stringclasses
9 values
abstract
stringlengths
33
3.33k
versions
list
update_date
timestamp[s]
authors_parsed
list
prediction
stringclasses
1 value
probability
float64
0.95
1
cs/0504094
Amit K Awasthi
Amit K Awasthi
A New Remote User Authentication Scheme Using Smart Cards with Check Digits
3 Pages. Not Published
null
null
null
cs.CR
null
Since 1981, when Lamport introduced the remote user authentication scheme using table, a plenty of schemes had been proposed with table and without table using. In 1993, Chang and Wu [5] introduced Remote password authentication scheme with smart cards. A number of remote authentication schemes with smart cards have been proposed since then. These schemes allow a valid user to login a remote server and access the services provided by the remote server. But still there is no scheme to authenticate the remote proxy user. In this paper we propose firstly, a protocol to authenticate a proxy user remotely using smartcards.
[ { "version": "v1", "created": "Sat, 23 Apr 2005 22:47:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Awasthi", "Amit K", "" ] ]
new_dataset
0.999667
cs/0504106
Thomas C. Schmidt
Hans L. Cycon, Thomas C. Schmidt, Matthias Waehlisch, Mark Palkow and Henrik Regensburg
A Distributed Multimedia Communication System and its Applications to E-Learning
Including 6 figures
IEEE International Symposium on Consumer Electronics, Sept. 1-3, 2004, Page(s):425 - 429
null
null
cs.MM cs.NI
null
In this paper we report on a multimedia communication system including a VCoIP (Video Conferencing over IP) software with a distributed architecture and its applications for teaching scenarios. It is a simple, ready-to-use scheme for distributed presenting, recording and streaming multimedia content. We also introduce and investigate concepts and experiments to IPv6 user and session mobility, with the special focus on real-time video group communication.
[ { "version": "v1", "created": "Thu, 28 Apr 2005 13:40:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Cycon", "Hans L.", "" ], [ "Schmidt", "Thomas C.", "" ], [ "Waehlisch", "Matthias", "" ], [ "Palkow", "Mark", "" ], [ "Regensburg", "Henrik", "" ] ]
new_dataset
0.997422
cs/0505014
Haibin Wang
Haibin Wang, Florentin Smarandache, Yan-Qing Zhang, Rajshekhar Sunderraman
Interval Neutrosophic Sets and Logic: Theory and Applications in Computing
12 figures, 100 pages, book in press
null
null
null
cs.LO
null
This book presents the advancements and applications of neutrosophics. Chapter 1 first introduces the interval neutrosophic sets which is an instance of neutrosophic sets. In this chapter, the definition of interval neutrosophic sets and set-theoretic operators are given and various properties of interval neutrosophic set are proved. Chapter 2 defines the interval neutrosophic logic based on interval neutrosophic sets including the syntax and semantics of first order interval neutrosophic propositional logic and first order interval neutrosophic predicate logic. The interval neutrosophic logic can reason and model fuzzy, incomplete and inconsistent information. In this chapter, we also design an interval neutrosophic inference system based on first order interval neutrosophic predicate logic. The interval neutrosophic inference system can be applied to decision making. Chapter 3 gives one application of interval neutrosophic sets and logic in the field of relational databases. Neutrosophic data model is the generalization of fuzzy data model and paraconsistent data model. Here, we generalize various set-theoretic and relation-theoretic operations of fuzzy data model to neutrosophic data model. Chapter 4 gives another application of interval neutrosophic logic. A soft semantic Web Services agent framework is proposed to faciliate the registration and discovery of high quality semantic Web Services agent. The intelligent inference engine module of soft Semantic Web Services agent is implemented using interval neutrosophic logic.
[ { "version": "v1", "created": "Fri, 6 May 2005 13:57:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Wang", "Haibin", "" ], [ "Smarandache", "Florentin", "" ], [ "Zhang", "Yan-Qing", "" ], [ "Sunderraman", "Rajshekhar", "" ] ]
new_dataset
0.998789
cs/0505047
David Wood
David R. Wood
A Simple Proof of the F{\'a}ry-Wagner Theorem
2 pages
null
null
null
cs.CG
null
We give a simple proof of the following fundamental result independently due to Fary (1948) and Wagner (1936): Every plane graph has a drawing in which every edge is straight.
[ { "version": "v1", "created": "Wed, 18 May 2005 11:27:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Wood", "David R.", "" ] ]
new_dataset
0.998804
cs/0505050
Manuel Arturo Izquierdo
Manuel Arturo Izquierdo
The QDF file format: an electronic system to describe ancient andean khipus
LaTeX text, 12 pages
null
null
null
cs.CY
null
With the goal of bringing to reseachers of the ancient andean khipus with a tool to share and process electronically the current corpus of these ancient information devices, I present on this paper a proposal for a Quipu Description Format (QDF), a XML based file format designed to describe such documents in a systematic and computer standard way.
[ { "version": "v1", "created": "Thu, 19 May 2005 22:42:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Izquierdo", "Manuel Arturo", "" ] ]
new_dataset
0.999638
cs/0505061
Dragos Trinca
Dragos Trinca
EAH: A New Encoder based on Adaptive Variable-length Codes
16 pages
null
null
null
cs.DS
null
Adaptive variable-length codes associate a variable-length codeword to the symbol being encoded depending on the previous symbols in the input string. This class of codes has been recently presented in [Dragos Trinca, arXiv:cs.DS/0505007] as a new class of non-standard variable-length codes. New algorithms for data compression, based on adaptive variable-length codes of order one and Huffman's algorithm, have been recently presented in [Dragos Trinca, ITCC 2004]. In this paper, we extend the work done so far by the following contributions: first, we propose an improved generalization of these algorithms, called EAHn. Second, we compute the entropy bounds for EAHn, using the well-known bounds for Huffman's algorithm. Third, we discuss implementation details and give reports of experimental results obtained on some well-known corpora. Finally, we describe a parallel version of EAHn using the PRAM model of computation.
[ { "version": "v1", "created": "Tue, 24 May 2005 06:53:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Trinca", "Dragos", "" ] ]
new_dataset
0.999413
cs/0505062
Ashutosh Saxena PhD Comp. Science
Ravi S. Veerubhotla, Ashutosh Saxena, V.P. Gulati, A.K. Pujari
Gossip Codes for Fingerprinting: Construction, Erasure Analysis and Pirate Tracing
28 pages
Journal of Universal Computer Science, vol. 11, no. 1 (2005), 122-149
null
null
cs.CR
null
This work presents two new construction techniques for q-ary Gossip codes from tdesigns and Traceability schemes. These Gossip codes achieve the shortest code length specified in terms of code parameters and can withstand erasures in digital fingerprinting applications. This work presents the construction of embedded Gossip codes for extending an existing Gossip code into a bigger code. It discusses the construction of concatenated codes and realisation of erasure model through concatenated codes.
[ { "version": "v1", "created": "Tue, 24 May 2005 13:44:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Veerubhotla", "Ravi S.", "" ], [ "Saxena", "Ashutosh", "" ], [ "Gulati", "V. P.", "" ], [ "Pujari", "A. K.", "" ] ]
new_dataset
0.999234
cs/0505070
Xiao-feng Xie
Xiao-Feng Xie, Wen-Jun Zhang
SWAF: Swarm Algorithm Framework for Numerical Optimization
Genetic and Evolutionary Computation Conference (GECCO), Part I, 2004: 238-250 (LNCS 3102)
null
null
null
cs.NE
null
A swarm algorithm framework (SWAF), realized by agent-based modeling, is presented to solve numerical optimization problems. Each agent is a bare bones cognitive architecture, which learns knowledge by appropriately deploying a set of simple rules in fast and frugal heuristics. Two essential categories of rules, the generate-and-test and the problem-formulation rules, are implemented, and both of the macro rules by simple combination and subsymbolic deploying of multiple rules among them are also studied. Experimental results on benchmark problems are presented, and performance comparison between SWAF and other existing algorithms indicates that it is efficiently.
[ { "version": "v1", "created": "Wed, 25 May 2005 01:39:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Xie", "Xiao-Feng", "" ], [ "Zhang", "Wen-Jun", "" ] ]
new_dataset
0.998525
cs/0505084
Valentin Brimkov
Valentin Brimkov, Angelo Maimone, Giorgio Nordo
An explicit formula for the number of tunnels in digital objects
9 pages, 4 figures
null
null
null
cs.DM cs.CG cs.CV
null
An important concept in digital geometry for computer imagery is that of tunnel. In this paper we obtain a formula for the number of tunnels as a function of the number of the object vertices, pixels, holes, connected components, and 2x2 grid squares. It can be used to test for tunnel-freedom a digital object, in particular a digital curve.
[ { "version": "v1", "created": "Tue, 31 May 2005 00:44:16 GMT" }, { "version": "v2", "created": "Wed, 7 Sep 2005 23:28:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Brimkov", "Valentin", "" ], [ "Maimone", "Angelo", "" ], [ "Nordo", "Giorgio", "" ] ]
new_dataset
0.996903
cs/0506004
Vladimir Vovk
Vladimir Vovk
Non-asymptotic calibration and resolution
20 pages
null
null
null
cs.LG
null
We analyze a new algorithm for probability forecasting of binary observations on the basis of the available data, without making any assumptions about the way the observations are generated. The algorithm is shown to be well calibrated and to have good resolution for long enough sequences of observations and for a suitable choice of its parameter, a kernel on the Cartesian product of the forecast space $[0,1]$ and the data space. Our main results are non-asymptotic: we establish explicit inequalities, shown to be tight, for the performance of the algorithm.
[ { "version": "v1", "created": "Wed, 1 Jun 2005 14:03:20 GMT" }, { "version": "v2", "created": "Wed, 27 Jul 2005 16:15:54 GMT" }, { "version": "v3", "created": "Sun, 21 Aug 2005 19:55:55 GMT" }, { "version": "v4", "created": "Sat, 1 Jul 2006 13:46:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Vovk", "Vladimir", "" ] ]
new_dataset
0.993248
cs/0506008
Felix Klaedtke
Felix Klaedtke
Bounds on the Automata Size for Presburger Arithmetic
null
null
null
null
cs.LO
null
Automata provide a decision procedure for Presburger arithmetic. However, until now only crude lower and upper bounds were known on the sizes of the automata produced by this approach. In this paper, we prove an upper bound on the the number of states of the minimal deterministic automaton for a Presburger arithmetic formula. This bound depends on the length of the formula and the quantifiers occurring in the formula. The upper bound is established by comparing the automata for Presburger arithmetic formulas with the formulas produced by a quantifier elimination method. We also show that our bound is tight, even for nondeterministic automata. Moreover, we provide optimal automata constructions for linear equations and inequations.
[ { "version": "v1", "created": "Thu, 2 Jun 2005 15:11:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Klaedtke", "Felix", "" ] ]
new_dataset
0.994221
cs/0506067
Juan Jose Amor
Juan Jose Amor, Gregorio Robles, Jesus Gonzalez-Barahona
Measuring Woody: The Size of Debian 3.0
null
null
null
null
cs.SE
null
Debian is possibly the largest free software distribution, with well over 4,500 source packages in the latest stable release (Debian 3.0) and more than 8,000 source packages in the release currently in preparation. However, we wish to know what these numbers mean. In this paper, we use David A. Wheeler's SLOCCount system to determine the number of physical source lines of code (SLOC) of Debian 3.0 (aka woody). We show that Debian 3.0 includes more than 105,000,000 physical SLOC (almost twice than Red Hat 9, released about 8 months later), showing that the Debian development model (based on the work of a large group of voluntary developers spread around the world) is at least as capable as other development methods (like the more centralized one, based on the work of employees, used by Red Hat or Microsoft) to manage distributions of this size. It is also shown that if Debian had been developed using traditional proprietary methods, the COCOMO model estimates that its cost would be close to $6.1 billion USD to develop Debian 3.0. In addition, we offer both an analysis of the programming languages used in the distribution (C amounts for about 65%, C++ for about 12%, Shell for about 8% and LISP is around 4%, with many others to follow), and the largest packages (The Linux kernel, Mozilla, XFree86, PM3, etc.)
[ { "version": "v1", "created": "Wed, 15 Jun 2005 21:48:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Amor", "Juan Jose", "" ], [ "Robles", "Gregorio", "" ], [ "Gonzalez-Barahona", "Jesus", "" ] ]
new_dataset
0.99982
cs/0506068
John Watrous
Chris Marriott and John Watrous
Quantum Arthur-Merlin Games
22 pages
Computational Complexity, 14(2): 122 - 152, 2005
null
null
cs.CC quant-ph
null
This paper studies quantum Arthur-Merlin games, which are Arthur-Merlin games in which Arthur and Merlin can perform quantum computations and Merlin can send Arthur quantum information. As in the classical case, messages from Arthur to Merlin are restricted to be strings of uniformly generated random bits. It is proved that for one-message quantum Arthur-Merlin games, which correspond to the complexity class QMA, completeness and soundness errors can be reduced exponentially without increasing the length of Merlin's message. Previous constructions for reducing error required a polynomial increase in the length of Merlin's message. Applications of this fact include a proof that logarithmic length quantum certificates yield no increase in power over BQP and a simple proof that QMA is contained in PP. Other facts that are proved include the equivalence of three (or more) message quantum Arthur-Merlin games with ordinary quantum interactive proof systems and some basic properties concerning two-message quantum Arthur-Merlin games.
[ { "version": "v1", "created": "Wed, 15 Jun 2005 22:13:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Marriott", "Chris", "" ], [ "Watrous", "John", "" ] ]
new_dataset
0.958419
cs/0506099
Yuval Shavitt
Yuval Shavitt and Eran Shir
DIMES: Let the Internet Measure Itself
10 pages, 12 figures
null
null
null
cs.NI
null
Today's Internet maps, which are all collected from a small number of vantage points, are falling short of being accurate. We suggest here a paradigm shift for this task. DIMES is a distributed measurement infrastructure for the Internet that is based on the deployment of thousands of light weight measurement agents around the globe. We describe the rationale behind DIMES deployment, discuss its design trade-offs and algorithmic challenges, and analyze the structure of the Internet as it seen with DIMES.
