id
stringlengths 9
10
| submitter
stringlengths 2
52
⌀ | authors
stringlengths 4
6.51k
| title
stringlengths 4
246
| comments
stringlengths 1
523
⌀ | journal-ref
stringlengths 4
345
⌀ | doi
stringlengths 11
120
⌀ | report-no
stringlengths 2
243
⌀ | categories
stringlengths 5
98
| license
stringclasses 9
values | abstract
stringlengths 33
3.33k
| versions
list | update_date
timestamp[s] | authors_parsed
list | prediction
stringclasses 1
value | probability
float64 0.95
1
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0606046 | Andreas U. Schmidt | Jan Piechalski and Andreas U. Schmidt | Authorised Translations of Electronic Documents | In: Peer-reviewed Proceedings of the Information Security South
Africa (ISSA) 2006 From Insight to Foresight Conference, 5 to 7 July 2006,
Sandton, South Africa | null | null | null | cs.OH | null | A concept is proposed to extend authorised translations of documents to
electronically signed, digital documents. Central element of the solution is an
electronic seal, embodied as an XML data structure, which attests to the
correctness of the translation and the authorisation of the translator. The
seal contains a digital signature binding together original and translated
document, thus enabling forensic inspection and therefore legal security in the
appropriation of the translation. Organisational aspects of possible
implementation variants of electronic authorised translations are discussed and
a realisation as a stand-alone web-service is presented.
| [
{
"version": "v1",
"created": "Sat, 10 Jun 2006 10:37:24 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Piechalski",
"Jan",
""
],
[
"Schmidt",
"Andreas U.",
""
]
]
| new_dataset | 0.999497 |
cs/0606089 | William Yurcik | Charis Ermopoulos and William Yurcik | NVision-PA: A Tool for Visual Analysis of Command Behavior Based on
Process Accounting Logs (with a Case Study in HPC Cluster Security) | 25 pages, 13 Figures | null | null | null | cs.CR cs.DC | null | In the UNIX/Linux environment the kernel can log every command process
created by every user with process accounting. Thus process accounting logs
have many potential uses, particularly the monitoring and forensic
investigation of security events. Previous work successfully leveraged the use
of process accounting logs to identify a difficult to detect and damaging
intrusion against high performance computing (HPC) clusters, masquerade
attacks, where intruders masquerade as legitimate users with purloined
authentication credentials. While masqueraders on HPC clusters were found to be
identifiable with a high accuracy (greater than 90%), this accuracy is still
not high enough for HPC production environments where greater than 99% accuracy
is needed.
This paper incrementally advances the goal of more accurately identifying
masqueraders on HPC clusters by seeking to identify features within command
sets that distinguish masqueraders. To accomplish this goal, we created
NVision-PA, a software tool that produces text and graphic statistical
summaries describing input processing accounting logs. We report NVision-PA
results describing two different process accounting logs; one from Internet
usage and one from HPC cluster usage. These results identify the distinguishing
features of Internet users (as proxies for masqueraders) posing as clusters
users. This research is both a promising next step toward creating a real-time
masquerade detection sensor for production HPC clusters as well as providing
another tool for system administrators to use for statistically monitoring and
managing legitimate workloads (as indicated by command usage) in HPC
environments.
| [
{
"version": "v1",
"created": "Tue, 20 Jun 2006 16:53:02 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ermopoulos",
"Charis",
""
],
[
"Yurcik",
"William",
""
]
]
| new_dataset | 0.970643 |
cs/0606097 | Andrew Krizhanovsky A | A. Krizhanovsky | Synonym search in Wikipedia: Synarcher | 4 pages, 2 figures, Synarcher program is available at
http://synarcher.sourceforge.net | null | null | null | cs.IR cs.DM | null | The program Synarcher for synonym (and related terms) search in the text
corpus of special structure (Wikipedia) was developed. The results of the
search are presented in the form of graph. It is possible to explore the graph
and search for graph elements interactively. Adapted HITS algorithm for synonym
search, program architecture, and program work evaluation with test examples
are presented in the paper. The proposed algorithm can be applied to a query
expansion by synonyms (in a search engine) and a synonym dictionary forming.
| [
{
"version": "v1",
"created": "Thu, 22 Jun 2006 14:17:26 GMT"
},
{
"version": "v2",
"created": "Fri, 23 Jun 2006 05:10:39 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Krizhanovsky",
"A.",
""
]
]
| new_dataset | 0.991405 |
cs/0607051 | Catherine Recanati | Catherine Recanati (LIPN) | Raisonner avec des diagrammes : perspectives cognitives et
computationnelles | paru initialement comme Rapport LIPN en 2004 | Intellectica 40 (2005) 9-42 | null | null | cs.CL | null | Diagrammatic, analogical or iconic representations are often contrasted with
linguistic or logical representations, in which the shape of the symbols is
arbitrary. The aim of this paper is to make a case for the usefulness of
diagrams in inferential knowledge representation systems. Although commonly
used, diagrams have for a long time suffered from the reputation of being only
a heuristic tool or a mere support for intuition. The first part of this paper
is an historical background paying tribute to the logicians, psychologists and
computer scientists who put an end to this formal prejudice against diagrams.
The second part is a discussion of their characteristics as opposed to those of
linguistic forms. The last part is aimed at reviving the interest for
heterogeneous representation systems including both linguistic and diagrammatic
representations.
| [
{
"version": "v1",
"created": "Tue, 11 Jul 2006 19:13:25 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Recanati",
"Catherine",
"",
"LIPN"
]
]
| new_dataset | 0.991345 |
cs/0607055 | Akimichi Takemura | Hisayuki Hara and Akimichi Takemura | Boundary cliques, clique trees and perfect sequences of maximal cliques
of a chordal graph | null | null | null | null | cs.DM | null | We characterize clique trees of a chordal graph in their relation to
simplicial vertices and perfect sequences of maximal cliques. We investigate
boundary cliques defined by Shibata and clarify their relation to endpoints of
clique trees. Next we define a symmetric binary relation between the set of
clique trees and the set of perfect sequences of maximal cliques. We describe
the relation as a bipartite graph and prove that the bipartite graph is always
connected. Lastly we consider to characterize chordal graphs from the aspect of
non-uniqueness of clique trees.
| [
{
"version": "v1",
"created": "Tue, 11 Jul 2006 23:14:51 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Hara",
"Hisayuki",
""
],
[
"Takemura",
"Akimichi",
""
]
]
| new_dataset | 0.99922 |
cs/0607141 | Riccardo Pucella | Karl Crary and Robert Harper | Logic Column 16: Higher-Order Abstract Syntax: Setting the Record
Straight | 4 pages | null | null | null | cs.LO | null | This article responds to a critique of higher-order abstract syntax appearing
in Logic Column 14, ``Nominal Logic and Abstract Syntax'', cs.LO/0511025.
| [
{
"version": "v1",
"created": "Mon, 31 Jul 2006 14:15:23 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Crary",
"Karl",
""
],
[
"Harper",
"Robert",
""
]
]
| new_dataset | 0.991656 |
cs/0608016 | Sebastian Brand | Gregory J. Duck, Peter J. Stuckey, Sebastian Brand | ACD Term Rewriting | 21 pages; 22nd International Conference on Logic Programming
(ICLP'06) | null | null | null | cs.PL cs.SC | null | We introduce Associative Commutative Distributive Term Rewriting (ACDTR), a
rewriting language for rewriting logical formulae. ACDTR extends AC term
rewriting by adding distribution of conjunction over other operators.
Conjunction is vital for expressive term rewriting systems since it allows us
to require that multiple conditions hold for a term rewriting rule to be used.
ACDTR uses the notion of a "conjunctive context", which is the conjunction of
constraints that must hold in the context of a term, to enable the programmer
to write very expressive and targeted rewriting rules. ACDTR can be seen as a
general logic programming language that extends Constraint Handling Rules and
AC term rewriting. In this paper we define the semantics of ACDTR and describe
our prototype implementation.
| [
{
"version": "v1",
"created": "Thu, 3 Aug 2006 02:55:16 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Duck",
"Gregory J.",
""
],
[
"Stuckey",
"Peter J.",
""
],
[
"Brand",
"Sebastian",
""
]
]
| new_dataset | 0.994468 |
cs/0608026 | Dinesh Kumar | Dinesh Kumar (INRIA Sophia Antipolis), Dhiman Barman, Eitan Altman
(INRIA Sophia Antipolis), Jean-Marc Kelif (FT R&D) | New Cross-Layer Channel Switching Policy for TCP Transmission on 3G UMTS
Downlink | null | null | null | null | cs.NI | null | In 3G UMTS, two main transport channels have been provided for downlink data
transmission: a common FACH channel and a dedicated DCH channel. The
performance of TCP in UMTS depends much on the channel switching policy used.
In this paper, we propose and analyze three new basic threshold-based channel
switching policies for UMTS that we name as QS (Queue Size), FS (Flow Size) and
QSFS (QS & FS combined) policy. These policies significantly improve over a
modified threshold policy in [1] by about 17% in response time metrics. We
further propose and evaluate a new improved switching policy that we call
FS-DCH (at-least flow-size threshold on DCH) policy. This policy is biased
towards short TCP flows of few packets and is thus a cross-layer policy that
improves the performance of TCP by giving priority to the initial few packets
of a flow on the fast DCH channel. Extensive simulation results confirm this
improvement for the case when number of TCP connections is low.
| [
{
"version": "v1",
"created": "Fri, 4 Aug 2006 11:53:04 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kumar",
"Dinesh",
"",
"INRIA Sophia Antipolis"
],
[
"Barman",
"Dhiman",
"",
"INRIA Sophia Antipolis"
],
[
"Altman",
"Eitan",
"",
"INRIA Sophia Antipolis"
],
[
"Kelif",
"Jean-Marc",
"",
"FT R&D"
]
]
| new_dataset | 0.997199 |
cs/0608027 | Edwin Henneken | E. Henneken, M.J. Kurtz, G. Eichhorn, A. Accomazzi, C.S. Grant, D.
Thompson, E. Bohlen, S.S. Murray | myADS-arXiv - a Tailor-Made, Open Access, Virtual Journal | 4 pages, 2 figures, poster paper to appear in the proceedings of the
LISA V conference | null | null | null | cs.DL astro-ph | null | The myADS-arXiv service provides the scientific community with a one stop
shop for staying up-to-date with a researcher's field of interest. The service
provides a powerful and unique filter on the enormous amount of bibliographic
information added to the ADS on a daily basis. It also provides a complete view
with the most relevant papers available in the subscriber's field of interest.
With this service, the subscriber will get to know the lastest developments,
popular trends and the most important papers. This makes the service not only
unique from a technical point of view, but also from a content point of view.
On this poster we will argue why myADS-arXiv is a tailor-made, open access,
virtual journal and we will illustrate its unique character.
| [
{
"version": "v1",
"created": "Fri, 4 Aug 2006 15:23:32 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Henneken",
"E.",
""
],
[
"Kurtz",
"M. J.",
""
],
[
"Eichhorn",
"G.",
""
],
[
"Accomazzi",
"A.",
""
],
[
"Grant",
"C. S.",
""
],
[
"Thompson",
"D.",
""
],
[
"Bohlen",
"E.",
""
],
[
"Murray",
"S. S.",
""
]
]
| new_dataset | 0.999128 |
cs/0608031 | Mikio Fujii | Mikio Fujii | Secure Positioning of Mobile Terminals with Simplex Radio Communication | 8 pages, 4 figures | null | null | null | cs.CR | null | With the rapid spread of various mobile terminals in our society, the
importance of secure positioning is growing for wireless networks in
adversarial settings. Recently, several authors have proposed a secure
positioning mechanism of mobile terminals which is based on the geometric
property of wireless node placement, and on the postulate of modern physics
that a propagation speed of information never exceeds the velocity of light. In
particular, they utilize the measurements of the round-trip time of radio
signal propagation and bidirectional communication for variants of the
challenge-and-response. In this paper, we propose a novel means to construct
the above mechanism by use of unidirectional communication instead of
bidirectional communication. Our proposal is based on the assumption that a
mobile terminal incorporates a high-precision inner clock in a tamper-resistant
protected area. In positioning, the mobile terminal uses its inner clock and
the time and location information broadcasted by radio from trusted stations.
Our proposal has a major advantage in protecting the location privacy of mobile
terminal users, because the mobile terminal need not provide any information to
the trusted stations through positioning procedures. Besides, our proposal is
free from the positioning error due to claimant's processing-time fluctuations
in the challenge-and-response, and is well-suited for mobile terminals in the
open air, or on the move at high speed, in terms of practical usage. We analyze
the security, the functionality, and the feasibility of our proposal in
comparison to previous proposals.
| [
{
"version": "v1",
"created": "Mon, 7 Aug 2006 05:49:31 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Fujii",
"Mikio",
""
]
]
| new_dataset | 0.994921 |
cs/0608045 | Fotis Georgatos Drs | Giannis Kouretis, Fotis Georgatos | LiveWN, cpu scavenging in the Grid Era | 4 pages | null | null | null | cs.DC cs.NI | null | The goal of this research is to introduce an easy and versatile way to
provide and use Grid resources without the need of any OS installation or
middleware configuration. At the same time we provide an excellent training
tool for newer Grid users and people that want to experiment, without enforcing
any installation. We have been testing it thoroughly under different
circumstances with firm success.
| [
{
"version": "v1",
"created": "Tue, 8 Aug 2006 15:28:53 GMT"
},
{
"version": "v2",
"created": "Tue, 8 Aug 2006 22:13:28 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kouretis",
"Giannis",
""
],
[
"Georgatos",
"Fotis",
""
]
]
| new_dataset | 0.997572 |
cs/0608055 | Hao Chen | Hao Chen | MDS Ideal Secret Sharing Scheme from AG-codes on Elliptic Curves | null | null | null | null | cs.CR | null | For a secret sharing scheme, two parameters $d_{min}$ and $d_{cheat}$ are
defined in [12] and [13]. These two parameters measure the error-correcting
capability and the secret-recovering capability of the secret sharing scheme
against cheaters. Some general properties of the parameters have been studied
in [12,[9] and [13]. The MDS secret-sharing scheme was defined in [12] and it
is proved that MDS perfect secret sharing scheme can be constructed for any
monotone access structure. The famous Shamir $(k,n)$ threshold secret sharing
scheme is the MDS with $d_{min}=d_{cheat}=n-k+1$. In [3] we proposed the linear
secret sharing scheme from algebraic-geometric codes. In this paper the linear
secret sharing scheme from AG-codes on elliptic curves is studied and it is
shown that many of them are MDS linear secret sharing scheme.
| [
{
"version": "v1",
"created": "Mon, 14 Aug 2006 01:49:34 GMT"
},
{
"version": "v2",
"created": "Sun, 3 Sep 2006 03:59:29 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Chen",
"Hao",
""
]
]
| new_dataset | 0.986698 |
cs/0608092 | Danny Dolev | Ariel Daliot and Danny Dolev | Self-Stabilizing Byzantine Pulse Synchronization | An updated version. The original version appeared as TR-2005-84, The
Hebrew university, Aug. 2005 | null | null | TR-2005-84 | cs.DC | null | The ``Pulse Synchronization'' problem can be loosely described as targeting
to invoke a recurring distributed event as simultaneously as possible at the
different nodes and with a frequency that is as regular as possible. This
target becomes surprisingly subtle and difficult to achieve when facing both
transient and permanent failures. In this paper we present an algorithm for
pulse synchronization that self-stabilizes while at the same time tolerating a
permanent presence of Byzantine faults. The Byzantine nodes might incessantly
try to de-synchronize the correct nodes. Transient failures might throw the
system into an arbitrary state in which correct nodes have no common notion
what-so-ever, such as time or round numbers, and can thus not infer anything
from their own local states upon the state of other correct nodes. The
presented algorithm grants nodes the ability to infer that eventually all
correct nodes will invoke their pulses within a very short time interval of
each other and will do so regularly.
