id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
sequencelengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/9711104 | null | D. Monderer, M. Tennenholtz | Dynamic Non-Bayesian Decision Making | See http://www.jair.org/ for any accompanying files | Journal of Artificial Intelligence Research, Vol 7, (1997),
231-248 | null | null | cs.AI | null | The model of a non-Bayesian agent who faces a repeated game with incomplete
information against Nature is an appropriate tool for modeling general
agent-environment interactions. In such a model the environment state
(controlled by Nature) may change arbitrarily, and the feedback/reward function
is initially unknown. The agent is not Bayesian, that is he does not form a
prior probability neither on the state selection strategy of Nature, nor on his
reward function. A policy for the agent is a function which assigns an action
to every history of observations and actions. Two basic feedback structures are
considered. In one of them -- the perfect monitoring case -- the agent is able
to observe the previous environment state as part of his feedback, while in the
other -- the imperfect monitoring case -- all that is available to the agent is
the reward obtained. Both of these settings refer to partially observable
processes, where the current environment state is unknown. Our main result
refers to the competitive ratio criterion in the perfect monitoring case. We
prove the existence of an efficient stochastic policy that ensures that the
competitive ratio is obtained at almost all stages with an arbitrarily high
probability, where efficiency is measured in terms of rate of convergence. It
is further shown that such an optimal policy does not exist in the imperfect
monitoring case. Moreover, it is proved that in the perfect monitoring case
there does not exist a deterministic policy that satisfies our long run
optimality criterion. In addition, we discuss the maxmin criterion and prove
that a deterministic efficient optimal strategy does exist in the imperfect
monitoring case under this criterion. Finally we show that our approach to
long-run optimality can be viewed as qualitative, which distinguishes it from
previous work in this area.
| [
{
"version": "v1",
"created": "Sat, 1 Nov 1997 00:00:00 GMT"
}
] | 2014-11-17T00:00:00 | [
[
"Monderer",
"D.",
""
],
[
"Tennenholtz",
"M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/9711105 | null | Lawrence C. Paulson | Mechanizing Coinduction and Corecursion in Higher-order Logic | null | published in Journal of Logic and Computation 7 (March 1997),
175-204 | null | null | cs.LO | null | A theory of recursive and corecursive definitions has been developed in
higher-order logic (HOL) and mechanized using Isabelle. Least fixedpoints
express inductive data types such as strict lists; greatest fixedpoints express
coinductive data types, such as lazy lists. Well-founded recursion expresses
recursive functions over inductive data types; corecursion expresses functions
that yield elements of coinductive data types. The theory rests on a
traditional formalization of infinite trees. The theory is intended for use in
specification and verification. It supports reasoning about a wide range of
computable functions, but it does not formalize their operational semantics and
can express noncomputable functions also. The theory is illustrated using
finite and infinite lists. Corecursion expresses functions over infinite lists;
coinduction reasons about such functions.
| [
{
"version": "v1",
"created": "Tue, 31 Oct 2000 00:00:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Paulson",
"Lawrence C.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/9711106 | null | Lawrence C. Paulson | Generic Automatic Proof Tools | null | published in Robert Veroff (editor), Automated Reasoning and its
Applications: Essays in Honor of Larry Wos (MIT Press, 1997), 23-47 | null | null | cs.LO | null | This book chapter establishes connections between the interactive proof tool
Isabelle and classical tableau and resolution technology. Isabelle's classical
reasoner is described and demonstrated by an extended case study: the
Church-Rosser theorem for combinators. Compared with other interactive theorem
provers, Isabelle's classical reasoner achieves a high degree of automation.
| [
{
"version": "v1",
"created": "Thu, 29 Mar 2001 00:00:00 GMT"
}
] | 2016-08-31T00:00:00 | [
[
"Paulson",
"Lawrence C.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/9712101 | null | J. Frank, P. Cheeseman, J. Stutz | When Gravity Fails: Local Search Topology | See http://www.jair.org/ for any accompanying files | Journal of Artificial Intelligence Research, Vol 7, (1997),
249-281 | null | null | cs.AI | null | Local search algorithms for combinatorial search problems frequently
encounter a sequence of states in which it is impossible to improve the value
of the objective function; moves through these regions, called plateau moves,
dominate the time spent in local search. We analyze and characterize plateaus
for three different classes of randomly generated Boolean Satisfiability
problems. We identify several interesting features of plateaus that impact the
performance of local search algorithms. We show that local minima tend to be
small but occasionally may be very large. We also show that local minima can be
escaped without unsatisfying a large number of clauses, but that systematically
searching for an escape route may be computationally expensive if the local
minimum is large. We show that plateaus with exits, called benches, tend to be
much larger than minima, and that some benches have very few exit states which
local search can use to escape. We show that the solutions (i.e., global
minima) of randomly generated problem instances form clusters, which behave
similarly to local minima. We revisit several enhancements of local search
algorithms and explain their performance in light of our results. Finally we
discuss strategies for creating the next generation of local search algorithms.
| [
{
"version": "v1",
"created": "Mon, 1 Dec 1997 00:00:00 GMT"
}
] | 2014-11-17T00:00:00 | [
[
"Frank",
"J.",
""
],
[
"Cheeseman",
"P.",
""
],
[
"Stutz",
"J.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/9712102 | null | H. Kaindl, G. Kainz | Bidirectional Heuristic Search Reconsidered | See http://www.jair.org/ for any accompanying files | Journal of Artificial Intelligence Research, Vol 7, (1997),
283-317 | null | null | cs.AI | null | The assessment of bidirectional heuristic search has been incorrect since it
was first published more than a quarter of a century ago. For quite a long
time, this search strategy did not achieve the expected results, and there was
a major misunderstanding about the reasons behind it. Although there is still
wide-spread belief that bidirectional heuristic search is afflicted by the
problem of search frontiers passing each other, we demonstrate that this
conjecture is wrong. Based on this finding, we present both a new generic
approach to bidirectional heuristic search and a new approach to dynamically
improving heuristic values that is feasible in bidirectional search only. These
approaches are put into perspective with both the traditional and more recently
proposed approaches in order to facilitate a better overall understanding.
Empirical results of experiments with our new approaches show that
bidirectional heuristic search can be performed very efficiently and also with
limited memory. These results suggest that bidirectional heuristic search
appears to be better for solving certain difficult problems than corresponding
unidirectional search. This provides some evidence for the usefulness of a
search strategy that was long neglected. In summary, we show that bidirectional
heuristic search is viable and consequently propose that it be reconsidered.
| [
{
"version": "v1",
"created": "Mon, 1 Dec 1997 00:00:00 GMT"
}
] | 2014-11-17T00:00:00 | [
[
"Kaindl",
"H.",
""
],
[
"Kainz",
"G.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/9801101 | null | G. Gogic, C. H. Papadimitriou, M. Sideri | Incremental Recompilation of Knowledge | See http://www.jair.org/ for any accompanying files | Journal of Artificial Intelligence Research, Vol 8, (1998), 23-37 | null | null | cs.AI | null | Approximating a general formula from above and below by Horn formulas (its
Horn envelope and Horn core, respectively) was proposed by Selman and Kautz
(1991, 1996) as a form of ``knowledge compilation,'' supporting rapid
approximate reasoning; on the negative side, this scheme is static in that it
supports no updates, and has certain complexity drawbacks pointed out by
Kavvadias, Papadimitriou and Sideri (1993). On the other hand, the many
frameworks and schemes proposed in the literature for theory update and
revision are plagued by serious complexity-theoretic impediments, even in the
Horn case, as was pointed out by Eiter and Gottlob (1992), and is further
demonstrated in the present paper. More fundamentally, these schemes are not
inductive, in that they may lose in a single update any positive properties of
the represented sets of formulas (small size, Horn structure, etc.). In this
paper we propose a new scheme, incremental recompilation, which combines Horn
approximation and model-based updates; this scheme is inductive and very
efficient, free of the problems facing its constituents. A set of formulas is
represented by an upper and lower Horn approximation. To update, we replace the
upper Horn formula by the Horn envelope of its minimum-change update, and
similarly the lower one by the Horn core of its update; the key fact which
enables this scheme is that Horn envelopes and cores are easy to compute when
the underlying formula is the result of a minimum-change update of a Horn
formula by a clause. We conjecture that efficient algorithms are possible for
more complex updates.
| [
{
"version": "v1",
"created": "Thu, 1 Jan 1998 00:00:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gogic",
"G.",
""
],
[
"Papadimitriou",
"C. H.",
""
],
[
"Sideri",
"M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/9801102 | null | J. Engelfriet | Monotonicity and Persistence in Preferential Logics | See http://www.jair.org/ for any accompanying files | Journal of Artificial Intelligence Research, Vol 8, (1998), 1-21 | null | null | cs.AI | null | An important characteristic of many logics for Artificial Intelligence is
their nonmonotonicity. This means that adding a formula to the premises can
invalidate some of the consequences. There may, however, exist formulae that
can always be safely added to the premises without destroying any of the
consequences: we say they respect monotonicity. Also, there may be formulae
that, when they are a consequence, can not be invalidated when adding any
formula to the premises: we call them conservative. We study these two classes
of formulae for preferential logics, and show that they are closely linked to
the formulae whose truth-value is preserved along the (preferential) ordering.
We will consider some preferential logics for illustration, and prove syntactic
characterization results for them. The results in this paper may improve the
efficiency of theorem provers for preferential logics.
| [
{
"version": "v1",
"created": "Thu, 1 Jan 1998 00:00:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Engelfriet",
"J.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/9801103 | Maggie McLoughlin | Donald E. Knuth | Linear probing and graphs | null | Algorithmica 22 (1998), no. 4, 561--568 | null | Knuth migration 11/2004 | cs.DS | null | Mallows and Riordan showed in 1968 that labeled trees with a small number of
inversions are related to labeled graphs that are connected and sparse. Wright
enumerated sparse connected graphs in 1977, and Kreweras related the inversions
of trees to the so-called ``parking problem'' in 1980. A~combination of these
three results leads to a surprisingly simple analysis of the behavior of
hashing by linear probing, including higher moments of the cost of successful
search.
| [
{
"version": "v1",
"created": "Thu, 15 Jan 1998 00:00:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Knuth",
"Donald E.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/9803101 | null | B. Srivastava, S. Kambhampati | Synthesizing Customized Planners from Specifications | See http://www.jair.org/ for any accompanying files | Journal of Artificial Intelligence Research, Vol 8, (1998), 93-128 | null | null | cs.AI | null | Existing plan synthesis approaches in artificial intelligence fall into two
categories -- domain independent and domain dependent. The domain independent
approaches are applicable across a variety of domains, but may not be very
efficient in any one given domain. The domain dependent approaches need to be
(re)designed for each domain separately, but can be very efficient in the
domain for which they are designed. One enticing alternative to these
approaches is to automatically synthesize domain independent planners given the
knowledge about the domain and the theory of planning. In this paper, we
investigate the feasibility of using existing automated software synthesis
tools to support such synthesis. Specifically, we describe an architecture
called CLAY in which the Kestrel Interactive Development System (KIDS) is used
to derive a domain-customized planner through a semi-automatic combination of a
declarative theory of planning, and the declarative control knowledge specific
to a given domain, to semi-automatically combine them to derive
domain-customized planners. We discuss what it means to write a declarative
theory of planning and control knowledge for KIDS, and illustrate our approach
by generating a class of domain-specific planners using state space
refinements. Our experiments show that the synthesized planners can outperform
classical refinement planners (implemented as instantiations of UCP,
Kambhampati & Srivastava, 1995), using the same control knowledge. We will
contrast the costs and benefits of the synthesis approach with conventional
methods for customizing domain independent planners.
| [
{
"version": "v1",
"created": "Sun, 1 Mar 1998 00:00:00 GMT"
}
] | 2009-09-25T00:00:00 | [
[
"Srivastava",
"B.",
""
],
[
"Kambhampati",
"S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/9803102 | null | A. Moore, M. S. Lee | Cached Sufficient Statistics for Efficient Machine Learning with Large
Datasets | See http://www.jair.org/ for any accompanying files | Journal of Artificial Intelligence Research, Vol 8, (1998), 67-91 | null | null | cs.AI | null | This paper introduces new algorithms and data structures for quick counting
for machine learning datasets. We focus on the counting task of constructing
contingency tables, but our approach is also applicable to counting the number
of records in a dataset that match conjunctive queries. Subject to certain
assumptions, the costs of these operations can be shown to be independent of
the number of records in the dataset and loglinear in the number of non-zero
entries in the contingency table. We provide a very sparse data structure, the
ADtree, to minimize memory use. We provide analytical worst-case bounds for
this structure for several models of data distribution. We empirically
demonstrate that tractably-sized data structures can be produced for large
real-world datasets by (a) using a sparse tree structure that never allocates
memory for counts of zero, (b) never allocating memory for counts that can be
deduced from other counts, and (c) not bothering to expand the tree fully near
its leaves. We show how the ADtree can be used to accelerate Bayes net
structure finding algorithms, rule learning algorithms, and feature selection
algorithms, and we provide a number of empirical results comparing ADtree
methods against traditional direct counting approaches. We also discuss the
possible uses of ADtrees in other machine learning methods, and discuss the
merits of ADtrees in comparison with alternative representations such as
kd-trees, R-trees and Frequent Sets.
| [
{
"version": "v1",
"created": "Sun, 1 Mar 1998 00:00:00 GMT"
}
] | 2009-09-25T00:00:00 | [
[
"Moore",
"A.",
""
],
[
"Lee",
"M. S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/9803103 | null | S. Argamon-Engelson, M. Koppel | Tractability of Theory Patching | See http://www.jair.org/ for any accompanying files | Journal of Artificial Intelligence Research, Vol 8, (1998), 39-65 | null | null | cs.AI | null | In this paper we consider the problem of `theory patching', in which we are
given a domain theory, some of whose components are indicated to be possibly
flawed, and a set of labeled training examples for the domain concept. The
theory patching problem is to revise only the indicated components of the
theory, such that the resulting theory correctly classifies all the training
examples. Theory patching is thus a type of theory revision in which revisions
are made to individual components of the theory. Our concern in this paper is
to determine for which classes of logical domain theories the theory patching
problem is tractable. We consider both propositional and first-order domain
theories, and show that the theory patching problem is equivalent to that of
determining what information contained in a theory is `stable' regardless of
what revisions might be performed to the theory. We show that determining
stability is tractable if the input theory satisfies two conditions: that
revisions to each theory component have monotonic effects on the classification
of examples, and that theory components act independently in the classification
of examples in the theory. We also show how the concepts introduced can be used
to determine the soundness and completeness of particular theory patching
algorithms.
| [
{
"version": "v1",
"created": "Sun, 1 Mar 1998 00:00:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Argamon-Engelson",
"S.",
""
],
[
"Koppel",
"M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/9805101 | null | J. F\"urnkranz | Integrative Windowing | See http://www.jair.org/ for any accompanying files | Journal of Artificial Intelligence Research, Vol 8, (1998),
129-164 | 10.1613/jair.487 | null | cs.AI | null | In this paper we re-investigate windowing for rule learning algorithms. We
show that, contrary to previous results for decision tree learning, windowing
can in fact achieve significant run-time gains in noise-free domains and
explain the different behavior of rule learning algorithms by the fact that
they learn each rule independently. The main contribution of this paper is
integrative windowing, a new type of algorithm that further exploits this
property by integrating good rules into the final theory right after they have
been discovered. Thus it avoids re-learning these rules in subsequent
iterations of the windowing process. Experimental evidence in a variety of
noise-free domains shows that integrative windowing can in fact achieve
substantial run-time gains. Furthermore, we discuss the problem of noise in
windowing and present an algorithm that is able to achieve run-time gains in a
set of experiments in a simple domain with artificial noise.
| [
{
"version": "v1",
"created": "Fri, 1 May 1998 00:00:00 GMT"
}
] | 2018-12-10T00:00:00 | [
[
"Fürnkranz",
"J.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/9806101 | null | A. Darwiche | Model-Based Diagnosis using Structured System Descriptions | See http://www.jair.org/ for any accompanying files | Journal of Artificial Intelligence Research, Vol 8, (1998),
165-222 | null | null | cs.AI | null | This paper presents a comprehensive approach for model-based diagnosis which
includes proposals for characterizing and computing preferred diagnoses,
assuming that the system description is augmented with a system structure (a
directed graph explicating the interconnections between system components).