[ { "version": "v1", "created": "Tue, 28 Jun 2005 20:29:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Shavitt", "Yuval", "" ], [ "Shir", "Eran", "" ] ]
new_dataset
0.992865
cs/0506105
Ren-Chiun Wang
Ren-Chiun Wang, Chou-Chen Yang, Kun-Ru Mo
A protected password change protocol
null
null
null
null
cs.CR
null
Some protected password change protocols were proposed. However, the previous protocols were easily vulnerable to several attacks such as denial of service, password guessing, stolen-verifier and impersonation atacks etc. Recently, Chang et al. proposed a simple authenticated key agreement and protected password change protocol for enhancing the security and efficiency. In this paper, authors shall show that password guessing, denial of service and known-key attacks can work in their password change protocol. At the same time, authors shall propose a new password change protocol to withstand all the threats of security.
[ { "version": "v1", "created": "Thu, 30 Jun 2005 03:20:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Wang", "Ren-Chiun", "" ], [ "Yang", "Chou-Chen", "" ], [ "Mo", "Kun-Ru", "" ] ]
new_dataset
0.996522
cs/0507012
Adilson Xavier V.
Gilson A. Giraldi, Adilson V. Xavier, Antonio L. Apolinario Jr, Paulo S. Rodrigues
Lattice Gas Cellular Automata for Computational Fluid Animation
null
null
null
null
cs.GR
null
The past two decades showed a rapid growing of physically-based modeling of fluids for computer graphics applications. In this area, a common top down approach is to model the fluid dynamics by Navier-Stokes equations and apply a numerical techniques such as Finite Differences or Finite Elements for the simulation. In this paper we focus on fluid modeling through Lattice Gas Cellular Automata (LGCA) for computer graphics applications. LGCA are discrete models based on point particles that move on a lattice, according to suitable and simple rules in order to mimic a fully molecular dynamics. By Chapman-Enskog expansion, a known multiscale technique in this area, it can be demonstrated that the Navier-Stokes model can be reproduced by the LGCA technique. Thus, with LGCA we get a fluid model that does not require solution of complicated equations. Therefore, we combine the advantage of the low computational cost of LGCA and its ability to mimic the realistic fluid dynamics to develop a new animating framework for computer graphics applications. In this work, we discuss the theoretical elements of our proposal and show experimental results.
[ { "version": "v1", "created": "Tue, 5 Jul 2005 19:48:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Giraldi", "Gilson A.", "" ], [ "Xavier", "Adilson V.", "" ], [ "Apolinario", "Antonio L.", "Jr" ], [ "Rodrigues", "Paulo S.", "" ] ]
new_dataset
0.998581
cs/0507028
Robert Milson
Robert Milson, Aaron Krowne
Adapting CBPP platforms for instructional use
Will be presented at the 2005, Emory university symposium on Free Culture and the Digital Library
null
null
null
cs.DL cs.HC
null
Commons based peer-production (CBPP) is the de-centralized, net-based approach to the creation and dissemination of information resources. Underlying every CBPP system is a virtual community brought together by an internet tool (such as a web site) and structured by a specific collaboration protocol. In this talk we will argue that the value of such platforms can be leveraged by adapting them for pedagogical purposes. We report on one such recent adaptation. The Noosphere system is a web-based collaboration environment that underlies the popular Planetmath website, a collaboratively written encyclopedia of mathematics licensed under the GNU Free Documentation License (FDL). Recently, the system was used to host a graduate-level mathematics course at Dalhousie University, in Halifax, Canada. The course consisted of regular lectures and assignment problems. The students in the course collaborated on a set of course notes, encapsulating the lecture content and giving solutions of assigned problems. The successful outcome of this experiment demonstrated that a dedicated Noosphere system is well suited for classroom applications. We argue that this ``proof of concept'' experience also strongly suggests that every successful CBPP platform possesses latent pedagogical value.
[ { "version": "v1", "created": "Sun, 10 Jul 2005 19:05:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Milson", "Robert", "" ], [ "Krowne", "Aaron", "" ] ]
new_dataset
0.981549
cs/0507030
G\"unter Rote
Imre Barany and Guenter Rote
Strictly convex drawings of planar graphs
20 pages, 13 figures. to be published in Documenta Mathematica. The revision includes numerous small additions, corrections, and improvements, in particular: - a discussion of the constants in the O-notation, after the statement of thm.1. - a different set-up and clarification of the case distinction for Lemma 1
DOCUMENTA MATHEMATICA, Vol. 11 (2006), 369-391
null
null
cs.CG cs.DM
null
Every three-connected planar graph with n vertices has a drawing on an O(n^2) x O(n^2) grid in which all faces are strictly convex polygons. These drawings are obtained by perturbing (not strictly) convex drawings on O(n) x O(n) grids. More generally, a strictly convex drawing exists on a grid of size O(W) x O(n^4/W), for any choice of a parameter W in the range n<W<n^2. Tighter bounds are obtained when the faces have fewer sides. In the proof, we derive an explicit lower bound on the number of primitive vectors in a triangle.
[ { "version": "v1", "created": "Mon, 11 Jul 2005 20:06:06 GMT" }, { "version": "v2", "created": "Wed, 21 Jun 2006 10:01:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Barany", "Imre", "" ], [ "Rote", "Guenter", "" ] ]
new_dataset
0.999169
cs/0507049
David Eppstein
David Eppstein, Michael T. Goodrich, Jonathan Z. Sun
The Skip Quadtree: A Simple Dynamic Data Structure for Multidimensional Data
12 pages, 3 figures. A preliminary version of this paper appeared in the 21st ACM Symp. Comp. Geom., Pisa, 2005, pp. 296-305
null
null
null
cs.CG
null
We present a new multi-dimensional data structure, which we call the skip quadtree (for point data in R^2) or the skip octree (for point data in R^d, with constant d>2). Our data structure combines the best features of two well-known data structures, in that it has the well-defined "box"-shaped regions of region quadtrees and the logarithmic-height search and update hierarchical structure of skip lists. Indeed, the bottom level of our structure is exactly a region quadtree (or octree for higher dimensional data). We describe efficient algorithms for inserting and deleting points in a skip quadtree, as well as fast methods for performing point location and approximate range queries.
[ { "version": "v1", "created": "Tue, 19 Jul 2005 20:17:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Eppstein", "David", "" ], [ "Goodrich", "Michael T.", "" ], [ "Sun", "Jonathan Z.", "" ] ]
new_dataset
0.990735
cs/0507054
Andrey Siver S.
A. S. Siver
f2mma: FORTRAN to Mathematica translator
null
null
null
null
cs.OH
null
f2mma program can be used to translate programs written in some subset of the FORTRAN language into {\sl Mathematica} system's programming language. This subset have been enough to translate GAPP (Global Analysis of Particle Properties) programm into {\sl Mathematica} language automatically. Observables table calculated with GAPP({\sl Mathematica}) is presented.
[ { "version": "v1", "created": "Thu, 21 Jul 2005 13:32:15 GMT" }, { "version": "v2", "created": "Tue, 2 Aug 2005 06:48:26 GMT" }, { "version": "v3", "created": "Fri, 5 Aug 2005 09:26:15 GMT" }, { "version": "v4", "created": "Mon, 23 Jan 2006 14:27:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Siver", "A. S.", "" ] ]
new_dataset
0.998234
cs/0507055
Andrey Siver S.
A. S. Siver
ReacProc: A Tool to Process Reactions Describing Particle Interactions
5 pages
null
null
null
cs.CE
null
ReacProc is a program written in C/C++ programming language which can be used (1) to check out of reactions describing particles interactions against conservation laws and (2) to reduce input reaction into some canonical form. A table with particles properties is available within ReacProc package.
[ { "version": "v1", "created": "Thu, 21 Jul 2005 14:17:47 GMT" }, { "version": "v2", "created": "Tue, 2 Aug 2005 07:14:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Siver", "A. S.", "" ] ]
new_dataset
0.999177
cs/0507057
Tereza Tu\v{s}arov\'a
Tereza Tusarova
A new sibling of BQP
extended abstract, submitted to UC'05
null
null
null
cs.CC
null
We present a new quantum complexity class, called MQ^2, which is contained in AWPP. This class has a compact and simple mathematical definition, involving only polynomial-time computable functions and a unitarity condition. It contains both Deutsch-Jozsa's and Shor's algorithm, while its relation to BQP is unknown. This shows that in the complexity class hierarchy, BQP is not an extraordinary isolated island, but has ''siblings'' which as well can solve prime-factorization.
[ { "version": "v1", "created": "Thu, 21 Jul 2005 22:36:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Tusarova", "Tereza", "" ] ]
new_dataset
0.995243
cs/0508005
Riccardo Pucella
Nick Papanikolaou
Logic Column 13: Reasoning Formally about Quantum Systems: An Overview
17 pages
SIGACT News, 36(3), pp. 51-66, 2005
null
null
cs.LO
null
This article is intended as an introduction to the subject of quantum logic, and as a brief survey of the relevant literature. Also discussed here are logics for specification and analysis of quantum information systems, in particular, recent work by P. Mateus and A. Sernadas, and also by R. van der Meyden and M. Patra. Overall, our objective is to provide a high-level presentation of the logical aspects of quantum theory. Mateus' and Sernadas' EQPL logic is illustrated with a small example, namely the state of an entangled pair of qubits. The "KT" logic of van der Meyden and Patra is demonstrated briefly in the context of the B92 protocol for quantum key distribution.
[ { "version": "v1", "created": "Mon, 1 Aug 2005 14:34:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Papanikolaou", "Nick", "" ] ]
new_dataset
0.983781
cs/0508041
Tian-Jian Jiang
Tian-Jian Jiang, Deng-Liu, Kang-min Liu, Weizhong Yang, Pek-tiong Tan, Mengjuei Hsieh, Tsung-hsiang Chang, Wen-Lien Hsu
OpenVanilla - A Non-Intrusive Plug-In Framework of Text Services
4 pages
null
null
null
cs.HC
null
Input method (IM) is a sine qua non for text entry of many Asian languages, but its potential applications on other languages remain under-explored. This paper proposes a philosophy of input method design by seeing it as a nonintrusive plug-in text service framework. Such design allows new functionalities of text processing to be attached onto a running application without any tweaking of code. We also introduce OpenVanilla, a cross-platform framework that is designed with the above-mentioned model in mind. Frameworks like OpenVanilla have shown that an input method can be more than just a text entry tool: it offers a convenient way for developing various text service and language tools.
[ { "version": "v1", "created": "Thu, 4 Aug 2005 22:39:49 GMT" }, { "version": "v2", "created": "Thu, 29 Jun 2006 06:41:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Jiang", "Tian-Jian", "" ], [ "Deng-Liu", "", "" ], [ "Liu", "Kang-min", "" ], [ "Yang", "Weizhong", "" ], [ "Tan", "Pek-tiong", "" ], [ "Hsieh", "Mengjuei", "" ], [ "Chang", "Tsung-hsiang", "" ], [ "Hsu", "Wen-Lien", "" ] ]
new_dataset
0.998634
cs/0508063
Michel Dagenais
Michel R. Dagenais (Dept. of Computer Engineering, Ecole Polytechnique, Montreal, Canada)
Disks, Partitions, Volumes and RAID Performance with the Linux Operating System
null
null
null
null
cs.PF cs.OS
null
Block devices in computer operating systems typically correspond to disks or disk partitions, and are used to store files in a filesystem. Disks are not the only real or virtual device which adhere to the block accessible stream of bytes block device model. Files, remote devices, or even RAM may be used as a virtual disks. This article examines several common combinations of block device layers used as virtual disks in the Linux operating system: disk partitions, loopback files, software RAID, Logical Volume Manager, and Network Block Devices. It measures their relative performance using different filesystems: Ext2, Ext3, ReiserFS, JFS, XFS,NFS.
[ { "version": "v1", "created": "Fri, 12 Aug 2005 16:13:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Dagenais", "Michel R.", "", "Dept. of Computer Engineering, Ecole\n Polytechnique, Montreal, Canada" ] ]
new_dataset
0.995476
cs/0508066
Jonathan Bowen
Silvia Filippini-Fantoni and Jonathan P. Bowen
Can Small Museums Develop Compelling, Educational and Accessible Web Resources? The Case of Accademia Carrara
14 pages, 6 figures
In James Hemsley, Vito Cappellini and Gerd Stanke (eds.), EVA 2005 London Conference Proceedings, University College London, UK, 25-29 July 2005, pages 18.1-18.14. ISBN: 0-9543146-6-2
null
null
cs.MM cs.CY cs.DL cs.IR
null
Due to the lack of budget, competence, personnel and time, small museums are often unable to develop compelling, educational and accessible web resources for their permanent collections or temporary exhibitions. In an attempt to prove that investing in these types of resources can be very fruitful even for small institutions, we will illustrate the case of Accademia Carrara, a museum in Bergamo, northern Italy, which, for a current temporary exhibition on Cezanne and Renoir's masterpieces from the Paul Guillaume collection, developed a series of multimedia applications, including an accessible website, rich in content and educational material [www.cezannerenoir.it].