Pulse synchronization has previously been shown to be a powerful tool for
designing general self-stabilizing Byzantine algorithms and is hitherto the
only method that provides for the general design of efficient practical
protocols in the confluence of these two fault models. The difficulty, in
general, to design any algorithm in this fault model may be indicated by the
remarkably few algorithms resilient to both fault models. The few published
self-stabilizing Byzantine algorithms are typically complicated and sometimes
converge from an arbitrary initial state only after exponential or super
exponential time.
| [
{
"version": "v1",
"created": "Thu, 24 Aug 2006 16:07:07 GMT"
},
{
"version": "v2",
"created": "Fri, 25 Aug 2006 03:24:24 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Daliot",
"Ariel",
""
],
[
"Dolev",
"Danny",
""
]
]
| new_dataset | 0.993725 |
cs/0608096 | Danny Dolev | Ariel Daliot, Danny Dolev and Hanna Parnas | Linear-time Self-stabilizing Byzantine Clock Synchronization | This is a corrected version. The original paper appeared in OPODIS'03 | Proc. of 7th International Conference on Principles of Distributed
Systems (OPODIS'03 La Martinique, France), December, 2003 | null | null | cs.DC | null | Clock synchronization is a very fundamental task in distributed system. It
thus makes sense to require an underlying clock synchronization mechanism to be
highly fault-tolerant. A self-stabilizing algorithm seeks to attain
synchronization once lost; a Byzantine algorithm assumes synchronization is
never lost and focuses on containing the influence of the permanent presence of
faulty nodes. There are efficient self-stabilizing solutions for clock
synchronization as well as efficient solutions that are resilient to Byzantine
faults. In contrast, to the best of our knowledge there is no practical
solution that is self-stabilizing while tolerating the permanent presence of
Byzantine nodes. We present the first linear-time self-stabilizing Byzantine
clock synchronization algorithm. Our deterministic clock synchronization
algorithm is based on the observation that all clock synchronization algorithms
require events for exchanging clock values and re-synchronizing the clocks to
within safe bounds. These events usually need to happen synchronously at the
different nodes. In classic Byzantine algorithms this is fulfilled or aided by
having the clocks initially close to each other and thus the actual clock
values can be used for synchronizing the events. This implies that clock values
cannot differ arbitrarily, which necessarily renders these solutions to be
non-stabilizing. Our scheme suggests using an underlying distributed pulse
synchronization module that is uncorrelated to the clock values.
| [
{
"version": "v1",
"created": "Fri, 25 Aug 2006 03:11:28 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Daliot",
"Ariel",
""
],
[
"Dolev",
"Danny",
""
],
[
"Parnas",
"Hanna",
""
]
]
| new_dataset | 0.991576 |
cs/0608114 | Benoit Hudzia | Benoit Hudzia and Serge Petiton | Reliable multicast fault tolerant MPI in the Grid environment | null | Benoit Hudzia and Serge Petiton, "Reliable multicast fault
tolerant MPI in the Grid environment", International Conference GRIDnet,
october 2004 | null | null | cs.DC | null | Grid environments have recently been developed with low stretch and overheads
that increase with the logarithm of the number of nodes in the system. Getting
and sending data to/from a large numbers of nodes is gaining importance due to
an increasing number of independent data providers and the heterogeneity of the
network/Grid. One of the key challenges is to achieve a balance between low
bandwidth consumption and good reliability. In this paper we present an
implementation of a reliable multicast protocol over a fault tolerant MPI:
MPICHV2. It can provide one way to solve the problem of transferring large
chunks of data between applications running on a grid with limited network
links. We first show that we can achieve similar performance as the MPICH-P4
implementation by using multicast with data compression in a cluster. Next, we
provide a theoretical cluster organization and GRID network architecture to
harness the performance provided by using multicast. Finally, we present the
conclusion and future work.
| [
{
"version": "v1",
"created": "Tue, 29 Aug 2006 13:14:29 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Hudzia",
"Benoit",
""
],
[
"Petiton",
"Serge",
""
]
]
| new_dataset | 0.954049 |
cs/0608120 | Thierry Cachat | Thierry Cachat (LIAFA) | Controller synthesis & Ordinal Automata | with appendix | Proceedings of the 4th International Symposium on Automated
Technology for Verification and Analysis (ATVA'06) Springer (Ed.) (2006)
215-228 | null | null | cs.GT | null | Ordinal automata are used to model physical systems with Zeno behavior. Using
automata and games techniques we solve a control problem formulated and left
open by Demri and Nowak in 2005. It involves partial observability and a new
synchronization between the controller and the environment.
| [
{
"version": "v1",
"created": "Wed, 30 Aug 2006 09:58:08 GMT"
},
{
"version": "v2",
"created": "Mon, 30 Oct 2006 11:04:54 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Cachat",
"Thierry",
"",
"LIAFA"
]
]
| new_dataset | 0.999316 |
cs/0609016 | Tomasz Ciszkowski Mr | Tomasz Ciszkowski, Zbigniew Kotulski | ANAP: Anonymous Authentication Protocol in Mobile Ad hoc Networks | 12 pages, 10th Domestic Conference on Applied Cryptography ENIGMA,
Warsaw, Poland, May 2006, The second author's last name was corrected | null | null | null | cs.CR cs.NI | null | The pervasiveness of wireless communication recently gave mobile ad hoc
networks (MANET) a significant researchers' attention, due to its innate
capabilities of instant communication in many time and mission critical
applications. However, its natural advantages of networking in civilian and
military environments make them vulnerable to security threats. Support for an
anonymity in MANET is an orthogonal to security critical challenge we faced in
this paper. We propose a new anonymous authentication protocol for mobile ad
hoc networks enhanced with a distributed reputation system. The main its
objective is to provide mechanisms concealing a real identity of communicating
nodes with an ability of resist to known attacks. The distributed reputation
system is incorporated for a trust management and malicious behavior detection
in the network. The end-to-end anonymous authentication is conducted in
three-pass handshake based on an asymmetric and symmetric key cryptography.
After successfully finished authentication phase secure and multiple anonymous
data channels are established. The anonymity is guarantied by randomly chosen
pseudonyms owned by a user. Nodes of the network are publicly identified and
are independent of users' pseudonyms. In this paper we presented an example of
the protocol implementation.
| [
{
"version": "v1",
"created": "Tue, 5 Sep 2006 18:21:45 GMT"
},
{
"version": "v2",
"created": "Wed, 6 Sep 2006 14:40:25 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ciszkowski",
"Tomasz",
""
],
[
"Kotulski",
"Zbigniew",
""
]
]
| new_dataset | 0.998177 |
cs/0609029 | Himanshu Thapliyal | Himanshu Thapliyal and Hamid R. Arabnia | Reversible Programmable Logic Array (RPLA) using Fredkin & Feynman Gates
for Industrial Electronics and Applications | Published in Proceedings of the International Conference on Embedded
Systems and Applications(ESA'06),Las Vegas, U.S.A, June 2006(CSREA Press) | null | null | null | cs.AR | null | In recent years, reversible logic has emerged as a promising computing
paradigm having application in low power CMOS, quantum computing,
nanotechnology, and optical computing. The classical set of gates such as AND,
OR, and EXOR are not reversible. In this paper, the authors have proposed
reversible programmable logic array (RPLA) architecture using reversible
Fredkin and Feynman gates. The proposed RPLA has n inputs and m outputs and can
realize m functions of n variables. In order to demonstrate the design of RPLA,
a 3 input RPLA is designed which can perform any 28 functions using the
combination of 8 min terms (23). Furthermore, the application of the designed 3
input RPLA is shown by implementing the full adder and full subtractor
functions through it.
| [
{
"version": "v1",
"created": "Thu, 7 Sep 2006 14:25:21 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Thapliyal",
"Himanshu",
""
],
[
"Arabnia",
"Hamid R.",
""
]
]
| new_dataset | 0.95077 |
cs/0609036 | Himanshu Thapliyal | Himanshu Thapliyal, Hamid R. Arabnia and M.B Srinivas | Reduced Area Low Power High Throughput BCD Adders for IEEE 754r Format | 6 Pages;Published in Proceedings of the 11th International CSI
Computer Conference (CSICC'06), Tehran, Jan 24-26, 2006, pp.59-64 | null | null | null | cs.AR | null | IEEE 754r is the ongoing revision to the IEEE 754 floating point standard and
a major enhancement to the standard is the addition of decimal format. Firstly,
this paper proposes novel two transistor AND and OR gates. The proposed AND
gate has no power supply, thus it can be referred as the Powerless AND gate.
Similarly, the proposed two transistor OR gate has no ground and can be
referred as Groundless OR. Secondly for IEEE 754r format, two novel BCD adders
called carry skip and carry look-ahead BCD adders are also proposed in this
paper. In order to design the carry look-ahead BCD adder, a novel 4 bit carry
look-ahead adder called NCLA is proposed which forms the basic building block
of the proposed carry look-ahead BCD adder. Finally, the proposed two
transistors AND and OR gates are used to provide the optimized small area low
power high throughput circuitries of the proposed BCD adders.
| [
{
"version": "v1",
"created": "Fri, 8 Sep 2006 05:36:20 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Thapliyal",
"Himanshu",
""
],
[
"Arabnia",
"Hamid R.",
""
],
[
"Srinivas",
"M. B",
""
]
]
| new_dataset | 0.993644 |
cs/0609051 | Ralf Steinberger | Bruno Pouliquen, Ralf Steinberger, Camelia Ignat, Irina Temnikova,
Anna Widiger, Wajdi Zaghouani, Jan Zizka | Multilingual person name recognition and transliteration | Explains the technology behind the JRC's NewsExplorer application,
which is freely accessible at http://press.jrc.it/NewsExplorer | Journal CORELA - Cognition, Representation, Langage. Numeros
speciaux, Le traitement lexicographique des noms propres. December 2005. ISSN
1638-5748 | null | null | cs.CL cs.IR | null | We present an exploratory tool that extracts person names from multilingual
news collections, matches name variants referring to the same person, and
infers relationships between people based on the co-occurrence of their names
in related news. A novel feature is the matching of name variants across
languages and writing systems, including names written with the Greek, Cyrillic
and Arabic writing system. Due to our highly multilingual setting, we use an
internal standard representation for name representation and matching, instead
of adopting the traditional bilingual approach to transliteration. This work is
part of the news analysis system NewsExplorer that clusters an average of
25,000 news articles per day to detect related news within the same and across
different languages.
| [
{
"version": "v1",
"created": "Mon, 11 Sep 2006 11:08:23 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Pouliquen",
"Bruno",
""
],
[
"Steinberger",
"Ralf",
""
],
[
"Ignat",
"Camelia",
""
],
[
"Temnikova",
"Irina",
""
],
[
"Widiger",
"Anna",
""
],
[
"Zaghouani",
"Wajdi",
""
],
[
"Zizka",
"Jan",
""
]
]
| new_dataset | 0.99705 |
cs/0609058 | Ralf Steinberger | Ralf Steinberger, Bruno Pouliquen, Anna Widiger, Camelia Ignat, Tomaz
Erjavec, Dan Tufis, Daniel Varga | The JRC-Acquis: A multilingual aligned parallel corpus with 20+
languages | A multilingual textual resource with meta-data freely available for
download at http://langtech.jrc.it/JRC-Acquis.html | Proceedings of the 5th International Conference on Language
Resources and Evaluation (LREC'2006), pp. 2142-2147. Genoa, Italy, 24-26 May
2006 | null | null | cs.CL | null | We present a new, unique and freely available parallel corpus containing
European Union (EU) documents of mostly legal nature. It is available in all 20
official EUanguages, with additional documents being available in the languages
of the EU candidate countries. The corpus consists of almost 8,000 documents
per language, with an average size of nearly 9 million words per language.
Pair-wise paragraph alignment information produced by two different aligners
(Vanilla and HunAlign) is available for all 190+ language pair combinations.
Most texts have been manually classified according to the EUROVOC subject
domains so that the collection can also be used to train and test multi-label
classification algorithms and keyword-assignment software. The corpus is
encoded in XML, according to the Text Encoding Initiative Guidelines. Due to
the large number of parallel texts in many languages, the JRC-Acquis is
particularly suitable to carry out all types of cross-language research, as
well as to test and benchmark text analysis software across different languages
(for instance for alignment, sentence splitting and term extraction).
| [
{
"version": "v1",
"created": "Tue, 12 Sep 2006 07:10:15 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Steinberger",
"Ralf",
""
],
[
"Pouliquen",
"Bruno",
""
],
[
"Widiger",
"Anna",
""
],
[
"Ignat",
"Camelia",
""
],
[
"Erjavec",
"Tomaz",
""
],
[
"Tufis",
"Dan",
""
],
[
"Varga",
"Daniel",
""
]
]
| new_dataset | 0.999616 |
cs/0609061 | Ralf Steinberger | Ralf Steinberger (European Commission - Joint Research Centre) | Cross-lingual keyword assignment | Precursor paper to cs.CL/0609059. The automatic classification system
described here has now matured and is in daily use for document indexing in a
European parliament. See http://langtech.jrc.it/Eurovoc.html for more
details. 8 pages | Proceedings of the XVII Conference of the Spanish Society for
Natural Language Processing (SEPLN-2001). Procesamiento del Lenguaje Natural,
Revista No. 27, pp. 273-280. Jaen, Spain, 12-14 September 2001. ISSN
1135-5948 | null | null | cs.CL cs.IR | null | This paper presents a language-independent approach to controlled vocabulary
keyword assignment using the EUROVOC thesaurus. Due to the multilingual nature
of EUROVOC, the keywords for a document written in one language can be
displayed in all eleven official European Union languages. The mapping of
documents written in different languages to the same multilingual thesaurus
furthermore allows cross-language document comparison. The assignment of the
controlled vocabulary thesaurus descriptors is achieved by applying a
statistical method that uses a collection of manually indexed documents to
identify, for each thesaurus descriptor, a large number of lemmas that are
statistically associated to the descriptor. These associated words are then
used during the assignment procedure to identify a ranked list of those EUROVOC
terms that are most likely to be good keywords for a given document. The paper
also describes the challenges of this task and discusses the achieved results
of the fully functional prototype.
| [
{
"version": "v1",
"created": "Tue, 12 Sep 2006 09:29:57 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Steinberger",
"Ralf",
"",
"European Commission - Joint Research Centre"
]
]
| new_dataset | 0.998621 |
cs/0609065 | Ralf Steinberger | Bruno Pouliquen, Marco Kimler, Ralf Steinberger, Camelia Ignat, Tamara
Oellinger, Ken Blackler, Flavio Fuart, Wajdi Zaghouani, Anna Widiger,
Ann-Charlotte Forslund, Clive Best (European Commission - Joint Research
Centre) | Geocoding multilingual texts: Recognition, disambiguation and
visualisation | 6 pages | Proceedings of the 5th International Conference on Language
Resources and Evaluation (LREC-2006), pp. 53-58. Genoa, Italy, 24-26 May 2006 | null | null | cs.CL cs.IR | null | We are presenting a method to recognise geographical references in free text.