Specifically, we first introduce the notion of a consequence, which is a
syntactically unconstrained propositional sentence that characterizes all
consistency-based diagnoses and show that standard characterizations of
diagnoses, such as minimal conflicts, correspond to syntactic variations on a
consequence. Second, we propose a new syntactic variation on the consequence
known as negation normal form (NNF) and discuss its merits compared to standard
variations. Third, we introduce a basic algorithm for computing consequences in
NNF given a structured system description. We show that if the system structure
does not contain cycles, then there is always a linear-size consequence in NNF
which can be computed in linear time. For arbitrary system structures, we show
a precise connection between the complexity of computing consequences and the
topology of the underlying system structure. Finally, we present an algorithm
that enumerates the preferred diagnoses characterized by a consequence. The
algorithm is shown to take linear time in the size of the consequence if the
preference criterion satisfies some general conditions.
| [
{
"version": "v1",
"created": "Mon, 1 Jun 1998 00:00:00 GMT"
}
] | 2014-11-17T00:00:00 | [
[
"Darwiche",
"A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/9806102 | null | L. Finkelstein, S. Markovitch | A Selective Macro-learning Algorithm and its Application to the NxN
Sliding-Tile Puzzle | See http://www.jair.org/ for an online appendix and other files
accompanying this article | Journal of Artificial Intelligence Research, Vol 8, (1998),
223-263 | null | null | cs.AI | null | One of the most common mechanisms used for speeding up problem solvers is
macro-learning. Macros are sequences of basic operators acquired during problem
solving. Macros are used by the problem solver as if they were basic operators.
The major problem that macro-learning presents is the vast number of macros
that are available for acquisition. Macros increase the branching factor of the
search space and can severely degrade problem-solving efficiency. To make macro
learning useful, a program must be selective in acquiring and utilizing macros.
This paper describes a general method for selective acquisition of macros.
Solvable training problems are generated in increasing order of difficulty. The
only macros acquired are those that take the problem solver out of a local
minimum to a better state. The utility of the method is demonstrated in several
domains, including the domain of NxN sliding-tile puzzles. After learning on
small puzzles, the system is able to efficiently solve puzzles of any size.
| [
{
"version": "v1",
"created": "Mon, 1 Jun 1998 00:00:00 GMT"
}
] | 2009-09-25T00:00:00 | [
[
"Finkelstein",
"L.",
""
],
[
"Markovitch",
"S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/9808001 | Max Chaves | M. Chaves | Chess Pure Strategies are Probably Chaotic | 7 pages, no figures | null | null | null | cs.CC cs.AI | null | It is odd that chess grandmasters often disagree in their analysis of
positions, sometimes even of simple ones, and that a grandmaster can hold his
own against an powerful analytic machine such as Deep Blue. The fact that there
must exist pure winning strategies for chess is used to construct a control
strategy function. It is then shown that chess strategy is equivalent to an
autonomous system of differential equations, and conjectured that the system is
chaotic. If true the conjecture would explain the forenamed peculiarities and
would also imply that there cannot exist a static evaluator for chess.
| [
{
"version": "v1",
"created": "Fri, 21 Aug 1998 19:13:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chaves",
"M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/9808002 | Lane A. Hemaspaandra | Edith Hemaspaandra, Lane A. Hemaspaandra, Harald Hempel | Downward Collapse from a Weaker Hypothesis | null | null | null | see UR-CS-TR-98-681 | cs.CC | null | Hemaspaandra et al. proved that, for $m > 0$ and $0 < i < k - 1$: if
$\Sigma_i^p \BoldfaceDelta DIFF_m(\Sigma_k^p)$ is closed under complementation,
then $DIFF_m(\Sigma_k^p) = coDIFF_m(\Sigma_k^p)$. This sharply asymmetric
result fails to apply to the case in which the hypothesis is weakened by
allowing the $\Sigma_i^p$ to be replaced by any class in its difference
hierarchy. We so extend the result by proving that, for $s,m > 0$ and $0 < i <
k - 1$: if $DIFF_s(\Sigma_i^p) \BoldfaceDelta DIFF_m(\Sigma_k^p)$ is closed
under complementation, then $DIFF_m(\Sigma_k^p) = coDIFF_m(\Sigma_k^p)$.
| [
{
"version": "v1",
"created": "Mon, 24 Aug 1998 21:37:54 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hemaspaandra",
"Edith",
""
],
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Hempel",
"Harald",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/9808003 | Lane A. Hemaspaandra | Lane A. Hemaspaandra and Joerg Rothe | Creating Strong Total Commutative Associative Complexity-Theoretic
One-Way Functions from Any Complexity-Theoretic One-Way Function | null | null | null | see UR-CS-TR-98-688 | cs.CC cs.CR | null | Rabi and Sherman [RS97] presented novel digital signature and unauthenticated
secret-key agreement protocols, developed by themselves and by Rivest and
Sherman. These protocols use ``strong,'' total, commutative (in the case of
multi-party secret-key agreement), associative one-way functions as their key
building blocks. Though Rabi and Sherman did prove that associative one-way
functions exist if $\p \neq \np$, they left as an open question whether any
natural complexity-theoretic assumption is sufficient to ensure the existence
of ``strong,'' total, commutative, associative one-way functions. In this
paper, we prove that if $\p \neq \np$ then ``strong,'' total, commutative,
associative one-way functions exist.
| [
{
"version": "v1",
"created": "Sun, 23 Aug 1998 18:22:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Rothe",
"Joerg",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/9808004 | Jon Crowcroft | Jon Crowcroft and Philippe Oechslin | Differentiated End-to-End Internet Services using a Weighted
Proportional Fair Sharing TCP | null | null | null | null | cs.NI cs.PF | null | In this document we study the application of weighted proportional fairness
to data flows in the Internet. We let the users set the weights of their
connections in order to maximise the utility they get from the network. When
combined with a pricing scheme where connections are billed by weight and time,
such a system is known to maximise the total utility of the network. Our study
case is a national Web cache server connected to long distance links. We
propose two ways of weighting TCP connections by manipulating some parameters
of the protocol and present results from simulations and prototypes. We finally
discuss how proportional fairness could be used to implement an Internet with
differentiated services.
| [
{
"version": "v1",
"created": "Tue, 25 Aug 1998 12:59:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Crowcroft",
"Jon",
""
],
[
"Oechslin",
"Philippe",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
cs/9808005 | Joseph Y. Halpern | Nir Friedman, Joseph Y. Halpern, and Daphne Koller | First-Order Conditional Logic Revisited | This is an expanded version of a paper that appeared in AAAI '96 | null | null | null | cs.AI cs.LO | null | Conditional logics play an important role in recent attempts to formulate
theories of default reasoning. This paper investigates first-order conditional
logic. We show that, as for first-order probabilistic logic, it is important
not to confound statistical conditionals over the domain (such as ``most birds
fly''), and subjective conditionals over possible worlds (such as ``I believe
that Tweety is unlikely to fly''). We then address the issue of ascribing
semantics to first-order conditional logic. As in the propositional case, there
are many possible semantics. To study the problem in a coherent way, we use
plausibility structures. These provide us with a general framework in which
many of the standard approaches can be embedded. We show that while these
standard approaches are all the same at the propositional level, they are
significantly different in the context of a first-order language. Furthermore,
we show that plausibilities provide the most natural extension of conditional
logic to the first-order case: We provide a sound and complete axiomatization
that contains only the KLM properties and standard axioms of first-order modal
logic. We show that most of the other approaches have additional properties,
which result in an inappropriate treatment of an infinitary version of the
lottery paradox.
| [
{
"version": "v1",
"created": "Fri, 28 Aug 1998 00:16:49 GMT"
}
] | 2009-09-25T00:00:00 | [
[
"Friedman",
"Nir",
""
],
[
"Halpern",
"Joseph Y.",
""
],
[
"Koller",
"Daphne",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/9808006 | Joseph Y. Halpern | Joseph Y. Halpern | Set-Theoretic Completeness for Epistemic and Conditional Logic | This is an expanded version of a paper that appeared in AI and
Mathematics, 1998 | Annals of Mathematics and Artificial Intelligence, vol. 26, 1999,
pp. 1-27 | null | null | cs.AI cs.LO | null | The standard approach to logic in the literature in philosophy and
mathematics, which has also been adopted in computer science, is to define a
language (the syntax), an appropriate class of models together with an
interpretation of formulas in the language (the semantics), a collection of
axioms and rules of inference characterizing reasoning (the proof theory), and
then relate the proof theory to the semantics via soundness and completeness
results. Here we consider an approach that is more common in the economics
literature, which works purely at the semantic, set-theoretic level. We provide
set-theoretic completeness results for a number of epistemic and conditional
logics, and contrast the expressive power of the syntactic and set-theoretic
approaches
| [
{
"version": "v1",
"created": "Fri, 28 Aug 1998 00:39:47 GMT"
},
{
"version": "v2",
"created": "Tue, 30 May 2000 20:46:09 GMT"
}
] | 2009-09-25T00:00:00 | [
[
"Halpern",
"Joseph Y.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/9808007 | Joseph Y. Halpern | Nir Friedman and Joseph Y. Halpern | Plausibility Measures and Default Reasoning | This is an expanded version of a paper that appeared in AAAI '96 | null | null | null | cs.AI cs.LO | null | We introduce a new approach to modeling uncertainty based on plausibility
measures. This approach is easily seen to generalize other approaches to
modeling uncertainty, such as probability measures, belief functions, and
possibility measures. We focus on one application of plausibility measures in
this paper: default reasoning. In recent years, a number of different semantics
for defaults have been proposed, such as preferential structures,
$\epsilon$-semantics, possibilistic structures, and $\kappa$-rankings, that
have been shown to be characterized by the same set of axioms, known as the KLM
properties. While this was viewed as a surprise, we show here that it is almost
inevitable. In the framework of plausibility measures, we can give a necessary
condition for the KLM axioms to be sound, and an additional condition necessary
and sufficient to ensure that the KLM axioms are complete. This additional
condition is so weak that it is almost always met whenever the axioms are
sound. In particular, it is easily seen to hold for all the proposals made in
the literature.
| [
{
"version": "v1",
"created": "Sat, 29 Aug 1998 00:12:30 GMT"
}
] | 2016-08-31T00:00:00 | [
[
"Friedman",
"Nir",
""
],
[
"Halpern",
"Joseph Y.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/9808008 | Joseph O'Rourke | Pankaj K. Agarwal and Joseph O'Rourke | Computational Geometry Column 34 | null | SIGACT News, 29(3) (Issue 108) 27-32, Sept. 1998 | null | null | cs.CG | null | Problems presented at the open-problem session of the 14th Annual ACM
Symposium on Computational Geometry are listed.
| [
{
"version": "v1",
"created": "Mon, 31 Aug 1998 19:04:14 GMT"
}
] | 2009-09-25T00:00:00 | [
[
"Agarwal",
"Pankaj K.",
""
],
[
"O'Rourke",
"Joseph",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
cs/9808101 | null | M. L. Littman, J. Goldsmith, M. Mundhenk | The Computational Complexity of Probabilistic Planning | See http://www.jair.org/ for any accompanying files | Journal of Artificial Intelligence Research, Vol 9, (1998), 1-36 | null | null | cs.AI | null | We examine the computational complexity of testing and finding small plans in
probabilistic planning domains with both flat and propositional
representations. The complexity of plan evaluation and existence varies with
the plan type sought; we examine totally ordered plans, acyclic plans, and
looping plans, and partially ordered plans under three natural definitions of
plan value. We show that problems of interest are complete for a variety of
complexity classes: PL, P, NP, co-NP, PP, NP^PP, co-NP^PP, and PSPACE. In the
process of proving that certain planning problems are complete for NP^PP, we
introduce a new basic NP^PP-complete problem, E-MAJSAT, which generalizes the
standard Boolean satisfiability problem to computations involving probabilistic
quantities; our results suggest that the development of good heuristics for
E-MAJSAT could be important for the creation of efficient algorithms for a wide
variety of problems.
| [
{
"version": "v1",
"created": "Sat, 1 Aug 1998 00:00:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Littman",
"M. L.",
""
],
[
"Goldsmith",
"J.",
""
],
[
"Mundhenk",
"M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/9809001 | Joerg Rothe | Joerg Rothe | Immunity and Simplicity for Exact Counting and Other Counting Classes | 20 pages | null | null | University of Rochester Technical Report TR-98-679 | cs.CC | null | Ko [RAIRO 24, 1990] and Bruschi [TCS 102, 1992] showed that in some
relativized world, PSPACE (in fact, ParityP) contains a set that is immune to
the polynomial hierarchy (PH). In this paper, we study and settle the question
of (relativized) separations with immunity for PH and the counting classes PP,
C_{=}P, and ParityP in all possible pairwise combinations. Our main result is
that there is an oracle A relative to which C_{=}P contains a set that is
immune to BPP^{ParityP}. In particular, this C_{=}P^A set is immune to PH^{A}
and ParityP^{A}. Strengthening results of Tor\'{a}n [J.ACM 38, 1991] and Green
[IPL 37, 1991], we also show that, in suitable relativizations, NP contains a
C_{=}P-immune set, and ParityP contains a PP^{PH}-immune set. This implies the
existence of a C_{=}P^{B}-simple set for some oracle B, which extends results
of Balc\'{a}zar et al. [SIAM J.Comp. 14, 1985; RAIRO 22, 1988] and provides the
first example of a simple set in a class not known to be contained in PH. Our
proof technique requires a circuit lower bound for ``exact counting'' that is
derived from Razborov's [Mat. Zametki 41, 1987] lower bound for majority.
| [
{
"version": "v1",
"created": "Tue, 1 Sep 1998 11:16:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rothe",
"Joerg",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/9809002 | Joerg Rothe | Judy Goldsmith, Mitsunori Ogihara, Joerg Rothe | Tally NP Sets and Easy Census Functions | 24 pages | null | null | University of Rochester Technical Report TR-98-684 | cs.CC | null | We study the question of whether every P set has an easy (i.e.,
polynomial-time computable) census function. We characterize this question in
terms of unlikely collapses of language and function classes such as the
containment of #P_1 in FP, where #P_1 is the class of functions that count the
witnesses for tally NP sets. We prove that every #P_{1}^{PH} function can be
computed in FP^{#P_{1}^{#P_{1}}}. Consequently, every P set has an easy census
function if and only if every set in the polynomial hierarchy does. We show
that the assumption of #P_1 being contained in FP implies P = BPP and that PH
is contained in MOD_{k}P for each k \geq 2, which provides further evidence
that not all sets in P have an easy census function. We also relate a set's
property of having an easy census function to other well-studied properties of
sets, such as rankability and scalability (the closure of the rankable sets
under P-isomorphisms). Finally, we prove that it is no more likely that the
census function of any set in P can be approximated (more precisely, can be
n^{\alpha}-enumerated in time n^{\beta} for fixed \alpha and \beta) than that
it can be precisely computed in polynomial time.