[ { "version": "v1", "created": "Sat, 13 Aug 2005 14:46:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Filippini-Fantoni", "Silvia", "" ], [ "Bowen", "Jonathan P.", "" ] ]
new_dataset
0.964657
cs/0508080
Kirti Chawla
Kirti Chawla
A 3D RGB Axis-based Color-oriented Cryptography
16 Pages, 12 figures
null
null
null
cs.CR
null
In this document, a formal approach to encrypt, decrypt, transmit and receive information using colors is explored. A piece of information consists of set of symbols with a definite property imposed on the generating set. The symbols are usually encoded using ascii scheme. A linear to 3d transformation is presented. The change of axis from traditional xyz to rgb is highlighted and its effect are studied. A point in this new axis is then represented as a unique color and a vector or matrix is associated with it, making it amenable to standard vector or matrix operations. A formal notion on hybrid cryptography is introduced as the algorithm lies on the boundary of symmetric and asymmetric cryptography. No discussion is complete, without mentioning reference to communication aspects of secure information in a channel. Transmission scheme pertaining to light as carrier is introduced and studied. Key-exchanges do not come under the scope of current frame of document.
[ { "version": "v1", "created": "Thu, 18 Aug 2005 07:07:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Chawla", "Kirti", "" ] ]
new_dataset
0.999003
cs/0508086
Dragos Trinca
Dragos Trinca
High-performance BWT-based Encoders
12 pages
null
null
null
cs.DS
null
In 1994, Burrows and Wheeler developed a data compression algorithm which performs significantly better than Lempel-Ziv based algorithms. Since then, a lot of work has been done in order to improve their algorithm, which is based on a reversible transformation of the input string, called BWT (the Burrows-Wheeler transformation). In this paper, we propose a compression scheme based on BWT, MTF (move-to-front coding), and a version of the algorithms presented in [Dragos Trinca, ITCC-2004].
[ { "version": "v1", "created": "Sun, 21 Aug 2005 05:47:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Trinca", "Dragos", "" ] ]
new_dataset
0.995413
cs/0508116
Robert Burger PhD
John Robert Burger
Quantum Algorithm Processors to Reveal Hamiltonian Cycles
10 pages
null
null
null
cs.AR cs.CG
null
Quantum computer versus quantum algorithm processor in CMOS are compared to find (in parallel) all Hamiltonian cycles in a graph with m edges and n vertices, each represented by k bits. A quantum computer uses quantum states analogous to CMOS registers. With efficient initialization, number of CMOS registers is proportional to (n-1)! Number of qubits in a quantum computer is approximately proportional to kn+2mn in the approach below. Using CMOS, the bits per register is about proportional to kn, which is less since bits can be irreversibly reset. In either concept, number of gates, or operations to identify Hamiltonian cycles is proportional to kmn. However, a quantum computer needs an additional exponentially large number of operations to accomplish a probabilistic readout. In contrast, CMOS is deterministic and readout is comparable to ordinary memory.
[ { "version": "v1", "created": "Thu, 25 Aug 2005 19:04:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Burger", "John Robert", "" ] ]
new_dataset
0.999224
cs/0508129
Esra Erdem
Esra Erdem, Vladimir Lifschitz, and Don Ringe
Temporal Phylogenetic Networks and Logic Programming
null
null
null
null
cs.LO cs.AI cs.PL
null
The concept of a temporal phylogenetic network is a mathematical model of evolution of a family of natural languages. It takes into account the fact that languages can trade their characteristics with each other when linguistic communities are in contact, and also that a contact is only possible when the languages are spoken at the same time. We show how computational methods of answer set programming and constraint logic programming can be used to generate plausible conjectures about contacts between prehistoric linguistic communities, and illustrate our approach by applying it to the evolutionary history of Indo-European languages. To appear in Theory and Practice of Logic Programming (TPLP).
[ { "version": "v1", "created": "Tue, 30 Aug 2005 13:04:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Erdem", "Esra", "" ], [ "Lifschitz", "Vladimir", "" ], [ "Ringe", "Don", "" ] ]
new_dataset
0.996355
cs/0508130
Mehul Shah
Mary Baker, Mehul Shah, David S. H. Rosenthal, Mema Roussopoulos, Petros Maniatis, TJ Giuli, Prashanth Bungale
A Fresh Look at the Reliability of Long-term Digital Storage
null
null
null
null
cs.DL cs.DB cs.OS
null
Many emerging Web services, such as email, photo sharing, and web site archives, need to preserve large amounts of quickly-accessible data indefinitely into the future. In this paper, we make the case that these applications' demands on large scale storage systems over long time horizons require us to re-evaluate traditional storage system designs. We examine threats to long-lived data from an end-to-end perspective, taking into account not just hardware and software faults but also faults due to humans and organizations. We present a simple model of long-term storage failures that helps us reason about the various strategies for addressing these threats in a cost-effective manner. Using this model we show that the most important strategies for increasing the reliability of long-term storage are detecting latent faults quickly, automating fault repair to make it faster and cheaper, and increasing the independence of data replicas.
[ { "version": "v1", "created": "Wed, 31 Aug 2005 01:44:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Baker", "Mary", "" ], [ "Shah", "Mehul", "" ], [ "Rosenthal", "David S. H.", "" ], [ "Roussopoulos", "Mema", "" ], [ "Maniatis", "Petros", "" ], [ "Giuli", "TJ", "" ], [ "Bungale", "Prashanth", "" ] ]
new_dataset
0.989358
cs/0509025
Jeremy Avigad
Jeremy Avigad, Kevin Donnelly, David Gray, and Paul Raff
A formally verified proof of the prime number theorem
23 pages
null
null
null
cs.AI cs.LO cs.SC
null
The prime number theorem, established by Hadamard and de la Vall'ee Poussin independently in 1896, asserts that the density of primes in the positive integers is asymptotic to 1 / ln x. Whereas their proofs made serious use of the methods of complex analysis, elementary proofs were provided by Selberg and Erd"os in 1948. We describe a formally verified version of Selberg's proof, obtained using the Isabelle proof assistant.
[ { "version": "v1", "created": "Fri, 9 Sep 2005 15:47:35 GMT" }, { "version": "v2", "created": "Thu, 19 Jan 2006 21:18:33 GMT" }, { "version": "v3", "created": "Thu, 6 Apr 2006 20:27:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Avigad", "Jeremy", "" ], [ "Donnelly", "Kevin", "" ], [ "Gray", "David", "" ], [ "Raff", "Paul", "" ] ]
new_dataset
0.969977
cs/0509054
Joseph O'Rourke
Mirela Damian, Robin Flatland, Joseph O'Rourke
Grid Vertex-Unfolding Orthogonal Polyhedra
Original: 12 pages, 8 figures, 11 references. Revised: 22 pages, 16 figures, 12 references. New version is a substantial revision superceding the preliminary extended abstract that appeared in Lecture Notes in Computer Science, Volume 3884, Springer, Berlin/Heidelberg, Feb. 2006, pp. 264-276
null
null
null
cs.CG cs.DM
null
An edge-unfolding of a polyhedron is produced by cutting along edges and flattening the faces to a *net*, a connected planar piece with no overlaps. A *grid unfolding* allows additional cuts along grid edges induced by coordinate planes passing through every vertex. A vertex-unfolding permits faces in the net to be connected at single vertices, not necessarily along edges. We show that any orthogonal polyhedron of genus zero has a grid vertex-unfolding. (There are orthogonal polyhedra that cannot be vertex-unfolded, so some type of "gridding" of the faces is necessary.) For any orthogonal polyhedron P with n vertices, we describe an algorithm that vertex-unfolds P in O(n^2) time. Enroute to explaining this algorithm, we present a simpler vertex-unfolding algorithm that requires a 3 x 1 refinement of the vertex grid.
[ { "version": "v1", "created": "Mon, 19 Sep 2005 00:22:03 GMT" }, { "version": "v2", "created": "Wed, 27 Sep 2006 18:21:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Damian", "Mirela", "" ], [ "Flatland", "Robin", "" ], [ "O'Rourke", "Joseph", "" ] ]
new_dataset
0.999672
cs/0509071
Krzysztof R. Apt
Krzysztof R. Apt, Francesca Rossi and K. Brent Venable
CP-nets and Nash equilibria
6 pages. in: roc. of the Third International Conference on Computational Intelligence, Robotics and Autonomous Systems (CIRAS '05). To appear
null
null
null
cs.GT cs.AI
null
We relate here two formalisms that are used for different purposes in reasoning about multi-agent systems. One of them are strategic games that are used to capture the idea that agents interact with each other while pursuing their own interest. The other are CP-nets that were introduced to express qualitative and conditional preferences of the users and which aim at facilitating the process of preference elicitation. To relate these two formalisms we introduce a natural, qualitative, extension of the notion of a strategic game. We show then that the optimal outcomes of a CP-net are exactly the Nash equilibria of an appropriately defined strategic game in the above sense. This allows us to use the techniques of game theory to search for optimal outcomes of CP-nets and vice-versa, to use techniques developed for CP-nets to search for Nash equilibria of the considered games.
[ { "version": "v1", "created": "Thu, 22 Sep 2005 16:07:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Apt", "Krzysztof R.", "" ], [ "Rossi", "Francesca", "" ], [ "Venable", "K. Brent", "" ] ]
new_dataset
0.994615
cs/0509072
Kaikai Shen
Kaikai Shen, Lide Wu
Folksonomy as a Complex Network
null
null
null
null
cs.IR cs.DL physics.soc-ph
null
Folksonomy is an emerging technology that works to classify the information over WWW through tagging the bookmarks, photos or other web-based contents. It is understood to be organized by every user while not limited to the authors of the contents and the professional editors. This study surveyed the folksonomy as a complex network. The result indicates that the network, which is composed of the tags from the folksonomy, displays both properties of small world and scale-free. However, the statistics only shows a local and static slice of the vast body of folksonomy which is still evolving.
[ { "version": "v1", "created": "Fri, 23 Sep 2005 13:27:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Shen", "Kaikai", "" ], [ "Wu", "Lide", "" ] ]
new_dataset
0.966154
cs/0509082
Yossi Zana
Yossi Zana, Roberto M. Cesar-JR
Face Recognition Based on Polar Frequency Features
ACM Transactions on Applied Perception
null
null
null
cs.CV
null
A novel biologically motivated face recognition algorithm based on polar frequency is presented. Polar frequency descriptors are extracted from face images by Fourier-Bessel transform (FBT). Next, the Euclidean distance between all images is computed and each image is now represented by its dissimilarity to the other images. A Pseudo-Fisher Linear Discriminant was built on this dissimilarity space. The performance of Discrete Fourier transform (DFT) descriptors, and a combination of both feature types was also evaluated. The algorithms were tested on a 40- and 1196-subjects face database (ORL and FERET, respectively). With 5 images per subject in the training and test datasets, error rate on the ORL database was 3.8, 1.25 and 0.2% for the FBT, DFT, and the combined classifier, respectively, as compared to 2.6% achieved by the best previous algorithm. The most informative polar frequency features were concentrated at low-to-medium angular frequencies coupled to low radial frequencies. On the FERET database, where an affine normalization pre-processing was applied, the FBT algorithm outperformed only the PCA in a rank recognition test. However, it achieved performance comparable to state-of-the-art methods when evaluated by verification tests. These results indicate the high informative value of the polar frequency content of face images in relation to recognition and verification tasks, and that the Cartesian frequency content can complement information about the subjects' identity, but possibly only when the images are not pre-normalized. Possible implications for human face recognition are discussed.
[ { "version": "v1", "created": "Tue, 27 Sep 2005 15:50:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Zana", "Yossi", "" ], [ "Cesar-JR", "Roberto M.", "" ] ]
new_dataset
0.978271
cs/0509100
Shripad Thite
Jeff Erickson (1), Shripad Thite (1), David P. Bunde (1) ((1) Department of Computer Science, University of Illinois at Urbana-Champaign, Urbana, IL, USA)
Distance-2 Edge Coloring is NP-Complete
3 pages, 1 figure in color
null
null
null
cs.DM cs.CC
null
We prove that it is NP-complete to determine whether there exists a distance-2 edge coloring (strong edge coloring) with 5 colors of a bipartite 2-inductive graph with girth 6 and maximum degree 3.
[ { "version": "v1", "created": "Fri, 30 Sep 2005 13:15:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Erickson", "Jeff", "" ], [ "Thite", "Shripad", "" ], [ "Bunde", "David P.", "" ] ]
new_dataset
0.998455
cs/0510001
Jo\~ao Vitor Baldini Soares
Jo\~ao V. B. Soares, Jorge J. G. Leandro, Roberto M. Cesar Jr., Herbert F. Jelinek, Michael J. Cree
Retinal Vessel Segmentation Using the 2-D Morlet Wavelet and Supervised Classification
9 pages, 7 figures and 1 table. Accepted for publication in IEEE Trans Med Imag; added copyright notice
IEEE Trans Med Imag, Vol. 25, no. 9, pp. 1214- 1222, Sep. 2006.
10.1109/TMI.2006.879967
null
cs.CV
null
We present a method for automated segmentation of the vasculature in retinal images. The method produces segmentations by classifying each image pixel as vessel or non-vessel, based on the pixel's feature vector. Feature vectors are composed of the pixel's intensity and continuous two-dimensional Morlet wavelet transform responses taken at multiple scales. The Morlet wavelet is capable of tuning to specific frequencies, thus allowing noise filtering and vessel enhancement in a single step. We use a Bayesian classifier with class-conditional probability density functions (likelihoods) described as Gaussian mixtures, yielding a fast classification, while being able to model complex decision surfaces and compare its performance with the linear minimum squared error classifier. The probability distributions are estimated based on a training set of labeled pixels obtained from manual segmentations. The method's performance is evaluated on publicly available DRIVE and STARE databases of manually labeled non-mydriatic images. On the DRIVE database, it achieves an area under the receiver operating characteristic (ROC) curve of 0.9598, being slightly superior than that presented by the method of Staal et al.