Our tool must work on various languages with a minimum of language-dependent
resources, except a gazetteer. The main difficulty is to disambiguate these
place names by distinguishing places from persons and by selecting the most
likely place out of a list of homographic place names world-wide. The system
uses a number of language-independent clues and heuristics to disambiguate
place name homographs. The final aim is to index texts with the countries and
cities they mention and to automatically visualise this information on
geographical maps using various tools.
| [
{
"version": "v1",
"created": "Tue, 12 Sep 2006 12:57:38 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Pouliquen",
"Bruno",
"",
"European Commission - Joint Research\n Centre"
],
[
"Kimler",
"Marco",
"",
"European Commission - Joint Research\n Centre"
],
[
"Steinberger",
"Ralf",
"",
"European Commission - Joint Research\n Centre"
],
[
"Ignat",
"Camelia",
"",
"European Commission - Joint Research\n Centre"
],
[
"Oellinger",
"Tamara",
"",
"European Commission - Joint Research\n Centre"
],
[
"Blackler",
"Ken",
"",
"European Commission - Joint Research\n Centre"
],
[
"Fuart",
"Flavio",
"",
"European Commission - Joint Research\n Centre"
],
[
"Zaghouani",
"Wajdi",
"",
"European Commission - Joint Research\n Centre"
],
[
"Widiger",
"Anna",
"",
"European Commission - Joint Research\n Centre"
],
[
"Forslund",
"Ann-Charlotte",
"",
"European Commission - Joint Research\n Centre"
],
[
"Best",
"Clive",
"",
"European Commission - Joint Research\n Centre"
]
]
| new_dataset | 0.999056 |
cs/0609131 | Ran Ren | Ran Ren, Madan mohan Manokar, Yaogang Shi, Baoyu Zheng | A Fast Block Matching Algorithm for Video Motion Estimation Based on
Particle Swarm Optimization and Motion Prejudgment | 10 pages, 12 figures, submitted to ACM Symposium of Applied
Computing(SAC) | null | null | null | cs.MM | null | In this paper, we propose a fast 2-D block-based motion estimation algorithm
called Particle Swarm Optimization - Zero-motion Prejudgment(PSO-ZMP) which
consists of three sequential routines: 1)Zero-motion prejudgment. The routine
aims at finding static macroblocks(MB) which do not need to perform remaining
search thus reduces the computational cost; 2)Predictive image coding and 3)PSO
matching routine. Simulation results obtained show that the proposed PSO-ZMP
algorithm achieves over 10 times of computation less than Diamond Search(DS)
and 5 times less than the recent proposed Adaptive Rood Pattern
Searching(ARPS). Meanwhile the PSNR performances using PSO-ZMP are very close
to that using DS and ARPS in some less-motioned sequences. While in some
sequences containing dense and complex motion contents, the PSNR performances
of PSO-ZMP are several dB lower than that using DS and ARPS but in an
acceptable degree.
| [
{
"version": "v1",
"created": "Sun, 24 Sep 2006 09:55:57 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ren",
"Ran",
""
],
[
"Manokar",
"Madan mohan",
""
],
[
"Shi",
"Yaogang",
""
],
[
"Zheng",
"Baoyu",
""
]
]
| new_dataset | 0.95565 |
cs/0609141 | Iosif Pinelis | Iosif Pinelis | Polygon Convexity: A Minimal O(n) Test | 14 pages | null | null | null | cs.CG cs.CC math.CO math.MG | null | An O(n) test for polygon convexity is stated and proved. It is also proved
that the test is minimal in a certain exact sense.
| [
{
"version": "v1",
"created": "Mon, 25 Sep 2006 19:23:55 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Pinelis",
"Iosif",
""
]
]
| new_dataset | 0.999667 |
cs/0609143 | Adrian Paschke | Adrian Paschke | ECA-LP / ECA-RuleML: A Homogeneous Event-Condition-Action Logic
Programming Language | Paschke, A.: ECA-LP / ECA-RuleML: A Homogeneous
Event-Condition-Action Logic Programming Language, Int. Conf. on Rules and
Rule Markup Languages for the Semantic Web (RuleML06), Athens, Georgia, USA,
Nov. 2006 | Paschke, A.: ECA-LP / ECA-RuleML: A Homogeneous
Event-Condition-Action Logic Programming Language, Int. Conf. on Rules and
Rule Markup Languages for the Semantic Web (RuleML06), Athens, Georgia, USA,
Nov. 2006 | null | null | cs.AI cs.LO cs.SE | null | Event-driven reactive functionalities are an urgent need in nowadays
distributed service-oriented applications and (Semantic) Web-based
environments. An important problem to be addressed is how to correctly and
efficiently capture and process the event-based behavioral, reactive logic
represented as ECA rules in combination with other conditional decision logic
which is represented as derivation rules. In this paper we elaborate on a
homogeneous integration approach which combines derivation rules, reaction
rules (ECA rules) and other rule types such as integrity constraint into the
general framework of logic programming. The developed ECA-LP language provides
expressive features such as ID-based updates with support for external and
self-updates of the intensional and extensional knowledge, transac-tions
including integrity testing and an event algebra to define and process complex
events and actions based on a novel interval-based Event Calculus variant.
| [
{
"version": "v1",
"created": "Tue, 26 Sep 2006 14:36:47 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Paschke",
"Adrian",
""
]
]
| new_dataset | 0.995772 |
cs/0609145 | Alexandre d'Aspremont | Alexandre d'Aspremont, Laurent El Ghaoui | A Semidefinite Relaxation for Air Traffic Flow Scheduling | Submitted to RIVF 2007 | null | null | null | cs.CE | null | We first formulate the problem of optimally scheduling air traffic low with
sector capacity constraints as a mixed integer linear program. We then use
semidefinite relaxation techniques to form a convex relaxation of that problem.
Finally, we present a randomization algorithm to further improve the quality of
the solution. Because of the specific structure of the air traffic flow
problem, the relaxation has a single semidefinite constraint of size dn where d
is the maximum delay and n the number of flights.
| [
{
"version": "v1",
"created": "Tue, 26 Sep 2006 15:34:40 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"d'Aspremont",
"Alexandre",
""
],
[
"Ghaoui",
"Laurent El",
""
]
]
| new_dataset | 0.997822 |
cs/0610006 | Adrian Paschke | Adrian Paschke | A Typed Hybrid Description Logic Programming Language with Polymorphic
Order-Sorted DL-Typed Unification for Semantic Web Type Systems | Full technical report 12/05. Published inn: Proc. of 2nd Int.
Workshop on OWL: Experiences and Directions 2006 (OWLED'06) at ISWC'06,
Athens, Georgia, USA, 2006 | In: Proc. of 2nd Int. Workshop on OWL: Experiences and Directions
2006 (OWLED'06) at ISWC'06, Athens, Georgia, USA, 2006 | null | null | cs.AI | null | In this paper we elaborate on a specific application in the context of hybrid
description logic programs (hybrid DLPs), namely description logic Semantic Web
type systems (DL-types) which are used for term typing of LP rules based on a
polymorphic, order-sorted, hybrid DL-typed unification as procedural semantics
of hybrid DLPs. Using Semantic Web ontologies as type systems facilitates
interchange of domain-independent rules over domain boundaries via dynamically
typing and mapping of explicitly defined type ontologies.
| [
{
"version": "v1",
"created": "Mon, 2 Oct 2006 08:57:54 GMT"
},
{
"version": "v2",
"created": "Tue, 3 Apr 2007 21:36:44 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Paschke",
"Adrian",
""
]
]
| new_dataset | 0.967059 |
cs/0610011 | Alberto Accomazzi | Alberto Accomazzi, Gunther Eichhorn, Michael J. Kurtz, Carolyn S.
Grant, Edwin Henneken, Markus Demleitner, Donna Thompson, Elizabeth Bohlen,
Stephen S. Murray | Creation and use of Citations in the ADS | 9 pages; to be published in the proceedings of the conference
"Library and Information Services V," June 2006, Cambridge, MA, USA | null | null | null | cs.DL astro-ph cs.DB cs.IR | null | With over 20 million records, the ADS citation database is regularly used by
researchers and librarians to measure the scientific impact of individuals,
groups, and institutions. In addition to the traditional sources of citations,
the ADS has recently added references extracted from the arXiv e-prints on a
nightly basis. We review the procedures used to harvest and identify the
reference data used in the creation of citations, the policies and procedures
that we follow to avoid double-counting and to eliminate contributions which
may not be scholarly in nature. Finally, we describe how users and institutions
can easily obtain quantitative citation data from the ADS, both interactively
and via web-based programming tools.
The ADS is available at http://ads.harvard.edu.
| [
{
"version": "v1",
"created": "Tue, 3 Oct 2006 21:29:03 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Accomazzi",
"Alberto",
""
],
[
"Eichhorn",
"Gunther",
""
],
[
"Kurtz",
"Michael J.",
""
],
[
"Grant",
"Carolyn S.",
""
],
[
"Henneken",
"Edwin",
""
],
[
"Demleitner",
"Markus",
""
],
[
"Thompson",
"Donna",
""
],
[
"Bohlen",
"Elizabeth",
""
],
[
"Murray",
"Stephen S.",
""
]
]
| new_dataset | 0.997241 |
cs/0610020 | William Gilreath | William F. Gilreath | XString: XML as a String | 27-pages, 2-tables | null | null | null | cs.DB | null | Extensible markup language (XML) is a technology that has been much hyped, so
that XML has become an industry buzzword. Behind the hype is a powerful
technology for data representation in a platform independent manner. As a text
document, however, XML suffers from being too bloated, and requires an XML
parser to access and manipulate it. XString is an encoding method for XML, in
essence, a markup language's markup language. XString gives the benefit of
compressing XML, and allows for easy manipulation and processing of XML source
as a very long string.
| [
{
"version": "v1",
"created": "Wed, 4 Oct 2006 23:21:11 GMT"
},
{
"version": "v2",
"created": "Fri, 6 Oct 2006 23:03:01 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Gilreath",
"William F.",
""
]
]
| new_dataset | 0.999759 |
cs/0610029 | Alberto Accomazzi | Carolyn S. Grant, Alberto Accomazzi, Donna Thompson, Edwin Henneken,
Guenther Eichhorn, Michael J. Kurtz, and Stephen S. Murray | Data in the ADS -- Understanding How to Use it Better | 4 pages; submitted to the proceedings of the Library and Information
Services in Astronomy V; to be published by ASP Conference Proceedings | null | null | null | cs.DL cs.DB | null | The Smithsonian/NASA ADS Abstract Service contains a wealth of data for
astronomers and librarians alike, yet the vast majority of usage consists of
rudimentary searches. Hints on how to obtain more focused search results by
using more of the various capabilities of the ADS are presented, including
searching by affiliation. We also discuss the classification of articles by
content and by referee status.
The ADS is funded by NASA Grant NNG06GG68G-16613687.
| [
{
"version": "v1",
"created": "Thu, 5 Oct 2006 18:51:54 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Grant",
"Carolyn S.",
""
],
[
"Accomazzi",
"Alberto",
""
],
[
"Thompson",
"Donna",
""
],
[
"Henneken",
"Edwin",
""
],
[
"Eichhorn",
"Guenther",
""
],
[
"Kurtz",
"Michael J.",
""
],
[
"Murray",
"Stephen S.",
""
]
]
| new_dataset | 0.997687 |
cs/0610048 | Stephen D. Miller | Nathan Keller, Stephen D. Miller, Ilya Mironov, and Ramarathnam
Venkatesan | MV3: A new word based stream cipher using rapid mixing and revolving
buffers | 27 pages, shortened version will appear in "Topics in Cryptology -
CT-RSA 2007" | null | null | null | cs.CR cs.DM math.CO | null | MV3 is a new word based stream cipher for encrypting long streams of data. A
direct adaptation of a byte based cipher such as RC4 into a 32- or 64-bit word
version will obviously need vast amounts of memory. This scaling issue
necessitates a look for new components and principles, as well as mathematical
analysis to justify their use. Our approach, like RC4's, is based on rapidly
mixing random walks on directed graphs (that is, walks which reach a random
state quickly, from any starting point). We begin with some well understood
walks, and then introduce nonlinearity in their steps in order to improve
security and show long term statistical correlations are negligible. To
minimize the short term correlations, as well as to deter attacks using
equations involving successive outputs, we provide a method for sequencing the
outputs derived from the walk using three revolving buffers. The cipher is fast
-- it runs at a speed of less than 5 cycles per byte on a Pentium IV processor.
A word based cipher needs to output more bits per step, which exposes more
correlations for attacks. Moreover we seek simplicity of construction and
transparent analysis. To meet these requirements, we use a larger state and
claim security corresponding to only a fraction of it. Our design is for an
adequately secure word-based cipher; our very preliminary estimate puts the
security close to exhaustive search for keys of size < 256 bits.
| [
{
"version": "v1",
"created": "Tue, 10 Oct 2006 01:23:52 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Keller",
"Nathan",
""
],
[
"Miller",
"Stephen D.",
""
],
[
"Mironov",
"Ilya",
""
],
[
"Venkatesan",
"Ramarathnam",
""
]
]
| new_dataset | 0.998916 |
cs/0610075 | Marek Czachor | Diederik Aerts, Marek Czachor, Bart De Moor | On Geometric Algebra representation of Binary Spatter Codes | preliminary version | null | null | null | cs.AI quant-ph | null | Kanerva's Binary Spatter Codes are reformulated in terms of geometric
algebra. The key ingredient of the construction is the representation of XOR
binding in terms of geometric product.
| [
{
"version": "v1",
"created": "Thu, 12 Oct 2006 18:48:22 GMT"
},
{
"version": "v2",
"created": "Mon, 23 Oct 2006 13:56:54 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Aerts",
"Diederik",
""
],
[
"Czachor",
"Marek",
""
],
[
"De Moor",
"Bart",
""
]
]
| new_dataset | 0.969102 |
cs/0610078 | Fehmi Ben Abdesslem | Fehmi Ben Abdesslem, Luigi Iannone, Marcelo Dias de Amorim, Katia
Obraczka, Ignacio Solis, and Serge Fdida | Rapid Prototyping over IEEE 802.11 | Changed content. 12 pages | null | null | null | cs.NI | null | This paper introduces Prawn, a tool for prototyping communication protocols
over IEEE 802.11 networks. Prawn allows researchers to conduct both functional
assessment and performance evaluation as an inherent part of the protocol
design process. Since Prawn runs on real IEEE 802.11 nodes, prototypes can be
evaluated and adjusted under realistic conditions. Once the prototype has been
extensively tested and thoroughly validated, and its functional design tuned
accordingly, it is then ready for implementation. Prawn facilitates prototype
development by providing: (i) a set of building blocks that implement common
functions needed by a wide range of wireless protocols (e.g., neighbor
discovery, link quality assessment, message transmission and reception), and
(ii) an API that allows protocol designers to access Prawn primitives. We show
through a number of case studies how Prawn supports prototyping as part of
protocol design and, as a result of enabling deployment and testing under
real-world scenarios, how Prawn provides useful feedback on protocol operation
and performance.
| [
{
"version": "v1",
"created": "Fri, 13 Oct 2006 15:29:44 GMT"
},
{
"version": "v2",
"created": "Sat, 3 Feb 2007 21:41:58 GMT"
},
{
"version": "v3",
"created": "Tue, 22 May 2007 16:24:37 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Abdesslem",
"Fehmi Ben",
""
],
[
"Iannone",
"Luigi",
""
],
[
"de Amorim",
"Marcelo Dias",
""
],
[
"Obraczka",
"Katia",
""
],
[
"Solis",
"Ignacio",
""
],
[
"Fdida",
"Serge",
""
]
]
| new_dataset | 0.991928 |
cs/0610085 | Farn Wang | Farn Wang | Symbolic Simulation-Checking of Dense-Time Systems | 16 pages, 1 figure | null | null | null | cs.LO cs.SE | null | Intuitively, an (implementation) automata is simulated by a (specification)
automata if every externally observable transition by the implementation
automata can also be made by the specification automata. In this work, we
present a symbolic algorithm for the simulation-checking of timed automatas. We
first present a simulation-checking procedure that operates on state spaces,
representable with convex polyhedra, of timed automatas. We then present
techniques to represent those intermediate result convex polyhedra with zones
and make the procedure an algorithm. We then discuss how to handle Zeno states
in the implementation automata. Finally, we have endeavored to realize the
algorithm and report the performance of our algorithm in the experiment.
