id
stringlengths
9
10
submitter
stringlengths
2
52
authors
stringlengths
4
6.51k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
345
doi
stringlengths
11
120
report-no
stringlengths
2
243
categories
stringlengths
5
98
license
stringclasses
9 values
abstract
stringlengths
33
3.33k
versions
list
update_date
timestamp[s]
authors_parsed
list
prediction
stringclasses
1 value
probability
float64
0.95
1
cs/9902019
Wei Ding
Wei Ding, Gary Marchionini, Dagobert Soergel
Multimodal Surrogates for Video Browsing
11 pages
null
null
null
cs.DL cs.HC
null
Three types of video surrogates - visual (keyframes), verbal (keywords/phrases), and combination of the two - were designed and studied in a qualitative investigation of user cognitive processes. The results favor the combined surrogates in which verbal information and images reinforce each other, lead to better comprehension, and may actually require less processing time. The results also highlight image features users found most helpful. These findings will inform the interface design and video representation for video retrieval and browsing.
[ { "version": "v1", "created": "Tue, 9 Feb 1999 04:56:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Ding", "Wei", "" ], [ "Marchionini", "Gary", "" ], [ "Soergel", "Dagobert", "" ] ]
new_dataset
0.956826
cs/9903005
Lecomte Pierre
Pierre B. A. Lecomte, Michel Rigo
Numeration systems on a regular language
15 pages
null
null
null
cs.OH
null
Generalizations of linear numeration systems in which the set of natural numbers is recognizable by finite automata are obtained by describing an arbitrary infinite regular language following the lexicographic ordering. For these systems of numeration, we show that ultimately periodic sets are recognizable. We also study the translation and the multiplication by constants as well as the order dependence of the recognizability.
[ { "version": "v1", "created": "Thu, 4 Mar 1999 08:35:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Lecomte", "Pierre B. A.", "" ], [ "Rigo", "Michel", "" ] ]
new_dataset
0.968152
cs/9903007
Marc Dymetman
Marc Dymetman
Some Remarks on the Geometry of Grammar
22 pages, 15 figures
null
null
null
cs.CL cs.LO
null
This paper, following (Dymetman:1998), presents an approach to grammar description and processing based on the geometry of cancellation diagrams, a concept which plays a central role in combinatorial group theory (Lyndon-Schuppe:1977). The focus here is on the geometric intuitions and on relating group-theoretical diagrams to the traditional charts associated with context-free grammars and type-0 rewriting systems. The paper is structured as follows. We begin in Section 1 by analyzing charts in terms of constructs called cells, which are a geometrical counterpart to rules. Then we move in Section 2 to a presentation of cancellation diagrams and show how they can be used computationally. In Section 3 we give a formal algebraic presentation of the concept of group computation structure, which is based on the standard notions of free group and conjugacy. We then relate in Section 4 the geometric and the algebraic views of computation by using the fundamental theorem of combinatorial group theory (Rotman:1994). In Section 5 we study in more detail the relationship between the two views on the basis of a simple grammar stated as a group computation structure. In section 6 we extend this grammar to handle non-local constructs such as relative pronouns and quantifiers. We conclude in Section 7 with some brief notes on the differences between normal submonoids and normal subgroups, group computation versus rewriting systems, and the use of group morphisms to study the computational complexity of parsing and generation.
[ { "version": "v1", "created": "Fri, 5 Mar 1999 18:25:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Dymetman", "Marc", "" ] ]
new_dataset
0.969588
cs/9903018
Carlos Cassino
Carlos Cassino, Roberto Ierusalimschy, and Noemi Rodriguez
LuaJava - A Scripting Tool for Java
10 pages, LaTeX, 1 figure. Available at http://www.tecgraf.puc-rio.br/~cassino/luajava
null
null
PUC-RioInf.MCC02/99
cs.SE
null
Scripting languages are becoming more and more important as a tool for software development, as they provide great flexibility for rapid prototyping and for configuring componentware applications. In this paper we present LuaJava, a scripting tool for Java. LuaJava adopts Lua, a dynamically typed interpreted language, as its script language. Great emphasis is given to the transparency of the integration between the two languages, so that objects from one language can be used inside the other like native objects. The final result of this integration is a tool that allows the construction of configurable Java applications, using off-the-shelf components, in a high abstraction level.