| [
{
"version": "v1",
"created": "Tue, 1 Sep 1998 12:15:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Goldsmith",
"Judy",
""
],
[
"Ogihara",
"Mitsunori",
""
],
[
"Rothe",
"Joerg",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/9809003 | Joseph Y. Halpern | R. Fagin, J. Y. Halpern, Y. Moses, and M. Vardi | Common knowledge revisited | A previous version appeared in TARK (Theoretical Aspects of
Rationality and Knowledge), 1996. This version will appear in Annals of Pure
and Applied Logic. The material in this paper is basically taken from Chapter
11 of our book Reasoning About Knowledge (MIT Press, 1995) | null | null | null | cs.LO cs.DC | null | We consider the common-knowledge paradox raised by Halpern and Moses: common
knowledge is necessary for agreement and coordination, but common knowledge is
unattainable in the real world because of temporal imprecision. We discuss two
solutions to this paradox: (1) modeling the world with a coarser granularity,
and (2) relaxing the requirements for coordination.
| [
{
"version": "v1",
"created": "Tue, 1 Sep 1998 21:56:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fagin",
"R.",
""
],
[
"Halpern",
"J. Y.",
""
],
[
"Moses",
"Y.",
""
],
[
"Vardi",
"M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/9809004 | Jim Gray | Jim Gray, Joshua Coates, Chris Nyberg | Performance / Price Sort | Original word file at:
http://research.microsoft.com/~gray/PennySort.doc | null | null | null | cs.DB cs.PF | null | NTsort is an external sort on WindowsNT 5.0. It has minimal functionality but
excellent price performance. In particular, running on mail-order hardware it
can sort 1.5 GB for a penny. For commercially available sorts, Postman Sort
from Robert Ramey Software Development has elapsed time performance comparable
to NTsort, while using less processor time. It can sort 1.27 GB for a penny
(12.7 million records.) These sorts set new price-performance records. This
paper documents this and proposes that the PennySort benchmark be revised to
Performance/Price sort: a simple GB/$ sort metric based on a two-pass external
sort.
| [
{
"version": "v1",
"created": "Wed, 2 Sep 1998 00:49:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gray",
"Jim",
""
],
[
"Coates",
"Joshua",
""
],
[
"Nyberg",
"Chris",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
cs/9809005 | Jim Gray | Jim Gray, Goetz Graefe | The Five-Minute Rule Ten Years Later, and Other Computer Storage Rules
of Thumb | Original document at:
http://research.microsoft.com/~gray/5_min_rule_SIGMOD.doc | ACM SIGMOD Record 26(4): 63-68 (1997) | null | MSR-TR-97-33 | cs.DB | null | Simple economic and performance arguments suggest appropriate lifetimes for
main memory pages and suggest optimal page sizes. The fundamental tradeoffs are
the prices and bandwidths of RAMs and disks. The analysis indicates that with
today's technology, five minutes is a good lifetime for randomly accessed
pages, one minute is a good lifetime for two-pass sequentially accessed pages,
and 16 KB is a good size for index pages. These rules-of-thumb change in
predictable ways as technology ratios change. They also motivate the importance
of the new Kaps, Maps, Scans, and $/Kaps, $/Maps, $/TBscan metrics.
| [
{
"version": "v1",
"created": "Wed, 2 Sep 1998 01:49:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gray",
"Jim",
""
],
[
"Graefe",
"Goetz",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
cs/9809006 | Jim Gray | Werner Vogels, Dan Dumitriu, Ken Birman, Rod Gamache, Mike Massa, Rob
Short, John Vert, Joe Barrera | The Design and Architecture of the Microsoft Cluster Service -- A
Practical Approach to High-Availability and Scalability | Original document at:
http://research.microsoft.com/~gray/MSCS_FTCS98.doc | Proceedings of FTCS'98, June 23-25, 1998 in Munich, Germany | null | Microsoft Research MSR-TR-98-16 | cs.OS cs.DC | null | Microsoft Cluster Service (MSCS) extends the Win-dows NT operating system to
support high-availability services. The goal is to offer an execution
environment where off-the-shelf server applications can continue to operate,
even in the presence of node failures. Later ver-sions of MSCS will provide
scalability via a node and application management system that allows
applications to scale to hundreds of nodes. This paper provides a de-tailed
description of the MSCS architecture and the de-sign decisions that have driven
the implementation of the service. The paper also describes how some major
appli-cations use the MSCS features, and describes features added to make it
easier to implement and manage fault-tolerant applications on MSCS.
| [
{
"version": "v1",
"created": "Wed, 2 Sep 1998 17:11:54 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vogels",
"Werner",
""
],
[
"Dumitriu",
"Dan",
""
],
[
"Birman",
"Ken",
""
],
[
"Gamache",
"Rod",
""
],
[
"Massa",
"Mike",
""
],
[
"Short",
"Rob",
""
],
[
"Vert",
"John",
""
],
[
"Barrera",
"Joe",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OS",
"description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.",
"span": "(Operating Systems)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/9809007 | Jim Gray | Jim Gray | Locally Served Network Computers | Original document at:
http://research.microsoft.com/~gray/NC_Servers.doc | Middleware Spectra, 11.2, 1997 | null | MSR-TR-95-55 | cs.AR cs.DC | null | NCs are the natural evolution of PCs, ubiquitous computers everywhere. The
current vision of NCs requires two improbable developments: (1) inexpensive
high-bandwidth WAN links to the Internet, and (2) inexpensive centralized
servers. The large NC bandwidth requirements will force each home or office to
have a local server LAN attached to the NCs. These servers will be much less
expensive to purchase and manage than a centralized solution. Centralized staff
are expensive and unresponsive.
| [
{
"version": "v1",
"created": "Wed, 2 Sep 1998 17:30:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gray",
"Jim",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/9809008 | Catuscia Palamidessi | Catuscia Palamidessi | Comparing the expressive power of the Synchronous and the Asynchronous
pi-calculus | 10 pages. Proc. of the POPL'97 symposium | Proc. of the 24th ACM Symposium on Principles of Programming
Languages (POPL), pages 256--265, ACM, 1997 | null | null | cs.PL cs.LO | null | The Asynchronous pi-calculus, as recently proposed by Boudol and,
independently, by Honda and Tokoro, is a subset of the pi-calculus which
contains no explicit operators for choice and output-prefixing. The
communication mechanism of this calculus, however, is powerful enough to
simulate output-prefixing, as shown by Boudol, and input-guarded choice, as
shown recently by Nestmann and Pierce. A natural question arises, then, whether
or not it is possible to embed in it the full pi-calculus. We show that this is
not possible, i.e. there does not exist any uniform, parallel-preserving,
translation from the pi-calculus into the asynchronous pi-calculus, up to any
``reasonable'' notion of equivalence. This result is based on the incapablity
of the asynchronous pi-calculus of breaking certain symmetries possibly present
in the initial communication graph. By similar arguments, we prove a separation
result between the pi-calculus and CCS.
| [
{
"version": "v1",
"created": "Wed, 2 Sep 1998 17:40:46 GMT"
}
] | 2020-11-17T00:00:00 | [
[
"Palamidessi",
"Catuscia",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/9809009 | Ronald F. Boisvert | Ronald F. Boisvert, Jack J. Dongarra, Roldan Pozo, Karin Remington and
G. W. Stewart | Developing numerical libraries in Java | 11 pages. Revised version of paper presented to the 1998 ACM
Conference on Java for High Performance Network Computing. To appear in
Concurrency: Practice and Experience | null | null | null | cs.MS | null | The rapid and widespread adoption of Java has created a demand for reliable
and reusable mathematical software components to support the growing number of
compute-intensive applications now under development, particularly in science
and engineering. In this paper we address practical issues of the Java language
and environment which have an effect on numerical library design and
development. Benchmarks which illustrate the current levels of performance of
key numerical kernels on a variety of Java platforms are presented. Finally, a
strategy for the development of a fundamental numerical toolkit for Java is
proposed and its current status is described.
| [
{
"version": "v1",
"created": "Wed, 2 Sep 1998 19:27:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Boisvert",
"Ronald F.",
""
],
[
"Dongarra",
"Jack J.",
""
],
[
"Pozo",
"Roldan",
""
],
[
"Remington",
"Karin",
""
],
[
"Stewart",
"G. W.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
}
] |
cs/9809010 | Jim Gray | C. Gordon Bell, Jim Gray | The Revolution Yet to Happen | Original document at:
http://research.microsoft.com/~gray/Revolution.doc | null | null | Microsoft Technical report: MSR-TR-98-45 | cs.GL | null | All information about physical objects including humans, buildings,
processes, and organizations will be online. This trend is both desirable and
inevitable. Cyberspace will provide the basis for wonderful new ways to inform,
entertain, and educate people. The information and the corresponding systems
will streamline commerce, but will also provide new levels of personal service,
health care, and automation. The most significant benefit will be a
breakthrough in our ability to remotely communicate with one another using all
our senses.
The ACM and the transistor were born in 1947. At that time the stored program
computer was a revolutionary idea and the transistor was just a curiosity. Both
ideas evolved rapidly. By the mid 1960s integrated circuits appeared --
allowing mass fabrication of transistors on silicon substrates. This allowed
low-cost mass-produced computers. These technologies enabled extraordinary
increases in processing speed and memory coupled with extraordinary price
declines.
The only form of processing and memory more easily, cheaply, and rapidly
fabricated is the human brain. Peter Cohrane (1996) estimates the brain to have
a processing power of around 1000 million-million operations per second, (one
Petaops) and a memory of 10 Terabytes. If current trends continue, computers
could have these capabilities by 2047. Such computers could be 'on body'
personal assistants able to recall everything one reads, hears, and sees.
| [
{
"version": "v1",
"created": "Wed, 2 Sep 1998 19:39:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bell",
"C. Gordon",
""
],
[
"Gray",
"Jim",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GL",
"description": "Covers introductory material, survey material, predictions of future trends, biographies, and miscellaneous computer-science related material. Roughly includes all of ACM Subject Class A, except it does not include conference proceedings (which will be listed in the appropriate subject area).",
"span": "(General Literature)"
}
] |
cs/9809011 | Jim Gray | Tom Barclay, Robert Eberl, Jim Gray, John Nordlinger, Guru
Raghavendran, Don Slutz, Greg Smith, Phil Smoot, John Hoffman, Natt Robb III,
Hedy Rossmeissl, Beth Duff, George Lee, Theresa Mathesmier, Randall Sunne | Microsoft TerraServer | Original file at
http://research.microsoft.com/~gray/TerraServer_TR.doc | null | null | Microsoft MSR-TR-98-17 | cs.DB cs.DL | null | The Microsoft TerraServer stores aerial and satellite images of the earth in
a SQL Server Database served to the public via the Internet. It is the world's
largest atlas, combining five terabytes of image data from the United States
Geodetic Survey, Sovinformsputnik, and Encarta Virtual Globe. Internet browsers
provide intuitive spatial and gazetteer interfaces to the data. The TerraServer
is also an E-Commerce application. Users can buy the right to use the imagery
using Microsoft Site Servers managed by the USGS and Aerial Images. This paper
describes the TerraServer's design and implementation.
| [
{
"version": "v1",
"created": "Sat, 5 Sep 1998 00:29:54 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Barclay",
"Tom",
""
],
[
"Eberl",
"Robert",
""
],
[
"Gray",
"Jim",
""
],
[
"Nordlinger",
"John",
""
],
[
"Raghavendran",
"Guru",
""
],
[
"Slutz",
"Don",
""
],
[
"Smith",
"Greg",
""
],
[
"Smoot",
"Phil",
""
],
[
"Hoffman",
"John",
""
],
[
"Robb",
"Natt",
"III"
],
[
"Rossmeissl",
"Hedy",
""
],
[
"Duff",
"Beth",
""
],
[
"Lee",
"George",
""
],
[
"Mathesmier",
"Theresa",
""
],
[
"Sunne",
"Randall",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
cs/9809012 | David Karger | David R. Karger | A Fully Polynomial Randomized Approximation Scheme for the All Terminal
Network Reliability Problem | To appear in SICOMP | null | null | null | cs.DS | null | The classic all-terminal network reliability problem posits a graph, each of
whose edges fails independently with some given probability.
| [
{
"version": "v1",
"created": "Wed, 9 Sep 1998 02:38:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Karger",
"David R.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/9809013 | Joseph Y. Halpern | Fahiem Bacchus, Joseph Y. Halpern, Hector J. Levesque | Reasoning about Noisy Sensors and Effectors in the Situation Calculus | A preliminary version of the paper appeared in IJCAI '95 | null | null | null | cs.AI cs.LO | null | Agents interacting with an incompletely known world need to be able to reason
about the effects of their actions, and to gain further information about that
world they need to use sensors of some sort. Unfortunately, both the effects of
actions and the information returned from sensors are subject to error. To cope
with such uncertainties, the agent can maintain probabilistic beliefs about the
state of the world. With probabilistic beliefs the agent will be able to
quantify the likelihood of the various outcomes of its actions and is better
able to utilize the information gathered from its error-prone actions and
sensors. In this paper, we present a model in which we can reason about an
agent's probabilistic degrees of belief and the manner in which these beliefs
change as various actions are executed. We build on a general logical theory of
action developed by Reiter and others, formalized in the situation calculus. We
propose a simple axiomatization that captures an agent's state of belief and
the manner in which these beliefs change when actions are executed. Our model
displays a number of intuitively reasonable properties.
| [
{
"version": "v1",
"created": "Wed, 9 Sep 1998 22:28:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bacchus",
"Fahiem",
""
],
[
"Halpern",
"Joseph Y.",
""
],
[
"Levesque",
"Hector J.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/9809014 | Gopalan Nadathur | Gopalan Nadathur | Uniform Provability in Classical Logic | 23 pages | Journal of Logic and Computation, Vol 8, No 96-15, pp 209-229,
1998 | null | null | cs.LO | null | Uniform proofs are sequent calculus proofs with the following characteristic:
the last step in the derivation of a complex formula at any stage in the proof
is always the introduction of the top-level logical symbol of that formula. We
investigate the relevance of this uniform proof notion to structuring proof
search in classical logic. A logical language in whose context provability is
equivalent to uniform provability admits of a goal-directed proof procedure
that interprets logical symbols as search directives whose meanings are given
by the corresponding inference rules. While this uniform provability property
does not hold directly of classical logic, we show that it holds of a fragment
of it that only excludes essentially positive occurrences of universal
quantifiers under a modest, sound, modification to the set of assumptions: the
addition to them of the negation of the formula being proved. We further note
that all uses of the added formula can be factored into certain derived rules.