| [
{
"version": "v1",
"created": "Fri, 13 Oct 2006 18:02:47 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Wang",
"Farn",
""
]
]
| new_dataset | 0.970899 |
cs/0610137 | Silvano Dal Zilio | Lucia Acciai (LIF), Michele Boreale, Silvano Dal Zilio (LIF) | A Concurrent Calculus with Atomic Transactions | 29 pages | null | null | null | cs.LO cs.DC | null | The Software Transactional Memory (STM) model is an original approach for
controlling concurrent accesses to ressources without the need for explicit
lock-based synchronization mechanisms. A key feature of STM is to provide a way
to group sequences of read and write actions inside atomic blocks, similar to
database transactions, whose whole effect should occur atomically. In this
paper, we investigate STM from a process algebra perspective and define an
extension of asynchronous CCS with atomic blocks of actions. Our goal is not
only to set a formal ground for reasoning on STM implementations but also to
understand how this model fits with other concurrency control mechanisms. We
also view this calculus as a test bed for extending process calculi with atomic
transactions. This is an interesting direction for investigation since, for the
most part, actual works that mix transactions with process calculi consider
compensating transactions, a model that lacks all the well-known ACID
properties. We show that the addition of atomic transactions results in a very
expressive calculus, enough to easily encode other concurrent primitives such
as guarded choice and multiset-synchronization (\`{a} la join-calculus). The
correctness of our encodings is proved using a suitable notion of bisimulation
equivalence. The equivalence is then applied to prove interesting ``laws of
transactions'' and to obtain a simple normal form for transactions.
| [
{
"version": "v1",
"created": "Tue, 24 Oct 2006 08:26:04 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Acciai",
"Lucia",
"",
"LIF"
],
[
"Boreale",
"Michele",
"",
"LIF"
],
[
"Zilio",
"Silvano Dal",
"",
"LIF"
]
]
| new_dataset | 0.997635 |
cs/0610174 | Marko Samer | Marko Samer, Stefan Szeider | A Fixed-Parameter Algorithm for #SAT with Parameter Incidence Treewidth | 9 pages, 1 figure | null | null | null | cs.DS cs.CC cs.LO | null | We present an efficient fixed-parameter algorithm for #SAT parameterized by
the incidence treewidth, i.e., the treewidth of the bipartite graph whose
vertices are the variables and clauses of the given CNF formula; a variable and
a clause are joined by an edge if and only if the variable occurs in the
clause. Our algorithm runs in time O(4^k k l N), where k denotes the incidence
treewidth, l denotes the size of a largest clause, and N denotes the number of
nodes of the tree-decomposition.
| [
{
"version": "v1",
"created": "Tue, 31 Oct 2006 12:58:36 GMT"
},
{
"version": "v2",
"created": "Wed, 21 Feb 2007 20:56:15 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Samer",
"Marko",
""
],
[
"Szeider",
"Stefan",
""
]
]
| new_dataset | 0.99529 |
cs/0611006 | Julian Togelius | Julian Togelius and Simon M. Lucas | Evolving controllers for simulated car racing | Won the CEC 2005 Best Student Paper Award | Proceedings of the 2005 Congress on Evolutionary Computation,
pages 1906-1913 | null | null | cs.NE cs.LG cs.RO | null | This paper describes the evolution of controllers for racing a simulated
radio-controlled car around a track, modelled on a real physical track. Five
different controller architectures were compared, based on neural networks,
force fields and action sequences. The controllers use either egocentric (first
person), Newtonian (third person) or no information about the state of the car
(open-loop controller). The only controller that was able to evolve good racing
behaviour was based on a neural network acting on egocentric inputs.
| [
{
"version": "v1",
"created": "Thu, 2 Nov 2006 00:47:57 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Togelius",
"Julian",
""
],
[
"Lucas",
"Simon M.",
""
]
]
| new_dataset | 0.9589 |
cs/0611022 | Anurag Ganguli | Anurag Ganguli, Jorge Cortes, Francesco Bullo | Multirobot rendezvous with visibility sensors in nonconvex environments | 21 pages | null | null | null | cs.RO | null | This paper presents a coordination algorithm for mobile autonomous robots.
Relying upon distributed sensing the robots achieve rendezvous, that is, they
move to a common location. Each robot is a point mass moving in a nonconvex
environment according to an omnidirectional kinematic model. Each robot is
equipped with line-of-sight limited-range sensors, i.e., a robot can measure
the relative position of any object (robots or environment boundary) if and
only if the object is within a given distance and there are no obstacles
in-between. The algorithm is designed using the notions of robust visibility,
connectivity-preserving constraint sets, and proximity graphs. Simulations
illustrate the theoretical results on the correctness of the proposed
algorithm, and its performance in asynchronous setups and with sensor
measurement and control errors.
| [
{
"version": "v1",
"created": "Mon, 6 Nov 2006 02:50:42 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ganguli",
"Anurag",
""
],
[
"Cortes",
"Jorge",
""
],
[
"Bullo",
"Francesco",
""
]
]
| new_dataset | 0.999336 |
cs/0611026 | Susanne Salmon-Alt | Susanne Salmon-Alt (ATILF), Laurent Romary (INRIA Lorraine - LORIA),
Jean-Marie Pierrel (ATILF) | Un mod\`ele g\'en\'erique d'organisation de corpus en ligne: application
\`a la FReeBank | null | Traitement Automatique des Langues (TAL) 45 (2006) 145-169 | null | null | cs.CL | null | The few available French resources for evaluating linguistic models or
algorithms on other linguistic levels than morpho-syntax are either
insufficient from quantitative as well as qualitative point of view or not
freely accessible. Based on this fact, the FREEBANK project intends to create
French corpora constructed using manually revised output from a hybrid
Constraint Grammar parser and annotated on several linguistic levels
(structure, morpho-syntax, syntax, coreference), with the objective to make
them available on-line for research purposes. Therefore, we will focus on using
standard annotation schemes, integration of existing resources and maintenance
allowing for continuous enrichment of the annotations. Prior to the actual
presentation of the prototype that has been implemented, this paper describes a
generic model for the organization and deployment of a linguistic resource
archive, in compliance with the various works currently conducted within
international standardization initiatives (TEI and ISO/TC 37/SC 4).
| [
{
"version": "v1",
"created": "Mon, 6 Nov 2006 14:37:27 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Salmon-Alt",
"Susanne",
"",
"ATILF"
],
[
"Romary",
"Laurent",
"",
"INRIA Lorraine - LORIA"
],
[
"Pierrel",
"Jean-Marie",
"",
"ATILF"
]
]
| new_dataset | 0.999311 |
cs/0611033 | Maria Naya Plasencia | Maria Naya Plasencia (INRIA Rocquencourt) | Cryptanalyse de Achterbahn-128/80 | null | null | null | null | cs.CR | null | This paper presents two attacks against Achterbahn-128/80, the last version
of one of the stream cipher proposals in the eSTREAM project. The attack
against the 80-bit variant, Achterbahn-80, has complexity 2^{56.32}. The attack
against Achterbahn-128 requires 2^{75.4} operations and 2^{61} keystream bits.
These attacks are based on an improvement of the attack due to Hell and
Johansson against Achterbahn version 2 and also on an algorithm that makes
profit of the short lengths of the constituent registers.
*****
Ce papier pr\'{e}sente deux attaques sur Achterbahn-128/80, la derni\`{e}re
version d'un des algorithmes propos\'{e}s dans le cadre de eSTREAM. L'attaque
sur la version de 80 bits, Achterbahn-80, est en 2^{56.32}. L'attaque sur
Achterbahn-128 a besoin de 2^{75.4} calculs et 2^{61} bits de suite chiffrante.
Ces attaques sont bas\'{e}es sur une am\'{e}lioration de l'attaque propos\'{e}e
par Hell et Johansson sur la version 2 d'Achterbahn et aussi sur un algorithme
qui tire profit des petites longueurs des registres.
| [
{
"version": "v1",
"created": "Wed, 8 Nov 2006 07:48:39 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Plasencia",
"Maria Naya",
"",
"INRIA Rocquencourt"
]
]
| new_dataset | 0.985519 |
cs/0611087 | Vipul Mathur | Naresh Singhmar, Vipul Mathur, Varsha Apte, D. Manjunath | A Combined LIFO-Priority Scheme for Overload Control of E-commerce Web
Servers | 10 pages, 8 figures, presented at the International Infrastructure
Survivability Workshop (affiliated with the 25th IEEE International Real-Time
Systems Symposium), Lisbon, Portugal, December 2004 | null | null | null | cs.PF | null | E-commerce Web-servers often face overload conditions during which
revenue-generating requests may be dropped or abandoned due to an increase in
the browsing requests. In this paper we present a simple, yet effective,
mechanism for overload control of E-commerce Web-servers. We develop an
E-commerce workload model that separates the browsing requests from
revenue-generating transaction requests. During overload, we apply LIFO
discipline in the browsing queues and use a dynamic priority model to service
them. The transaction queues are given absolute priority over the browsing
queues. This is called the LIFO-Pri scheduling discipline. Experimental results
show that LIFO-Pri dramatically improves the overall Web-server throughput
while also increasing the completion rate of revenue-generating requests. The
Web-server was able to operate at nearly 60% of its maximum capacity even when
offered load was 1.5 times its capacity. Further, when compared to a single
queue FIFO system, there was a seven-fold increase in the number of completed
revenue-generating requests during overload.
| [
{
"version": "v1",
"created": "Fri, 17 Nov 2006 23:43:40 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Singhmar",
"Naresh",
""
],
[
"Mathur",
"Vipul",
""
],
[
"Apte",
"Varsha",
""
],
[
"Manjunath",
"D.",
""
]
]
| new_dataset | 0.976234 |
cs/0611107 | Adam L. Buchsbaum | Adam L. Buchsbaum, Emden R. Gansner, Cecilia M. Procopiuc, Suresh
Venkatasubramanian | Rectangular Layouts and Contact Graphs | 28 pages, 13 figures, 55 references, 1 appendix | null | null | null | cs.DS cs.DM | null | Contact graphs of isothetic rectangles unify many concepts from applications
including VLSI and architectural design, computational geometry, and GIS.
Minimizing the area of their corresponding {\em rectangular layouts} is a key
problem. We study the area-optimization problem and show that it is NP-hard to
find a minimum-area rectangular layout of a given contact graph. We present
O(n)-time algorithms that construct $O(n^2)$-area rectangular layouts for
general contact graphs and $O(n\log n)$-area rectangular layouts for trees.
(For trees, this is an $O(\log n)$-approximation algorithm.) We also present an
infinite family of graphs (rsp., trees) that require $\Omega(n^2)$ (rsp.,
$\Omega(n\log n)$) area.
We derive these results by presenting a new characterization of graphs that
admit rectangular layouts using the related concept of {\em rectangular duals}.
A corollary to our results relates the class of graphs that admit rectangular
layouts to {\em rectangle of influence drawings}.
| [
{
"version": "v1",
"created": "Tue, 21 Nov 2006 15:03:37 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Buchsbaum",
"Adam L.",
""
],
[
"Gansner",
"Emden R.",
""
],
[
"Procopiuc",
"Cecilia M.",
""
],
[
"Venkatasubramanian",
"Suresh",
""
]
]
| new_dataset | 0.988896 |
cs/0612047 | Kristina Lerman | Kristina Lerman and Laurie Jones | Social Browsing on Flickr | 8 pages; submitted to the International Conference on Weblogs and
Social Media | null | null | null | cs.HC cs.AI | null | The new social media sites - blogs, wikis, del.icio.us and Flickr, among
others - underscore the transformation of the Web to a participatory medium in
which users are actively creating, evaluating and distributing information. The
photo-sharing site Flickr, for example, allows users to upload photographs,
view photos created by others, comment on those photos, etc. As is common to
other social media sites, Flickr allows users to designate others as
``contacts'' and to track their activities in real time. The contacts (or
friends) lists form the social network backbone of social media sites. We claim
that these social networks facilitate new ways of interacting with information,
e.g., through what we call social browsing. The contacts interface on Flickr
enables users to see latest images submitted by their friends. Through an
extensive analysis of Flickr data, we show that social browsing through the
contacts' photo streams is one of the primary methods by which users find new
images on Flickr. This finding has implications for creating personalized
recommendation systems based on the user's declared contacts lists.
| [
{
"version": "v1",
"created": "Thu, 7 Dec 2006 23:41:51 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lerman",
"Kristina",
""
],
[
"Jones",
"Laurie",
""
]
]
| new_dataset | 0.996716 |
cs/0612054 | Wojciech Mazurczyk | Wojciech Mazurczyk, Zbigniew Kotulski | Lightweight security mechanism for PSTN-VoIP cooperation | 6 pages, 5 figures | null | null | null | cs.CR cs.MM | null | In this paper we describe a new, lightweight security mechanism for PSTN-VoIP
cooperation that is based on two information hiding techniques: digital
watermarking and steganography. Proposed scheme is especially suitable for
PSTN-IP-PSTN (toll-by-passing) scenario which nowadays is very popular
application of IP Telephony systems. With the use of this mechanism we
authenticate end-to-end transmitted voice between PSTN users. Additionally we
improve IP part traffic security (both media stream and VoIP signalling
messages). Exemplary scenario is presented for SIP signalling protocol along
with SIP-T extension and H.248/Megaco protocol.
| [
{
"version": "v1",
"created": "Fri, 8 Dec 2006 22:05:21 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Mazurczyk",
"Wojciech",
""
],
[
"Kotulski",
"Zbigniew",
""
]
]
| new_dataset | 0.994813 |
cs/0612085 | Roberto Bagnara | Roberto Bagnara, Patricia M. Hill, Enea Zaffanella | The Parma Polyhedra Library: Toward a Complete Set of Numerical
Abstractions for the Analysis and Verification of Hardware and Software
Systems | 38 pages, 2 figures, 3 listings, 3 tables | null | null | Quaderno 457 | cs.MS cs.PL | null | Since its inception as a student project in 2001, initially just for the
handling (as the name implies) of convex polyhedra, the Parma Polyhedra Library
has been continuously improved and extended by joining scrupulous research on
the theoretical foundations of (possibly non-convex) numerical abstractions to
a total adherence to the best available practices in software development. Even
though it is still not fully mature and functionally complete, the Parma
Polyhedra Library already offers a combination of functionality, reliability,
usability and performance that is not matched by similar, freely available
libraries. In this paper, we present the main features of the current version
of the library, emphasizing those that distinguish it from other similar
libraries and those that are important for applications in the field of
analysis and verification of hardware and software systems.
| [
{
"version": "v1",
"created": "Mon, 18 Dec 2006 10:15:38 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Bagnara",
"Roberto",
""
],
[
"Hill",
"Patricia M.",
""
],
[
"Zaffanella",
"Enea",
""
]
]
| new_dataset | 0.998525 |
cs/0612119 | Philippe Saux Picart | Cyril Brunie (LACO), Philippe Saux Picart (LM) | Symmetric Subresultants and Applications | null | null | null | null | cs.SC | null | Schur's transforms of a polynomial are used to count its roots in the unit
disk. These are generalized them by introducing the sequence of symmetric
sub-resultants of two polynomials. Although they do have a determinantal
definition, we show that they satisfy a structure theorem which allows us to
compute them with a type of Euclidean division. As a consequence, a fast
algorithm based on a dichotomic process and FFT is designed. We prove also that
these symmetric sub-resultants have a deep link with Toeplitz matrices.
Finally, we propose a new algorithm of inversion for such matrices. It has the
same cost as those already known, however it is fraction-free and consequently
well adapted to computer algebra.
| [
{
"version": "v1",
"created": "Fri, 22 Dec 2006 08:20:11 GMT"
},
{
"version": "v2",
"created": "Thu, 29 Mar 2007 17:49:55 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Brunie",
"Cyril",
"",
"LACO"
],
[
"Picart",
"Philippe Saux",
"",
"LM"
]
]
| new_dataset | 0.994733 |
cs/0612127 | Mohamed Y. Eltabakh | Mohamed Y. Eltabakh, Mourad Ouzzani, Walid G. Aref | bdbms -- A Database Management System for Biological Data | This article is published under a Creative Commons License Agreement
(http://creativecommons.org/licenses/by/2.5/.) You may copy, distribute,
display, and perform the work, make derivative works and make commercial use
of the work, but, you must attribute the work to the author and CIDR 2007.