[ { "version": "v1", "created": "Tue, 30 Mar 1999 11:28:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Cassino", "Carlos", "" ], [ "Ierusalimschy", "Roberto", "" ], [ "Rodriguez", "Noemi", "" ] ]
new_dataset
0.990327
cs/9904005
Walter Eaves
Walter Eaves
Transport Level Security: a proof using the Gong-Needham-Yahalom Logic
22 pages, 2 figures, 1 appendix
null
null
null
cs.CR
null
This paper provides a proof of the proposed Internet standard Transport Level Security protocol using the Gong-Needham-Yahalom logic. It is intended as a teaching aid and hopes to show to students: the potency of a formal method for protocol design; some of the subtleties of authenticating parties on a network where all messages can be intercepted; the design of what should be a widely accepted standard.
[ { "version": "v1", "created": "Wed, 14 Apr 1999 20:05:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Eaves", "Walter", "" ] ]
new_dataset
0.970948
cs/9904011
Yin Zhang
Yin Zhang
WebScript -- A Scripting Language for the Web
19 pages, 11 figures
null
null
null
cs.NI cs.PL
null
WebScript is a scripting language for processing Web documents. Designed as an extension to Jacl, the Java implementation of Tcl, WebScript allows programmers to manipulate HTML in the same way as Tcl manipulates text strings and GUI elements. This leads to a completely new way of writing the next generation of Web applications. This paper presents the motivation behind the design and implementation of WebScript, an overview of its major features, as well as some demonstrations of its power.
[ { "version": "v1", "created": "Wed, 21 Apr 1999 19:21:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Zhang", "Yin", "" ] ]
new_dataset
0.998985
cs/9904014
Stephen F. Bush
Stephen F. Bush and Sunil Jagannath and Joseph B. Evans and Victor Frost and Gary Minden and K. Sam Shanmugan
A Control and Management Network for Wireless ATM Systems
author's web page at http://www.crd.ge.com/people/bush
ACM-Baltzer Wireless Networks (WINET), volume 3, pages 267-283,1997
null
null
cs.NI
null
This paper describes the design of a control and management network (orderwire) for a mobile wireless Asynchronous Transfer Mode (ATM) network. This mobile wireless ATM network is part of the Rapidly Deployable Radio Network (RDRN). The orderwire system consists of a packet radio network which overlays the mobile wireless ATM network, each network element in this network uses Global Positioning System (GPS) information to control a beamforming antenna subsystem which provides for spatial reuse. This paper also proposes a novel Virtual Network Configuration (VNC) algorithm for predictive network configuration. A mobile ATM Private Network-Network Interface (PNNI) based on VNC is also discussed. Finally, as a prelude to the system implementation, results of a Maisie simulation of the orderwire system are discussed.
[ { "version": "v1", "created": "Thu, 22 Apr 1999 12:58:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Bush", "Stephen F.", "" ], [ "Jagannath", "Sunil", "" ], [ "Evans", "Joseph B.", "" ], [ "Frost", "Victor", "" ], [ "Minden", "Gary", "" ], [ "Shanmugan", "K. Sam", "" ] ]
new_dataset
0.998949
cs/9904017
David R. Hanson
David R. Hanson
A Machine-Independent Debugger--Revisited
12 pages; 6 figures; 3 tables
Software--Practice & Experience, vol. 29, no. 10, 849-862, Aug. 1999
null
Microsoft Research MSR-TR-99-04
cs.PL cs.SE
null
Most debuggers are notoriously machine-dependent, but some recent research prototypes achieve varying degrees of machine-independence with novel designs. Cdb, a simple source-level debugger for C, is completely independent of its target architecture. This independence is achieved by embedding symbol tables and debugging code in the target program, which costs both time and space. This paper describes a revised design and implementation of cdb that reduces the space cost by nearly one-half and the time cost by 13% by storing symbol tables in external files. A symbol table is defined by a 31-line grammar in the Abstract Syntax Description Language (ASDL). ASDL is a domain-specific language for specifying tree data structures. The ASDL tools accept an ASDL grammar and generate code to construct, read, and write these data structures. Using ASDL automates implementing parts of the debugger, and the grammar documents the symbol table concisely. Using ASDL also suggested simplifications to the interface between the debugger and the target program. Perhaps most important, ASDL emphasizes that symbol tables are data structures, not file formats. Many of the pitfalls of working with low-level file formats can be avoided by focusing instead on high-level data structures and automating the implementation details.