[ { "version": "v1", "created": "Fri, 30 Sep 2005 22:27:45 GMT" }, { "version": "v2", "created": "Thu, 11 May 2006 17:09:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Soares", "João V. B.", "" ], [ "Leandro", "Jorge J. G.", "" ], [ "Cesar", "Roberto M.", "Jr." ], [ "Jelinek", "Herbert F.", "" ], [ "Cree", "Michael J.", "" ] ]
new_dataset
0.984823
cs/0510011
David Delahaye
David Delahaye (CEDRIC), Micaela Mayero (LIPN)
Diophantus' 20th Problem and Fermat's Last Theorem for n=4: Formalization of Fermat's Proofs in the Coq Proof Assistant
16 pages
null
null
null
cs.LO cs.SE math.NT
null
We present the proof of Diophantus' 20th problem (book VI of Diophantus' Arithmetica), which consists in wondering if there exist right triangles whose sides may be measured as integers and whose surface may be a square. This problem was negatively solved by Fermat in the 17th century, who used the "wonderful" method (ipse dixit Fermat) of infinite descent. This method, which is, historically, the first use of induction, consists in producing smaller and smaller non-negative integer solutions assuming that one exists; this naturally leads to a reductio ad absurdum reasoning because we are bounded by zero. We describe the formalization of this proof which has been carried out in the Coq proof assistant. Moreover, as a direct and no less historical application, we also provide the proof (by Fermat) of Fermat's last theorem for n=4, as well as the corresponding formalization made in Coq.
[ { "version": "v1", "created": "Tue, 4 Oct 2005 08:53:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Delahaye", "David", "", "CEDRIC" ], [ "Mayero", "Micaela", "", "LIPN" ] ]
new_dataset
0.997514
cs/0510027
Alexandre d'Aspremont
Alexandre d'Aspremont
A Market Test for the Positivity of Arrow-Debreu Prices
New version, fixes a few minor errors and typos
null
null
null
cs.CE
null
We derive tractable necessary and sufficient conditions for the absence of buy-and-hold arbitrage opportunities in a perfectly liquid, one period market. We formulate the positivity of Arrow-Debreu prices as a generalized moment problem to show that this no arbitrage condition is equivalent to the positive semidefiniteness of matrices formed by the market price of tradeable securities and their products. We apply this result to a market with multiple assets and basket call options.
[ { "version": "v1", "created": "Tue, 11 Oct 2005 13:40:17 GMT" }, { "version": "v2", "created": "Thu, 15 Jun 2006 17:05:08 GMT" } ]
2007-05-23T00:00:00
[ [ "d'Aspremont", "Alexandre", "" ] ]
new_dataset
0.997887
cs/0510039
Sandor P. Fekete
Christophe Bobda, Ali Ahmadinia, Mateusz Majer, Juergen Teich, Sandor P. Fekete, Jan van der Veen
DyNoC: A Dynamic Infrastructure for Communication in Dynamically Reconfigurable Devices
9 pages, 7 figures, 1 table, Latex, to appear in 15th International Conference on Field-Programmable Logic and Application
null
null
null
cs.AR
null
A new paradigm to support the communication among modules dynamically placed on a reconfigurable device at run-time is presented. Based on the network on chip (NoC) infrastructure, we developed a dynamic communication infrastructure as well as routing methodologies capable to handle routing in a NoC with obstacles created by dynamically placed components. We prove the unrestricted reachability of components and pins, the deadlock-freeness and we finally show the feasibility of our approach by means on real life example applications.
[ { "version": "v1", "created": "Fri, 14 Oct 2005 22:03:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Bobda", "Christophe", "" ], [ "Ahmadinia", "Ali", "" ], [ "Majer", "Mateusz", "" ], [ "Teich", "Juergen", "" ], [ "Fekete", "Sandor P.", "" ], [ "van der Veen", "Jan", "" ] ]
new_dataset
0.99963
cs/0510048
Sandor P. Fekete
Alexander Kroeller and Sandor P. Fekete and Dennis Pfisterer and Stefan Fischer
Deterministic boundary recognition and topology extraction for large sensor networks
10 pages, 9 figures, Latex, to appear in Symposium on Discrete Algorithms (SODA 2006)
null
null
null
cs.DC cs.CG
null
We present a new framework for the crucial challenge of self-organization of a large sensor network. The basic scenario can be described as follows: Given a large swarm of immobile sensor nodes that have been scattered in a polygonal region, such as a street network. Nodes have no knowledge of size or shape of the environment or the position of other nodes. Moreover, they have no way of measuring coordinates, geometric distances to other nodes, or their direction. Their only way of interacting with other nodes is to send or to receive messages from any node that is within communication range. The objective is to develop algorithms and protocols that allow self-organization of the swarm into large-scale structures that reflect the structure of the street network, setting the stage for global routing, tracking and guiding algorithms.
[ { "version": "v1", "created": "Mon, 17 Oct 2005 12:23:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Kroeller", "Alexander", "" ], [ "Fekete", "Sandor P.", "" ], [ "Pfisterer", "Dennis", "" ], [ "Fischer", "Stefan", "" ] ]
new_dataset
0.996741
cs/0510053
Martin Kutz
Martin Kutz
A pair of trees without a simultaneous geometric embedding in the plane
This paper has been withdrawn by the author because it had turned out that the result was already known before
null
null
null
cs.CG
null
Any planar graph has a crossing-free straight-line drawing in the plane. A simultaneous geometric embedding of two n-vertex graphs is a straight-line drawing of both graphs on a common set of n points, such that the edges withing each individual graph do not cross. We consider simultaneous embeddings of two labeled trees, with predescribed vertex correspondences, and present an instance of such a pair that cannot be embedded. Further we provide an example of a planar graph that cannot be embedded together with a path when vertex correspondences are given.
[ { "version": "v1", "created": "Tue, 18 Oct 2005 18:26:00 GMT" }, { "version": "v2", "created": "Tue, 1 Nov 2005 13:14:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Kutz", "Martin", "" ] ]
new_dataset
0.995257
cs/0510059
Arnaud De La Fortelle
Michel Parent (INRIA Rocquencourt), Arnaud De La Fortelle (INRIA Rocquencourt)
Cybercars : Past, Present and Future of the Technology
null
Dans ITS World Congress 2005
null
null
cs.RO
null
Automobile has become the dominant transport mode in the world in the last century. In order to meet a continuously growing demand for transport, one solution is to change the control approach for vehicle to full driving automation, which removes the driver from the control loop to improve efficiency and reduce accidents. Recent work shows that there are several realistic paths towards this deployment : driving assistance on passenger cars, automated commercial vehicles on dedicated infrastructures, and new forms of urban transport (car-sharing and cybercars). Cybercars have already been put into operation in Europe, and it seems that this approach could lead the way towards full automation on most urban, and later interurban infrastructures. The European project CyberCars has brought many improvements in the technology needed to operate cybercars over the last three years. A new, larger European project is now being prepared to carry this work further in order to meet more ambitious objectives in terms of safety and efficiency. This paper will present past and present technologies and will focus on the future developments.
[ { "version": "v1", "created": "Thu, 20 Oct 2005 15:03:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Parent", "Michel", "", "INRIA Rocquencourt" ], [ "De La Fortelle", "Arnaud", "", "INRIA\n Rocquencourt" ] ]
new_dataset
0.999781
cs/0510087
Johannes Gro{\ss}e
J. Grosse
MathPSfrag: Creating Publication-Quality Labels in Mathematica Plots
7 pages, 8 figures, for associated Mathematica package, see http://wwwth.mppmu.mpg.de/members/jgrosse/mathpsfrag/MathPSfrag-1.0.tar.gz
null
null
LMU-ASC 70/05; MPP-2005-126
cs.GR
null
This article introduces a Mathematica package providing a graphics export function that automatically replaces Mathematica expressions in a graphic by the corresponding LaTeX constructs and positions them correctly. It thus facilitates the creation of publication-quality Enscapulated PostScript (EPS) graphics.
[ { "version": "v1", "created": "Mon, 31 Oct 2005 09:40:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Grosse", "J.", "" ] ]
new_dataset
0.992897
cs/0511017
Gus Gutoski
Gus Gutoski
Short Quantum Games
MSc thesis, 79 pages single-spaced
null
null
null
cs.CC quant-ph
null
In this thesis we introduce quantum refereed games, which are quantum interactive proof systems with two competing provers. We focus on a restriction of this model that we call "short quantum games" and we prove an upper bound and a lower bound on the expressive power of these games. For the lower bound, we prove that every language having an ordinary quantum interactive proof system also has a short quantum game. An important part of this proof is the establishment of a quantum measurement that reliably distinguishes between quantum states chosen from disjoint convex sets. For the upper bound, we show that certain types of quantum refereed games, including short quantum games, are decidable in deterministic exponential time by supplying a separation oracle for use with the ellipsoid method for convex feasibility.
[ { "version": "v1", "created": "Thu, 3 Nov 2005 23:00:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Gutoski", "Gus", "" ] ]
new_dataset
0.998905
cs/0511022
Emanuel Diamant
Emanuel Diamant
Does a Plane Imitate a Bird? Does Computer Vision Have to Follow Biological Paradigms?
Proceedings of the 1st International Symposium on Brain, Vision, and Artificial Intelligence, 19-21 October 2005, Naples, Italy
LNCS, vol. 3704, pp. 108-115, 2005, Springer Verlag Berlin Heidelberg 2005
null
null
cs.NE
null
We posit a new paradigm for image information processing. For the last 25 years, this task was usually approached in the frame of Treisman's two-stage paradigm [1]. The latter supposes an unsupervised, bottom-up directed process of preliminary information pieces gathering at the lower processing stages and a supervised, top-down directed process of information pieces binding and grouping at the higher stages. It is acknowledged that these sub-processes interact and intervene between them in a tricky and a complicated manner. Notwithstanding the prevalence of this paradigm in biological and computer vision, we nevertheless propose to replace it with a new one, which we would like to designate as a two-part paradigm. In it, information contained in an image is initially extracted in an independent top-down manner by one part of the system, and then it is examined and interpreted by another, separate system part. We argue that the new paradigm seems to be more plausible than its forerunner. We provide evidence from human attention vision studies and insights of Kolmogorov's complexity theory to support our arguments. We also provide some reasons in favor of separate image interpretation issues.
[ { "version": "v1", "created": "Fri, 4 Nov 2005 15:08:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Diamant", "Emanuel", "" ] ]
new_dataset
0.995775
cs/0511025
Riccardo Pucella
James Cheney
Logic Column 14: Nominal Logic and Abstract Syntax
24 pages
SIGACT News 36 (4), pp. 47-69, 2005
null
null
cs.LO
null
Formalizing syntactic proofs of properties of logics, programming languages, security protocols, and other formal systems is a significant challenge, in large part because of the obligation to handle name-binding correctly. We present an approach called nominal abstract syntax that has attracted considerable interest since its introduction approximately six years ago. After an overview of other approaches, we describe nominal abstract syntax and nominal logic, a logic for reasoning about nominal abstract syntax. We also discuss applications of nominal techniques to programming, automated reasoning, and identify some future directions.
[ { "version": "v1", "created": "Sat, 5 Nov 2005 02:47:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Cheney", "James", "" ] ]
new_dataset
0.99924
cs/0511043
Damiano Bolzoni
Damiano Bolzoni, Emmanuele Zambon, Sandro Etalle, Pieter Hartel
Poseidon: a 2-tier Anomaly-based Intrusion Detection System
null
null
null
TR-CTIT-05-53
cs.CR
null
We present Poseidon, a new anomaly based intrusion detection system. Poseidon is payload-based, and presents a two-tier architecture: the first stage consists of a Self-Organizing Map, while the second one is a modified PAYL system. Our benchmarks on the 1999 DARPA data set show a higher detection rate and lower number of false positives than PAYL and PHAD.
[ { "version": "v1", "created": "Fri, 11 Nov 2005 13:43:04 GMT" }, { "version": "v2", "created": "Wed, 7 Dec 2005 15:11:44 GMT" }, { "version": "v3", "created": "Mon, 30 Jan 2006 14:27:46 GMT" }, { "version": "v4", "created": "Fri, 3 Feb 2006 12:26:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Bolzoni", "Damiano", "" ], [ "Zambon", "Emmanuele", "" ], [ "Etalle", "Sandro", "" ], [ "Hartel", "Pieter", "" ] ]
new_dataset
0.999636
cs/0511071
Francesco Capasso
Francesco Capasso
A polynomial-time heuristic for Circuit-SAT
20 pages, 8 figures
null
null
null
cs.CC cs.DS
null
In this paper is presented an heuristic that, in polynomial time and space in the input dimension, determines if a circuit describes a tautology or a contradiction. If the circuit is neither a tautology nor a contradiction, then the heuristic finds an assignment to the circuit inputs such that the circuit is satisfied.
[ { "version": "v1", "created": "Fri, 18 Nov 2005 20:23:46 GMT" }, { "version": "v2", "created": "Tue, 22 Nov 2005 21:56:11 GMT" }, { "version": "v3", "created": "Wed, 23 Nov 2005 22:19:18 GMT" }, { "version": "v4", "created": "Mon, 28 Nov 2005 19:52:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Capasso", "Francesco", "" ] ]
new_dataset
0.999842
cs/0512001
Frank Ruskey
Jeremy Carroll (1), Frank Ruskey (2), Mark Weston (2) ((1) HP Laboratories, Bristol, UK, (2) University of Victoria, Canada)
Which n-Venn diagrams can be drawn with convex k-gons?
10 pages, 3 figures. To be published in Proceedings of the Second International Workshop on Euler Diagrams (Euler 2005), Electronic Notes in Theoretical Computer Science
null
null
null
cs.CG
null
We establish a new lower bound for the number of sides required for the component curves of simple Venn diagrams made from polygons. Specifically, for any n-Venn diagram of convex k-gons, we prove that k >= (2^n - 2 - n) / (n (n-2)). In the process we prove that Venn diagrams of seven curves, simple or not, cannot be formed from triangles. We then give an example achieving the new lower bound of a (simple, symmetric) Venn diagram of seven quadrilaterals. Previously Grunbaum had constructed a 7-Venn diagram of non-convex 5-gons [``Venn Diagrams II'', Geombinatorics 2:25-31, 1992].