3rd Biennial Conference on Innovative Data Systems Research (CIDR) January
710, 2007, Asilomar, California, USA | null | null | null | cs.DB | null | Biologists are increasingly using databases for storing and managing their
data. Biological databases typically consist of a mixture of raw data,
metadata, sequences, annotations, and related data obtained from various
sources. Current database technology lacks several functionalities that are
needed by biological databases. In this paper, we introduce bdbms, an
extensible prototype database management system for supporting biological data.
bdbms extends the functionalities of current DBMSs to include: (1) Annotation
and provenance management including storage, indexing, manipulation, and
querying of annotation and provenance as first class objects in bdbms, (2)
Local dependency tracking to track the dependencies and derivations among data
items, (3) Update authorization to support data curation via content-based
authorization, in contrast to identity-based authorization, and (4) New access
methods and their supporting operators that support pattern matching on various
types of compressed biological data types. This paper presents the design of
bdbms along with the techniques proposed to support these functionalities
including an extension to SQL. We also outline some open issues in building
bdbms.
| [
{
"version": "v1",
"created": "Fri, 22 Dec 2006 20:32:00 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Eltabakh",
"Mohamed Y.",
""
],
[
"Ouzzani",
"Mourad",
""
],
[
"Aref",
"Walid G.",
""
]
]
| new_dataset | 0.99817 |
cs/0612129 | Bishwaranjan Bhattacharjee | Bishwaranjan Bhattacharjee, Vuk Ercegovac, Joseph Glider, Richard
Golding, Guy Lohman, Volke Markl, Hamid Pirahesh, Jun Rao, Robert Rees,
Frederick Reiss, Eugene Shekita, Garret Swart | Impliance: A Next Generation Information Management Appliance | This article is published under a Creative Commons License Agreement
(http://creativecommons.org/licenses/by/2.5/.) You may copy, distribute,
display, and perform the work, make derivative works and make commercial use
of the work, but, you must attribute the work to the author and CIDR 2007.
3rd Biennial Conference on Innovative Data Systems Research (CIDR) January
710, 2007, Asilomar, California, USA | null | null | null | cs.DB | null | ably successful in building a large market and adapting to the changes of the
last three decades, its impact on the broader market of information management
is surprisingly limited. If we were to design an information management system
from scratch, based upon today's requirements and hardware capabilities, would
it look anything like today's database systems?" In this paper, we introduce
Impliance, a next-generation information management system consisting of
hardware and software components integrated to form an easy-to-administer
appliance that can store, retrieve, and analyze all types of structured,
semi-structured, and unstructured information. We first summarize the trends
that will shape information management for the foreseeable future. Those trends
imply three major requirements for Impliance: (1) to be able to store, manage,
and uniformly query all data, not just structured records; (2) to be able to
scale out as the volume of this data grows; and (3) to be simple and robust in
operation. We then describe four key ideas that are uniquely combined in
Impliance to address these requirements, namely the ideas of: (a) integrating
software and off-the-shelf hardware into a generic information appliance; (b)
automatically discovering, organizing, and managing all data - unstructured as
well as structured - in a uniform way; (c) achieving scale-out by exploiting
simple, massive parallel processing, and (d) virtualizing compute and storage
resources to unify, simplify, and streamline the management of Impliance.
Impliance is an ambitious, long-term effort to define simpler, more robust, and
more scalable information systems for tomorrow's enterprises.
| [
{
"version": "v1",
"created": "Fri, 22 Dec 2006 20:49:29 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Bhattacharjee",
"Bishwaranjan",
""
],
[
"Ercegovac",
"Vuk",
""
],
[
"Glider",
"Joseph",
""
],
[
"Golding",
"Richard",
""
],
[
"Lohman",
"Guy",
""
],
[
"Markl",
"Volke",
""
],
[
"Pirahesh",
"Hamid",
""
],
[
"Rao",
"Jun",
""
],
[
"Rees",
"Robert",
""
],
[
"Reiss",
"Frederick",
""
],
[
"Shekita",
"Eugene",
""
],
[
"Swart",
"Garret",
""
]
]
| new_dataset | 0.982974 |
cs/0612132 | Lokman Meho | Lokman I. Meho, Kiduk Yang | A New Era in Citation and Bibliometric Analyses: Web of Science, Scopus,
and Google Scholar | 49 pages, accepted for publication in the Journal of the American
Society for Information Science and Technology | null | null | null | cs.DL cs.IR | null | Academic institutions, federal agencies, publishers, editors, authors, and
librarians increasingly rely on citation analysis for making hiring, promotion,
tenure, funding, and/or reviewer and journal evaluation and selection
decisions. The Institute for Scientific Information's (ISI) citation databases
have been used for decades as a starting point and often as the only tools for
locating citations and/or conducting citation analyses. ISI databases (or Web
of Science), however, may no longer be adequate as the only or even the main
sources of citations because new databases and tools that allow citation
searching are now available. Whether these new databases and tools complement
or represent alternatives to Web of Science (WoS) is important to explore.
Using a group of 15 library and information science faculty members as a case
study, this paper examines the effects of using Scopus and Google Scholar (GS)
on the citation counts and rankings of scholars as measured by WoS. The paper
discusses the strengths and weaknesses of WoS, Scopus, and GS, their overlap
and uniqueness, quality and language of the citations, and the implications of
the findings for citation analysis. The project involved citation searching for
approximately 1,100 scholarly works published by the study group and over 200
works by a test group (an additional 10 faculty members). Overall, more than
10,000 citing and purportedly citing documents were examined. WoS data took
about 100 hours of collecting and processing time, Scopus consumed 200 hours,
and GS a grueling 3,000 hours.
| [
{
"version": "v1",
"created": "Sat, 23 Dec 2006 14:47:24 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Meho",
"Lokman I.",
""
],
[
"Yang",
"Kiduk",
""
]
]
| new_dataset | 0.999015 |
cs/0612139 | Alexander Haubold | Alexander Haubold, John R. Kender | Alignment of Speech to Highly Imperfect Text Transcriptions | null | null | null | null | cs.SD cs.MM | null | We introduce a novel and inexpensive approach for the temporal alignment of
speech to highly imperfect transcripts from automatic speech recognition (ASR).
Transcripts are generated for extended lecture and presentation videos, which
in some cases feature more than 30 speakers with different accents, resulting
in highly varying transcription qualities. In our approach we detect a subset
of phonemes in the speech track, and align them to the sequence of phonemes
extracted from the transcript. We report on the results for 4 speech-transcript
sets ranging from 22 to 108 minutes. The alignment performance is promising,
showing a correct matching of phonemes within 10, 20, 30 second error margins
for more than 60%, 75%, 90% of text, respectively, on average.
| [
{
"version": "v1",
"created": "Thu, 28 Dec 2006 06:45:43 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Haubold",
"Alexander",
""
],
[
"Kender",
"John R.",
""
]
]
| new_dataset | 0.971643 |
cs/0701045 | Iosif Pinelis | Iosif Pinelis | Polygon Convexity: Another O(n) Test | 14 pages; changes: (i) a test for non-strict convexity is added; (ii)
the proofs are gathered in a separate section; (iii) a more detailed abstract
is given | null | null | null | cs.CG cs.DS | null | An n-gon is defined as a sequence \P=(V_0,...,V_{n-1}) of n points on the
plane. An n-gon \P is said to be convex if the boundary of the convex hull of
the set {V_0,...,V_{n-1}} of the vertices of \P coincides with the union of the
edges [V_0,V_1],...,[V_{n-1},V_0]; if at that no three vertices of \P are
collinear then \P is called strictly convex. We prove that an n-gon \P with
n\ge3 is strictly convex if and only if a cyclic shift of the sequence
(\al_0,...,\al_{n-1})\in[0,2\pi)^n of the angles between the x-axis and the
vectors V_1-V_0,...,V_0-V_{n-1} is strictly monotone. A ``non-strict'' version
of this result is also proved.
| [
{
"version": "v1",
"created": "Mon, 8 Jan 2007 18:51:37 GMT"
},
{
"version": "v2",
"created": "Tue, 16 Jan 2007 22:57:51 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Pinelis",
"Iosif",
""
]
]
| new_dataset | 0.997216 |
cs/0701107 | Wim Vanhoof | Hani Girgis, Bharat Jayaraman | JavaTA: A Logic-based Debugger for Java | Paper presented at the 16th Workshop on Logic-based Methods in
Programming Environments (WLPE2006) | null | null | null | cs.PL | null | This paper presents a logic based approach to debugging Java programs. In
contrast with traditional debugging we propose a debugging methodology for Java
programs using logical queries on individual execution states and also over the
history of execution. These queries were arrived at by a systematic study of
errors in object-oriented programs in our earlier research. We represent the
salient events during the execution of a Java program by a logic database, and
implement the queries as logic programs. Such an approach allows us to answer a
number of useful and interesting queries about a Java program, such as the
calling sequence that results in a certain outcome, the state of an object at a
particular execution point, etc. Our system also provides the ability to
compose new queries during a debugging session. We believe that logic
programming offers a significant contribution to the art of object-oriented
programs debugging.
| [
{
"version": "v1",
"created": "Wed, 17 Jan 2007 13:48:49 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Girgis",
"Hani",
""
],
[
"Jayaraman",
"Bharat",
""
]
]
| new_dataset | 0.993755 |
cs/0701128 | M. V. Panduranga Rao | M. V. Panduranga Rao | Interference Automata | 19 pages. A preliminary version appears under the title "On a Model
of Computation based on Optical Interference" in Proc. of the 16-th
Australasian Workshop on Combinatorial Algorithms (AWOCA'05), pp. 249-261 | null | null | null | cs.CC | null | We propose a computing model, the Two-Way Optical Interference Automata
(2OIA), that makes use of the phenomenon of optical interference. We introduce
this model to investigate the increase in power, in terms of language
recognition, of a classical Deterministic Finite Automaton (DFA) when endowed
with the facility of optical interference. The question is in the spirit of
Two-Way Finite Automata With Quantum and Classical States (2QCFA) [A. Ambainis
and J. Watrous, Two-way Finite Automata With Quantum and Classical States,
Theoretical Computer Science, 287 (1), 299-311, (2002)] wherein the classical
DFA is augmented with a quantum component of constant size. We test the power
of 2OIA against the languages mentioned in the above paper. We give efficient
2OIA algorithms to recognize languages for which 2QCFA machines have been shown
to exist, as well as languages whose status vis-a-vis 2QCFA has been posed as
open questions. Finally we show the existence of a language that cannot be
recognized by a 2OIA but can be recognized by an $O(n^3)$ space Turing machine.
| [
{
"version": "v1",
"created": "Mon, 22 Jan 2007 09:14:11 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Rao",
"M. V. Panduranga",
""
]
]
| new_dataset | 0.998585 |
cs/0701147 | Wim Vanhoof | Michael Hanus | A Generic Analysis Environment for Curry Programs | Paper presented at the 16th Workshop on Logic-based Methods in
Programming Environments | null | null | null | cs.PL | null | We present CurryBrowser, a generic analysis environment for the declarative
multi-paradigm language Curry. CurryBrowser supports browsing through the
program code of an application written in Curry, i.e., the main module and all
directly or indirectly imported modules. Each module can be shown in different
formats (e.g., source code, interface, intermediate code) and, inside each
module, various properties of functions defined in this module can be analyzed.
In order to support the integration of various program analyses, CurryBrowser
has a generic interface to connect local and global analyses implemented in
Curry. CurryBrowser is completely implemented in Curry using libraries for GUI
programming and meta-programming.
| [
{
"version": "v1",
"created": "Wed, 24 Jan 2007 06:55:34 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Hanus",
"Michael",
""
]
]
| new_dataset | 0.991623 |
cs/0701161 | Jim Gray | Jim Gray, Charles Levine | Thousands of DebitCredit Transactions-Per-Second: Easy and Inexpensive | null | null | null | MSR-TR-2005-39 | cs.DB cs.PF | null | A $2k computer can execute about 8k transactions per second. This is 80x more
than one of the largest US bank's 1970's traffic - it approximates the total US
1970's financial transaction volume. Very modest modern computers can easily
solve yesterday's problems.
| [
{
"version": "v1",
"created": "Thu, 25 Jan 2007 23:51:22 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Gray",
"Jim",
""
],
[
"Levine",
"Charles",
""
]
]
| new_dataset | 0.99949 |
cs/0701170 | Jim Gray | Katalin Szlavecz, Andreas Terzis, Stuart Ozer, Razvan Musaloiu-E,
Joshua Cogan, Sam Small, Randal Burns, Jim Gray, Alex Szalay | Life Under Your Feet: An End-to-End Soil Ecology Sensor Network,
Database, Web Server, and Analysis Service | null | null | null | MSR TR 2006 90 | cs.DB cs.CE | null | Wireless sensor networks can revolutionize soil ecology by providing
measurements at temporal and spatial granularities previously impossible. This
paper presents a soil monitoring system we developed and deployed at an urban
forest in Baltimore as a first step towards realizing this vision. Motes in
this network measure and save soil moisture and temperature in situ every
minute. Raw measurements are periodically retrieved by a sensor gateway and
stored in a central database where calibrated versions are derived and stored.
The measurement database is published through Web Services interfaces. In
addition, analysis tools let scientists analyze current and historical data and
help manage the sensor network. The article describes the system design, what
we learned from the deployment, and initial results obtained from the sensors.
The system measures soil factors with unprecedented temporal precision.
However, the deployment required device-level programming, sensor calibration
across space and time, and cross-referencing measurements with external
sources. The database, web server, and data analysis design required
considerable innovation and expertise. So, the ratio of computer-scientists to
ecologists was 3:1. Before sensor networks can fulfill their potential as
instruments that can be easily deployed by scientists, these technical problems
must be addressed so that the ratio is one nerd per ten ecologists.
| [
{
"version": "v1",
"created": "Fri, 26 Jan 2007 05:08:06 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Szlavecz",
"Katalin",
""
],
[
"Terzis",
"Andreas",
""
],
[
"Ozer",
"Stuart",
""
],
[
"Musaloiu-E",
"Razvan",
""
],
[
"Cogan",
"Joshua",
""
],
[
"Small",
"Sam",
""
],
[
"Burns",
"Randal",
""
],
[
"Gray",
"Jim",
""
],
[
"Szalay",
"Alex",
""
]
]
| new_dataset | 0.998384 |
cs/0701173 | Jim Gray | Vik Singh, Jim Gray, Ani Thakar, Alexander S. Szalay, Jordan Raddick,
Bill Boroski, Svetlana Lebedeva, Brian Yanny | SkyServer Traffic Report - The First Five Years | null | null | null | MSR TR-2006-190 | cs.DB cs.CE | null | The SkyServer is an Internet portal to the Sloan Digital Sky Survey Catalog
Archive Server. From 2001 to 2006, there were a million visitors in 3 million
sessions generating 170 million Web hits, 16 million ad-hoc SQL queries, and 62
million page views. The site currently averages 35 thousand visitors and 400
thousand sessions per month. The Web and SQL logs are public. We analyzed
traffic and sessions by duration, usage pattern, data product, and client type
(mortal or bot) over time. The analysis shows (1) the site's popularity, (2)
the educational website that delivered nearly fifty thousand hours of
interactive instruction, (3) the relative use of interactive, programmatic, and
batch-local access, (4) the success of offering ad-hoc SQL, personal database,
and batch job access to scientists as part of the data publication, (5) the
continuing interest in "old" datasets, (6) the usage of SQL constructs, and (7)
a novel approach of using the corpus of correct SQL queries to suggest similar
but correct statements when a user presents an incorrect SQL statement.
| [
{
"version": "v1",
"created": "Fri, 26 Jan 2007 05:22:15 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Singh",
"Vik",
""
],
[
"Gray",
"Jim",
""
],
[
"Thakar",
"Ani",
""
],
[
"Szalay",
"Alexander S.",
""
],
[
"Raddick",
"Jordan",
""
],
[
"Boroski",
"Bill",
""
],
[
"Lebedeva",
"Svetlana",
""
],
[
"Yanny",
"Brian",
""
]
]
| new_dataset | 0.984389 |
cs/0702010 | Jacques Carette | Jacques Carette | A canonical form for some piecewise defined functions | submitted to ISSAC 2007 | null | null | null | cs.SC cs.MS | null | We define a canonical form for piecewise defined functions. We show that this
has a wider range of application as well as better complexity properties than
previous work.
| [
{
"version": "v1",
"created": "Thu, 1 Feb 2007 17:54:50 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Carette",
"Jacques",
""
]
]
| new_dataset | 0.990617 |
cs/0702022 | Changjia Chen | Chunxi Li and Changjia Chen | Gnutella: Topology Dynamics On Phase Space | 11 pages, 14 figures | null | null | null | cs.NI | null | In this paper, the topology dynamic of Gnutella is studied through phase
space. The dynamic changes in peer degree are studied as a time series in two
dimensional phase space which is defined as the number of connected leaves and
the number of connected ultras. The reported degrees are concentrated in three
special Software related regions that we named as Ultra Stable Region, Leaf
Stable Region and Transition Belt. A method is proposed to classify degree
traces in phase space into different classes. Connection churn then is studied
along with the churn in degree. It shows that the topological structure of
Gnutella is rather stable in its connection degree but not the topology itself.