[ { "version": "v1", "created": "Fri, 23 Apr 1999 18:34:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Hanson", "David R.", "" ] ]
new_dataset
0.958871
cs/9904020
Walter Eaves
Walter Eaves
ODP channel objects that provide services transparently for distributing processing systems
35 pages, 10 figures
null
null
null
cs.DC cs.OS
null
This paper describes an architecture for a distributing processing system that would allow remote procedure calls to invoke other services as messages are passed between clients and servers. It proposes that an additional class of data processing objects be located in the software communications channel. The objects in this channel would then be used to enforce protocols on client-server applications without any additional effort by the application programmers. For example, services such as key-management, time-stamping, sequencing and encryption can be implemented at different levels of the software communications stack to provide a complete authentication service. A distributing processing environment could be used to control broadband network data delivery. Architectures and invocation semantics are discussed, Example classes and interfaces for channel objects are given in the Java programming language.
[ { "version": "v1", "created": "Mon, 26 Apr 1999 21:13:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Eaves", "Walter", "" ] ]
new_dataset
0.991387
cs/9906010
Victor Makarov
Victor Makarov
Predicate Logic with Definitions
15 pages
null
null
null
cs.LO cs.AI
null
Predicate Logic with Definitions (PLD or D-logic) is a modification of first-order logic intended mostly for practical formalization of mathematics. The main syntactic constructs of D-logic are terms, formulas and definitions. A definition is a definition of variables, a definition of constants, or a composite definition (D-logic has also abbreviation definitions called abbreviations). Definitions can be used inside terms and formulas. This possibility alleviates introducing new quantifier-like names. Composite definitions allow constructing new definitions from existing ones.
[ { "version": "v1", "created": "Mon, 7 Jun 1999 20:16:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Makarov", "Victor", "" ] ]
new_dataset
0.997975
cs/9906020
Ion Androutsopoulos
I. Androutsopoulos (Software & Knowledge Engineering Lab, Institute of Informatics & Telecommunications, NCSR Demokritos, Greece)
Temporal Meaning Representations in a Natural Language Front-End
15 pages. To appear in the Proceedings of the 12th International Symposium on Languages for Intensional Programming, Athens, Greece, 1999
In Gergatsoulis, M. and Rondogiannis, P. (Eds.), Intensional Programming II (Proceedings of the 12th International Symposium on Languages for Intensional Programming, Athens, Greece, 1999), pp. 197-213, World Scientific, 2000.
null
null
cs.CL
null
Previous work in the context of natural language querying of temporal databases has established a method to map automatically from a large subset of English time-related questions to suitable expressions of a temporal logic-like language, called TOP. An algorithm to translate from TOP to the TSQL2 temporal database language has also been defined. This paper shows how TOP expressions could be translated into a simpler logic-like language, called BOT. BOT is very close to traditional first-order predicate logic (FOPL), and hence existing methods to manipulate FOPL expressions can be exploited to interface to time-sensitive applications other than TSQL2 databases, maintaining the existing English-to-TOP mapping.