The resulting proof system and the uniform provability property that holds of
it are used to outline a proof procedure for classical logic. An interesting
aspect of this proof procedure is that it incorporates within it previously
proposed mechanisms for dealing with disjunctive information in assumptions and
for handling hypotheticals. Our analysis sheds light on the relationship
between these mechanisms and the notion of uniform proofs.
| [
{
"version": "v1",
"created": "Thu, 10 Sep 1998 15:17:05 GMT"
}
] | 2014-11-17T00:00:00 | [
[
"Nadathur",
"Gopalan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/9809015 | Gopalan Nadathur | Gopalan Nadathur | Correspondences between Classical, Intuitionistic and Uniform
Provability | 31 pages | null | null | University of Chicago, CS Dept, TR-97-12 | cs.LO | null | Based on an analysis of the inference rules used, we provide a
characterization of the situations in which classical provability entails
intuitionistic provability. We then examine the relationship of these
derivability notions to uniform provability, a restriction of intuitionistic
provability that embodies a special form of goal-directedness. We determine,
first, the circumstances in which the former relations imply the latter. Using
this result, we identify the richest versions of the so-called abstract logic
programming languages in classical and intuitionistic logic. We then study the
reduction of classical and, derivatively, intuitionistic provability to uniform
provability via the addition to the assumption set of the negation of the
formula to be proved. Our focus here is on understanding the situations in
which this reduction is achieved. However, our discussions indicate the
structure of a proof procedure based on the reduction, a matter also considered
explicitly elsewhere.
| [
{
"version": "v1",
"created": "Thu, 10 Sep 1998 15:39:30 GMT"
}
] | 2016-08-31T00:00:00 | [
[
"Nadathur",
"Gopalan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/9809016 | Gopalan Nadathur | Gopalan Nadathur, Bharat Jayaraman and Keehang Kwon | Scoping Constructs in Logic Programming: Implementation Problems and
their Solution | 46 pages | Journal of Logic Programming, 25(2)-119:161, 1995 | null | null | cs.PL | null | The inclusion of universal quantification and a form of implication in goals
in logic programming is considered. These additions provide a logical basis for
scoping but they also raise new implementation problems. When universal and
existential quantifiers are permitted to appear in mixed order in goals, the
devices of logic variables and unification that are employed in solving
existential goals must be modified to ensure that constraints arising out of
the order of quantification are respected. Suitable modifications that are
based on attaching numerical tags to constants and variables and on using these
tags in unification are described. The resulting devices are amenable to an
efficient implementation and can, in fact, be assimilated easily into the usual
machinery of the Warren Abstract Machine (WAM). The provision of implications
in goals results in the possibility of program clauses being added to the
program for the purpose of solving specific subgoals. A naive scheme based on
asserting and retracting program clauses does not suffice for implementing such
additions for two reasons. First, it is necessary to also support the
resurrection of an earlier existing program in the face of backtracking.
Second, the possibility for implication goals to be surrounded by quantifiers
requires a consideration of the parameterization of program clauses by bindings
for their free variables. Devices for supporting these additional requirements
are described as also is the integration of these devices into the WAM. Further
extensions to the machine are outlined for handling higher-order additions to
the language. The ideas presented here are relevant to the implementation of
the higher-order logic programming language lambda Prolog.
| [
{
"version": "v1",
"created": "Thu, 10 Sep 1998 16:54:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Nadathur",
"Gopalan",
""
],
[
"Jayaraman",
"Bharat",
""
],
[
"Kwon",
"Keehang",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/9809017 | Madhav Marathe | Harry B. Hunt III, Madhav V. Marathe, Venkatesh Radhakrishnan, Richard
E. Stearns | The Complexity of Planar Counting Problems | 25 pages, 12 figures, appears in SIAM J. Computing | null | null | null | cs.CC cs.DM | null | We prove the #P-hardness of the counting problems associated with various
satisfiability, graph and combinatorial problems, when restricted to planar
instances. These problems include \begin{romannum} \item[{}] {\sc 3Sat, 1-3Sat,
1-Ex3Sat, Minimum Vertex Cover, Minimum Dominating Set, Minimum Feedback Vertex
Set, X3C, Partition Into Triangles, and Clique Cover.} \end{romannum} We also
prove the {\sf NP}-completeness of the {\sc Ambiguous Satisfiability} problems
\cite{Sa80} and the {\sf D$^P$}-completeness (with respect to random polynomial
reducibility) of the unique satisfiability problems \cite{VV85} associated with
several of the above problems, when restricted to planar instances. Previously,
very few {\sf #P}-hardness results, no {\sf NP}-hardness results, and no {\sf
D$^P$}-completeness results were known for counting problems, ambiguous
satisfiability problems and unique satisfiability problems, respectively, when
restricted to planar instances.
Assuming {\sf P $\neq $ NP}, one corollary of the above results is
There are no $\epsilon$-approximation algorithms for the problems of
maximizing or minimizing a linear objective function subject to a planar system
of linear inequality constraints over the integers.
| [
{
"version": "v1",
"created": "Fri, 11 Sep 1998 17:38:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hunt",
"Harry B.",
"III"
],
[
"Marathe",
"Madhav V.",
""
],
[
"Radhakrishnan",
"Venkatesh",
""
],
[
"Stearns",
"Richard E.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/9809018 | Lorrie Cranor | Lorrie Faith Cranor and Rebecca N. Wright | Influencing Software Usage | Prepared for the 26th Telecommunications Policy Research Conference,
October 3-5, 1998, Alexandria, VA | null | null | null | cs.CY | null | Technology designers often strive to design systems that are flexible enough
to be used in a wide range of situations. Software engineers, in particular,
are trained to seek general solutions to problems. General solutions can be
used not only to address the problem at hand, but also to address a wide range
of problems that the designers may not have even anticipated. Sometimes
designers wish to provide general solutions, while encouraging certain uses of
their technology and discouraging or precluding others. They may attempt to
influence the use of technology by ``hard-wiring'' it so that it only can be
used in certain ways, licensing it so that those who use it are legally
obligated to use it in certain ways, issuing guidelines for how it should be
used, or providing resources that make it easier to use the technology as the
designers intended than to use it in any other way.
This paper examines several cases where designers have attempted to influence
the use of technology through one of these mechanisms. Such cases include key
recovery encryption, Pegasus Mail, Platform for Internet Content Selection
(PICS) Guidelines, Java, Platform for Privacy Preferences Project (P3P)
Implementation Guide, Apple's style guidelines, and Microsoft Foundation
Classes. In some of these cases, the designers sought to influence the use of
technology for competitive reasons or in order to promote standardization or
interoperability. However, in other cases designers were motivated by
policy-related goals such as protecting privacy or free speech. As new
technologies are introduced with the express purpose of advancing
policy-related goals (for example, PICS and P3P), it is especially important to
understand the roles designers might play in influencing the use of technology.
| [
{
"version": "v1",
"created": "Fri, 11 Sep 1998 18:40:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cranor",
"Lorrie Faith",
""
],
[
"Wright",
"Rebecca N.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
cs/9809019 | Michael Manthey | Michael Manthey | Distributed Computation as Hierarchy | 16 pages, 3 figures | null | null | Aalborg University, Computer Science Dept. R-98-5005 | cs.DC cs.NE | null | This paper presents a new distributed computational model of distributed
systems called the phase web that extends V. Pratt's orthocurrence relation
from 1986. The model uses mutual-exclusion to express sequence, and a new kind
of hierarchy to replace event sequences, posets, and pomsets. The model
explicitly connects computation to a discrete Clifford algebra that is in turn
extended into homology and co-homology, wherein the recursive nature of objects
and boundaries becomes apparent and itself subject to hierarchical recursion.
Topsy, a programming environment embodying the phase web, is available from
www.cs.auc.dk/topsy.
| [
{
"version": "v1",
"created": "Mon, 14 Sep 1998 15:25:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Manthey",
"Michael",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
cs/9809020 | Min-Yen Kan | Min-Yen Kan, Judith L. Klavans, Kathleen R. McKeown | Linear Segmentation and Segment Significance | 9 pages, US Letter, 4 figures. Software License can be found at
http://www.cs.columbia.edu/nlp/licenses/segmenterLicenseDownload.html | Proceedings of 6th International Workshop of Very Large Corpora
(WVLC-6), Montreal, Quebec, Canada: Aug. 1998. pp. 197-205 | null | null | cs.CL | null | We present a new method for discovering a segmental discourse structure of a
document while categorizing segment function. We demonstrate how retrieval of
noun phrases and pronominal forms, along with a zero-sum weighting scheme,
determines topicalized segmentation. Futhermore, we use term distribution to
aid in identifying the role that the segment performs in the document. Finally,
we present results of evaluation in terms of precision and recall which surpass
earlier approaches.
| [
{
"version": "v1",
"created": "Tue, 15 Sep 1998 23:49:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kan",
"Min-Yen",
""
],
[
"Klavans",
"Judith L.",
""
],
[
"McKeown",
"Kathleen R.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/9809021 | Frantz Vichot | Francis Wolinski, Frantz Vichot, Olivier Gremont (Informatique
CDC/DTA, Arcueil, France) | Producing NLP-based On-line Contentware | 7 pages, 5 figures | Natural Language Processing & Industrial Applications, Moncton,
NB, Canada, Aug. 1998 | null | null | cs.CL cs.AR | null | For its internal needs as well as for commercial purposes, CDC Group has
produced several NLP-based on-line contentware applications for years. The
development process of such applications is subject to numerous constraints
such as quality of service, integration of new advances in NLP, direct
reactions from users, continuous versioning, short delivery deadlines and cost
control. Following this industrial and commercial experience, malleability of
the applications, their openness towards foreign components, efficiency of
applications and their ease of exploitation have appeared to be key points. In
this paper, we describe TalLab, a powerful architecture for on-line contentware
which fulfils these requirements.
| [
{
"version": "v1",
"created": "Wed, 16 Sep 1998 14:22:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wolinski",
"Francis",
"",
"Informatique\n CDC/DTA, Arcueil, France"
],
[
"Vichot",
"Frantz",
"",
"Informatique\n CDC/DTA, Arcueil, France"
],
[
"Gremont",
"Olivier",
"",
"Informatique\n CDC/DTA, Arcueil, France"
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
cs/9809022 | Bernd Ludwig | Bernd Ludwig, Guenther Goerz, Heinrich Niemann | Modelling Users, Intentions, and Structure in Spoken Dialog | 17 pages | null | null | null | cs.CL | null | We outline how utterances in dialogs can be interpreted using a partial first
order logic. We exploit the capability of this logic to talk about the truth
status of formulae to define a notion of coherence between utterances and
explain how this coherence relation can serve for the construction of AND/OR
trees that represent the segmentation of the dialog. In a BDI model we
formalize basic assumptions about dialog and cooperative behaviour of
participants. These assumptions provide a basis for inferring speech acts from
coherence relations between utterances and attitudes of dialog participants.
Speech acts prove to be useful for determining dialog segments defined on the
notion of completing expectations of dialog participants. Finally, we sketch
how explicit segmentation signalled by cue phrases and performatives is covered
by our dialog model.
| [
{
"version": "v1",
"created": "Thu, 17 Sep 1998 11:10:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ludwig",
"Bernd",
""
],
[
"Goerz",
"Guenther",
""
],
[
"Niemann",
"Heinrich",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/9809023 | Davood Rafiei | Davood Rafiei and Alberto Mendelzon | Similarity-Based Queries for Time Series Data | null | In Proceedings of the ACM SIGMOD Intl. Conf. on Management of
Data, pages 13-24, Tucson, Arizona, May 1997 | null | null | cs.DB | null | We study a set of linear transformations on the Fourier series representation
of a sequence that can be used as the basis for similarity queries on
time-series data. We show that our set of transformations is rich enough to
formulate operations such as moving average and time warping. We present a
query processing algorithm that uses the underlying R-tree index of a
multidimensional data set to answer similarity queries efficiently. Our
experiments show that the performance of this algorithm is competitive to that
of processing ordinary (exact match) queries using the index, and much faster
than sequential scanning. We relate our transformations to the general
framework for similarity queries of Jagadish et al.
| [
{
"version": "v1",
"created": "Thu, 17 Sep 1998 14:41:07 GMT"
},
{
"version": "v2",
"created": "Fri, 18 Sep 1998 19:04:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rafiei",
"Davood",
""
],
[
"Mendelzon",
"Alberto",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
cs/9809024 | Anoop Sarkar | XTAG Research Group (University of Pennsylvania) | A Lexicalized Tree Adjoining Grammar for English | 310 pages, 181 Postscript figures, uses 11pt, psfig.tex | null | null | IRCS Tech Report 98-18, ftp://ftp.cis.upenn.edu/pub/ircs/tr/98-18/ | cs.CL | null | This document describes a sizable grammar of English written in the TAG
formalism and implemented for use with the XTAG system. This report and the
grammar described herein supersedes the TAG grammar described in an earlier
1995 XTAG technical report. The English grammar described in this report is
based on the TAG formalism which has been extended to include lexicalization,
and unification-based feature structures. The range of syntactic phenomena that
can be handled is large and includes auxiliaries (including inversion), copula,
raising and small clause constructions, topicalization, relative clauses,
infinitives, gerunds, passives, adjuncts, it-clefts, wh-clefts, PRO
constructions, noun-noun modifications, extraposition, determiner sequences,
genitives, negation, noun-verb contractions, sentential adjuncts and
imperatives. This technical report corresponds to the XTAG Release 8/31/98. The
XTAG grammar is continuously updated with the addition of new analyses and
modification of old ones, and an online version of this report can be found at
the XTAG web page at http://www.cis.upenn.edu/~xtag/
| [
{
"version": "v1",
"created": "Fri, 18 Sep 1998 00:33:47 GMT"
},
{
"version": "v2",
"created": "Fri, 18 Sep 1998 02:49:22 GMT"
}
] | 2012-08-27T00:00:00 | [
[
"XTAG Research Group",
"",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/9809025 | Bernardo A. Huberman | Bernardo A. Huberman and Lada A. Adamic | Novelty and Social Search in the World Wide Web | null | null | null | null | cs.MA cs.DL | null | The World Wide Web is fast becoming a source of information for a large part
of the world's population. Because of its sheer size and complexity users often
resort to recommendations from others to decide which sites to visit. We
present a dynamical theory of recommendations which predicts site visits by
users of the World Wide Web. We show that it leads to a universal power law for
the number of users that visit given sites over periods of time, with an
exponent related to the rate at which users discover new sites on their own. An
extensive empirical study of user behavior in the Web that we conducted
confirms the existence of this law of influence while yielding bounds on the
rate of novelty encountered by users.
| [
{
"version": "v1",
"created": "Fri, 18 Sep 1998 00:07:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Huberman",
"Bernardo A.",
""
],
[
"Adamic",
"Lada A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
cs/9809026 | Anoop Sarkar | Mark-Jan Nederhof (DFKI), Anoop Sarkar (UPenn) and Giorgio Satta
(UPadova) | Prefix Probabilities from Stochastic Tree Adjoining Grammars | 7 pages, 2 Postscript figures, uses colacl.sty, graphicx.sty,
psfrag.sty | In Proceedings of COLING-ACL '98 (Montreal) | null | null | cs.CL | null | Language models for speech recognition typically use a probability model of
the form Pr(a_n | a_1, a_2, ..., a_{n-1}). Stochastic grammars, on the other
hand, are typically used to assign structure to utterances. A language model of
the above form is constructed from such grammars by computing the prefix
probability Sum_{w in Sigma*} Pr(a_1 ... a_n w), where w represents all
possible terminations of the prefix a_1 ... a_n. The main result in this paper
is an algorithm to compute such prefix probabilities given a stochastic Tree
Adjoining Grammar (TAG). The algorithm achieves the required computation in
O(n^6) time. The probability of subderivations that do not derive any words in
the prefix, but contribute structurally to its derivation, are precomputed to
achieve termination. This algorithm enables existing corpus-based estimation
techniques for stochastic TAGs to be used for language modelling.
| [
{
"version": "v1",
"created": "Fri, 18 Sep 1998 03:45:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Nederhof",
"Mark-Jan",
"",
"DFKI"
],
[
"Sarkar",
"Anoop",
"",
"UPenn"
],
[
"Satta",
"Giorgio",
"",
"UPadova"
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/9809027 | Anoop Sarkar | Anoop Sarkar (University of Pennsylvania) | Conditions on Consistency of Probabilistic Tree Adjoining Grammars | 7 pages, 4 Postscript figures, uses colacl.sty, graphicx.sty,
psfrag.sty | In Proceedings of COLING-ACL '98 (Montreal) | null | null | cs.CL | null | Much of the power of probabilistic methods in modelling language comes from
their ability to compare several derivations for the same string in the
language. An important starting point for the study of such cross-derivational
properties is the notion of _consistency_. The probability model defined by a
probabilistic grammar is said to be _consistent_ if the probabilities assigned
to all the strings in the language sum to one. From the literature on
probabilistic context-free grammars (CFGs), we know precisely the conditions
which ensure that consistency is true for a given CFG. This paper derives the
conditions under which a given probabilistic Tree Adjoining Grammar (TAG) can
be shown to be consistent. It gives a simple algorithm for checking consistency
and gives the formal justification for its correctness. The conditions derived
here can be used to ensure that probability models that use TAGs can be checked
for _deficiency_ (i.e. whether any probability mass is assigned to strings that
cannot be generated).