[ { "version": "v1", "created": "Wed, 30 Nov 2005 23:30:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Carroll", "Jeremy", "" ], [ "Ruskey", "Frank", "" ], [ "Weston", "Mark", "" ] ]
new_dataset
0.960081
cs/0512005
Vitorino Ramos Dr.
Vitorino Ramos, Carlos Fernandes and Agostinho C. Rosa
On Ants, Bacteria and Dynamic Environments
8 pages, 6 figures, full paper with pictures in http://alfa.ist.utl.pt/~cvrm/staff/vramos/ref_63.html, keywords: Swarm Intelligence and Perception, Social Cognitive Maps, Social Foraging, Self-Organization, Distributed Search and Optimization in Dynamic Environments. In NCA-05, Natural Computing and Applications Workshop, IEEE Computer Press, Timisoara, Romania, Sep. 25-29, 2005
null
null
null
cs.DC
null
Wasps, bees, ants and termites all make effective use of their environment and resources by displaying collective swarm intelligence. Termite colonies - for instance - build nests with a complexity far beyond the comprehension of the individual termite, while ant colonies dynamically allocate labor to various vital tasks such as foraging or defense without any central decision-making ability. Recent research suggests that microbial life can be even richer: highly social, intricately networked, and teeming with interactions, as found in bacteria. What strikes from these observations is that both ant colonies and bacteria have similar natural mechanisms based on Stigmergy and Self-Organization in order to emerge coherent and sophisticated patterns of global behaviour. Keeping in mind the above characteristics we will present a simple model to tackle the collective adaptation of a social swarm based on real ant colony behaviors (SSA algorithm) for tracking extrema in dynamic environments and highly multimodal complex functions described in the well-know De Jong test suite. Then, for the purpose of comparison, a recent model of artificial bacterial foraging (BFOA algorithm) based on similar stigmergic features is described and analyzed. Final results indicate that the SSA collective intelligence is able to cope and quickly adapt to unforeseen situations even when over the same cooperative foraging period, the community is requested to deal with two different and contradictory purposes, while outperforming BFOA in adaptive speed.
[ { "version": "v1", "created": "Thu, 1 Dec 2005 04:52:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Ramos", "Vitorino", "" ], [ "Fernandes", "Carlos", "" ], [ "Rosa", "Agostinho C.", "" ] ]
new_dataset
0.999706
cs/0512007
Arindam Mitra
Arindam Mitra
Entangled messages
PDF, 2 Pages
null
null
null
cs.CR cs.IR
null
It is sometimes necessary to send copies of the same email to different parties, but it is impossible to ensure that if one party reads the message the other parties will bound to read it. We propose an entanglement based scheme where if one party reads the message the other party will bound to read it simultaneously.
[ { "version": "v1", "created": "Thu, 1 Dec 2005 15:40:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Mitra", "Arindam", "" ] ]
new_dataset
0.958579
cs/0512031
Slawomir Lasota
Slawomir Lasota and Igor Walukiewicz
Alternating Timed Automata
the full version of the Fossacs'05 conference preliminary paper revised according ot the referee's comments
null
null
null
cs.LO
null
A notion of alternating timed automata is proposed. It is shown that such automata with only one clock have decidable emptiness problem over finite words. This gives a new class of timed languages which is closed under boolean operations and which has an effective presentation. We prove that the complexity of the emptiness problem for alternating timed automata with one clock is non-primitive recursive. The proof gives also the same lower bound for the universality problem for nondeterministic timed automata with one clock. We investigate extension of the model with epsilon-transitions and prove that emptiness is undecidable. Over infinite words, we show undecidability of the universality problem.
[ { "version": "v1", "created": "Thu, 8 Dec 2005 08:50:35 GMT" }, { "version": "v2", "created": "Thu, 24 Aug 2006 14:56:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Lasota", "Slawomir", "" ], [ "Walukiewicz", "Igor", "" ] ]
new_dataset
0.963289
cs/0512042
Xiaoyang Gu
Xiaoyang Gu, Jack H. Lutz, Elvira Mayordomo
Points on Computable Curves
10 pages, 12 pages appendix
null
null
null
cs.CC cs.CG
null
The ``analyst's traveling salesman theorem'' of geometric measure theory characterizes those subsets of Euclidean space that are contained in curves of finite length. This result, proven for the plane by Jones (1990) and extended to higher-dimensional Euclidean spaces by Okikiolu (1991), says that a bounded set $K$ is contained in some curve of finite length if and only if a certain ``square beta sum'', involving the ``width of $K$'' in each element of an infinite system of overlapping ``tiles'' of descending size, is finite. In this paper we characterize those {\it points} of Euclidean space that lie on {\it computable} curves of finite length by formulating and proving a computable extension of the analyst's traveling salesman theorem. Our extension says that a point in Euclidean space lies on some computable curve of finite length if and only if it is ``permitted'' by some computable ``Jones constriction''. A Jones constriction here is an explicit assignment of a rational cylinder to each of the above-mentioned tiles in such a way that, when the radius of the cylinder corresponding to a tile is used in place of the ``width of $K$'' in each tile, the square beta sum is finite. A point is permitted by a Jones constriction if it is contained in the cylinder assigned to each tile containing the point. The main part of our proof is the construction of a computable curve of finite length traversing all the points permitted by a given Jones constriction. Our construction uses the main ideas of Jones's ``farthest insertion'' construction, but our algorithm for computing the curve must work exclusively with the Jones constriction itself, because it has no direct access to the (typically uncomputable) points permitted by the Jones constriction.
[ { "version": "v1", "created": "Sat, 10 Dec 2005 03:08:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Gu", "Xiaoyang", "" ], [ "Lutz", "Jack H.", "" ], [ "Mayordomo", "Elvira", "" ] ]
new_dataset
0.999597
cs/0512062
Matteo Gagliolo
Juergen Schmidhuber, Matteo Gagliolo, Daan Wierstra, Faustino Gomez
Evolino for recurrent support vector machines
10 pages, 2 figures
null
null
IDSIA-19-05 version 2.0
cs.NE
null
Traditional Support Vector Machines (SVMs) need pre-wired finite time windows to predict and classify time series. They do not have an internal state necessary to deal with sequences involving arbitrary long-term dependencies. Here we introduce a new class of recurrent, truly sequential SVM-like devices with internal adaptive states, trained by a novel method called EVOlution of systems with KErnel-based outputs (Evoke), an instance of the recent Evolino class of methods. Evoke evolves recurrent neural networks to detect and represent temporal dependencies while using quadratic programming/support vector regression to produce precise outputs. Evoke is the first SVM-based mechanism learning to classify a context-sensitive language. It also outperforms recent state-of-the-art gradient-based recurrent neural networks (RNNs) on various time series prediction tasks.
[ { "version": "v1", "created": "Thu, 15 Dec 2005 15:05:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Schmidhuber", "Juergen", "" ], [ "Gagliolo", "Matteo", "" ], [ "Wierstra", "Daan", "" ], [ "Gomez", "Faustino", "" ] ]
new_dataset
0.989678
cs/0512064
Martin Kutz
Martin Kutz
Computing shortest non-trivial cycles on orientable surfaces of bounded genus in almost linear time
13 pages, 7 figures
null
null
null
cs.CG
null
We present an algorithm that computes a shortest non-contractible and a shortest non-separating cycle on an orientable combinatorial surface of bounded genus in O(n \log n) time, where n denotes the complexity of the surface. This solves a central open problem in computational topology, improving upon the current-best O(n^{3/2})-time algorithm by Cabello and Mohar (ESA 2005). Our algorithm uses universal-cover constructions to find short cycles and makes extensive use of existing tools from the field.
[ { "version": "v1", "created": "Thu, 15 Dec 2005 17:02:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Kutz", "Martin", "" ] ]
new_dataset
0.997079
cs/0512080
Grigorii Pivovarov
G. B. Pivovarov and S. E. Trunov
EqRank: Theme Evolution in Citation Graphs
8 pages, 7 figs, 2 tables
null
null
null
cs.DS cs.DL
null
Time evolution of the classification scheme generated by the EqRank algorithm is studied with hep-th citation graph as an example. Intuitive expectations about evolution of an adequate classification scheme for a growing set of objects are formulated. Evolution compliant with these expectations is called natural. It is demonstrated that EqRank yields a naturally evolving classification scheme. We conclude that EqRank can be used as a means to detect new scientific themes, and to track their development.
[ { "version": "v1", "created": "Tue, 20 Dec 2005 14:01:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Pivovarov", "G. B.", "" ], [ "Trunov", "S. E.", "" ] ]
new_dataset
0.962479
cs/0601010
Xiaowen Zhang
Xiaowen Zhang, Li Shu, Ke Tang
Multi-Map Orbit Hopping Chaotic Stream Cipher
9 pages
null
null
null
cs.CR
null
In this paper we propose a multi-map orbit hopping chaotic stream cipher that utilizes the idea of spread spectrum mechanism for secure digital communications and fundamental chaos characteristics of mixing, unpredictable, and extremely sensitive to initial conditions. The design, key and subkeys, and detail implementation of the system are addressed. A variable number of well studied chaotic maps form a map bank. And the key determines how the system hops between multiple orbits, and it also determines the number of maps, the number of orbits for each map, and the number of sample points for each orbits. A detailed example is provided.
[ { "version": "v1", "created": "Thu, 5 Jan 2006 21:52:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Zhang", "Xiaowen", "" ], [ "Shu", "Li", "" ], [ "Tang", "Ke", "" ] ]
new_dataset
0.999448
cs/0601021
Alexander Haubold
Alexander Haubold
Lighting Control using Pressure-Sensitive Touchpads
null
null
null
null
cs.HC
null
We introduce a novel approach to control physical lighting parameters by means of a pressure-sensitive touchpad. The two-dimensional area of the touchpad is subdivided into 5 virtual sliders, each controlling the intensity of a color (red, green, blue, yellow, and white). The physical interaction methodology is modeled directly after ubiquitous mechanical sliders and dimmers which tend to be used for intensity/volume control. Our abstraction to a pressure-sensitive touchpad provides advantages and introduces additional benefits over such existing devices.
[ { "version": "v1", "created": "Sat, 7 Jan 2006 11:06:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Haubold", "Alexander", "" ] ]
new_dataset
0.956214
cs/0601034
Vicky Weissman
Joseph Y. Halpern and Vicky Weissman
Using First-Order Logic to Reason about Policies
39 pages, earlier version in Proceedings of the Sixteenth IEEE Computer Security Foundations Workshop, 2003, pp. 187-201
null
null
null
cs.LO cs.CR
null
A policy describes the conditions under which an action is permitted or forbidden. We show that a fragment of (multi-sorted) first-order logic can be used to represent and reason about policies. Because we use first-order logic, policies have a clear syntax and semantics. We show that further restricting the fragment results in a language that is still quite expressive yet is also tractable. More precisely, questions about entailment, such as `May Alice access the file?', can be answered in time that is a low-order polynomial (indeed, almost linear in some cases), as can questions about the consistency of policy sets.
[ { "version": "v1", "created": "Tue, 10 Jan 2006 04:30:49 GMT" }, { "version": "v2", "created": "Thu, 12 Jan 2006 12:58:59 GMT" }, { "version": "v3", "created": "Mon, 15 May 2006 15:10:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Halpern", "Joseph Y.", "" ], [ "Weissman", "Vicky", "" ] ]
new_dataset
0.998466
cs/0601057
Vedran Kordic
Musa Mailah, Endra Pitowarno & Hishamuddin Jamaluddin
Robust Motion Control for Mobile Manipulator Using Resolved Acceleration and Proportional-Integral Active Force Control
null
International Journal of Advanced Robotics Systems, Vol.2No2. (2005)
null
null
cs.RO
null
A resolved acceleration control (RAC) and proportional-integral active force control (PIAFC) is proposed as an approach for the robust motion control of a mobile manipulator (MM) comprising a differentially driven wheeled mobile platform with a two-link planar arm mounted on top of the platform. The study emphasizes on the integrated kinematic and dynamic control strategy in which the RAC is used to manipulate the kinematic component while the PIAFC is implemented to compensate the dynamic effects including the bounded known/unknown disturbances and uncertainties. The effectivenss and robustness of the proposed scheme are investigated through a rigorous simulation study and later complemented with experimental results obtained through a number of experiments performed on a fully developed working prototype in a laboratory environment. A number of disturbances in the form of vibratory and impact forces are deliberately introduced into the system to evaluate the system performances. The investigation clearly demonstrates the extreme robustness feature of the proposed control scheme compared to other systems considered in the study.
[ { "version": "v1", "created": "Sat, 14 Jan 2006 08:14:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Mailah", "Musa", "" ], [ "Pitowarno", "Endra", "" ], [ "Jamaluddin", "Hishamuddin", "" ] ]
new_dataset
0.998743
cs/0601058
Vedran Kordic
Michael Sdahl & Bernd Kuhlenkoetter
CAGD - Computer Aided Gripper Design for a Flexible Gripping System
null
International Journal of Advanced Robotics Systems, Vol.2No2. (2005)
null
null
cs.RO
null
This paper is a summary of the recently accomplished research work on flexible gripping systems. The goal is to develop a gripper which can be used for a great amount of geometrically variant workpieces. The economic aspect is of particular importance during the whole development. The high flexibility of the gripper is obtained by three parallel used principles. These are human and computer based analysis of the gripping object as well as mechanical adaptation of the gripper to the object with the help of servo motors. The focus is on the gripping of free-form surfaces with suction cup.
[ { "version": "v1", "created": "Sat, 14 Jan 2006 08:15:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Sdahl", "Michael", "" ], [ "Kuhlenkoetter", "Bernd", "" ] ]
new_dataset
0.99551
cs/0601064
Vedran Kordic
Chua Kia & Mohd Rizal Arshad
Robotics Vision-based Heuristic Reasoning for Underwater Target Tracking and Navigation
www.ars-journal.com
International Journal of Advanced Robotics Systems, Vol.2No3. (2005)
null
null
cs.RO
null
This paper presents a robotics vision-based heuristic reasoning system for underwater target tracking and navigation. This system is introduced to improve the level of automation of underwater Remote Operated Vehicles (ROVs) operations. A prototype which combines computer vision with an underwater robotics system is successfully designed and developed to perform target tracking and intelligent navigation. ...