[ { "version": "v1", "created": "Tue, 22 Jun 1999 08:28:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Androutsopoulos", "I.", "", "Software & Knowledge Engineering Lab, Institute of\n Informatics & Telecommunications, NCSR Demokritos, Greece" ] ]
new_dataset
0.99905
cs/9906022
Joseph O'Rourke
Joseph O'Rourke and Irena Pashchenko
Zero-Parity Stabbing Information
null
Proc. Japan Conf. Discrete Comput. Geom. '98, Dec. 1998, 93--97
null
null
cs.CG cs.DM
null
Everett et al. introduced several varieties of stabbing information for the lines determined by pairs of vertices of a simple polygon P, and established their relationships to vertex visibility and other combinatorial data. In the same spirit, we define the ``zero-parity (ZP) stabbing information'' to be a natural weakening of their ``weak stabbing information,'' retaining only the distinction among {zero, odd, even>0} in the number of polygon edges stabbed. Whereas the weak stabbing information's relation to visibility remains an open problem, we completely settle the analogous questions for zero-parity information, with three results: (1) ZP information is insufficient to distinguish internal from external visibility graph edges; (2) but it does suffice for all polygons that avoid a certain complex substructure; and (3) the natural generalization of ZP information to the continuous case of smooth curves does distinguish internal from external visibility.
[ { "version": "v1", "created": "Tue, 22 Jun 1999 20:32:57 GMT" } ]
2007-05-23T00:00:00
[ [ "O'Rourke", "Joseph", "" ], [ "Pashchenko", "Irena", "" ] ]
new_dataset
0.999689
cs/9907016
Jim Gray
Tom Barclay Jim Gray Don Slutz
Microsoft TerraServer: A Spatial Data Warehouse
Original MSword format at http://research.microsoft.com/~gray/papers/MS_TR_99_30_TerraServer.doc
null
null
Microsoft Research Technical Report MSR-TR-99-29
cs.DB cs.DL
null
The TerraServer stores aerial, satellite, and topographic images of the earth in a SQL database available via the Internet. It is the world's largest online atlas, combining five terabytes of image data from the United States Geological Survey (USGS) and SPIN-2. This report describes the system-redesign based on our experience over the last year. It also reports usage and operations results over the last year -- over 2 billion web hits and over 20 Terabytes of imagry served over the Internet. Internet browsers provide intuitive spatial and text interfaces to the data. Users need no special hardware, software, or knowledge to locate and browse imagery. This paper describes how terabytes of "Internet unfriendly" geo-spatial images were scrubbed and edited into hundreds of millions of "Internet friendly" image tiles and loaded into a SQL data warehouse. Microsoft TerraServer demonstrates that general-purpose relational database technology can manage large scale image repositories, and shows that web browsers can be a good geospatial image presentation system.
[ { "version": "v1", "created": "Fri, 9 Jul 1999 21:30:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Slutz", "Tom Barclay Jim Gray Don", "" ] ]
new_dataset
0.980574
cs/9907018
Erik Demaine
Erik D. Demaine, Martin L. Demaine, David Eppstein, Greg N. Frederickson, Erich Friedman
Hinged Dissection of Polyominoes and Polyforms
27 pages, 39 figures. Accepted to Computational Geometry: Theory and Applications. v3 incorporates several comments by referees. v2 added many new results and a new coauthor (Frederickson)
null
null
null
cs.CG cs.DM
null
A hinged dissection of a set of polygons S is a collection of polygonal pieces hinged together at vertices that can be folded into any member of S. We present a hinged dissection of all edge-to-edge gluings of n congruent copies of a polygon P that join corresponding edges of P. This construction uses kn pieces, where k is the number of vertices of P. When P is a regular polygon, we show how to reduce the number of pieces to ceiling(k/2)*(n-1). In particular, we consider polyominoes (made up of unit squares), polyiamonds (made up of equilateral triangles), and polyhexes (made up of regular hexagons). We also give a hinged dissection of all polyabolos (made up of right isosceles triangles), which do not fall under the general result mentioned above. Finally, we show that if P can be hinged into Q, then any edge-to-edge gluing of n congruent copies of P can be hinged into any edge-to-edge gluing of n congruent copies of Q.