| [
{
"version": "v1",
"created": "Fri, 18 Sep 1998 03:58:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sarkar",
"Anoop",
"",
"University of Pennsylvania"
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/9809028 | Anoop Sarkar | Anoop Sarkar (University of Pennsylvania) | Separating Dependency from Constituency in a Tree Rewriting System | 7 pages, 6 Postscript figures, uses fullname.sty | In Proceedings of the Fifth Meeting on Mathematics of Language,
Saarbruecken, August 1997 | null | null | cs.CL | null | In this paper we present a new tree-rewriting formalism called Link-Sharing
Tree Adjoining Grammar (LSTAG) which is a variant of synchronous TAGs. Using
LSTAG we define an approach towards coordination where linguistic dependency is
distinguished from the notion of constituency. Such an approach towards
coordination that explicitly distinguishes dependencies from constituency gives
a better formal understanding of its representation when compared to previous
approaches that use tree-rewriting systems which conflate the two issues.
| [
{
"version": "v1",
"created": "Fri, 18 Sep 1998 04:44:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sarkar",
"Anoop",
"",
"University of Pennsylvania"
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/9809029 | Anoop Sarkar | Anoop Sarkar (University of Pennsylvania) | Incremental Parser Generation for Tree Adjoining Grammars | 12 pages, 12 Postscript figures, uses fullname.sty | Longer version of paper in Proceedings of the 34th Meeting of the
ACL, Student Session. Santa Cruz, June 1996 | 10.1063/1.1594535 | null | cs.CL | null | This paper describes the incremental generation of parse tables for the
LR-type parsing of Tree Adjoining Languages (TALs). The algorithm presented
handles modifications to the input grammar by updating the parser generated so
far. In this paper, a lazy generation of LR-type parsers for TALs is defined in
which parse tables are created by need while parsing. We then describe an
incremental parser generator for TALs which responds to modification of the
input grammar by updating parse tables built so far.
| [
{
"version": "v1",
"created": "Fri, 18 Sep 1998 05:03:48 GMT"
}
] | 2015-06-25T00:00:00 | [
[
"Sarkar",
"Anoop",
"",
"University of Pennsylvania"
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/9809030 | Vern Paxson | Vern Paxson (Network Research Group, Lawrence Berkeley National
Laboratory) | Fast, Approximate Synthesis of Fractional Gaussian Noise for Generating
Self-Similar Network Traffic | 14 pages | Computer Communication Review 27(5) (1997) 5-18 | null | LBL-36750/UC-405 | cs.NI | null | Recent network traffic studies argue that network arrival processes are much
more faithfully modeled using statistically self-similar processes instead of
traditional Poisson processes [LTWW94,PF95]. One difficulty in dealing with
self-similar models is how to efficiently synthesize traces (sample paths)
corresponding to self-similar traffic. We present a fast Fourier transform
method for synthesizing approximate self-similar sample paths for one type of
self-similar process, Fractional Gaussian Noise, and assess its performance and
validity. We find that the method is as fast or faster than existing methods
and appears to generate close approximations to true self-similar sample paths.
We also discuss issues in using such synthesized sample paths for simulating
network traffic, and how an approximation used by our method can dramatically
speed up evaluation of Whittle's estimator for H, the Hurst parameter giving
the strength of long-range dependence present in a self-similar time series.
| [
{
"version": "v1",
"created": "Fri, 18 Sep 1998 05:18:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Paxson",
"Vern",
"",
"Network Research Group, Lawrence Berkeley National\n Laboratory"
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9809031 | Mihir Bellare | William Aiello, Mihir Bellare, Giovanni Di Crescenzo and Ramarathnam
Venkatesan | Security amplification by composition: The case of doubly-iterated,
ideal ciphers | An extended abstract of this paper appeared in the proceedings of
Crypto 98 conference (Springer Verlag LNCS Vol 1462, 1998). This is the full
version | null | null | null | cs.CR | null | We investigate, in the Shannon model, the security of constructions
corresponding to double and (two-key) triple DES. That is, we consider
F_{k1}(F_{k2}(.)) and F_{k1}(F_{k2}^{-1}(F_{k1}(.))) with the component
functions being ideal ciphers. This models the resistance of these
constructions to ``generic'' attacks like meet in the middle attacks. We obtain
the first proof that composition actually increases the security of these
constructions in some meaningful sense. We compute a bound on the probability
of breaking the double cipher as a function of the number of computations of
the base cipher made, and the number of examples of the composed cipher seen,
and show that the success probability is the square of that for a single key
cipher. The same bound holds for the two-key triple cipher. The first bound is
tight and shows that meet in the middle is the best possible generic attack
against the double cipher.
| [
{
"version": "v1",
"created": "Fri, 18 Sep 1998 19:02:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Aiello",
"William",
""
],
[
"Bellare",
"Mihir",
""
],
[
"Di Crescenzo",
"Giovanni",
""
],
[
"Venkatesan",
"Ramarathnam",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/9809032 | Miroslaw Truszczynski | Victor W. Marek, Miroslaw Truszczynski | Stable models and an alternative logic programming paradigm | 21 pages | The Logic Programming Paradigm, K.R. Apt, V.W. Marek, M.
Truszczynski, D.S. Warren (eds.), pp. 375-398. Springer-Verlag, 1999 | null | null | cs.LO cs.AI | null | In this paper we reexamine the place and role of stable model semantics in
logic programming and contrast it with a least Herbrand model approach to Horn
programs. We demonstrate that inherent features of stable model semantics
naturally lead to a logic programming system that offers an interesting
alternative to more traditional logic programming styles of Horn logic
programming, stratified logic programming and logic programming with
well-founded semantics. The proposed approach is based on the interpretation of
program clauses as constraints. In this setting programs do not describe a
single intended model, but a family of stable models. These stable models
encode solutions to the constraint satisfaction problem described by the
program. Our approach imposes restrictions on the syntax of logic programs. In
particular, function symbols are eliminated from the language. We argue that
the resulting logic programming system is well-attuned to problems in the class
NP, has a well-defined domain of applications, and an emerging methodology of
programming. We point out that what makes the whole approach viable is recent
progress in implementations of algorithms to compute stable models of
propositional logic programs.
| [
{
"version": "v1",
"created": "Fri, 18 Sep 1998 20:34:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Marek",
"Victor W.",
""
],
[
"Truszczynski",
"Miroslaw",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/9809033 | Davood Rafiei | Davood Rafiei and Alberto Mendelzon | Efficient Retrieval of Similar Time Sequences Using DFT | null | Proceedings of 5th Intl. Conf. on Foundations of Data
Organizations and Algorithms (FODO '98), November 1998, Kobe, Japan | null | null | cs.DB | null | We propose an improvement of the known DFT-based indexing technique for fast
retrieval of similar time sequences. We use the last few Fourier coefficients
in the distance computation without storing them in the index since every
coefficient at the end is the complex conjugate of a coefficient at the
beginning and as strong as its counterpart. We show analytically that this
observation can accelerate the search time of the index by more than a factor
of two. This result was confirmed by our experiments, which were carried out on
real stock prices and synthetic data.
| [
{
"version": "v1",
"created": "Fri, 18 Sep 1998 21:24:23 GMT"
},
{
"version": "v2",
"created": "Fri, 25 Sep 1998 16:12:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rafiei",
"Davood",
""
],
[
"Mendelzon",
"Alberto",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
cs/9809034 | Tim Finin | Yannis Labrou and Tim Finin | Semantics and Conversations for an Agent Communication Language | Also in in "Readings in Agents", Michael Huhns and Munindar Singh
(eds), Morgan Kaufmann Publishers, Inc | Proceedings of the Fifteenth International Joint Conference on
Artificial Intelligence (IJCAI-97) August, 1997 | null | null | cs.MA cs.AI | null | We address the issues of semantics and conversations for agent communication
languages and the Knowledge Query Manipulation Language (KQML) in particular.
Based on ideas from speech act theory, we present a semantic description for
KQML that associates ``cognitive'' states of the agent with the use of the
language's primitives (performatives). We have used this approach to describe
the semantics for the whole set of reserved KQML performatives. Building on the
semantics, we devise the conversation policies, i.e., a formal description of
how KQML performatives may be combined into KQML exchanges (conversations),
using a Definite Clause Grammar. Our research offers methods for a speech act
theory-based semantic description of a language of communication acts and for
the specification of the protocols associated with these acts. Languages of
communication acts address the issue of communication among software
applications at a level of abstraction that is useful to the emerging software
agents paradigm.
| [
{
"version": "v1",
"created": "Fri, 18 Sep 1998 21:41:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Labrou",
"Yannis",
""
],
[
"Finin",
"Tim",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/9809035 | Jeff Erickson | Jeff Erickson, Leonidas J. Guibas, Jorge Stolfi, Li Zhang | Separation-Sensitive Collision Detection for Convex Objects | 10 pages, 8 figures; to appear in Proc. 10th Annual ACM-SIAM
Symposium on Discrete Algorithms, 1999; see also
http://www.uiuc.edu/ph/www/jeffe/pubs/kollide.html ; v2 replaces submission
with camera-ready version | null | null | null | cs.CG cs.GR | null | We develop a class of new kinetic data structures for collision detection
between moving convex polytopes; the performance of these structures is
sensitive to the separation of the polytopes during their motion. For two
convex polygons in the plane, let $D$ be the maximum diameter of the polygons,
and let $s$ be the minimum distance between them during their motion. Our
separation certificate changes $O(\log(D/s))$ times when the relative motion of
the two polygons is a translation along a straight line or convex curve,
$O(\sqrt{D/s})$ for translation along an algebraic trajectory, and $O(D/s)$ for
algebraic rigid motion (translation and rotation). Each certificate update is
performed in $O(\log(D/s))$ time. Variants of these data structures are also
shown that exhibit \emph{hysteresis}---after a separation certificate fails,
the new certificate cannot fail again until the objects have moved by some
constant fraction of their current separation. We can then bound the number of
events by the combinatorial size of a certain cover of the motion path by
balls.
| [
{
"version": "v1",
"created": "Fri, 18 Sep 1998 23:16:06 GMT"
},
{
"version": "v2",
"created": "Sat, 24 Oct 1998 21:51:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Erickson",
"Jeff",
""
],
[
"Guibas",
"Leonidas J.",
""
],
[
"Stolfi",
"Jorge",
""
],
[
"Zhang",
"Li",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
}
] |
cs/9809036 | Peter Stanski | P. Stanski, S. Giles and A. Zaslavsky | Document Archiving, Replication and Migration Container for Mobile Web
Users | 5 pages | Proceedings of the 1998 ACM Symposium on Applied Computing
(SAC98), Feb. 27- March 1, pp. 400-404, ACM, ISBN 0-89791-969-6 | null | null | cs.MA cs.MM | null | With the increasing use of mobile workstations for a wide variety of tasks
and associated information needs, and with many variations of available
networks, access to data becomes a prime consideration. This paper discusses
issues of workstation mobility and proposes a solution wherein the data
structures are accessed in an encapsulated form - through the Portable File
System (PFS) wrapper. The paper discusses an implementation of the Portable
File System, highlighting the architecture and commenting upon performance of
an experimental system. Although investigations have been focused upon mobile
access of WWW documents, this technique could be applied to any mobile data
access situation.
| [
{
"version": "v1",
"created": "Sun, 20 Sep 1998 12:48:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Stanski",
"P.",
""
],
[
"Giles",
"S.",
""
],
[
"Zaslavsky",
"A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
] |
cs/9809037 | David Eppstein | Nina Amenta, Marshall Bern, David Eppstein, Shang-Hua Teng | Regression Depth and Center Points | 14 pages, 3 figures | Discrete Comput. Geom. 23(3):305-323, 2000 | 10.1007/PL00009502 | null | cs.CG math.CO | null | We show that, for any set of n points in d dimensions, there exists a
hyperplane with regression depth at least ceiling(n/(d+1)). as had been
conjectured by Rousseeuw and Hubert. Dually, for any arrangement of n
hyperplanes in d dimensions there exists a point that cannot escape to infinity
without crossing at least ceiling(n/(d+1)) hyperplanes. We also apply our
approach to related questions on the existence of partitions of the data into
subsets such that a common plane has nonzero regression depth in each subset,
and to the computational complexity of regression depth problems.
| [
{
"version": "v1",
"created": "Mon, 21 Sep 1998 21:55:49 GMT"
},
{
"version": "v2",
"created": "Mon, 26 Jul 1999 22:00:37 GMT"
}
] | 2010-01-21T00:00:00 | [
[
"Amenta",
"Nina",
""
],
[
"Bern",
"Marshall",
""
],
[
"Eppstein",
"David",
""
],
[
"Teng",
"Shang-Hua",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
cs/9809038 | David Eppstein | David Eppstein | Incremental and Decremental Maintenance of Planar Width | 7 pages; 2 figures. A preliminary version of this paper was presented
at the 10th ACM/SIAM Symp. Discrete Algorithms (SODA '99); this is the
journal version, and will appear in J. Algorithms | J. Algorithms 37(2):570-577, Nov. 2000 | 10.1006/jagm.2000.1107 | null | cs.CG | null | We present an algorithm for maintaining the width of a planar point set
dynamically, as points are inserted or deleted. Our algorithm takes time
O(kn^epsilon) per update, where k is the amount of change the update causes in
the convex hull, n is the number of points in the set, and epsilon is any
arbitrarily small constant. For incremental or decremental update sequences,
the amortized time per update is O(n^epsilon).
| [
{
"version": "v1",
"created": "Mon, 21 Sep 1998 23:31:16 GMT"
},
{
"version": "v2",
"created": "Thu, 4 May 2000 00:54:20 GMT"
}
] | 2010-01-21T00:00:00 | [
[
"Eppstein",
"David",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
cs/9809039 | Chunlei Liu | Sonia Fahmy, Raj Jain | ABR Flow Control for Multipoint Connections | 5 pages, 2 figures submitted to IEEE Network Magazine, ATM Forum
Perspectives column | null | 10.1109/MNET.1998.730745 | null | cs.NI | null | Multipoint capabilities are essential for ATM networks to efficiently support
many applications, including IP multicasting and overlay applications. The
current signaling and routing specifications for ATM define point-to-multipoint
capabilities. Multipoint-to-point connection support is also being discussed by
the signaling and PNNI groups, and will be defined in the near future for the
unspecified bit rate (UBR) service. We examine point-to-multipoint and
multipoint-to-point flow control for the available bit rate (ABR) service, as
discussed in the traffic management working group.
| [
{
"version": "v1",
"created": "Tue, 22 Sep 1998 16:34:07 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Fahmy",
"Sonia",
""
],
[
"Jain",
"Raj",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9809040 | Chunlei Liu | Bobby Vandalore, Sonia Fahmy, Raj Jain, Rohit Goyal, Mukul Goyal | Overload Based Explicit Rate Switch Schemes with MCR Guarantees | Submitted to the INFOCOM '99 | null | null | null | cs.NI | null | An explicit rate switch scheme monitors the load at each link and gives
feedback to the sources. We define the overload factor as the ratio of the
input rate to the available capacity. In this paper, we present four overload
based ABR switch schemes which provide MCR guarantees. The switch schemes
proposed use the overload factor and other quantities to calculate feedback
rates. A dynamic queue control mechanism is used to achieve efficient usage of
the link, control queues and, achieve constant queuing delay at steady state.