The connection drop rate is estimated and the live time of connections is
inferred afterwards. M/M/m/m loss queue system is introduced to model the
degree keeping process in Gnutella. This model revealed that the degree stable
is ensured by large new connection efforts. In other words the stable in
topological structure of Gnutella is a results of essential unstable in its
topology. That opens a challenge to the basic design philosophy of this
network.
| [
{
"version": "v1",
"created": "Sun, 4 Feb 2007 08:12:38 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Li",
"Chunxi",
""
],
[
"Chen",
"Changjia",
""
]
]
| new_dataset | 0.996723 |
cs/0702034 | Rama Raghavan | L.Jeganathan and R.Rama | Graph Splicing System | 13 pages,5 figures | null | null | null | cs.DM | null | The string splicing was introduced by Tom Head which stands as an abstract
model for the DNA recombination under the influence of restriction enzymes. The
complex chemical process of three dimensional molecules in three dimensional
space can be modeled using graphs. The graph splicing systems which were
studied so far, can only be applied to a particular type of graphs which could
be interpreted as linear or circular graphs. In this paper, we take a different
and a novel approach to splice two graphs and introduce a splicing system for
graphs that can be applied to all types of graphs. Splicing two graphs can be
thought of as a new operation, among the graphs, that generates many new graphs
from the given two graphs. Taking a different line of thinking, some of the
graph theoretical results of the splicing are studied.
| [
{
"version": "v1",
"created": "Tue, 6 Feb 2007 05:46:36 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Jeganathan",
"L.",
""
],
[
"Rama",
"R.",
""
]
]
| new_dataset | 0.989162 |
cs/0702039 | Xavier Goaoc | Otfried Cheong, Xavier Goaoc (INRIA Lorraine - LORIA), Andreas
Holmsen, Sylvain Petitjean (INRIA Lorraine - LORIA) | Hadwiger and Helly-type theorems for disjoint unit spheres | null | Discrete and Computational Geometry (2006) | null | null | cs.CG | null | We prove Helly-type theorems for line transversals to disjoint unit balls in
$\R^{d}$. In particular, we show that a family of $n \geq 2d$ disjoint unit
balls in $\R^d$ has a line transversal if, for some ordering $\prec$ of the
balls, any subfamily of 2d balls admits a line transversal consistent with
$\prec$. We also prove that a family of $n \geq 4d-1$ disjoint unit balls in
$\R^d$ admits a line transversal if any subfamily of size $4d-1$ admits a
transversal.
| [
{
"version": "v1",
"created": "Wed, 7 Feb 2007 08:29:03 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Cheong",
"Otfried",
"",
"INRIA Lorraine - LORIA"
],
[
"Goaoc",
"Xavier",
"",
"INRIA Lorraine - LORIA"
],
[
"Holmsen",
"Andreas",
"",
"INRIA Lorraine - LORIA"
],
[
"Petitjean",
"Sylvain",
"",
"INRIA Lorraine - LORIA"
]
]
| new_dataset | 0.974633 |
cs/0702054 | Christoph Durr | Christoph Durr and Nguyen Kim Thang | Nash equilibria in Voronoi games on graphs | null | null | null | null | cs.GT cs.DS | null | In this paper we study a game where every player is to choose a vertex
(facility) in a given undirected graph. All vertices (customers) are then
assigned to closest facilities and a player's payoff is the number of customers
assigned to it. We show that deciding the existence of a Nash equilibrium for a
given graph is NP-hard which to our knowledge is the first result of this kind
for a zero-sum game. We also introduce a new measure, the social cost
discrepancy, defined as the ratio of the costs between the worst and the best
Nash equilibria. We show that the social cost discrepancy in our game is
Omega(sqrt(n/k)) and O(sqrt(kn)), where n is the number of vertices and k the
number of players.
| [
{
"version": "v1",
"created": "Fri, 9 Feb 2007 12:12:17 GMT"
},
{
"version": "v2",
"created": "Fri, 13 Apr 2007 14:11:36 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Durr",
"Christoph",
""
],
[
"Thang",
"Nguyen Kim",
""
]
]
| new_dataset | 0.984875 |
cs/0702074 | Xavier P\'erez-Gim\'enez | Josep Diaz, Dieter Mitsche, Xavier Perez | Dynamic Random Geometric Graphs | null | null | null | null | cs.DM | null | In this work we introduce Dynamic Random Geometric Graphs as a basic rough
model for mobile wireless sensor networks, where communication distances are
set to the known threshold for connectivity of static random geometric graphs.
We provide precise asymptotic results for the expected length of the
connectivity and disconnectivity periods of the network. We believe the formal
tools developed in this work could be of use in future studies in more concrete
settings. In addition, for static random geometric graphs at the threshold for
connectivity, we provide asymptotic expressions on the probability of existence
of components according to their sizes.
| [
{
"version": "v1",
"created": "Tue, 13 Feb 2007 09:00:34 GMT"
},
{
"version": "v2",
"created": "Fri, 20 Apr 2007 09:15:51 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Diaz",
"Josep",
""
],
[
"Mitsche",
"Dieter",
""
],
[
"Perez",
"Xavier",
""
]
]
| new_dataset | 0.99738 |
cs/0702081 | Rick Dale | Rick Dale | Random Sentences from a Generalized Phrase-Structure Grammar Interpreter | Brief paper with source code and examples | null | null | null | cs.CL | null | In numerous domains in cognitive science it is often useful to have a source
for randomly generated corpora. These corpora may serve as a foundation for
artificial stimuli in a learning experiment (e.g., Ellefson & Christiansen,
2000), or as input into computational models (e.g., Christiansen & Dale, 2001).
The following compact and general C program interprets a phrase-structure
grammar specified in a text file. It follows parameters set at a Unix or
Unix-based command-line and generates a corpus of random sentences from that
grammar.
| [
{
"version": "v1",
"created": "Wed, 14 Feb 2007 06:05:20 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Dale",
"Rick",
""
]
]
| new_dataset | 0.997787 |
cs/0702094 | Marko Horvat B.Sc.CS-Dipl.Ing. | Darko Fuduric, Marko Horvat and Mario Zagar | Authentication via wireless networks | 5 pages, 6 figures, 1 table, MIPRO Conference in Opatija, Croatia,
2006 | MIPRO, 2006 | null | null | cs.OH | null | Personal authentication is an important process we encounter almost every
day; when we are logging on a computer, entering a company where we work, or a
restricted area, when we are using our plastic credit cards to pay for a
service or to complete some other financial transaction, etc. In each of these
processes of personal authentication some kind of magnetic or optical token is
required. But by using novel technologies like mobile computing and wireless
networking, it is possible to avoid carrying multitude of ID cards or
remembering a number of PIN codes. Article shows how to efficiently
authenticate users via Personal Area Networks (PAN) like Bluetooth or IrDA
using commonplace AES (Rijndel) or MD5 encryption. This method can be
implemented on many types of mobile devices like Pocket PC PDA with Windows CE
(Windows Mobile 2003) real-time operating system, or any other customized OS,
so we will explain all components and key features of such basic system.
| [
{
"version": "v1",
"created": "Fri, 16 Feb 2007 16:46:59 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Fuduric",
"Darko",
""
],
[
"Horvat",
"Marko",
""
],
[
"Zagar",
"Mario",
""
]
]
| new_dataset | 0.998305 |
cs/0702107 | Charles Robert | Charles A. Robert (LORIA) | AMIEDoT: An annotation model for document tracking and recommendation
service | null | Dans International Joint Conferences on Computer, Information, and
Systems Sciences, and Engineering, (CIS2E 06) (2007) | null | null | cs.IR | null | The primary objective of document annotation in whatever form, manual or
electronic is to allow those who may not have control to original document to
provide personal view on information source. Beyond providing personal
assessment to original information sources, we are looking at a situation where
annotation made can be used as additional source of information for document
tracking and recommendation service. Most of the annotation tools existing
today were conceived for their independent use with no reference to the creator
of the annotation. We propose AMIEDoT (Annotation Model for Information
Exchange and Document Tracking) an annotation model that can assist in document
tracking and recommendation service. The model is based on three parameters in
the acts of annotation. We believe that introducing document parameters, time
and the parameters of the creator of annotation into an annotation process can
be a dependable source to know, who used a document, when a document was used
and for what a document was used for. Beyond document tracking, our model can
be used in not only for selective dissemination of information but for
recommendation services. AMIEDoT can also be used for information sharing and
information reuse.
| [
{
"version": "v1",
"created": "Mon, 19 Feb 2007 15:18:26 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Robert",
"Charles A.",
"",
"LORIA"
]
]
| new_dataset | 0.983467 |
cs/0702137 | Slavcho Shtrakov | Slavcho Shtrakov | Tree Automata and Essential Subtrees | 9 pages, 2 figures, Sixth International Conference on Discrete
Mathematics and Applications, Bansko, 2001 | Proc. of ICDMA, 31.08-02.09.2001, Bansko, v.6, 51-60 p | null | null | cs.CC cs.DM | null | We introduce essential subtrees for terms (trees) and tree automata . There
are some results concerning independent sets of subtrees and separable sets for
a tree and an automaton.
| [
{
"version": "v1",
"created": "Fri, 23 Feb 2007 13:20:58 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Shtrakov",
"Slavcho",
""
]
]
| new_dataset | 0.974679 |
cs/0702153 | Kyle Burke | Kyle Burke and Shang-Hua Teng | Games on the Sperner Triangle | 18 pages, 19 figures. Uses paithan.sty | null | null | null | cs.GT cs.CC | null | We create a new two-player game on the Sperner Triangle based on Sperner's
lemma. Our game has simple rules and several desirable properties. First, the
game is always certain to have a winner. Second, like many other interesting
games such as Hex and Geography, we prove that deciding whether one can win our
game is a PSPACE-complete problem. Third, there is an elegant balance in the
game such that neither the first nor the second player always has a decisive
advantage. We provide a web-based version of the game, playable at:
http://cs-people.bu.edu/paithan/spernerGame/ . In addition we propose other
games, also based on fixed-point theorems.
| [
{
"version": "v1",
"created": "Mon, 26 Feb 2007 05:00:45 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Burke",
"Kyle",
""
],
[
"Teng",
"Shang-Hua",
""
]
]
| new_dataset | 0.99945 |
cs/0703044 | Samuel Thibault | Samuel Thibault (INRIA Futurs), Sebastien Hinderer (INRIA Lorraine -
LORIA) | BrlAPI: Simple, Portable, Concurrent, Application-level Control of
Braille Terminals | null | Dans International Conference on Information and Communication
Technology Accessibility (ICTA) (2007) | null | null | cs.HC | null | Screen readers can drive braille devices for allowing visually impaired users
to access computer environments, by providing them the same information as
sighted users. But in some cases, this view is not easy to use on a braille
device. In such cases, it would be much more useful to let applications provide
their own braille feedback, specially adapted to visually impaired users. Such
applications would then need the ability to output braille ; however, allowing
both screen readers and applications access a wide panel of braille devices is
not a trivial task. We present an abstraction layer that applications may use
to communicate with braille devices. They do not need to deal with the
specificities of each device, but can do so if necessary. We show how several
applications can communicate with one braille device concurrently, with BrlAPI
making sensible choices about which application eventually gets access to the
device. The description of a widely used implementation of BrlAPI is included.
| [
{
"version": "v1",
"created": "Fri, 9 Mar 2007 16:55:23 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Thibault",
"Samuel",
"",
"INRIA Futurs"
],
[
"Hinderer",
"Sebastien",
"",
"INRIA Lorraine -\n LORIA"
]
]
| new_dataset | 0.999338 |
cs/0703067 | Stephen Smith | Stephen L. Smith, Francesco Bullo | Target assignment for robotic networks: asymptotic performance under
limited communication | 2007 ACC paper including proofs; Corrected typos | null | null | null | cs.RO | null | We are given an equal number of mobile robotic agents, and distinct target
locations. Each agent has simple integrator dynamics, a limited communication
range, and knowledge of the position of every target. We address the problem of
designing a distributed algorithm that allows the group of agents to divide the
targets among themselves and, simultaneously, leads each agent to reach its
unique target. We do not require connectivity of the communication graph at any
time. We introduce a novel assignment-based algorithm with the following
features: initial assignments and robot motions follow a greedy rule, and
distributed refinements of the assignment exploit an implicit circular ordering
of the targets. We prove correctness of the algorithm, and give worst-case
asymptotic bounds on the time to complete the assignment as the environment
grows with the number of agents. We show that among a certain class of
distributed algorithms, our algorithm is asymptotically optimal. The analysis
utilizes results on the Euclidean traveling salesperson problem.
| [
{
"version": "v1",
"created": "Wed, 14 Mar 2007 19:20:45 GMT"
},
{
"version": "v2",
"created": "Tue, 20 Mar 2007 19:57:30 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Smith",
"Stephen L.",
""
],
[
"Bullo",
"Francesco",
""
]
]
| new_dataset | 0.990694 |
cs/0703108 | Sourav Dhar | Sourav Dhar, Rabindranath Bera, K.Mal | Wireless Lan to Support Multimedia Communication Using Spread Spectrum
Technology | URSI 0ctober 22-29 2005, 4pages, 6 figures | null | null | null | cs.NI | null | Wireless LAN is currently enjoying rapid deployment in University
departments, business offices, hospitals and homes. It becomes an inexpensive
technology and allows multiple numbers of the households to simultaneously
access the internet while roaming about the house. In the present work, the
design and development of a wireless LAN is highlighted which utilizes direct
sequence spread spectrum (DSSS) technology at 900MHz RF carrier frequency in
its physical layer. This provides enormous security in the physical layer and
hence it is very difficult to hack or jam the network. The installation cost is
also less due to the use of 900 MHz RF carrier frequency..
| [
{
"version": "v1",
"created": "Thu, 22 Mar 2007 11:07:45 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Dhar",
"Sourav",
""
],
[
"Bera",
"Rabindranath",
""
],
[
"Mal",
"K.",
""
]
]
| new_dataset | 0.998917 |
cs/0703112 | Bharath Ramesh | Bharath Ramesh and Srinidhi Varadarajan | User-level DSM System for Modern High-Performance Interconnection
Networks | 6 pages, 5 figures | null | null | null | cs.DC | null | In this paper, we introduce a new user-level DSM system which has the ability
to directly interact with underlying interconnection networks. The DSM system
provides the application programmer a flexible API to program parallel
applications either using shared memory semantics over physically distributed
memory or to use an efficient remote memory demand paging technique. We also
introduce a new time slice based memory consistency protocol which is used by
the DSM system. We present preliminary results from our implementation on a
small Opteron Linux cluster interconnected over Myrinet.
| [
{
"version": "v1",
"created": "Thu, 22 Mar 2007 19:15:00 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Ramesh",
"Bharath",
""
],
[
"Varadarajan",
"Srinidhi",
""
]
]
| new_dataset | 0.968898 |
cs/0703152 | Ugo Dal Lago | Ugo Dal Lago, Andrea Masini, Margherita Zorzi | Quantum Lambda Calculi with Classical Control: Syntax and Expressive
Power | 25 pages | null | null | null | cs.LO | null | We study an untyped lambda calculus with quantum data and classical control.