[ { "version": "v1", "created": "Sat, 10 Jul 1999 21:29:56 GMT" }, { "version": "v2", "created": "Wed, 13 Oct 1999 01:54:07 GMT" }, { "version": "v3", "created": "Sun, 23 Mar 2003 13:29:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Demaine", "Erik D.", "" ], [ "Demaine", "Martin L.", "" ], [ "Eppstein", "David", "" ], [ "Frederickson", "Greg N.", "" ], [ "Friedman", "Erich", "" ] ]
new_dataset
0.982193
cs/9907027
Andrea Schaerf
Krzysztof R. Apt and Andrea Schaerf
The Alma Project, or How First-Order Logic Can Help Us in Imperative Programming
25 pages
null
null
null
cs.LO cs.PL
null
The aim of the Alma project is the design of a strongly typed constraint programming language that combines the advantages of logic and imperative programming. The first stage of the project was the design and implementation of Alma-0, a small programming language that provides a support for declarative programming within the imperative programming framework. It is obtained by extending a subset of Modula-2 by a small number of features inspired by the logic programming paradigm. In this paper we discuss the rationale for the design of Alma-0, the benefits of the resulting hybrid programming framework, and the current work on adding constraint processing capabilities to the language. In particular, we discuss the role of the logical and customary variables, the interaction between the constraint store and the program, and the need for lists.
[ { "version": "v1", "created": "Mon, 19 Jul 1999 09:36:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Apt", "Krzysztof R.", "" ], [ "Schaerf", "Andrea", "" ] ]
new_dataset
0.992287
cs/9908003
Erik Demaine
Marshall Bern, Erik D. Demaine, David Eppstein, Eric Kuo, Andrea Mantler, Jack Snoeyink
Ununfoldable Polyhedra with Convex Faces
14 pages, 9 figures, LaTeX 2e. To appear in Computational Geometry: Theory and Applications. Major revision with two new authors, solving the open problem about triangular faces
Computational Geometry: Theory and Applications 24(2):51-62, February 2003
null
null
cs.CG cs.DM
null
Unfolding a convex polyhedron into a simple planar polygon is a well-studied problem. In this paper, we study the limits of unfoldability by studying nonconvex polyhedra with the same combinatorial structure as convex polyhedra. In particular, we give two examples of polyhedra, one with 24 convex faces and one with 36 triangular faces, that cannot be unfolded by cutting along edges. We further show that such a polyhedron can indeed be unfolded if cuts are allowed to cross faces. Finally, we prove that ``open'' polyhedra with triangular faces may not be unfoldable no matter how they are cut.
[ { "version": "v1", "created": "Tue, 3 Aug 1999 17:37:04 GMT" }, { "version": "v2", "created": "Mon, 27 Aug 2001 20:42:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Bern", "Marshall", "" ], [ "Demaine", "Erik D.", "" ], [ "Eppstein", "David", "" ], [ "Kuo", "Eric", "" ], [ "Mantler", "Andrea", "" ], [ "Snoeyink", "Jack", "" ] ]
new_dataset
0.998126
cs/9908008
Dahlia Malkhi
Dahlia Malkhi, Michael Merritt and Ohad Rodeh
Secure Multicast in a WAN
preprint of a paper to appear in the Distributed Computing Journal
null
null
null
cs.CR cs.DC
null
A secure reliable multicast protocol enables a process to send a message to a group of recipients such that all correct destinations receive the same message, despite the malicious efforts of fewer than a third of the total number of processes, including the sender. This has been sh own to be a useful tool in building secure distributed services, albeit with a cost that typically grows linearly with the size of the system. For very large networks, for which this is prohibitive, we present two approaches for reducing the cost: First, we show a protocol whose cost is on the order of the number of tolerated failures. Secondly, we show how relaxing the consistency requirement to a probabilistic guarantee can reduce the associated cost, effectively to a constant.