The proposed algorithms are studied and compared using several configurations.
The configurations were chosen to test the performance of the algorithms in
presence of link bottlenecks, source bottlenecks and transient sources. A
comparison of the proposed algorithms based on the simulation results is
presented.
| [
{
"version": "v1",
"created": "Tue, 22 Sep 1998 21:34:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vandalore",
"Bobby",
""
],
[
"Fahmy",
"Sonia",
""
],
[
"Jain",
"Raj",
""
],
[
"Goyal",
"Rohit",
""
],
[
"Goyal",
"Mukul",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9809041 | Chunlei Liu | Bobby Vandalore, Raj Jain, Rohit Goyal, Sonia Fahmy | Design and Analysis of Queue Control Functions for Explicit Rate Switch
Schemes | Proceedings of IC3N'98, October 1998 | null | null | null | cs.NI | null | The main goals of a switch scheme are high utilization, low queuing delay and
fairness. To achieve high utilization the switch scheme can maintain non-zero
(small) queues in steady state which can be used if the sources do not have
data to send. Queue length (delay) can be controlled if part of the link
capacity is used for draining queues in the event of queue build up. In most
schemes a simple threshold function is used for queue control. Better control
of the queue and hence delay can be achieved by using sophisticated queue
control functions. It is very important to design and analyze such queue
control functions. We study step, linear, hyperbolic and inverse hyperbolic
queue control functions. Analytical explanation and simulation results
consistent with analysis are presented. From the study, we conclude that
inverse hyperbolic is the best control function and to reduce complexity the
linear control function can be used since it performs satisfactorily in most
cases.
| [
{
"version": "v1",
"created": "Tue, 22 Sep 1998 21:43:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vandalore",
"Bobby",
""
],
[
"Jain",
"Raj",
""
],
[
"Goyal",
"Rohit",
""
],
[
"Fahmy",
"Sonia",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9809042 | Chunlei Liu | Bobby Vandalore, Sonia Fahmy, Raj Jain, Rohit Goyal, Mukul Goyal | A Definition of General Weighted Fairness and its Support in Explicit
Rate Switch Algorithms | Proceedings of ICNP'98, October1998 | null | null | null | cs.NI | null | In this paper we give a general definition of weighted fairness and show how
this can achieve various fairness definitions, such as those mentioned in the
ATM Forum TM 4.0 Specifications. We discuss how a pricing policy can be mapped
to general weighted (GW) fairness. The GW fairness can be achieved by
calculating the $ExcessFairshare$ (weighted fairshare of the left over
bandwidth) for each VC. We show how a switch algorithm can be modified to
support the GW fairness by using the $ExcessFairshare$. We use ERICA+ as an
example switch algorithm and show how it can be modified to achieve the general
fairness. Simulations results are presented to demonstrate that the modified
switch algorithm achieves GW fairness. An analytical proof for convergence of
the modified ERICA+ algorithm is given in the appendix.
| [
{
"version": "v1",
"created": "Tue, 22 Sep 1998 22:01:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vandalore",
"Bobby",
""
],
[
"Fahmy",
"Sonia",
""
],
[
"Jain",
"Raj",
""
],
[
"Goyal",
"Rohit",
""
],
[
"Goyal",
"Mukul",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9809043 | Chunlei Liu | Bobby Vandalore, Shivkumar Kalyanaraman, Raj Jain, Rohit Goyal, Sonia
Fahmy | Worst Case Buffer Requirements For Tcp Over ABR | SICON'98, June 98 | null | null | null | cs.NI | null | ATM (asynchronous transfer mode) is the technology chosen for the Broadband
Integrated Services Digital Network (B-ISDN). The ATM ABR (available bit rate)
service can be used to transport ``best-effort'' traffic. In this paper, we
extend our earlier work on the buffer requirements problem for TCP over ABR.
Here, a worst case scenario is generated such that TCP sources send a burst of
data at the time when the sources have large congestion windows and the ACRs
(allowed cell rates) for ABR are high. We find that ABR using the ERICA+ switch
algorithm can control the maximum queue lengths (hence the buffer requirements)
even for the worst case. We present analytical arguments for the expected queue
length and simulation results for different number of sources values and
parameter values.
| [
{
"version": "v1",
"created": "Tue, 22 Sep 1998 22:05:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vandalore",
"Bobby",
""
],
[
"Kalyanaraman",
"Shivkumar",
""
],
[
"Jain",
"Raj",
""
],
[
"Goyal",
"Rohit",
""
],
[
"Fahmy",
"Sonia",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9809045 | Chunlei Liu | Shivkumar Kalyanaraman, Bobby Vandalore, Raj Jain, Rohit Goyal, Sonia
Fahmy, Seong-Cheol Kim, Sastri Kota | Performance of TCP over ABR with Long-Range Dependent VBR Background
Traffic over Terrestrial and Satellite ATM networks | Proceedings of LCN `98 | null | null | null | cs.NI | null | Compressed video is well known to be self-similar in nature. We model VBR
carrying Long-Range Dependent (LRD), multiplexed MPEG-2 video sources. The
actual traffic for the model is generated using fast-fourier transform of
generate the fractional gaussian noise (FGN) sequence. Our model of compressed
video sources bears similarity to an MPEG-2 Transport Stream carrying video,
i.e., it is long-range dependent and generates traffic in a piecewise-CBR
fashion. We study the effect of such VBR traffic on ABR carrying TCP traffic.
The effect of such VBR traffic is that the ABR capacity is highly variant. We
find that a switch algorithm like ERICA+ can tolerate this variance in ABR
capacity while maintaining high throughput and low delay. We present simulation
results for terrestrial and satellite configurations.
| [
{
"version": "v1",
"created": "Wed, 23 Sep 1998 01:40:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kalyanaraman",
"Shivkumar",
""
],
[
"Vandalore",
"Bobby",
""
],
[
"Jain",
"Raj",
""
],
[
"Goyal",
"Rohit",
""
],
[
"Fahmy",
"Sonia",
""
],
[
"Kim",
"Seong-Cheol",
""
],
[
"Kota",
"Sastri",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9809046 | Chunlei Liu | Sonia Fahmy, Raj Jain, Rohit Goyal, and Bobby Vandalore | Fairness for ABR multipoint-to-point connections | Proceedings of SPIE 98, November 1998 | null | 10.1117/12.325859 | null | cs.NI | null | In multipoint-to-point connections, the traffic at the root (destination) is
the combination of all traffic originating at the leaves. A crucial concern in
the case of multiple senders is how to define fairness within a multicast group
and among groups and point-to-point connections. Fairness definition can be
complicated since the multipoint connection can have the same identifier
(VPI/VCI) on each link, and senders might not be distinguishable in this case.
Many rate allocation algorithms implicitly assume that there is only one sender
in each VC, which does not hold for multipoint-to-point cases. We give various
possibilities for defining fairness for multipoint connections, and show the
tradeoffs involved. In addition, we show that ATM bandwidth allocation
algorithms need to be adapted to give fair allocations for multipoint-to-point
connections.
| [
{
"version": "v1",
"created": "Wed, 23 Sep 1998 01:49:19 GMT"
}
] | 2015-06-25T00:00:00 | [
[
"Fahmy",
"Sonia",
""
],
[
"Jain",
"Raj",
""
],
[
"Goyal",
"Rohit",
""
],
[
"Vandalore",
"Bobby",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9809047 | Chunlei Liu | Rohit Goyal, Raj Jain, Sonia Fahmy, Shobana Narayanaswamy | Modeling Traffic Management in ATM Networks with OPNET | Proc. of OPNETWORK'98, Washington DC., May 1998 | null | null | null | cs.NI | null | Asynchronous transfer mode (ATM) is the new generation of computer and
communication networks that are being deployed throughout the telecommunication
industry as well as in campus backbones. ATM technology distinguishes itself
from the previous networking protocols in that it has the latest traffic
management technology and thus allows guaranteeing delay, throughput, and other
performance measures. This in turn, allows users to integrate voice, video, and
data on the same network. Available bit rate (ABR) service in ATM has been
designed to fairly distribute all unused capacity to data traffic and is
specified in the ATM Forum's Traffic Management (TM4.0) standard. This paper
will describe the OPNET models that have been developed for ATM and ABR design
and analysis.
| [
{
"version": "v1",
"created": "Wed, 23 Sep 1998 02:17:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Goyal",
"Rohit",
""
],
[
"Jain",
"Raj",
""
],
[
"Fahmy",
"Sonia",
""
],
[
"Narayanaswamy",
"Shobana",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9809048 | Chunlei Liu | Rohit Goyal, Steve Lai, Raj Jain, Arian Durresi | laboratories for Data Communications and Computer Networks | Proc. of Frontiers in Education (FIE98), Tempe, November 1998 | null | null | null | cs.NI | null | In this paper we describe a hands-on laboratory oriented instructional
package that we have developed for data communications and networking. The
package consists of a software tool, together with instructional material for a
laboratory based networking curriculum. The software is based on a simulation
environment that enables the student to experiment with various networking
protocols, on an easy to use graphical user interface (GUI). Data message
flows, packet losses, control/routing message flows, virtual circuit setups,
link failures, bit errors etc., are some of the features that can be visualized
in this environment. The student can also modify the networking components
provided, as well as add new components using the C programming language. The
instructional material consists of a set of laboratory exercises for flow and
error control (HDLC), IEEE 802.3 CSMA/CD protocol, the token ring protocol,
interconnecting LANs via bridges, TCP congestion avoidance and control, IP
fragmentation and reassembly, ATM PNNI routing and ATM policing. The laboratory
exercises have facilitated the development of a networking curriculum based on
both the traditional computer networking principles, as well as the new
technologies in telecommunication networking. The laboratory environment has
been used in the networking curriculum at The Ohio State University, and is
being piloted at other universities. The entire package is freely available
over the Internet.
| [
{
"version": "v1",
"created": "Wed, 23 Sep 1998 02:21:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Goyal",
"Rohit",
""
],
[
"Lai",
"Steve",
""
],
[
"Jain",
"Raj",
""
],
[
"Durresi",
"Arian",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9809049 | Dr Peter J. Bentley | Peter J Bentley | Aspects of Evolutionary Design by Computers | In Proceedings of the 3rd On-line World Conference on Soft Computing
in Engineering Design and Manufacturing (WSC3) | null | null | null | cs.NE | null | This paper examines the four main types of Evolutionary Design by computers:
Evolutionary Design Optimisation, Evolutionary Art, Evolutionary Artificial
Life Forms and Creative Evolutionary Design. Definitions for all four areas are
provided. A review of current work in each of these areas is given, with
examples of the types of applications that have been tackled. The different
properties and requirements of each are examined. Descriptions of typical
representations and evolutionary algorithms are provided and examples of
designs evolved using these techniques are shown. The paper then discusses how
the boundaries of these areas are beginning to merge, resulting in four new
'overlapping' types of Evolutionary Design: Integral Evolutionary Design,
Artificial Life Based Evolutionary Design, Aesthetic Evolutionary AL and
Aesthetic Evolutionary Design. Finally, the last part of the paper discusses
some common problems faced by creators of Evolutionary Design systems,
including: interdependent elements in designs, epistasis, and constraint
handling.
| [
{
"version": "v1",
"created": "Wed, 23 Sep 1998 11:01:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bentley",
"Peter J",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
cs/9809050 | Wolfgang Lezius | Wolfgang Lezius (University of Paderborn), Reinhard Rapp (University
of Mainz), Manfred Wettler (University of Paderborn) | A Freely Available Morphological Analyzer, Disambiguator and Context
Sensitive Lemmatizer for German | 5 pages, Postscript only | Proceedings of the COLING-ACL 1998, pp. 743-748 | null | null | cs.CL | null | In this paper we present Morphy, an integrated tool for German morphology,
part-of-speech tagging and context-sensitive lemmatization. Its large lexicon
of more than 320,000 word forms plus its ability to process German compound
nouns guarantee a wide morphological coverage. Syntactic ambiguities can be
resolved with a standard statistical part-of-speech tagger. By using the output
of the tagger, the lemmatizer can determine the correct root even for ambiguous
word forms. The complete package is freely available and can be downloaded from
the World Wide Web.
| [
{
"version": "v1",
"created": "Wed, 23 Sep 1998 12:59:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lezius",
"Wolfgang",
"",
"University of Paderborn"
],
[
"Rapp",
"Reinhard",
"",
"University\n of Mainz"
],
[
"Wettler",
"Manfred",
"",
"University of Paderborn"
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/9809051 | Saturnino Luz | Niels Ole Bernsen and Laila Dybkjaer, eds. (The Natural Interactive
Systems Group, Odense University, Denmark) | Spoken Language Dialogue Systems and Components: Best practice in
development and evaluation (DISC 24823) - Periodic Progress Report 1: Basic
Details of the Action | 27 pages | null | null | DISC-D5.1 | cs.CL cs.SE | null | The DISC project aims to (a) build an in-depth understanding of the
state-of-the-art in spoken language dialogue systems (SLDSs) and components
development and evaluation with the purpose of (b) developing a first best
practice methodology in the field. The methodology will be accompanied by (c) a
series of development and evaluation support tools. To the limited extent
possible within the duration of the project, the draft versions of the
methodology and the tools will be (d) tested by SLDS developers from industry
and research, and will be (e) packaged to best suit their needs. In the first
year of DISC, (a) has been accomplished, and (b) and (c) have started. A
proposal to complete the work proposed above by adding 12 months to the 18
months of the present project, has been submitted to Esprit Long-Term Research
in March 1998.
| [
{
"version": "v1",
"created": "Wed, 23 Sep 1998 14:47:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bernsen",
"Niels Ole",
"",
"The Natural Interactive\n Systems Group, Odense University, Denmark"
],
[
"Dybkjaer",
"Laila",
"",
"The Natural Interactive\n Systems Group, Odense University, Denmark"
],
[
"eds.",
"",
"",
"The Natural Interactive\n Systems Group, Odense University, Denmark"
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/9809052 | Chunlei Liu | Rohit Goyal, Sastri Kota, Raj Jain, Sonia Fahmy, Bobby Vandalore,
Jerry Kallaus | Analysis and Simulation of Delay and Buffer Requirements of
satellite-ATM Networks for TCP/IP Traffic | Submitted to IEEE Journal of Selected Areas in Communications, March
1998 | null | null | null | cs.NI | null | In this paper we present a model to study the end-to-end delay performance of
a satellite-ATM netowrk. We describe a satellite-ATM network architecture. The
architecture presents a trade-off between the on-board switching/processing
features and the complexity of the satellite communication systems. The
end-to-end delay of a connection passing through a satellite constellation
consists of the transmission delay, the uplink and downlink ground
terminal-satellite propagation delay, the inter-satellite link delays, the
on-board switching, processing and buffering delays. In a broadband satellite
network, the propagation and the buffering delays have the most impact on the
overall delay. We present an analysis of the propagation and buffering delay
components for GEO and LEO systems. We model LEO constellations as satellites
evenly spaced in circular orbits around the earth. A simple routing algorithm
for LEO systems calculates locally optimal paths for the end-to-end connection.
This is used to calculate the end-to-end propagation delays for LEO networks.