This work stems from previous proposals by Selinger and Valiron and by Van
Tonder. We focus on syntax and expressiveness, rather than (denotational)
semantics. We prove subject reduction, confluence and a standardization
theorem. Moreover, we prove the computational equivalence of the proposed
calculus with a suitable class of quantum circuit families.
| [
{
"version": "v1",
"created": "Fri, 30 Mar 2007 08:59:43 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lago",
"Ugo Dal",
""
],
[
"Masini",
"Andrea",
""
],
[
"Zorzi",
"Margherita",
""
]
]
| new_dataset | 0.980639 |
cs/0703153 | Maurice Margenstern | Maurice Margenstern | The periodic domino problem is undecidable in the hyperbolic plane | null | null | null | null | cs.CG cs.DM | null | In this paper, we consider the periodic tiling problem which was proved
undecidable in the Euclidean plane by Yu. Gurevich and I. Koriakov in 1972.
Here, we prove that the same problem for the hyperbolic plane is also
undecidable.
| [
{
"version": "v1",
"created": "Fri, 30 Mar 2007 09:31:40 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Margenstern",
"Maurice",
""
]
]
| new_dataset | 0.960256 |
cs/0703155 | Amey Karkare | Amey Karkare, Uday Khedker, Amitabha Sanyal | Liveness of Heap Data for Functional Programs | Accepted at Heap Analysis and Verification workshop (HAV 2007), a
satellite workshop of ETAPS 2007 (No formal proceedings for workshop); 15
pages | null | null | null | cs.PL | null | Functional programming languages use garbage collection for heap memory
management. Ideally, garbage collectors should reclaim all objects that are
dead at the time of garbage collection. An object is dead at an execution
instant if it is not used in future. Garbage collectors collect only those dead
objects that are not reachable from any program variable. This is because they
are not able to distinguish between reachable objects that are dead and
reachable objects that are live.
In this paper, we describe a static analysis to discover reachable dead
objects in programs written in first-order, eager functional programming
languages. The results of this technique can be used to make reachable dead
objects unreachable, thereby allowing garbage collectors to reclaim more dead
objects.
| [
{
"version": "v1",
"created": "Fri, 30 Mar 2007 16:06:27 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Karkare",
"Amey",
""
],
[
"Khedker",
"Uday",
""
],
[
"Sanyal",
"Amitabha",
""
]
]
| new_dataset | 0.992383 |
cs/9809004 | Jim Gray | Jim Gray, Joshua Coates, Chris Nyberg | Performance / Price Sort | Original word file at:
http://research.microsoft.com/~gray/PennySort.doc | null | null | null | cs.DB cs.PF | null | NTsort is an external sort on WindowsNT 5.0. It has minimal functionality but
excellent price performance. In particular, running on mail-order hardware it
can sort 1.5 GB for a penny. For commercially available sorts, Postman Sort
from Robert Ramey Software Development has elapsed time performance comparable
to NTsort, while using less processor time. It can sort 1.27 GB for a penny
(12.7 million records.) These sorts set new price-performance records. This
paper documents this and proposes that the PennySort benchmark be revised to
Performance/Price sort: a simple GB/$ sort metric based on a two-pass external
sort.
| [
{
"version": "v1",
"created": "Wed, 2 Sep 1998 00:49:25 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Gray",
"Jim",
""
],
[
"Coates",
"Joshua",
""
],
[
"Nyberg",
"Chris",
""
]
]
| new_dataset | 0.999573 |
cs/9809010 | Jim Gray | C. Gordon Bell, Jim Gray | The Revolution Yet to Happen | Original document at:
http://research.microsoft.com/~gray/Revolution.doc | null | null | Microsoft Technical report: MSR-TR-98-45 | cs.GL | null | All information about physical objects including humans, buildings,
processes, and organizations will be online. This trend is both desirable and
inevitable. Cyberspace will provide the basis for wonderful new ways to inform,
entertain, and educate people. The information and the corresponding systems
will streamline commerce, but will also provide new levels of personal service,
health care, and automation. The most significant benefit will be a
breakthrough in our ability to remotely communicate with one another using all
our senses.
The ACM and the transistor were born in 1947. At that time the stored program
computer was a revolutionary idea and the transistor was just a curiosity. Both
ideas evolved rapidly. By the mid 1960s integrated circuits appeared --
allowing mass fabrication of transistors on silicon substrates. This allowed
low-cost mass-produced computers. These technologies enabled extraordinary
increases in processing speed and memory coupled with extraordinary price
declines.
The only form of processing and memory more easily, cheaply, and rapidly
fabricated is the human brain. Peter Cohrane (1996) estimates the brain to have
a processing power of around 1000 million-million operations per second, (one
Petaops) and a memory of 10 Terabytes. If current trends continue, computers
could have these capabilities by 2047. Such computers could be 'on body'
personal assistants able to recall everything one reads, hears, and sees.
| [
{
"version": "v1",
"created": "Wed, 2 Sep 1998 19:39:25 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Bell",
"C. Gordon",
""
],
[
"Gray",
"Jim",
""
]
]
| new_dataset | 0.999144 |
cs/9809021 | Frantz Vichot | Francis Wolinski, Frantz Vichot, Olivier Gremont (Informatique
CDC/DTA, Arcueil, France) | Producing NLP-based On-line Contentware | 7 pages, 5 figures | Natural Language Processing & Industrial Applications, Moncton,
NB, Canada, Aug. 1998 | null | null | cs.CL cs.AR | null | For its internal needs as well as for commercial purposes, CDC Group has
produced several NLP-based on-line contentware applications for years. The
development process of such applications is subject to numerous constraints
such as quality of service, integration of new advances in NLP, direct
reactions from users, continuous versioning, short delivery deadlines and cost
control. Following this industrial and commercial experience, malleability of
the applications, their openness towards foreign components, efficiency of
applications and their ease of exploitation have appeared to be key points. In
this paper, we describe TalLab, a powerful architecture for on-line contentware
which fulfils these requirements.
| [
{
"version": "v1",
"created": "Wed, 16 Sep 1998 14:22:35 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Wolinski",
"Francis",
"",
"Informatique\n CDC/DTA, Arcueil, France"
],
[
"Vichot",
"Frantz",
"",
"Informatique\n CDC/DTA, Arcueil, France"
],
[
"Gremont",
"Olivier",
"",
"Informatique\n CDC/DTA, Arcueil, France"
]
]
| new_dataset | 0.961884 |
cs/9809045 | Chunlei Liu | Shivkumar Kalyanaraman, Bobby Vandalore, Raj Jain, Rohit Goyal, Sonia
Fahmy, Seong-Cheol Kim, Sastri Kota | Performance of TCP over ABR with Long-Range Dependent VBR Background
Traffic over Terrestrial and Satellite ATM networks | Proceedings of LCN `98 | null | null | null | cs.NI | null | Compressed video is well known to be self-similar in nature. We model VBR
carrying Long-Range Dependent (LRD), multiplexed MPEG-2 video sources. The
actual traffic for the model is generated using fast-fourier transform of
generate the fractional gaussian noise (FGN) sequence. Our model of compressed
video sources bears similarity to an MPEG-2 Transport Stream carrying video,
i.e., it is long-range dependent and generates traffic in a piecewise-CBR
fashion. We study the effect of such VBR traffic on ABR carrying TCP traffic.
The effect of such VBR traffic is that the ABR capacity is highly variant. We
find that a switch algorithm like ERICA+ can tolerate this variance in ABR
capacity while maintaining high throughput and low delay. We present simulation
results for terrestrial and satellite configurations.
| [
{
"version": "v1",
"created": "Wed, 23 Sep 1998 01:40:13 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kalyanaraman",
"Shivkumar",
""
],
[
"Vandalore",
"Bobby",
""
],
[
"Jain",
"Raj",
""
],
[
"Goyal",
"Rohit",
""
],
[
"Fahmy",
"Sonia",
""
],
[
"Kim",
"Seong-Cheol",
""
],
[
"Kota",
"Sastri",
""
]
]
| new_dataset | 0.975188 |
cs/9809058 | Chunlei Liu | Raj Jain, Shiv Kalyanaraman and Ram Viswanathan | The OSU Scheme for Congestion Avoidance in ATM Networks: Lessons Learnt
and Extensions | null | null | null | null | cs.NI | null | The OSU scheme is a rate-based congestion avoidance scheme for ATM networks
using explicit rate indication. This work was one of the first attempts to
define explicit rate switch mechanisms and the Resource Management (RM) cell
format in Asynchronous Transfer Mode (ATM) networks. The key features of the
scheme include explicit rate feedback, congestion avoidance, fair operation
while maintaining high utilization, use of input rate as a congestion metric,
O(1) complexity. This paper presents an overview of the scheme, presents those
features of the scheme that have now become common features of other switch
algorithms and discusses three extensions of the scheme.
| [
{
"version": "v1",
"created": "Wed, 23 Sep 1998 15:09:56 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Jain",
"Raj",
""
],
[
"Kalyanaraman",
"Shiv",
""
],
[
"Viswanathan",
"Ram",
""
]
]
| new_dataset | 0.986287 |
cs/9809059 | Chunlei Liu | Shivkumar Kalyanaraman, Raj Jain, Sonia Fahmy, Rohit Goyal, and Bobby
Vandalore | The ERICA Switch Algorithm for ABR Traffic Management in ATM Networks | null | null | null | null | cs.NI | null | We propose an explicit rate indication scheme for congestion avoidance in ATM
networks. In this scheme, the network switches monitor their load on each link,
determining a load factor, the available capacity, and the number of currently
active virtual channels. This information is used to advise the sources about
the rates at which they should transmit. The algorithm is designed to achieve
efficiency, fairness, controlled queueing delays, and fast transient response.
The algorithm is also robust to measurement errors caused due to variation in
ABR demand and capacity. We present performance analysis of the scheme using
both analytical arguments and simulation results. The scheme is being
implemented by several ATM switch manufacturers.
| [
{
"version": "v1",
"created": "Wed, 23 Sep 1998 15:18:30 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kalyanaraman",
"Shivkumar",
""
],
[
"Jain",
"Raj",
""
],
[
"Fahmy",
"Sonia",
""
],
[
"Goyal",
"Rohit",
""
],
[
"Vandalore",
"Bobby",
""
]
]
| new_dataset | 0.989563 |
cs/9809072 | Chunlei Liu | Shiv Kalyanaraman, Raj Jain, Sonia Fahmy, Rohit Goyal, Jianping Jiang
and Seong-Cheol Kim | Performance of TCP over ABR on ATM backbone and with various VBR traffic
patterns | ICC'97, Montreal, June 1997 | null | null | null | cs.NI | null | We extend our earlier studies of buffer requirements of TCP over ABR in two
directions. First, we study the performance of TCP over ABR in an ATM backbone.
On the backbone, the TCP queues are at the edge router and not inside the ATM
network. The router requires buffer equal to the sum of the receiver window
sizes of the participating TCP connections. Second, we introduce various
patterns of VBR background traffic. The VBR background introduces variance in
the ABR capacity and the TCP traffic introduces variance in the ABR demand.
Some simple switch schemes are unable to keep up with the combined effect of
highly varying demands and highly varying ABR capacity. We present our
experiences with refining the ERICA+ switch scheme to handle these conditions.
| [
{
"version": "v1",
"created": "Thu, 24 Sep 1998 03:15:14 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kalyanaraman",
"Shiv",
""
],
[
"Jain",
"Raj",
""
],
[
"Fahmy",
"Sonia",
""
],
[
"Goyal",
"Rohit",
""
],
[
"Jiang",
"Jianping",
""
],
[
"Kim",
"Seong-Cheol",
""
]
]
| new_dataset | 0.99813 |
cs/9809080 | Chunlei Liu | Raj Jain, Shiv Kalyanaraman, Ram Viswanathan | The OSU Scheme for Congestion Avoidance in ATM networks Using Explicit
Rate Indication | Proceedings WATM'95 First Workshop on ATM Traffic Management, Paris,
December 1995 (proceedings also to appear in book form) | null | null | null | cs.NI | null | An explicit rate indication scheme for congestion avoidance in computer and
telecommunication networks is proposed. The sources monitor their load and
provide the information periodically to the switches. The switches, in turn,
compute the load level and ask the sources to adjust their rates up or down.
The scheme achieves high link utilization, fair allocation of rates among
contending sources and provides quick convergence. A backward congestion
notification option is also provided. The conditions under which this option is
useful are indicated.
| [
{
"version": "v1",
"created": "Thu, 24 Sep 1998 03:44:22 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Jain",
"Raj",
""
],
[
"Kalyanaraman",
"Shiv",
""
],
[
"Viswanathan",
"Ram",
""
]
]
| new_dataset | 0.988618 |
cs/9809088 | Chunlei Liu | R. Jain | Myths about Congestion Management in High Speed Networks | null | Internetworking: Research and Experience, Volume 3, 1992, pp.
101-113 | null | null | cs.NI | null | Weaknesses in several recently proposed ideas about congestion control and
avoidance in high-speed netwroks are identified. Both sides of the debate
concerning prior reservation of resources versus walk-in service, open-loop
control versus feedback control, rate control versus window control, and
router-based control versus source-based control are presented. The
circumstances under which backpressure is useful or not are discussed, and it
is argued that a single congestion scheme is not sufficient, but that a
combination of several schemes is required for complete congestion management
in a network.
| [
{
"version": "v1",
"created": "Thu, 24 Sep 1998 04:48:52 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Jain",
"R.",
""
]
]
| new_dataset | 0.985349 |
cs/9809094 | Chunlei Liu | R. Jain, K. Ramakrishnan, D. Chiu | Congestion Avoidance in Computer Networks with a Connectionless Network
Layer | DEC-TR-506, reprinted in C. Partridge, Ed., "Innovations in
Internetworking," published by Artech House, October 1988 | null | null | null | cs.NI | null | Widespread use of computer networks and the use of varied technology for the
interconnection of computers has made congestion a significant problem.
In this report, we summarize our research on congestion avoidance. We compare
the concept of congestion avoidance with that of congestion control.
Briefly, congestion control is a recovery mechanism, while congestion
avoidance is a prevention mechanism. A congestion control scheme helps the
network to recover from the congestion state while a congestion avoidance
scheme allows a network to operate in the region of low delay and high
throughput with minimal queuing, thereby preventing it from entering the
congested state in which packets are lost due to buffer shortage.
A number of possible alternatives for congestion avoidance were identified.
From these alternatives we selected one called the binary feedback scheme in
which the network uses a single bit in the network layer header to feed back
the congestion information to its users, which then increase or decrease their
load to make optimal use of the resources. The concept of global optimality in
a distributed system is defined in terms of efficiency and fairness such that
they can be independently quantified and apply to any number of resources and
users.