[ { "version": "v1", "created": "Thu, 12 Aug 1999 17:40:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Malkhi", "Dahlia", "" ], [ "Merritt", "Michael", "" ], [ "Rodeh", "Ohad", "" ] ]
new_dataset
0.998019
cs/9908009
Dahlia Malkhi
Dahlia Malkhi and Michael Reiter
Secure Execution of Java Applets using a Remote Playground
preprint of a paper to appear in IEEE Transactions on Software Engineering
null
null
null
cs.CR cs.NI
null
Mobile code presents a number of threats to machines that execute it. We introduce an approach for protecting machines and the resources they hold from mobile code, and describe a system based on our approach for protecting host machines from Java 1.1 applets. In our approach, each Java applet downloaded to the protected domain is rerouted to a dedicated machine (or set of machines), the {\em playground}, at which it is executed. Prior to execution the applet is transformed to use the downloading user's web browser as a graphics terminal for its input and output, and so the user has the illusion that the applet is running on her own machine. In reality, however, mobile code runs only in the sanitized environment of the playground, where user files cannot be mounted and from which only limited network connections are accepted by machines in the protected domain. Our playground thus provides a second level of defense against mobile code that circumvents language-based defenses. The paper presents the design and implementation of a playground for Java 1.1 applets, and discusses extensions of it for other forms of mobile code including Java 1.2.
[ { "version": "v1", "created": "Thu, 12 Aug 1999 17:50:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Malkhi", "Dahlia", "" ], [ "Reiter", "Michael", "" ] ]
new_dataset
0.999777
cs/9908016
David Eppstein
Marshall Bern and David Eppstein
Quadrilateral Meshing by Circle Packing
12 pages, 10 figures. To appear in Int. J. Comp. Geom. & Appl. A preliminary version of this work was presented at the 6th Int. Meshing Roundtable, Park City, Utah, 1997
Int. J. Comp. Geom. & Appl. 10(4):347-360, Aug. 2000
null
null
cs.CG
null
We use circle-packing methods to generate quadrilateral meshes for polygonal domains, with guaranteed bounds both on the quality and the number of elements. We show that these methods can generate meshes of several types: (1) the elements form the cells of a Voronoi diagram, (2) all elements have two opposite right angles, (3) all elements are kites, or (4) all angles are at most 120 degrees. In each case the total number of elements is O(n), where n is the number of input vertices.
[ { "version": "v1", "created": "Thu, 19 Aug 1999 20:40:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Bern", "Marshall", "" ], [ "Eppstein", "David", "" ] ]
new_dataset
0.97526
cs/9909018
Devillers
Olivier Devillers, Pierre-Maris Gandoin
Geometric compression for progressive transmission
16 pages, 10 figures
null
null
INRIA Research report 3766, in french
cs.CG cs.GR
null
The compression of geometric structures is a relatively new field of data compression. Since about 1995, several articles have dealt with the coding of meshes, using for most of them the following approach: the vertices of the mesh are coded in an order such that it contains partially the topology of the mesh. In the same time, some simple rules attempt to predict the position of the current vertex from the positions of its neighbours that have been previously coded. In this article, we describe a compression algorithm whose principle is completely different: the order of the vertices is used to compress their coordinates, and then the topology of the mesh is reconstructed from the vertices. This algorithm, particularly suited for terrain models, achieves compression factors that are slightly greater than those of the currently available algorithms, and moreover, it allows progressive and interactive transmission of the meshes.