[ { "version": "v1", "created": "Sat, 14 Jan 2006 08:34:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Kia", "Chua", "" ], [ "Arshad", "Mohd Rizal", "" ] ]
new_dataset
0.977848
cs/0601068
Sorav Bansal
Sorav Bansal
Checkbochs: Use Hardware to Check Software
4 pages, 4 figures
null
null
null
cs.OS cs.CR
null
In this paper, we present a system called Checkbochs, a machine simulator that checks rules about its guest operating system and applications at the hardware level. The properties to be checked can be implemented as `plugins' in the Checkbochs simulator. Some of the properties that were checked using Checkbochs include null-pointer checks, format-string vulnerabilities, user/kernel pointer checks, and race-conditions. On implementing these checks, we were able to uncover previously-unknown bugs in widely used Linux distributions. We also tested our tools on undergraduate coursework, and found numerous bugs.
[ { "version": "v1", "created": "Sat, 14 Jan 2006 23:21:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Bansal", "Sorav", "" ] ]
new_dataset
0.992883
cs/0601071
Antonio J. Fernandez
Antonio J. Fernandez, Teresa Hortala-Gonzalez, Fernando Saenz-Perez and Rafael del Vado-Virseda
Constraint Functional Logic Programming over Finite Domains
Accepted for publication in Theory and Practice of Logic programming (TPLP); 47 pages
null
null
null
cs.PL
null
In this paper, we present our proposal to Constraint Functional Logic Programming over Finite Domains (CFLP(FD)) with a lazy functional logic programming language which seamlessly embodies finite domain (FD) constraints. This proposal increases the expressiveness and power of constraint logic programming over finite domains (CLP(FD)) by combining functional and relational notation, curried expressions, higher-order functions, patterns, partial applications, non-determinism, lazy evaluation, logical variables, types, domain variables, constraint composition, and finite domain constraints. We describe the syntax of the language, its type discipline, and its declarative and operational semantics. We also describe TOY(FD), an implementation for CFLPFD(FD), and a comparison of our approach with respect to CLP(FD) from a programming point of view, showing the new features we introduce. And, finally, we show a performance analysis which demonstrates that our implementation is competitive with respect to existing CLP(FD) systems and that clearly outperforms the closer approach to CFLP(FD).
[ { "version": "v1", "created": "Mon, 16 Jan 2006 11:45:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Fernandez", "Antonio J.", "" ], [ "Hortala-Gonzalez", "Teresa", "" ], [ "Saenz-Perez", "Fernando", "" ], [ "del Vado-Virseda", "Rafael", "" ] ]
new_dataset
0.983917
cs/0601085
Vicky Weissman
Riccardo Pucella and Vicky Weissman
A Formal Foundation for ODRL
30 pgs, preliminary version presented at WITS-04 (Workshop on Issues in the Theory of Security), 2004
null
null
null
cs.LO cs.CR
null
ODRL is a popular XML-based language for stating the conditions under which resources can be accessed legitimately. The language is described in English and, as a result, agreements written in ODRL are open to interpretation. To address this problem, we propose a formal semantics for a representative fragment of the language. We use this semantics to determine precisely when a permission is implied by a set of ODRL statements and show that answering such questions is a decidable NP-hard problem. Finally, we define a tractable fragment of ODRL that is also fairly expressive.
[ { "version": "v1", "created": "Thu, 19 Jan 2006 02:41:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Pucella", "Riccardo", "" ], [ "Weissman", "Vicky", "" ] ]
new_dataset
0.99974
cs/0601086
Stephen Cook
Stephen Cook
Comments on Beckmann's Uniform Reducts
null
null
null
null
cs.CC
null
Arnold Beckmann defined the uniform reduct of a propositional proof system f to be the set of those bounded arithmetical formulas whose propositional translations have polynomial size f-proofs. We prove that the uniform reduct of f + Extended Frege consists of all true bounded arithmetical formulas iff f + Extended Frege simulates every proof system.
[ { "version": "v1", "created": "Thu, 19 Jan 2006 22:56:49 GMT" }, { "version": "v2", "created": "Mon, 23 Jan 2006 18:08:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Cook", "Stephen", "" ] ]
new_dataset
0.993163
cs/0601105
Vassilios Vassiliadis
Vassilios S. Vassiliadis
The Perceptron Algorithm: Image and Signal Decomposition, Compression, and Analysis by Iterative Gaussian Blurring
null
null
null
null
cs.CV
null
A novel algorithm for tunable compression to within the precision of reproduction targets, or storage, is proposed. The new algorithm is termed the `Perceptron Algorithm', which utilises simple existing concepts in a novel way, has multiple immediate commercial application aspects as well as it opens up a multitude of fronts in computational science and technology. The aims of this paper are to present the concepts underlying the algorithm, observations by its application to some example cases, and the identification of a multitude of potential areas of applications such as: image compression by orders of magnitude, signal compression including sound as well, image analysis in a multilayered detailed analysis, pattern recognition and matching and rapid database searching (e.g. face recognition), motion analysis, biomedical applications e.g. in MRI and CAT scan image analysis and compression, as well as hints on the link of these ideas to the way how biological memory might work leading to new points of view in neural computation. Commercial applications of immediate interest are the compression of images at the source (e.g. photographic equipment, scanners, satellite imaging systems), DVD film compression, pay-per-view downloads acceleration and many others identified in the present paper at its conclusion and future work section.
[ { "version": "v1", "created": "Tue, 24 Jan 2006 17:23:17 GMT" }, { "version": "v2", "created": "Wed, 25 Jan 2006 10:40:53 GMT" }, { "version": "v3", "created": "Thu, 26 Jan 2006 08:42:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Vassiliadis", "Vassilios S.", "" ] ]
new_dataset
0.99885
cs/0602059
Suchitra Manepalli
Suchitra Manepalli, Giridhar Manepalli, Michael L. Nelson
D2D: Digital Archive to MPEG-21 DIDL
28 pages, 8 figures
null
null
null
cs.DL
null
Digital Archive to MPEG-21 DIDL (D2D) analyzes the contents of the digital archive and produces an MPEG-21 Digital Item Declaration Language (DIDL) encapsulating the analysis results. DIDL is an extensible XML-based language that aggregates resources and the metadata. We provide a brief report on several analysis techniques applied on the digital archive by the D2D and provide an evaluation of its run-time performance.
[ { "version": "v1", "created": "Wed, 15 Feb 2006 22:18:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Manepalli", "Suchitra", "" ], [ "Manepalli", "Giridhar", "" ], [ "Nelson", "Michael L.", "" ] ]
new_dataset
0.982469
cs/0602064
Ana Romero
A. Romero, J. Rubio, F. Sergeraert
Computing spectral sequences
null
null
null
null
cs.SC
null
In this paper, a set of programs enhancing the Kenzo system is presented. Kenzo is a Common Lisp program designed for computing in Algebraic Topology, in particular it allows the user to calculate homology and homotopy groups of complicated spaces. The new programs presented here entirely compute Serre and Eilenberg-Moore spectral sequences, in particular the groups and differential maps for arbitrary r. They also determine when the spectral sequence has converged and describe the filtration of the target homology groups induced by the spectral sequence.
[ { "version": "v1", "created": "Fri, 17 Feb 2006 12:29:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Romero", "A.", "" ], [ "Rubio", "J.", "" ], [ "Sergeraert", "F.", "" ] ]
new_dataset
0.987263
cs/0602095
Joseph O'Rourke
Mirela Damian, Robin Flatland, Joseph O'Rourke
Epsilon-Unfolding Orthogonal Polyhedra
23 pages, 20 figures, 7 references. Revised version improves language and figures, updates references, and sharpens the conclusion
null
null
null
cs.CG
null
An unfolding of a polyhedron is produced by cutting the surface and flattening to a single, connected, planar piece without overlap (except possibly at boundary points). It is a long unsolved problem to determine whether every polyhedron may be unfolded. Here we prove, via an algorithm, that every orthogonal polyhedron (one whose faces meet at right angles) of genus zero may be unfolded. Our cuts are not necessarily along edges of the polyhedron, but they are always parallel to polyhedron edges. For a polyhedron of n vertices, portions of the unfolding will be rectangular strips which, in the worst case, may need to be as thin as epsilon = 1/2^{Omega(n)}.
[ { "version": "v1", "created": "Mon, 27 Feb 2006 17:03:19 GMT" }, { "version": "v2", "created": "Wed, 22 Mar 2006 14:11:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Damian", "Mirela", "" ], [ "Flatland", "Robin", "" ], [ "O'Rourke", "Joseph", "" ] ]
new_dataset
0.99933
cs/0602098
M. H. van Emden
M.H. van Emden
Compositional Semantics for the Procedural Interpretation of Logic
17 pages; no figures
null
null
DCS-307-IR
cs.PL
null
Semantics of logic programs has been given by proof theory, model theory and by fixpoint of the immediate-consequence operator. If clausal logic is a programming language, then it should also have a compositional semantics. Compositional semantics for programming languages follows the abstract syntax of programs, composing the meaning of a unit by a mathematical operation on the meanings of its constituent units. The procedural interpretation of logic has only yielded an incomplete abstract syntax for logic programs. We complete it and use the result as basis of a compositional semantics. We present for comparison Tarski's algebraization of first-order predicate logic, which is in substance the compositional semantics for his choice of syntax. We characterize our semantics by equivalence with the immediate-consequence operator.
[ { "version": "v1", "created": "Tue, 28 Feb 2006 19:28:31 GMT" }, { "version": "v2", "created": "Sun, 7 May 2006 17:41:17 GMT" } ]
2007-05-23T00:00:00
[ [ "van Emden", "M. H.", "" ] ]
new_dataset
0.997778
cs/0603001
Alois Schl\"ogl
Alois Schl\"ogl
BioSig - An application of Octave
6 pages, submission for the Octave 2006 meeting
null
null
Octave2006/16
cs.MS
null
BioSig is an open source software library for biomedical signal processing. Most users in the field are using Matlab; however, significant effort was undertaken to provide compatibility to Octave, too. This effort has been widely successful, only some non-critical components relying on a graphical user interface are missing. Now, installing BioSig on Octave is as easy as on Matlab. Moreover, a benchmark test based on BioSig has been developed and the benchmark results of several platforms are presented.
[ { "version": "v1", "created": "Wed, 1 Mar 2006 15:45:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Schlögl", "Alois", "" ] ]
new_dataset
0.994689
cs/0603056
Philip Davis
Philip M. Davis and Michael J. Fromerth
Does the arXiv lead to higher citations and reduced publisher downloads for mathematics articles?
Last updated May 02, 2006
Scientometrics Vol. 71, No. 2. (May, 2007)
10.1007/s11192-007-1661-8
null
cs.DL cs.IR math.HO
null
An analysis of 2,765 articles published in four math journals from 1997 to 2005 indicate that articles deposited in the arXiv received 35% more citations on average than non-deposited articles (an advantage of about 1.1 citations per article), and that this difference was most pronounced for highly-cited articles. Open Access, Early View, and Quality Differential were examined as three non-exclusive postulates for explaining the citation advantage. There was little support for a universal Open Access explanation, and no empirical support for Early View. There was some inferential support for a Quality Differential brought about by more highly-citable articles being deposited in the arXiv. In spite of their citation advantage, arXiv-deposited articles received 23% fewer downloads from the publisher's website (about 10 fewer downloads per article) in all but the most recent two years after publication. The data suggest that arXiv and the publisher's website may be fulfilling distinct functional needs of the reader.
[ { "version": "v1", "created": "Tue, 14 Mar 2006 19:36:24 GMT" }, { "version": "v2", "created": "Wed, 15 Mar 2006 21:08:20 GMT" }, { "version": "v3", "created": "Mon, 20 Mar 2006 17:34:40 GMT" }, { "version": "v4", "created": "Tue, 2 May 2006 19:28:01 GMT" }, { "version": "v5", "created": "Tue, 6 Feb 2007 14:52:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Davis", "Philip M.", "" ], [ "Fromerth", "Michael J.", "" ] ]
new_dataset
0.997163
cs/0603069
Xueliang Li
Fengwei Li, Xueliang Li
The neighbor-scattering number can be computed in polynomial time for interval graphs
13 pages
null
null
null
cs.DM math.CO
null
Neighbor-scattering number is a useful measure for graph vulnerability. For some special kinds of graphs, explicit formulas are given for this number. However, for general graphs it is shown that to compute this number is NP-complete. In this paper, we prove that for interval graphs this number can be computed in polynomial time.
[ { "version": "v1", "created": "Fri, 17 Mar 2006 07:00:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Li", "Fengwei", "" ], [ "Li", "Xueliang", "" ] ]
new_dataset
0.999711
cs/0603073
Bryan Ford
Bryan Ford
VXA: A Virtual Architecture for Durable Compressed Archives
14 pages, 7 figures, 2 tables
4th USENIX Conference on File and Storage Technologies, December 2005 (FAST '05), San Francisco, CA
null
null
cs.DL cs.IR
null
Data compression algorithms change frequently, and obsolete decoders do not always run on new hardware and operating systems, threatening the long-term usability of content archived using those algorithms. Re-encoding content into new formats is cumbersome, and highly undesirable when lossy compression is involved. Processor architectures, in contrast, have remained comparatively stable over recent decades. VXA, an archival storage system designed around this observation, archives executable decoders along with the encoded content it stores. VXA decoders run in a specialized virtual machine that implements an OS-independent execution environment based on the standard x86 architecture. The VXA virtual machine strictly limits access to host system services, making decoders safe to run even if an archive contains malicious code. VXA's adoption of a "native" processor architecture instead of type-safe language technology allows reuse of existing "hand-optimized" decoders in C and assembly language, and permits decoders access to performance-enhancing architecture features such as vector processing instructions. The performance cost of VXA's virtualization is typically less than 15% compared with the same decoders running natively. The storage cost of archived decoders, typically 30-130KB each, can be amortized across many archived files sharing the same compression method.