We present a simulation model to calculate the buffering delay for TCP/IP
traffic over ATM ABR and UBR service categories. We apply this model to
calculate total end-to-end delays for TCP/IP over satellite-ATM networks.
| [
{
"version": "v1",
"created": "Wed, 23 Sep 1998 14:03:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Goyal",
"Rohit",
""
],
[
"Kota",
"Sastri",
""
],
[
"Jain",
"Raj",
""
],
[
"Fahmy",
"Sonia",
""
],
[
"Vandalore",
"Bobby",
""
],
[
"Kallaus",
"Jerry",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9809053 | Chunlei Liu | ohit Goyal, Raj Jain, Shiv Kalyanaraman, Sonia Fahmy, Bobby Vandalore | Improving the Performance of TCP over the ATM-UBR service | null | null | null | null | cs.NI | null | In this paper we study the design issues in improving TCP performance over
the ATM UBR service. ATM-UBR switches respond to congestion by dropping cells
when their buffers become full. TCP connections running over UBR can experience
low throughput and high unfairness. Intelligent switch drop policies and
end-system policies can improve the performance of TCP over UBR with limited
buffers. We describe the various design options available to the network as
well as to the end systems to improve TCP performance over UBR. We study the
effects of Early Packet Discard, and two per-VC accounting based buffer
management policies. We also study the effects of various TCP end system
congestion control policies including slow start and congestion avoidance, fast
retransmit and recovery and selective acknowledgments. We present simulation
results for various small and large latency configurations with varying buffer
sizes and number of sources.
| [
{
"version": "v1",
"created": "Wed, 23 Sep 1998 14:23:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Goyal",
"ohit",
""
],
[
"Jain",
"Raj",
""
],
[
"Kalyanaraman",
"Shiv",
""
],
[
"Fahmy",
"Sonia",
""
],
[
"Vandalore",
"Bobby",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9809054 | Chunlei Liu | Rohit Goyal, Raj Jain, Sonia Fahmy, Bobby Vandalore, Shivkumar
Kalyanaraman | Design Issues for providing Minimum Rate Guarantees to the ATM
Unspecified Bit Rate Service | Proceedings of ATM98, Fairfax, May 1998 | null | null | null | cs.NI | null | Recent enhancements have been proposed to the ATM Unspecified Bit Rate (UBR)
service that guarantee a minimum rate at the frame level to the UBR VCs. These
enhancements have been called Guaranteed Frame Rate (GFR). In this paper, we
discuss the motivation, design and implementation issues for GFR. We present
the design of buffer management and policing mechanisms to implement GFR. We
study the effects of policing, per-VC buffer allocation, and per-VC queuing on
providing GFR to TCP/IP traffic. We conclude that per-VC scheduling is
necessary to provide minimum rate guarantees to TCP traffic. We examine the
role of frame tagging in the presence of scheduling and buffer management for
providing minumum rate guarantees. The use of GFR to support the Internet
Controlled Load Service is also discussed.
| [
{
"version": "v1",
"created": "Wed, 23 Sep 1998 14:28:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Goyal",
"Rohit",
""
],
[
"Jain",
"Raj",
""
],
[
"Fahmy",
"Sonia",
""
],
[
"Vandalore",
"Bobby",
""
],
[
"Kalyanaraman",
"Shivkumar",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9809055 | Chunlei Liu | Rohit Goyal, Raj Jain, Sonia Fahmy, Bobby Vandalore | Providing Rate Guarantees to TCP over the ATM GFR Service | Submitted to LCN'98 | null | null | null | cs.NI | null | The ATM Guaranteed Frame Rate (GFR) service is intended for best effort
traffic that can benefit from minimum throughput guarantees. Edge devices
connecting LANs to an ATM network can use GFR to transport multiple TCP/IP
connections over a single GFR VC.These devices would typically multiplex VCs
into a single FIFO queue. It has been shown that in general, FIFO queuing is
not sufficient to provide rate guarantees, and per-VC queuing with scheduling
is needed. We show that under conditions of low buffer allocation, it is
possible to control TCP rates with FIFO queuing and buffer management. We
present analysis and simulation results on controlling TCP rates by buffer
management. We present a buffer management policy that provides loose rate
guarantees to SACK TCP sources when the total buffer allocation is low. We
study the performance of this buffer management scheme by simulation.
| [
{
"version": "v1",
"created": "Wed, 23 Sep 1998 14:49:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Goyal",
"Rohit",
""
],
[
"Jain",
"Raj",
""
],
[
"Fahmy",
"Sonia",
""
],
[
"Vandalore",
"Bobby",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9809056 | Chunlei Liu | G. Babic, B. Vandalore, and R. Jain | Analysis and Modeling of Traffic in Modern Data Communication Networks | Ohio State University Technical Report, Feburary 1998 | null | null | OSU-CISRC-1/98-TR02 | cs.NI | null | In performance analysis and design of communication netword modeling data
traffic is important. With introduction of new applications, the
characteristics of the data traffic changes. We present a brief review the
different models of data traffic and how they have evolved. We present results
of data traffic analysis and simulated traffic, which demonstrates that the
packet train model fits the traffic at source destination level and long-memory
(self-similar) model fits the traffic at the aggregate level.
| [
{
"version": "v1",
"created": "Wed, 23 Sep 1998 15:01:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Babic",
"G.",
""
],
[
"Vandalore",
"B.",
""
],
[
"Jain",
"R.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9809057 | Chunlei Liu | Sonia Fahmy, Raj Jain, Shivkumar Kalyanaraman, Rohit Goyal and Bobby
Vandalore | On Determining the Fair Bandwidth Share for ABR Connections in ATM
Networks | Proceedings of the IEEE International Conference on Communications
(ICC) 1998, June 1998 | null | 10.1109/ICC.1998.683072 | null | cs.NI | null | The ABR service is designed to fairly allocate the bandwidth unused by higher
priority services. The network indicates to the ABR sources the rates at which
they should transmit to minimize their cell loss. Switches must constantly
measure the demand and available capacity, and divide the capacity fairly among
the contending connections. In order to compute the fair and efficient
allocation for each connection, a switch needs to determine the effective
number of active connections. In this paper, we propose a method for
determining the number of active connections and the fair bandwidth share for
each. We prove the efficiency and fairness of the proposed method analytically,
and simulate it by incorporating it into the ERICA switch algorithm.
| [
{
"version": "v1",
"created": "Wed, 23 Sep 1998 15:03:58 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Fahmy",
"Sonia",
""
],
[
"Jain",
"Raj",
""
],
[
"Kalyanaraman",
"Shivkumar",
""
],
[
"Goyal",
"Rohit",
""
],
[
"Vandalore",
"Bobby",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9809058 | Chunlei Liu | Raj Jain, Shiv Kalyanaraman and Ram Viswanathan | The OSU Scheme for Congestion Avoidance in ATM Networks: Lessons Learnt
and Extensions | null | null | null | null | cs.NI | null | The OSU scheme is a rate-based congestion avoidance scheme for ATM networks
using explicit rate indication. This work was one of the first attempts to
define explicit rate switch mechanisms and the Resource Management (RM) cell
format in Asynchronous Transfer Mode (ATM) networks. The key features of the
scheme include explicit rate feedback, congestion avoidance, fair operation
while maintaining high utilization, use of input rate as a congestion metric,
O(1) complexity. This paper presents an overview of the scheme, presents those
features of the scheme that have now become common features of other switch
algorithms and discusses three extensions of the scheme.
| [
{
"version": "v1",
"created": "Wed, 23 Sep 1998 15:09:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Jain",
"Raj",
""
],
[
"Kalyanaraman",
"Shiv",
""
],
[
"Viswanathan",
"Ram",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9809059 | Chunlei Liu | Shivkumar Kalyanaraman, Raj Jain, Sonia Fahmy, Rohit Goyal, and Bobby
Vandalore | The ERICA Switch Algorithm for ABR Traffic Management in ATM Networks | null | null | null | null | cs.NI | null | We propose an explicit rate indication scheme for congestion avoidance in ATM
networks. In this scheme, the network switches monitor their load on each link,
determining a load factor, the available capacity, and the number of currently
active virtual channels. This information is used to advise the sources about
the rates at which they should transmit. The algorithm is designed to achieve
efficiency, fairness, controlled queueing delays, and fast transient response.
The algorithm is also robust to measurement errors caused due to variation in
ABR demand and capacity. We present performance analysis of the scheme using
both analytical arguments and simulation results. The scheme is being
implemented by several ATM switch manufacturers.
| [
{
"version": "v1",
"created": "Wed, 23 Sep 1998 15:18:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kalyanaraman",
"Shivkumar",
""
],
[
"Jain",
"Raj",
""
],
[
"Fahmy",
"Sonia",
""
],
[
"Goyal",
"Rohit",
""
],
[
"Vandalore",
"Bobby",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9809060 | Tao Jiang | Harry Buhrman (CWI), Tao Jiang (McMaster U.), Ming Li (U of Waterloo),
Paul Vitanyi (CWI and U of Amsterdam) | New Applications of the Incompressibility Method: Part II | 13 pages. Submitted to TCS | null | null | null | cs.CC cs.DM | null | The incompressibility method is an elementary yet powerful proof technique.
It has been used successfully in many areas. To further demonstrate its power
and elegance we exhibit new simple proofs using the incompressibility method.
| [
{
"version": "v1",
"created": "Wed, 23 Sep 1998 15:41:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Buhrman",
"Harry",
"",
"CWI"
],
[
"Jiang",
"Tao",
"",
"McMaster U."
],
[
"Li",
"Ming",
"",
"U of Waterloo"
],
[
"Vitanyi",
"Paul",
"",
"CWI and U of Amsterdam"
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/9809061 | Tao Jiang | Tao Jiang (McMaster U.), Ming Li (U of Waterloo), Paul Vitanyi (CWI
and U of Amsterdam) | New Applications of the Incompressibility Method: Part I | 15 pages. To appear in The Computer Journal | null | null | null | cs.CC cs.DM | null | The incompressibility method is an elementary yet powerful proof technique.
It has been used successfully in many areas. To further demonstrate its power
and elegance we exhibit new simple proofs using the incompressibility method.
| [
{
"version": "v1",
"created": "Wed, 23 Sep 1998 15:43:54 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Jiang",
"Tao",
"",
"McMaster U."
],
[
"Li",
"Ming",
"",
"U of Waterloo"
],
[
"Vitanyi",
"Paul",
"",
"CWI\n and U of Amsterdam"
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/9809062 | Chunlei Liu | Sastri Kota, Rohit Goyal, Raj Jain | Satellite ATM Network Architectural Considerations and TCP/IP
Performance | Proceedings of the 3rd Ka Band Utilization Converence, Italy, 1997,
pp481-488 | null | null | null | cs.NI | null | In this paper, we have provided a summary of the design options in
Satellite-ATM technology. A satellite ATM network consists of a space segment
of satellites connected by inter-satellite crosslinks, and a ground segment of
the various ATM networks. A satellite-ATM interface module connects the
satellite network to the ATM networks and performs various call and control
functions. A network control center performs various network management and
resource allocation functions. Several issues such as the ATM service model,
media access protocols, and traffic management issues must be considered when
designing a satellite ATM network to effectively transport Internet traffic. We
have presented the buffer requirements for TCP/IP traffic over ATM-UBR for
satellite latencies. Our results are based on TCP with selective
acknowledgments and a per-VC buffer management policy at the switches. A buffer
size of about 0.5 * RTT to 1 * RTT is sufficient to provide over 98% throughput
to infinite TCP traffic for long latency networks and a large number of
sources. This buffer requirement is independent of the number of sources. The
fairness is high for a large numbers of sources because of the per-VC buffer
management performed at the switches and the nature of TCP traffic.
| [
{
"version": "v1",
"created": "Wed, 23 Sep 1998 15:54:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kota",
"Sastri",
""
],
[
"Goyal",
"Rohit",
""
],
[
"Jain",
"Raj",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9809063 | Chunlei Liu | Bobby Vandalore, Shivkumar Kalyanaraman, Raj Jain, Rohit Goyal, Sonia
Fahmy, Seong-Cheol Kim | Performance of Bursty World Wide Web (WWW) Sources over ABR | Submitted to WebNet `97, Toronto, November 97 | null | 10.1117/12.325884 | null | cs.NI | null | We model World Wide Web (WWW) servers and clients running over an ATM network
using the ABR (available bit rate) service. The WWW servers are modeled using a
variant of the SPECweb96 benchmark, while the WWW clients are based on a model
by Mah. The traffic generated by this application is typically bursty, i.e., it
has active and idle periods in transmission. A timeout occurs after given
amount of idle period. During idle period the underlying TCP congestion windows
remain open until a timeout expires. These open windows may be used to send
data in a burst when the application becomes active again. This raises the
possibility of large switch queues if the source rates are not controlled by
ABR. We study this problem and show that ABR scales well with a large number of
bursty TCP sources in the system.
| [
{
"version": "v1",
"created": "Wed, 23 Sep 1998 15:58:17 GMT"
}
] | 2019-10-16T00:00:00 | [
[
"Vandalore",
"Bobby",
""
],
[
"Kalyanaraman",
"Shivkumar",
""
],
[
"Jain",
"Raj",
""
],
[
"Goyal",
"Rohit",
""
],
[
"Fahmy",
"Sonia",
""
],
[
"Kim",
"Seong-Cheol",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9809064 | Madhav Marathe | Madhav V. Marathe, Harry B. Hunt III, Richard E. Stearns, Venkatesh
Radhakrishnan | Approximation Algorithms for PSPACE-Hard Hierarchically and Periodically
Specified Problems | 5 Figures, 24 pages | SIAM J. Computing, Vol. 27, No 5, Oct. 1998, pp. 1237--1261 | null | null | cs.CC cs.DS | null | We study the efficient approximability of basic graph and logic problems in
the literature when instances are specified hierarchically as in \cite{Le89} or
are specified by 1-dimensional finite narrow periodic specifications as in
\cite{Wa93}. We show that, for most of the problems $\Pi$ considered when
specified using {\bf k-level-restricted} hierarchical specifications or
$k$-narrow periodic specifications the following holds:
\item Let $\rho$ be any performance guarantee of a polynomial time
approximation algorithm for $\Pi$, when instances are specified using standard
specifications. Then $\forall \epsilon > 0$, $ \Pi$ has a polynomial time
approximation algorithm with performance guarantee $(1 + \epsilon) \rho$. \item
$\Pi$ has a polynomial time approximation scheme when restricted to planar
instances. \end{romannum}
These are the first polynomial time approximation schemes for PSPACE-hard
hierarchically or periodically specified problems. Since several of the
problems considered are PSPACE-hard, our results provide the first examples of
natural PSPACE-hard optimization problems that have polynomial time
approximation schemes. This answers an open question in Condon et. al.
\cite{CF+93}.
| [
{
"version": "v1",
"created": "Wed, 23 Sep 1998 15:58:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Marathe",
"Madhav V.",
""
],
[
"Hunt",
"Harry B.",
"III"
],
[
"Stearns",
"Richard E.",
""
],
[
"Radhakrishnan",
"Venkatesh",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/9809065 | Chunlei Liu | Sonia Fahmy, Raj Jain, Rohit Goyal, Bobby Vandalore, Shivkumar
Kalyanaraman, Sastri Kota, and Pradeep Samudra | Feedback Consolidation Algorithms for ABR Point-to-Multipoint
Connections in ATM Networks | Proceedings of IEEE INFOCOM 1998, March 1998, volume 3, pp. 1004-1013 | null | 10.1109/INFCOM.1998.662910 | null | cs.NI | null | ABR traffic management for point-to-multipoint connections controls the
source rate to the minimum rate supported by all the branches of the multicast
tree. A number of algorithms have been developed for extending ABR congestion
avoidance algorithms to perform feedback consolidation at the branch points.