[ { "version": "v1", "created": "Tue, 28 Sep 1999 06:56:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Devillers", "Olivier", "" ], [ "Gandoin", "Pierre-Maris", "" ] ]
new_dataset
0.994244
cs/9910018
Shie-Yuan Wang
S.Y. Wang
Decoupling Control from Data for TCP Congestion Control
Ph.D. Thesis, Harvard University, September 1999. This thesis's Chapter 3 about "TCP Trunking" will be published in IEEE ICNP'99 Proceedings. A condensed version of this thesis is currently submitted to a conference
null
null
null
cs.NI
null
Many applications want to use TCP congestion control to regulate the transmission rate of a data packet stream. A natural way to achieve this goal is to transport the data packet stream on a TCP connection. However, because TCP implements both congestion and error control, transporting a data packet stream directly using a TCP connection forces the data packet stream to be subject to TCP's other properties caused by TCP error control, which may be inappropriate for these applications. The TCP decoupling approach proposed in this thesis is a novel way of applying TCP congestion control to a data packet stream without actually transporting the data packet stream on a TCP connection. Instead, a TCP connection using the same network path as the data packet stream is set up separately and the transmission rate of the data packet stream is then associated with that of the TCP packets. Since the transmission rate of these TCP packets is under TCP congestion control, so is that of the data packet stream. Furthermore, since the data packet stream is not transported on a TCP connection, the regulated data packet stream is not subject to TCP error control. Because of this flexibility, the TCP decoupling approach opens up many new opportunities, solves old problems, and improves the performance of some existing applications. All of these advantages will be demonstrated in the thesis. This thesis presents the design, implementation, and analysis of the TCP decoupling approach, and its successful applications in TCP trunking, wireless communication, and multimedia streaming.
[ { "version": "v1", "created": "Thu, 21 Oct 1999 22:03:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Wang", "S. Y.", "" ] ]
new_dataset
0.999025
cs/9910024
Steven M. Robbins
Therese Biedl, Erik Demaine, Martin Demaine, Sylvain Lazard, Anna Lubiw, Joseph O'Rourke, Steve Robbins, Ileana Streinu, Godfried Toussaint, Sue Whitesides
On Reconfiguring Tree Linkages: Trees can Lock
16 pages, 6 figures Introduction reworked and references added, as the main open problem was recently closed
null
null
SOCS-00.7
cs.CG cs.DM
null
It has recently been shown that any simple (i.e. nonintersecting) polygonal chain in the plane can be reconfigured to lie on a straight line, and any simple polygon can be reconfigured to be convex. This result cannot be extended to tree linkages: we show that there are trees with two simple configurations that are not connected by a motion that preserves simplicity throughout the motion. Indeed, we prove that an $N$-link tree can have $2^{\Omega(N)}$ equivalence classes of configurations.
[ { "version": "v1", "created": "Mon, 1 Nov 1999 17:50:19 GMT" }, { "version": "v2", "created": "Fri, 29 Sep 2000 02:26:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Biedl", "Therese", "" ], [ "Demaine", "Erik", "" ], [ "Demaine", "Martin", "" ], [ "Lazard", "Sylvain", "" ], [ "Lubiw", "Anna", "" ], [ "O'Rourke", "Joseph", "" ], [ "Robbins", "Steve", "" ], [ "Streinu", "Ileana", "" ], [ "Toussaint", "Godfried", "" ], [ "Whitesides", "Sue", "" ] ]
new_dataset
0.986642
cs/9911002
Rigo Michel
Michel Rigo
Numeration systems on a regular language: Arithmetic operations, Recognizability and Formal power series
34 pages; corrected typos, two sections concerning exponential case and relation with positional systems added
Theoret. Comput. Sci. 269 (2001) 469--498
null
null
cs.CC
null
Generalizations of numeration systems in which N is recognizable by a finite automaton are obtained by describing a lexicographically ordered infinite regular language L over a finite alphabet A. For these systems, we obtain a characterization of recognizable sets of integers in terms of rational formal series. We also show that, if the complexity of L is Theta (n^q) (resp. if L is the complement of a polynomial language), then multiplication by an integer k preserves recognizability only if k=t^{q+1} (resp. if k is not a power of the cardinality of A) for some integer t. Finally, we obtain sufficient conditions for the notions of recognizability and U-recognizability to be equivalent, where U is some positional numeration system related to a sequence of integers.