[ { "version": "v1", "created": "Sat, 18 Mar 2006 16:31:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Ford", "Bryan", "" ] ]
new_dataset
0.997216
cs/0603074
Bryan Ford
Bryan Ford, Pyda Srisuresh, Dan Kegel
Peer-to-Peer Communication Across Network Address Translators
8 figures, 1 table
USENIX Annual Technical Conference, April 2005 (USENIX '05), Anaheim, CA
null
null
cs.NI cs.CR
null
Network Address Translation (NAT) causes well-known difficulties for peer-to-peer (P2P) communication, since the peers involved may not be reachable at any globally valid IP address. Several NAT traversal techniques are known, but their documentation is slim, and data about their robustness or relative merits is slimmer. This paper documents and analyzes one of the simplest but most robust and practical NAT traversal techniques, commonly known as "hole punching." Hole punching is moderately well-understood for UDP communication, but we show how it can be reliably used to set up peer-to-peer TCP streams as well. After gathering data on the reliability of this technique on a wide variety of deployed NATs, we find that about 82% of the NATs tested support hole punching for UDP, and about 64% support hole punching for TCP streams. As NAT vendors become increasingly conscious of the needs of important P2P applications such as Voice over IP and online gaming protocols, support for hole punching is likely to increase in the future.
[ { "version": "v1", "created": "Sat, 18 Mar 2006 16:51:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Ford", "Bryan", "" ], [ "Srisuresh", "Pyda", "" ], [ "Kegel", "Dan", "" ] ]
new_dataset
0.976092
cs/0603076
Bryan Ford
Bryan Ford, Jacob Strauss, Chris Lesniewski-Laas, Sean Rhea, Frans Kaashoek, Robert Morris
User-Relative Names for Globally Connected Personal Devices
7 pages, 1 figure, 1 table
5th International Workshop on Peer-to-Peer Systems, February 2006 (IPTPS 2006), Santa Barbara, CA
null
null
cs.NI cs.DC cs.OS
null
Nontechnical users who own increasingly ubiquitous network-enabled personal devices such as laptops, digital cameras, and smart phones need a simple, intuitive, and secure way to share information and services between their devices. User Information Architecture, or UIA, is a novel naming and peer-to-peer connectivity architecture addressing this need. Users assign UIA names by "introducing" devices to each other on a common local-area network, but these names remain securely bound to their target as devices migrate. Multiple devices owned by the same user, once introduced, automatically merge their namespaces to form a distributed "personal cluster" that the owner can access or modify from any of his devices. Instead of requiring users to allocate globally unique names from a central authority, UIA enables users to assign their own "user-relative" names both to their own devices and to other users. With UIA, for example, Alice can always access her iPod from any of her own personal devices at any location via the name "ipod", and her friend Bob can access her iPod via a relative name like "ipod.Alice".
[ { "version": "v1", "created": "Sat, 18 Mar 2006 17:27:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Ford", "Bryan", "" ], [ "Strauss", "Jacob", "" ], [ "Lesniewski-Laas", "Chris", "" ], [ "Rhea", "Sean", "" ], [ "Kaashoek", "Frans", "" ], [ "Morris", "Robert", "" ] ]
new_dataset
0.989781
cs/0603079
Maria Chiara Meo
Maurizio Gabbrielli and Maria Chiara Meo
A compositional Semantics for CHR
null
null
null
null
cs.PL
null
Constraint Handling Rules (CHR) are a committed-choice declarative language which has been designed for writing constraint solvers. A CHR program consists of multi-headed guarded rules which allow one to rewrite constraints into simpler ones until a solved form is reached. CHR has received a considerable attention, both from the practical and from the theoretical side. Nevertheless, due the use of multi-headed clauses, there are several aspects of the CHR semantics which have not been clarified yet. In particular, no compositional semantics for CHR has been defined so far. In this paper we introduce a fix-point semantics which characterizes the input/output behavior of a CHR program and which is and-compositional, that is, which allows to retrieve the semantics of a conjunctive query from the semantics of its components. Such a semantics can be used as a basis to define incremental and modular analysis and verification tools.
[ { "version": "v1", "created": "Mon, 20 Mar 2006 14:17:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Gabbrielli", "Maurizio", "" ], [ "Meo", "Maria Chiara", "" ] ]
new_dataset
0.992228
cs/0603091
Himanshu Thapliyal
Himanshu Thapliyal and M.B Srinivas
A New Reversible TSG Gate and Its Application For Designing Efficient Adder Circuits
5 Pages: Published in 7th International Symposium on Representations and Methodology of Future Computing Technologies(RM 2005), Tokyo, Japan, September 5-6, 2005
null
null
null
cs.AR
null
In the recent years, reversible logic has emerged as a promising technology having its applications in low power CMOS, quantum computing, nanotechnology, and optical computing. The classical set of gates such as AND, OR, and EXOR are not reversible. This paper proposes a new 4 * 4 reversible gate called TSG gate. The proposed gate is used to design efficient adder units. The most significant aspect of the proposed gate is that it can work singly as a reversible full adder i.e reversible full adder can now be implemented with a single gate only. The proposed gate is then used to design reversible ripple carry and carry skip adders. It is demonstrated that the adder architectures designed using the proposed gate are much better and optimized, compared to their existing counterparts in literature; in terms of number of reversible gates and garbage outputs. Thus, this paper provides the initial threshold to building of more complex system which can execute more complicated operations using reversible logic.
[ { "version": "v1", "created": "Thu, 23 Mar 2006 06:44:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Thapliyal", "Himanshu", "" ], [ "Srinivas", "M. B", "" ] ]
new_dataset
0.987894
cs/0603092
Himanshu Thapliyal
Himanshu Thapliyal and M.B Srinivas
An Extension to DNA Based Fredkin Gate Circuits: Design of Reversible Sequential Circuits using Fredkin Gates
7 Pages: Deals with design of reversible sequential circuits. Published: Proceedings of SPIE Volume: 6050, pp.196-202.Optomechatronic Micro/Nano Devices and Components, Sapporo, Japan, December 5-7, 2005; Editor(s): Yoshitada Katagiri
null
null
null
cs.AR
null
In recent years, reversible logic has emerged as a promising computing paradigm having its applications in low power computing, quantum computing, nanotechnology, optical computing and DNA computing. The classical set of gates such as AND, OR, and EXOR are not reversible. Recently, it has been shown how to encode information in DNA and use DNA amplification to implement Fredkin gates. Furthermore, in the past Fredkin gates have been constructed using DNA, whose outputs are used as inputs for other Fredkin gates. Thus, it can be concluded that arbitrary circuits of Fredkin gates can be constructed using DNA. This paper provides the initial threshold to building of more complex system having reversible sequential circuits and which can execute more complicated operations. The novelty of the paper is the reversible designs of sequential circuits using Fredkin gate. Since, Fredkin gate has already been realized using DNA, it is expected that this work will initiate the building of complex systems using DNA. The reversible circuits designed here are highly optimized in terms of number of gates and garbage outputs. The modularization approach that is synthesizing small circuits and thereafter using them to construct bigger circuits is used for designing the optimal reversible sequential circuits.
[ { "version": "v1", "created": "Thu, 23 Mar 2006 08:33:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Thapliyal", "Himanshu", "" ], [ "Srinivas", "M. B", "" ] ]
new_dataset
0.962628
cs/0603099
Alin Suciu PhD
Alin Suciu, Rodica Potolea, Tudor Muresan
Benchmark Problems for Constraint Solving
null
null
null
null
cs.PF cs.SC
null
Constraint Programming is roughly a new software technology introduced by Jaffar and Lassez in 1987 for description and effective solving of large, particularly combinatorial, problems especially in areas of planning and scheduling. In the following we define three problems for constraint solving from the domain of electrical networks; based on them we define 43 related problems. For the defined set of problems we benchmarked five systems: ILOG OPL, AMPL, GAMS, Mathematica and UniCalc. As expected some of the systems performed very well for some problems while others performed very well on others.
[ { "version": "v1", "created": "Sun, 26 Mar 2006 20:19:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Suciu", "Alin", "" ], [ "Potolea", "Rodica", "" ], [ "Muresan", "Tudor", "" ] ]
new_dataset
0.998016
cs/0603101
Alin Suciu PhD
Alin Suciu, Kalman Pusztai, Andrei Vancea
Prolog Server Pages
null
null
null
null
cs.NI cs.PL
null
Prolog Server Pages (PSP) is a scripting language, based on Prolog, than can be embedded in HTML documents. To run PSP applications one needs a web server, a web browser and a PSP interpreter. The code is executed, by the interpreter, on the server-side (web server) and the output (together with the html code in witch the PSP code is embedded) is sent to the client-side (browser). The current implementation supports Apache Web Server. We implemented an Apache web server module that handles PSP files, and sends the result (an html document) to the client. PSP supports both GET and POST http requests. It also provides methods for working with http cookies.
[ { "version": "v1", "created": "Sun, 26 Mar 2006 20:35:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Suciu", "Alin", "" ], [ "Pusztai", "Kalman", "" ], [ "Vancea", "Andrei", "" ] ]
new_dataset
0.999729
cs/0603121
Scott Turner
Scott Turner, Manuel A. Perez-Quinones and Stephen H. Edwards
minimUML: A Minimalist Approach to UML Diagraming for Early Computer Science Education
38 pages, 15 figures
null
null
null
cs.HC cs.SE
null
The Unified Modeling Language (UML) is commonly used in introductory Computer Science to teach basic object-oriented design. However, there appears to be a lack of suitable software to support this task. Many of the available programs that support UML focus on developing code and not on enhancing learning. Those that were designed for educational use sometimes have poor interfaces or are missing common and important features, such as multiple selection and undo/redo. There is a need for software that is tailored to an instructional environment and has all the useful and needed functionality for that specific task. This is the purpose of minimUML. minimUML provides a minimum amount of UML, just what is commonly used in beginning programming classes, while providing a simple, usable interface. In particular, minimUML was designed to support abstract design while supplying features for exploratory learning and error avoidance. In addition, it allows for the annotation of diagrams, through text or freeform drawings, so students can receive feedback on their work. minimUML was developed with the goal of supporting ease of use, supporting novice students, and a requirement of no prior-training for its use.
[ { "version": "v1", "created": "Thu, 30 Mar 2006 06:12:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Turner", "Scott", "" ], [ "Perez-Quinones", "Manuel A.", "" ], [ "Edwards", "Stephen H.", "" ] ]
new_dataset
0.99393
cs/0604026
Damiano Bolzoni
Damiano Bolzoni, Sandro Etalle
APHRODITE: an Anomaly-based Architecture for False Positive Reduction
null
null
null
TR-CTIT-06-13
cs.CR
null
We present APHRODITE, an architecture designed to reduce false positives in network intrusion detection systems. APHRODITE works by detecting anomalies in the output traffic, and by correlating them with the alerts raised by the NIDS working on the input traffic. Benchmarks show a substantial reduction of false positives and that APHRODITE is effective also after a "quick setup", i.e. in the realistic case in which it has not been "trained" and set up optimally
[ { "version": "v1", "created": "Fri, 7 Apr 2006 12:13:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Bolzoni", "Damiano", "" ], [ "Etalle", "Sandro", "" ] ]
new_dataset
0.998218
cs/0604067
R.N.Mohan Professor
R.N.Mohan, Moon Ho Lee, Subhash Pokrel
Certain t-partite graphs
null
null
null
null
cs.DM
null
By making use of the generalized concept of orthogonality in Latin squares, certain t-partite graphs have been constructed and a suggestion for a net work system and some applications have been made.
[ { "version": "v1", "created": "Tue, 18 Apr 2006 09:30:55 GMT" }, { "version": "v2", "created": "Thu, 11 May 2006 00:11:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Mohan", "R. N.", "" ], [ "Lee", "Moon Ho", "" ], [ "Pokrel", "Subhash", "" ] ]
new_dataset
0.997763
cs/0604073
Muthiah Annamalai
Muthiah Annamalai, Hemant Kumar, Leela Velusamy
Octave-GTK: A GTK binding for GNU Octave
Comments: Presented at Octave2006 Conference, Washington D.C
null
null
Octave2006/02
cs.SE
null
This paper discusses the problems faced with interoperability between two programming languages, with respect to GNU Octave, and GTK API written in C, to provide the GTK API on Octave.Octave-GTK is the fusion of two different API's: one exported by GNU Octave [scientific computing tool] and the other GTK [GUI toolkit]; this enables one to use GTK primitives within GNU Octave, to build graphical front ends,at the same time using octave engine for number crunching power. This paper illustrates our implementation of binding logic, and shows results extended to various other libraries using the same base code generator. Also shown, are methods of code generation, binding automation, and the niche we plan to fill in the absence of GUI in Octave. Canonical discussion of advantages, feasibility and problems faced in the process are elucidated.
[ { "version": "v1", "created": "Wed, 19 Apr 2006 16:46:23 GMT" }, { "version": "v2", "created": "Fri, 28 Apr 2006 18:43:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Annamalai", "Muthiah", "" ], [ "Kumar", "Hemant", "" ], [ "Velusamy", "Leela", "" ] ]
new_dataset
0.999449
cs/0604087
Yongzhi Cao
Yongzhi Cao, Lirong Xia and Mingsheng Ying
Probabilistic Automata for Computing with Words
35 pages; 3 figures
null
null
null
cs.AI cs.CL
null
Usually, probabilistic automata and probabilistic grammars have crisp symbols as inputs, which can be viewed as the formal models of computing with values. In this paper, we first introduce probabilistic automata and probabilistic grammars for computing with (some special) words in a probabilistic framework, where the words are interpreted as probabilistic distributions or possibility distributions over a set of crisp symbols. By probabilistic conditioning, we then establish a retraction principle from computing with words to computing with values for handling crisp inputs and a generalized extension principle from computing with words to computing with all words for handling arbitrary inputs. These principles show that computing with values and computing with all words can be respectively implemented by computing with some special words. To compare the transition probabilities of two near inputs, we also examine some analytical properties of the transition probability functions of generalized extensions. Moreover, the retractions and the generalized extensions are shown to be equivalence-preserving. Finally, we clarify some relationships among the retractions, the generalized extensions, and the extensions studied recently by Qiu and Wang.