The proposed scheme has been simulated and shown to be globally efficient,
fair, responsive, convergent, robust, distributed, and
configuration-independent.
| [
{
"version": "v1",
"created": "Thu, 24 Sep 1998 05:05:18 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Jain",
"R.",
""
],
[
"Ramakrishnan",
"K.",
""
],
[
"Chiu",
"D.",
""
]
]
| new_dataset | 0.995259 |
cs/9809095 | Chunlei Liu | R. Jain, K. Ramakrishnan | Congestion Avoidance in Computer Networks with a Connectionless Network
Layer, Part I: Concepts, Goals and Methodology | roc. Computer Networking Symposium, Washington, D.C., April 11-13,
1988, pp. 134-143 | null | null | null | cs.NI | null | Congestion is said to occur in the network when the resource demands exceed
the capacity and packets are lost due to too much queuing in the network.
During congestion, the network throughput may drop to zero and the path delay
may become very high. A congestion control scheme helps the network to recover
from the congestion state. A congestion avoidance scheme allows a network to
operate in the region of low delay and high throughput. Such schemes prevent a
network from entering the congested state. Congestion avoidance is a prevention
mechanism while congestion control is a recovery mechanism. We compare the
concept of congestion avoidance with that of flow control and congestion
control. A number of possible alternative for congestion avoidance have been
identified. From these a few were selected for study. The criteria for
selection and goals for these schemes have been described. In particular, we
wanted the scheme to be globally efficient, fair, dynamic, convergent, robust,
distributed, configuration independent, etc. These goals and the test cases
used to verify whether a particular scheme has met the goals have been
described. We model the network and the user policies for congestion avoidance
as a feedback control system. The key components of a generic congestion
avoidance scheme are: congestion detection, congestion feedback, feedback
selector, signal filter, decision function, and increase/decrease algorithms.
These components have been explained.
| [
{
"version": "v1",
"created": "Thu, 24 Sep 1998 05:10:41 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Jain",
"R.",
""
],
[
"Ramakrishnan",
"K.",
""
]
]
| new_dataset | 0.996273 |
cs/9809098 | Chunlei Liu | R. Jain | On Caching out-of-order packets in window flow controlled networks | DEC Technical Report DEC-TR-342, January 1985 | null | null | DEC-TR-342 | cs.NI | null | In window flow controlled networks, if a packet is lost the destination has
to decide whether to save (cache) subsequent out-of-order packets. Also, the
source has to decide whether to send just one packet or to send all packets
following it. This leads to four different types of caching schemes.
Simulations show, against our immediate intuition, that regardless of whether
the destination is caching or not, the source should retransmit only one
packet. This paper describes the alternatives to, and provides justification
for, schemes used in Digital Network Architecture and ARPAnet TCP.
| [
{
"version": "v1",
"created": "Thu, 24 Sep 1998 05:23:43 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Jain",
"R.",
""
]
]
| new_dataset | 0.985241 |
cs/9809105 | Thomas Lippert | Thomas Lippert, Nikolay Petkov, Paolo Palazzari, and Klaus Schilling | Hyper-Systolic Matrix Multiplication | 29 pages, 13 figures | null | null | HLRZ1998-59 | cs.MS | null | A novel parallel algorithm for matrix multiplication is presented. The
hyper-systolic algorithm makes use of a one-dimensional processor abstraction.
The procedure can be implemented on all types of parallel systems. It can
handle matrix-vector multiplications as well as transposed matrix products.
| [
{
"version": "v1",
"created": "Thu, 24 Sep 1998 20:56:11 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Lippert",
"Thomas",
""
],
[
"Petkov",
"Nikolay",
""
],
[
"Palazzari",
"Paolo",
""
],
[
"Schilling",
"Klaus",
""
]
]
| new_dataset | 0.998899 |
cs/9810004 | James P. Cohoon | Bruce R. Childers, James P. Cohoon, Jack W. Davidson, Peter Valle | The Design of EzWindows: A Graphics API for an Introductory Programming
Course | 5 pages, 5 figures, conference submission | null | null | null | cs.CY cs.GR | null | Teaching object-oriented programming in an introductory programming course
poses considerable challenges to the instructor. An often advocated approach to
meeting this challenge is the use of a simple, object-oriented graphics
library. We have developed a simple, portable graphics library for teaching
object-oriented programming using C++. The library, EzWindows, allows beginning
programmers to design and write programs that use the graphical display found
on all modern desktop computers. In addition to providing simple graphical
objects such as windows, geometric shapes, and bitmaps, EzWindows provides
facilities for introducing event-based programming using the mouse and timers.
EzWindows has proven to be extremely popular; it is currently in use at over
200 universities, colleges, and high schools. This paper describes the
rationale for EzWindows and its high-level design.
| [
{
"version": "v1",
"created": "Sat, 3 Oct 1998 12:04:29 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Childers",
"Bruce R.",
""
],
[
"Cohoon",
"James P.",
""
],
[
"Davidson",
"Jack W.",
""
],
[
"Valle",
"Peter",
""
]
]
| new_dataset | 0.997209 |
cs/9810006 | Kersten Barney | Nick McKeown (Stanford University), Martin Izzard (Texas Instruments),
Adisak Mekkittikul (Stanford University), Bill Ellersick (Stanford
University) and Mark Horowitz (Stanford University) | The Tiny Tera: A Packet Switch Core | 13 pages, 10 figures | Hot Interconnects V, Stanford University, August 1996; IEEE Micro
Jan/Feb 1997, pp 26-33 | null | null | cs.NI | null | The objective is to design and build a small, high-bandwidth switch.
| [
{
"version": "v1",
"created": "Mon, 5 Oct 1998 17:50:02 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"McKeown",
"Nick",
"",
"Stanford University"
],
[
"Izzard",
"Martin",
"",
"Texas Instruments"
],
[
"Mekkittikul",
"Adisak",
"",
"Stanford University"
],
[
"Ellersick",
"Bill",
"",
"Stanford\n University"
],
[
"Horowitz",
"Mark",
"",
"Stanford University"
]
]
| new_dataset | 0.981528 |
cs/9810026 | James K. Huggins | Yuri Gurevich and James K. Huggins | The Railroad Crossing Problem: An Experiment with Instantaneous Actions
and Immediate Reactions | See also the web site at http://www.eecs.umich.edu/gasm/ | Selected papers from CSL'95, ed. H.K. Buening, Springer Lecture
Notes in Computer Science 1092, 1996, 266--290 | null | null | cs.SE | null | We give an evolving algebra solution for the well-known railroad crossing
problem and use the occasion to experiment with agents that perform
instantaneous actions in continuous time and in particular with agents that
fire at the moment they are enabled.
| [
{
"version": "v1",
"created": "Mon, 26 Oct 1998 19:24:37 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Gurevich",
"Yuri",
""
],
[
"Huggins",
"James K.",
""
]
]
| new_dataset | 0.997756 |
cs/9811014 | James K. Huggins | Egon Boerger and James K. Huggins | Abstract State Machines 1988-1998: Commented ASM Bibliography | Also maintained as a BibTeX file at http://www.eecs.umich.edu/gasm/ | Formal Specification Column (H. Ehrig, ed.), EATCS Bulletin 64,
February 1998, 105--127 | null | null | cs.SE | null | An annotated bibliography of papers which deal with or use Abstract State
Machines (ASMs), as of January 1998.
| [
{
"version": "v1",
"created": "Mon, 9 Nov 1998 19:32:38 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Boerger",
"Egon",
""
],
[
"Huggins",
"James K.",
""
]
]
| new_dataset | 0.999164 |
cs/9811021 | Bernardo Kastrup | Bernardo Kastrup | Automatic Hardware Synthesis for a Hybrid Reconfigurable CPU Featuring
Philips CPLDs | 6 pages, 7 figures, PACT '98 Workshop on Reconfigurable Computing | null | null | null | cs.PL cs.AR | null | A high-level architecture of a Hybrid Reconfigurable CPU, based on a
Philips-supported core processor, is introduced. It features the Philips XPLA2
CPLD as a reconfigurable functional unit. A compilation chain is presented, in
which automatic implementation of time-critical program segments in custom
hardware is performed. The entire process is transparent from the programmer's
point of view. The hardware synthesis module of the chain, which translates
segments of assembly code into a hardware netlist, is discussed in details.
Application examples are also presented.
| [
{
"version": "v1",
"created": "Thu, 12 Nov 1998 09:49:57 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kastrup",
"Bernardo",
""
]
]
| new_dataset | 0.993272 |
cs/9811028 | Shie-Yuan Wang | H.T. Kung and S.Y. Wang | TCP Trunking | postscript file | null | null | null | cs.NI | null | A TCP trunk is an IP tunnel under TCP control, capable of carrying packets
from any number of user flows. By exploiting properties of TCP, a TCP trunk
provides elastic and reliable transmission over a network, and automatically
shares the network fairly with other competing trunks. Moreover, by aggregating
user flows into a single trunk flow, TCP trunking can significantly reduce the
number of flows that the network needs to manage, thereby allowing use of
simplified management to achieve improved perfor mance. For example, when
dealing with only a small number of TCP trunk flows, a router with a simple
FIFO buffer can experience low packet loss rates.
A TCP trunk is a "soft" circuit in the sense that it requires no flow states
to be maintained inside the network. Setting up a TCP trunk involves only
configuring the two end nodes. This is in contrast with traditional methods of
configuring circuits via signaling of network nodes.
A simple packet-dropping mechanism based on packet accounting at the
transmitter of a TCP trunk assures that, when the trunk reduces its bandwidth
in response to network congestion, user TCP flows carried by the trunk will
reduce their bandwidths by the same proportion. Simu lation results have
demonstrated that TCP trunks can provide improved network performance to users,
while achieving high network utilization.
| [
{
"version": "v1",
"created": "Fri, 20 Nov 1998 20:55:45 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Kung",
"H. T.",
""
],
[
"Wang",
"S. Y.",
""
]
]
| new_dataset | 0.998318 |
cs/9901011 | Barry M. Leiner | Barry M. Leiner, Vinton G. Cerf, David D. Clark, Robert E. Kahn,
Leonard Kleinrock, Daniel C. Lynch, Jon Postel, Larry G. Roberts, and Stephen
Wolf | A Brief History of the Internet | null | null | null | null | cs.NI | null | The Internet has revolutionized the computer and communications world like
nothing before. The invention of the telegraph, telephone, radio, and computer
set the stage for this unprecedented integration of capabilities. The Internet
is at once a world-wide broadcasting capability, a mechanism for information
dissemination, and a medium for collaboration and interaction between
individuals and their computers without regard for geographic location.
In this paper, several of us involved in the development and evolution of the
Internet share our views of its origins and history. This is intended to be a
brief, necessarily cursory and incomplete history. This history revolves around
four distinct aspects. There is the technological evolution that began with
early research on packet switching and the ARPANET (and related technologies),
and where current research continues to expand the horizons of the
infrastructure along several dimensions, such as scale, performance, and higher
level functionality. There is the operations and management aspect of a global
and complex operational infrastructure. There is the social aspect, which
resulted in a broad community of Internauts working together to create and
evolve the technology. And there is the commercialization aspect, resulting in
an extremely effective transition of research results into a broadly deployed
and available information infrastructure.
| [
{
"version": "v1",
"created": "Sat, 23 Jan 1999 00:37:11 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Leiner",
"Barry M.",
""
],
[
"Cerf",
"Vinton G.",
""
],
[
"Clark",
"David D.",
""
],
[
"Kahn",
"Robert E.",
""
],
[
"Kleinrock",
"Leonard",
""
],
[
"Lynch",
"Daniel C.",
""
],
[
"Postel",
"Jon",
""
],
[
"Roberts",
"Larry G.",
""
],
[
"Wolf",
"Stephen",
""
]
]
| new_dataset | 0.992896 |
cs/9901015 | John Watrous | John Watrous | PSPACE has 2-round quantum interactive proof systems | 13 pages | null | null | null | cs.CC quant-ph | null | In this paper we consider quantum interactive proof systems, i.e.,
interactive proof systems in which the prover and verifier may perform quantum
computations and exchange quantum messages. It is proved that every language in
PSPACE has a quantum interactive proof system that requires only two rounds of
communication between the prover and verifier, while having exponentially small
(one-sided) probability of error. It follows that quantum interactive proof
systems are strictly more powerful than classical interactive proof systems in
the constant-round case unless the polynomial time hierarchy collapses to the
second level.
| [
{
"version": "v1",
"created": "Wed, 27 Jan 1999 21:35:26 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Watrous",
"John",
""
]
]
| new_dataset | 0.9951 |
cs/9902002 | Kuang-hua Chen | Kuang-hua Chen | Automatic Identification of Subjects for Textual Documents in Digital
Libraries | 7 pages, 6 tables | null | null | null | cs.DL cs.CL | null | The amount of electronic documents in the Internet grows very quickly. How to
effectively identify subjects for documents becomes an important issue. In
past, the researches focus on the behavior of nouns in documents. Although
subjects are composed of nouns, the constituents that determine which nouns are
subjects are not only nouns. Based on the assumption that texts are
well-organized and event-driven, nouns and verbs together contribute the
process of subject identification. This paper considers four factors: 1) word
importance, 2) word frequency, 3) word co-occurrence, and 4) word distance and
proposes a model to identify subjects for textual documents. The preliminary
experiments show that the performance of the proposed model is close to that of
human beings.
| [
{
"version": "v1",
"created": "Mon, 1 Feb 1999 11:01:23 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Chen",
"Kuang-hua",
""
]
]
| new_dataset | 0.979426 |
cs/9902004 | Eric Lease Morgan | Eric Lease Morgan | The Alex Catalogue, A Collection of Digital Texts with Automatic Methods
for Acquisition and Cataloging, User-Defined Typography, Cross-searching of
Indexed Content, and a Sense of Community | 9 pages, 2 figures | null | null | null | cs.DL | null | This paper describes the Alex Catalogue of Electronic Texts, the only
Internet-accessible collection of digital documents allowing the user to 1)
dynamically create customized, typographically readable documents on demand, 2)
search the content of one or more documents from the collection simultaneously,
3) create sets of documents from the collection for review and annotation, and
4) publish these sets of annotated documents in turn fostering a sense of
community around the Catalogue. More than a just a collection of links that
will break over time, Alex is an archive of electronic texts providing
unprecedented access to its content and features allowing it to meet the needs
of a wide variety of users and settings. Furthermore, the process of
maintaining the Catalogue is streamlined with tools for automatic acquisition
and cataloging making it possible to sustain the service with a minimum of
personnel.
| [
{
"version": "v1",
"created": "Tue, 2 Feb 1999 14:14:42 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Morgan",
"Eric Lease",
""
]
]
| new_dataset | 0.984303 |
cs/9902016 | Ye Jian | Michael J. Hu, Ye Jian | Multimedia Description Framework (MDF) for Content Description of
Audio/Video Documents | 20 pages | null | null | null | cs.DL | null | MPEG is undertaking a new initiative to standardize content description of
audio and video data/documents. When it is finalized in 2001, MPEG-7 is
expected to provide standardized description schemes for concise and
unambiguous content description of data/documents of complex media types.
Meanwhile, other meta-data or description schemes, such as Dublin Core, XML,
etc., are becoming popular in different application domains. In this paper, we
propose the Multimedia Description Framework (MDF), which is designated to
accommodate multiple description (meta-data) schemes, both MPEG-7 and
non-MPEG-7, into integrated architecture. We will use examples to show how MDF
description makes use of combined strength of different description schemes to
enhance its expression power and flexibility. We conclude the paper with
discussion of using MDF description of a movie video to search/retrieve
required scene clips from the movie, on the MDF prototype system we have
implemented.
| [
{
"version": "v1",
"created": "Tue, 9 Feb 1999 02:17:19 GMT"
}
]
| 2007-05-23T00:00:00 | [
[
"Hu",
"Michael J.",
""
],
[
"Jian",
"Ye",
""
]
]
| new_dataset | 0.994875 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.