[ { "version": "v1", "created": "Mon, 8 Nov 1999 13:03:50 GMT" }, { "version": "v2", "created": "Thu, 20 Jan 2000 13:40:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Rigo", "Michel", "" ] ]
new_dataset
0.998167
cs/9911009
John Watrous
Andris Ambainis (1), John Watrous (2) ((1) UC Berkeley, (2) University of Calgary)
Two-way finite automata with quantum and classical states
11 pages
null
null
null
cs.CC quant-ph
null
We introduce 2-way finite automata with quantum and classical states (2qcfa's). This is a variant on the 2-way quantum finite automata (2qfa) model which may be simpler to implement than unrestricted 2qfa's; the internal state of a 2qcfa may include a quantum part that may be in a (mixed) quantum state, but the tape head position is required to be classical. We show two languages for which 2qcfa's are better than classical 2-way automata. First, 2qcfa's can recognize palindromes, a language that cannot be recognized by 2-way deterministic or probabilistic finite automata. Second, in polynomial time 2qcfa's can recognize {a^n b^n | n>=0}, a language that can be recognized classically by a 2-way probabilistic automaton but only in exponential time.
[ { "version": "v1", "created": "Tue, 16 Nov 1999 22:24:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Ambainis", "Andris", "" ], [ "Watrous", "John", "" ] ]
new_dataset
0.999462
cs/9911013
Joseph O'Rourke
Joseph O'Rourke and The Smith Problem Solving Group
PushPush is NP-hard in 3D
10 pages, 7 figures
null
null
Smith Tech. Rep. 064, Nov. 1999
cs.CG cs.DM
null
We prove that a particular pushing-blocks puzzle is intractable in 3D. The puzzle, inspired by the game PushPush, consists of unit square blocks on an integer lattice. An agent may push blocks (but never pull them) in attempting to move between given start and goal positions. In the PushPush version, the agent can only push one block at a time, and moreover, each block, when pushed, slides the maximal extent of its free range. We prove this version is NP-hard in 3D by reduction from SAT. The corresponding problem in 2D remains open.
[ { "version": "v1", "created": "Sun, 28 Nov 1999 15:43:50 GMT" } ]
2007-05-23T00:00:00
[ [ "O'Rourke", "Joseph", "" ], [ "Group", "The Smith Problem Solving", "" ] ]
new_dataset
0.99951
cs/9912003
Masaki Murata
M. Murata, H. Isahara (CRL), M. Nagao (Kyoto University)
Resolution of Indirect Anaphora in Japanese Sentences Using Examples 'X no Y (Y of X)'
8 pages, 0 figures. Computation and Language
ACL'99 Workshop on 'Coreference and Its Applications', Maryland, USA, June 22, 1999
null
null
cs.CL
null
A noun phrase can indirectly refer to an entity that has already been mentioned. For example, ``I went into an old house last night. The roof was leaking badly and ...'' indicates that ``the roof'' is associated with `` an old house}'', which was mentioned in the previous sentence. This kind of reference (indirect anaphora) has not been studied well in natural language processing, but is important for coherence resolution, language understanding, and machine translation. In order to analyze indirect anaphora, we need a case frame dictionary for nouns that contains knowledge of the relationships between two nouns but no such dictionary presently exists. Therefore, we are forced to use examples of ``X no Y'' (Y of X) and a verb case frame dictionary instead. We tried estimating indirect anaphora using this information and obtained a recall rate of 63% and a precision rate of 68% on test sentences. This indicates that the information of ``X no Y'' is useful to a certain extent when we cannot make use of a noun case frame dictionary. We estimated the results that would be given by a noun case frame dictionary, and obtained recall and precision rates of 71% and 82% respectively. Finally, we proposed a way to construct a noun case frame dictionary by using examples of ``X no Y.''
[ { "version": "v1", "created": "Mon, 13 Dec 1999 04:42:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Murata", "M.", "", "CRL" ], [ "Isahara", "H.", "", "CRL" ], [ "Nagao", "M.", "", "Kyoto University" ] ]
new_dataset
0.997778