[ { "version": "v1", "created": "Sun, 23 Apr 2006 02:58:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Cao", "Yongzhi", "" ], [ "Xia", "Lirong", "" ], [ "Ying", "Mingsheng", "" ] ]
new_dataset
0.988215
cs/0604100
Abhishek Parakh
Abhishek Parakh
Protocols for Kak's Cubic Cipher and Diffie-Hellman Based Asymmetric Oblivious Key Exchange
7 pages, with minor typographical corrections.
null
null
null
cs.CR
null
This paper presents protocols for Kak's cubic transformation and proposes a modification to Diffie-Hellman key exchange protocol in order to achieve asymmetric oblivious exchange of keys.
[ { "version": "v1", "created": "Tue, 25 Apr 2006 17:39:37 GMT" }, { "version": "v2", "created": "Sun, 1 Apr 2007 17:49:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Parakh", "Abhishek", "" ] ]
new_dataset
0.977491
cs/0604113
Andrea Sportiello
Sergio Caracciolo, Davide Fichera, Andrea Sportiello
One-in-Two-Matching Problem is NP-complete
30 pages
null
null
null
cs.CC
null
2-dimensional Matching Problem, which requires to find a matching of left- to right-vertices in a balanced $2n$-vertex bipartite graph, is a well-known polynomial problem, while various variants, like the 3-dimensional analogoue (3DM, with triangles on a tripartite graph), or the Hamiltonian Circuit Problem (HC, a restriction to ``unicyclic'' matchings) are among the main examples of NP-hard problems, since the first Karp reduction series of 1972. The same holds for the weighted variants of these problems, the Linear Assignment Problem being polynomial, and the Numerical 3-Dimensional Matching and Travelling Salesman Problem being NP-complete. In this paper we show that a small modification of the 2-dimensional Matching and Assignment Problems in which for each $i \leq n/2$ it is required that either $\pi(2i-1)=2i-1$ or $\pi(2i)=2i$, is a NP-complete problem. The proof is by linear reduction from SAT (or NAE-SAT), with the size $n$ of the Matching Problem being four times the number of edges in the factor graph representation of the boolean problem. As a corollary, in combination with the simple linear reduction of One-in-Two Matching to 3-Dimensional Matching, we show that SAT can be linearly reduced to 3DM, while the original Karp reduction was only cubic.
[ { "version": "v1", "created": "Fri, 28 Apr 2006 16:40:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Caracciolo", "Sergio", "" ], [ "Fichera", "Davide", "" ], [ "Sportiello", "Andrea", "" ] ]
new_dataset
0.994367
cs/0605053
Rajkumar Buyya
Hussein Gibbins and Rajkumar Buyya
Gridscape II: A Customisable and Pluggable Grid Monitoring Portal and its Integration with Google Maps
12 pages
null
null
Technical Report, GRIDS-TR-2006-8, Grid Computing and Distributed Systems Laboratory, The University of Melbourne, Australia, May 12, 2006
cs.DC
null
Grid computing has emerged as an effective means of facilitating the sharing of distributed heterogeneous resources, enabling collaboration in large scale environments. However, the nature of Grid systems, coupled with the overabundance and fragmentation of information, makes it difficult to monitor resources, services, and computations in order to plan and make decisions. In this paper we present Gridscape II, a customisable portal component that can be used on its own or plugged in to compliment existing Grid portals. Gridscape II manages the gathering of information from arbitrary, heterogeneous and distributed sources and presents them together seamlessly within a single interface. It also leverages the Google Maps API in order to provide a highly interactive user interface. Gridscape II is simple and easy to use, providing a solution to those users who do not wish to invest heavily in developing their own monitoring portal from scratch, and also for those users who want something that is easy to customise and extend for their specific needs.
[ { "version": "v1", "created": "Fri, 12 May 2006 09:41:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Gibbins", "Hussein", "" ], [ "Buyya", "Rajkumar", "" ] ]
new_dataset
0.963878
cs/0605062
Al-Mukaddim Khan Pathan
Al-Mukaddim Khan Pathan and Md. Golam Shagadul Amin Talukder
QoSIP: A QoS Aware IP Routing Ptotocol for Multimedia Data
8th International Conference of Advanced Communication Technology (ICACT 2006)
null
null
null
cs.NI
null
Conventional IP routing protocols are not suitable for multimedia applications which have very stringent Quality-of-Service (QoS) demands and they require a connection oriented service. For multimedia applications it is expected that the router should be able to forward the packet according to the demand of the packet and it is necessary to find a path that satisfies the specific demands of a particular application. In order to address these issues, in this paper, we have presented a QoS aware IP routing protocol where a router stores information about the QoS parameters and routes the packet accordingly. Keywords: IP Routing Protocol, Quality of Service (QoS) parameter, QoSIP, Selective Flooding.
[ { "version": "v1", "created": "Mon, 15 May 2006 10:39:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Pathan", "Al-Mukaddim Khan", "" ], [ "Talukder", "Md. Golam Shagadul Amin", "" ] ]
new_dataset
0.99982
cs/0605066
Xiaowen Zhang
Xiaowen Zhang, Ke Tang, Li Shu
A Chaotic Cipher Mmohocc and Its Randomness Evaluation
8 pages, 4 figures, and 3 tables, submitted to ICCS06
null
null
null
cs.CR
null
After a brief introduction to a new chaotic stream cipher Mmohocc which utilizes the fundamental chaos characteristics of mixing, unpredictability, and sensitivity to initial conditions, we conducted the randomness statistical tests against the keystreams generated by the cipher. Two batteries of most stringent randomness tests, namely the NIST Suite and the Diehard Suite, were performed. The results showed that the keystreams have successfully passed all the statistical tests. We conclude that Mmohocc can generate high-quality pseudorandom numbers from a statistical point of view.
[ { "version": "v1", "created": "Mon, 15 May 2006 18:25:35 GMT" }, { "version": "v2", "created": "Tue, 30 May 2006 11:58:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Zhang", "Xiaowen", "" ], [ "Tang", "Ke", "" ], [ "Shu", "Li", "" ] ]
new_dataset
0.997963
cs/0605088
Ke Liu
Ke Liu, Adnan Majeed and Nael B. Abu-Ghazaleh
TARMAC: Traffic-Analysis Reslient MAC Protocol for Multi-Hop Wireless Networks
null
null
null
null
cs.NI cs.CR
null
Traffic analysis in Multi-hop Wireless Networks can expose the structure of the network allowing attackers to focus their efforts on critical nodes. For example, jamming the only data sink in a sensor network can cripple the network. We propose a new communication protocol that is part of the MAC layer, but resides conceptually between the routing layer and MAC, that is resilient to traffic analysis. Each node broadcasts the data that it has to transmit according to a fixed transmission schedule that is independent of the traffic being generated, making the network immune to time correlation analysis. The transmission pattern is identical, with the exception of a possible time shift, at all nodes, removing spatial correlation of transmissions to network strucutre. Data for all neighbors resides in the same encrypted packet. Each neighbor then decides which subset of the data in a packet to forward onwards using a routing protocol whose details are orthogonal to the proposed scheme. We analyze the basic scheme, exploring the tradeoffs in terms of frequency of transmission and packet size. We also explore adaptive and time changing patterns and analyze their performance under a number of representative scenarios.
[ { "version": "v1", "created": "Fri, 19 May 2006 22:42:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Liu", "Ke", "" ], [ "Majeed", "Adnan", "" ], [ "Abu-Ghazaleh", "Nael B.", "" ] ]
new_dataset
0.997139
cs/0605102
Shaili Jain
Adam L. Buchsbaum, Alon Efrat, Shaili Jain, Suresh Venkatasubramanian and Ke Yi
Restricted Strip Covering and the Sensor Cover Problem
14 pages, 6 figures
null
null
null
cs.DS cs.CG
null
Given a set of objects with durations (jobs) that cover a base region, can we schedule the jobs to maximize the duration the original region remains covered? We call this problem the sensor cover problem. This problem arises in the context of covering a region with sensors. For example, suppose you wish to monitor activity along a fence by sensors placed at various fixed locations. Each sensor has a range and limited battery life. The problem is to schedule when to turn on the sensors so that the fence is fully monitored for as long as possible. This one dimensional problem involves intervals on the real line. Associating a duration to each yields a set of rectangles in space and time, each specified by a pair of fixed horizontal endpoints and a height. The objective is to assign a position to each rectangle to maximize the height at which the spanning interval is fully covered. We call this one dimensional problem restricted strip covering. If we replace the covering constraint by a packing constraint, the problem is identical to dynamic storage allocation, a scheduling problem that is a restricted case of the strip packing problem. We show that the restricted strip covering problem is NP-hard and present an O(log log n)-approximation algorithm. We present better approximations or exact algorithms for some special cases. For the uniform-duration case of restricted strip covering we give a polynomial-time, exact algorithm but prove that the uniform-duration case for higher-dimensional regions is NP-hard. Finally, we consider regions that are arbitrary sets, and we present an O(log n)-approximation algorithm.
[ { "version": "v1", "created": "Wed, 24 May 2006 03:27:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Buchsbaum", "Adam L.", "" ], [ "Efrat", "Alon", "" ], [ "Jain", "Shaili", "" ], [ "Venkatasubramanian", "Suresh", "" ], [ "Yi", "Ke", "" ] ]
new_dataset
0.981709
cs/0605125
Germain Drolet
Germain Drolet (Department of Electrical & Computer Engineering, Royal Military College of Canada)
Combinational Logic Circuit Design with the Buchberger Algorithm
15 pages, 1 table
null
null
null
cs.AR
null
We detail a procedure for the computation of the polynomial form of an electronic combinational circuit from the design equations in a truth table. The method uses the Buchberger algorithm rather than current traditional methods based on search algorithms. We restrict the analysis to a single output, but the procedure can be generalized to multiple outputs. The procedure is illustrated with the design of a simple arithmetic and logic unit with two 3-bit operands and two control bits.
[ { "version": "v1", "created": "Fri, 26 May 2006 18:43:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Drolet", "Germain", "", "Department of Electrical & Computer Engineering, Royal\n Military College of Canada" ] ]
new_dataset
0.982217
cs/0605136
Bourgeois Gerald
Gerald Bourgeois
Attaque algebrique de NTRU a l'aide des vecteurs de Witt
6 pages; correction of the miscalculations
null
null
null
cs.CR
null
One improves an algebraic attack of NTRU due to Silverman, Smart and Vercauteren; the latter considered the first 2 bits of a Witt vector attached to the research of the secret key; here the first 4 bits are considered, which provides additional equations of degrees 4 and 8.
[ { "version": "v1", "created": "Mon, 29 May 2006 22:42:24 GMT" }, { "version": "v2", "created": "Mon, 5 Jun 2006 22:44:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Bourgeois", "Gerald", "" ] ]
new_dataset
0.996458
cs/0606007
Andrew Pavlo
Andrew Pavlo (1), Christopher Homan (2), Jonathan Schull (2) ((1) University of Wisconsin-Madison, (2) Rochester Institute of Technology)
A parent-centered radial layout algorithm for interactive graph visualization and animation
null
null
null
null
cs.HC cs.CG cs.GR
null
We have developed (1) a graph visualization system that allows users to explore graphs by viewing them as a succession of spanning trees selected interactively, (2) a radial graph layout algorithm, and (3) an animation algorithm that generates meaningful visualizations and smooth transitions between graphs while minimizing edge crossings during transitions and in static layouts. Our system is similar to the radial layout system of Yee et al. (2001), but differs primarily in that each node is positioned on a coordinate system centered on its own parent rather than on a single coordinate system for all nodes. Our system is thus easy to define recursively and lends itself to parallelization. It also guarantees that layouts have many nice properties, such as: it guarantees certain edges never cross during an animation. We compared the layouts and transitions produced by our algorithms to those produced by Yee et al. Results from several experiments indicate that our system produces fewer edge crossings during transitions between graph drawings, and that the transitions more often involve changes in local scaling rather than structure. These findings suggest the system has promise as an interactive graph exploration tool in a variety of settings.
[ { "version": "v1", "created": "Thu, 1 Jun 2006 16:56:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Pavlo", "Andrew", "" ], [ "Homan", "Christopher", "" ], [ "Schull", "Jonathan", "" ] ]
new_dataset
0.984984
cs/0606029
Audun Josang
Audun Josang
Belief Calculus
22 pages, 10 figures
null
null
null
cs.AI
null
In Dempster-Shafer belief theory, general beliefs are expressed as belief mass distribution functions over frames of discernment. In Subjective Logic beliefs are expressed as belief mass distribution functions over binary frames of discernment. Belief representations in Subjective Logic, which are called opinions, also contain a base rate parameter which express the a priori belief in the absence of evidence. Philosophically, beliefs are quantitative representations of evidence as perceived by humans or by other intelligent agents. The basic operators of classical probability calculus, such as addition and multiplication, can be applied to opinions, thereby making belief calculus practical. Through the equivalence between opinions and Beta probability density functions, this also provides a calculus for Beta probability density functions. This article explains the basic elements of belief calculus.
[ { "version": "v1", "created": "Wed, 7 Jun 2006 14:32:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Josang", "Audun", "" ] ]
new_dataset
0.996467