This paper discusses various design options and implementation alternatives for
the consolidation algorithms, and proposes a number of new algorithms. The
performance of the proposed algorithms and the previous algorithms is compared
under a variety of conditions. Results indicate that the algorithms we propose
eliminate the consolidation noise (caused if the feedback is returned before
all branches respond), while exhibiting a fast transient response.
| [
{
"version": "v1",
"created": "Wed, 23 Sep 1998 16:22:42 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Fahmy",
"Sonia",
""
],
[
"Jain",
"Raj",
""
],
[
"Goyal",
"Rohit",
""
],
[
"Vandalore",
"Bobby",
""
],
[
"Kalyanaraman",
"Shivkumar",
""
],
[
"Kota",
"Sastri",
""
],
[
"Samudra",
"Pradeep",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9809066 | Chunlei Liu | Rohit Goyal, Raj Jain, Shivkumar Kalyanaraman, Sonia Fahmy, Bobby
Vandalore, Sastri Kota | TCP Selective Acknowledgments and UBR Drop Policies to Improve ATM-UBR
Performance over Terrestrial and Satellite Networks | Proc. ICCCN97, Las Vegas, September 1997 pp17-27 | null | null | null | cs.NI | null | We study the performance of Selective Acknowledgments with TCP over the
ATM-UBR service category. We examine various UBR drop policies, TCP mechanisms
and network configurations to recommend optimal parameters for TCP over UBR. We
discuss various TCP congestion control mechanisms compare their performance for
LAN and WAN networks. We describe the effect of satellite delays on TCP
performance over UBR and present simulation results for LAN, WAN and satellite
networks. SACK TCP improves the performance of TCP over UBR, especially for
large delay networks. Intelligent drop policies at the switches are an
important factor for good performance in local area networks.
| [
{
"version": "v1",
"created": "Thu, 24 Sep 1998 02:53:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Goyal",
"Rohit",
""
],
[
"Jain",
"Raj",
""
],
[
"Kalyanaraman",
"Shivkumar",
""
],
[
"Fahmy",
"Sonia",
""
],
[
"Vandalore",
"Bobby",
""
],
[
"Kota",
"Sastri",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9809067 | Chunlei Liu | Sonia Fahmy, Raj Jain, Shivkumar Kalyanaraman, Rohit Goyal, Bobby
Vandalore and Xiangrong Cai | A Survey of Protocols and Open Issues in ATM Multipoint Communication | OSU Technical Report, August 21, 1997 | null | null | null | cs.NI | null | Asynchronous transfer mode (ATM) networks must define multicast capabilities
in order to efficiently support numerous applications, such as video
conferencing and distributed applications, in addition to LAN emulation (LANE)
and Internet protocol (IP) multicasting. Several problems and issues arise in
ATM multicasting, such as signaling, routing, connection admission control, and
traffic management problems. IP integrated services over ATM poses further
challenges to ATM multicasting. Scalability and simplicity are the two main
concerns for ATM multicasting. This paper provides a survey of the current work
on multicasting problems in general, and ATM multicasting in particular. A
number of proposed schemes is examined, such as the schemes MARS, MCS, SEAM,
SMART, RSVP, and various multipoint traffic management and transport-layer
schemes. The paper also indicates a number of key open issues that remain
unresolved.
| [
{
"version": "v1",
"created": "Thu, 24 Sep 1998 02:56:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fahmy",
"Sonia",
""
],
[
"Jain",
"Raj",
""
],
[
"Kalyanaraman",
"Shivkumar",
""
],
[
"Goyal",
"Rohit",
""
],
[
"Vandalore",
"Bobby",
""
],
[
"Cai",
"Xiangrong",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9809068 | Chunlei Liu | Raj Jain and Gojko Babic | Performance Testing Effort at the ATM Forum: An Overview | IEEE Communication Magazine, Special issue on ATM performance,
Version: April 10, 1997, pp110-116 | null | null | null | cs.NI | null | The testing group at ATM Forum is working on developing a specification for
performance testing of ATM switches and networks. The emphasis is on the user
perceived frame-level performance. This paper explains what is different about
this new effort and gives its status.
| [
{
"version": "v1",
"created": "Thu, 24 Sep 1998 03:00:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Jain",
"Raj",
""
],
[
"Babic",
"Gojko",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9809069 | Chunlei Liu | Shiv Kalyanaraman, Raj Jain, Jianping Jiang, Rohit Goyal, Sonia Fahmy
and Pradeep Samudra | Design Considerations for the Virtual Source/Virtual Destination (VS/VD)
Feature in the ABR Service of ATM Networks | 25 pages | null | null | null | cs.NI | null | The Available Bit Rate (ABR) service in ATM networks has been specified to
allow fair and efficient support of data applications over ATM utilizing
capacity left over after servicing higher priority classes. One of the
architectural features in the ABR specification [tm4] is the Virtual
Source/Virtual Destination (VS/VD) option. This option allows a switch to
divide an end-to-end ABR connection into separately controlled ABR segments by
acting like a destination on one segment, and like a source on the other. The
coupling in the VS/VD switch between the two ABR control segments is
implementation specific. In this paper, we model a VS/VD ATM switch and study
the issues in designing coupling between ABR segments. We identify a number of
implementation options for the coupling. A good choice significantly improves
the stability and transient performance of the system and reduces the buffer
requirements at the switches.
| [
{
"version": "v1",
"created": "Thu, 24 Sep 1998 03:06:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kalyanaraman",
"Shiv",
""
],
[
"Jain",
"Raj",
""
],
[
"Jiang",
"Jianping",
""
],
[
"Goyal",
"Rohit",
""
],
[
"Fahmy",
"Sonia",
""
],
[
"Samudra",
"Pradeep",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9809070 | Chunlei Liu | Shivkumar Kalyanaraman, Raj Jain, Rohit Goyal, Sonia Fahmy, and
Seong-Cheol Kim | Use-it or Lose-it Policies for the Available Bit Rate (ABR) Service in
ATM Networks | 25 pages | null | null | null | cs.NI | null | The Available Bit Rate (ABR) service has been developed to support 21st
century data applications over Asynchronous Transfer Mode (ATM). The ABR
service uses a closed-loop rate-based traffic management framework where the
network divides left-over bandwidth among contending sources. The ATM Forum
traffic management group also incorporated open-loop control capabilities to
make the ABR service robust to temporary network failures and source
inactivity. An important problem addressed was whether rate allocations of
sources should be taken away if sources do not use them. The proposed
solutions, popularly known as the Use-It-or-Lose-It (UILI) policies, have had
significant impact on the ABR service capabilities. In this paper we discuss
the design, development, and the final shape of these policies and their impact
on the ABR service. We compare the various alternatives through a performance
evaluation.
| [
{
"version": "v1",
"created": "Thu, 24 Sep 1998 03:09:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kalyanaraman",
"Shivkumar",
""
],
[
"Jain",
"Raj",
""
],
[
"Goyal",
"Rohit",
""
],
[
"Fahmy",
"Sonia",
""
],
[
"Kim",
"Seong-Cheol",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9809071 | Chunlei Liu | Rohit Goyal, Raj Jain, Shiv Kalyanaraman, Sonia Fahmy and Seong-Cheol
Kim | UBR+: Improving Performance of TCP over ATM-UBR service | ICC'97, Montreal, June 1997, pp1042-1048 | null | null | null | cs.NI | null | ATM-UBR switches respond to congestion by dropping cells when their buffers
become full. TCP connections running over UBR experience low throughput and
high unfairness. For 100% TCP throughput each switch needs buffers equal to the
sum of the window sizes of all the TCP connections. Intelligent drop policies
can improve the performance of TCP over UBR with limited buffers. The UBR+
service proposes enhancements to UBR for intelligent drop. Early Packet Discard
improves throughput but does not attempt to improve fairness. Selective packet
drop based on per-connection buffer occupancy improves fairness. The Fair
Buffer Allocation scheme further improves both throughput and fairness.
| [
{
"version": "v1",
"created": "Thu, 24 Sep 1998 03:12:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Goyal",
"Rohit",
""
],
[
"Jain",
"Raj",
""
],
[
"Kalyanaraman",
"Shiv",
""
],
[
"Fahmy",
"Sonia",
""
],
[
"Kim",
"Seong-Cheol",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9809072 | Chunlei Liu | Shiv Kalyanaraman, Raj Jain, Sonia Fahmy, Rohit Goyal, Jianping Jiang
and Seong-Cheol Kim | Performance of TCP over ABR on ATM backbone and with various VBR traffic
patterns | ICC'97, Montreal, June 1997 | null | null | null | cs.NI | null | We extend our earlier studies of buffer requirements of TCP over ABR in two
directions. First, we study the performance of TCP over ABR in an ATM backbone.
On the backbone, the TCP queues are at the edge router and not inside the ATM
network. The router requires buffer equal to the sum of the receiver window
sizes of the participating TCP connections. Second, we introduce various
patterns of VBR background traffic. The VBR background introduces variance in
the ABR capacity and the TCP traffic introduces variance in the ABR demand.
Some simple switch schemes are unable to keep up with the combined effect of
highly varying demands and highly varying ABR capacity. We present our
experiences with refining the ERICA+ switch scheme to handle these conditions.
| [
{
"version": "v1",
"created": "Thu, 24 Sep 1998 03:15:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kalyanaraman",
"Shiv",
""
],
[
"Jain",
"Raj",
""
],
[
"Fahmy",
"Sonia",
""
],
[
"Goyal",
"Rohit",
""
],
[
"Jiang",
"Jianping",
""
],
[
"Kim",
"Seong-Cheol",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9809073 | Chunlei Liu | Shiv Kalyanaraman, Raj Jain, Sonia Fahmy, Rohit Goyal and Seong-Cheol
Kim | Performance and Buffering Requirements of Internet Protocols over ATM
ABR and UBR Services | IEEE Communications Magazine, Vol 36, no 6, pp152-157 | null | 10.1109/35.685383 | null | cs.NI | null | The Asynchronous Transfer Mode (ATM) networks are quickly being adopted as
backbones over various parts of the Internet. This paper analyzes the
performance of TCP/IP protocols over ATM network's Available Bit Rate (ABR) and
Unspecified Bit Rate (UBR) services. It is shown that ABR pushes congestion to
the edges of the ATM network while UBR leaves it inside the ATM portion.
| [
{
"version": "v1",
"created": "Thu, 24 Sep 1998 03:18:01 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Kalyanaraman",
"Shiv",
""
],
[
"Jain",
"Raj",
""
],
[
"Fahmy",
"Sonia",
""
],
[
"Goyal",
"Rohit",
""
],
[
"Kim",
"Seong-Cheol",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9809074 | Chunlei Liu | Shiv Kalyanaraman, Raj Jain, Rohit Goyal, Sonia Fahmy and Seong-Cheol
Kim | Performance of TCP/IP Using ATM ABR and UBR Services over Satellite
Networks | IEEE Communication Society Workshop on Computer-Aided Modeling,
Analysis and Design of Communication Links and Networks, Mclean, VA, October
20, 1996 | null | null | null | cs.NI | null | We study the buffering requirements for zero cell loss for TCP/IP over
satellite links using the available bit rate (ABR) and unspecified bit rate
(UBR) services of asynchronous transfer mode (ATM) networks. For the ABR
service, we explore the effect of feedback delay (a factor which depends upon
the position of the bottleneck), the switch scheme used, and background
variable bit rate (VBR) traffic. It is shown that the buffer requirement for
TCP over ABR is independent of the number of TCP sources, but depends on the
aforementioned factors. For the UBR service, we show that the buffer
requirement is the sum of the TCP receiver window sizes. We substantiate our
arguments with simulation results.
| [
{
"version": "v1",
"created": "Thu, 24 Sep 1998 03:20:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kalyanaraman",
"Shiv",
""
],
[
"Jain",
"Raj",
""
],
[
"Goyal",
"Rohit",
""
],
[
"Fahmy",
"Sonia",
""
],
[
"Kim",
"Seong-Cheol",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9809075 | Chunlei Liu | Sonia Fahmy, Raj Jain, Shivkumar Kalyanaraman, Rohit Goyal, and Fang
Lu | On Source Rules for ABR Service on ATM Networks with Satellite Links | Proceedings of the First International Workshop on Satellite-based
Information Services, Rye, New York, November 1996, pp108-115 | null | null | null | cs.NI | null | During the design of ABR traffic management at the ATM Forum, we performed
several analyses to ensure that the ABR service will operate efficiently over
satellite links. In the cases where the performance was unacceptable, we
suggested modifications to the traffic management specifications. This paper
describes one such issue related to the count of missing resource management
cells (Crm) parameter of the ABR source behavior. The analysis presented here
led to the changes which are now part of the ATM traffic management (TM 4.0)
specification. In particular, the size of the transient buffer exposure (TBE)
parameter was set to 24 bits, and no size was enforced for the Crm parameter.
This simple change improved the throughput over OC-3 satellite links from 45
Mbps to 140 Mbps.
| [
{
"version": "v1",
"created": "Thu, 24 Sep 1998 03:22:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fahmy",
"Sonia",
""
],
[
"Jain",
"Raj",
""
],
[
"Kalyanaraman",
"Shivkumar",
""
],
[
"Goyal",
"Rohit",
""
],
[
"Lu",
"Fang",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9809076 | Chunlei Liu | Sonia Fahmy, Raj Jain, Fang Lu, and Shivkumar Kalyanaraman | A Survey of Congestion Control Techniques and Data Link Protocols in
Satellite Networks | null | null | null | null | cs.NI | null | Satellite communication systems are the means of realizing a global broadband
integrated services digital network. Due to the statistical nature of the
integrated services traffic, the resulting rate fluctuations and burstiness
render congestion control a complicated, yet indispensable function. The long
propagation delay of the earth-satellite link further imposes severe demands
and constraints on the congestion control schemes, as well as the media access
control techniques and retransmission protocols that can be employed in a
satellite network. The problems in designing satellite network protocols, as
well as some of the solutions proposed to tackle these problems, will be the
primary focus of this survey.
| [
{
"version": "v1",
"created": "Thu, 24 Sep 1998 03:25:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fahmy",
"Sonia",
""
],
[
"Jain",
"Raj",
""
],
[
"Lu",
"Fang",
""
],
[
"Kalyanaraman",
"Shivkumar",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9809077 | Chunlei Liu | Raj Jain, Shiv Kalyanaraman, Sonia Fahmy, Rohit Goyal, S. Kim | Source Behavior for ATM ABR Traffic Management: An Explanation | IEEE Communications Magazine, November 1, 1996, vol 34, no11, pp50-57 | null | 10.1109/35.544194 | null | cs.NI | null | The Available Bit Rate (ABR) service has been developed to support data
applications over Asynchronous Transfer Mode (ATM) networks. The network
continuously monitors its traffic and provides feedback to the source end
systems. This paper explains the rules that the sources have to follow to
achieve a fair and efficient allocation of network resources.
| [
{
"version": "v1",
"created": "Thu, 24 Sep 1998 03:27:43 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Jain",
"Raj",
""
],
[
"Kalyanaraman",
"Shiv",
""
],
[
"Fahmy",
"Sonia",
""
],
[
"Goyal",
"Rohit",
""
],
[
"Kim",
"S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9809078 | Chunlei Liu | Shiv Kalyanaraman, Raj Jain, Sonia Fahmy, and Rohit Goyal | Buffer Requirements For TCP/IP Over ABR | Proc. IEEE ATM'96 Workshop, San Fransisco, August 23-24, 1996 | null | null | null | cs.NI | null | We study the buffering requirements for zero cell loss for TCP over ABR. We
show that the maximum buffers required at the switch is proportional to the
maximum round trip time (RTT) of all VCs through the link. The number of
round-trips depends upon the the switch algorithm used. With our ERICA
[erica-final] switch algorithm, we find that the buffering required is
independent of the number of TCP sources. We substantiate our arguments with
simulation results.
| [
{
"version": "v1",
"created": "Thu, 24 Sep 1998 03:30:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kalyanaraman",
"Shiv",
""
],
[
"Jain",
"Raj",
""
],
[
"Fahmy",
"Sonia",
""
],
[
"Goyal",
"Rohit",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.