id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
sequencelengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/9809079 | Chunlei Liu | G. Dommety and Raj Jain | Potential Networking Applications of Global Positioning Systems (GPS) | OSU Technical report, April 1996 | null | null | TR-24, April 1996 | cs.NI | null | The main goal of this study was to survey current applications of GPS to
distributed systems and networks. Detailed lists of GPS products, current
applications, addresses of manufacturers, and sources for further information
are included in this report.
| [
{
"version": "v1",
"created": "Thu, 24 Sep 1998 03:37:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dommety",
"G.",
""
],
[
"Jain",
"Raj",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9809080 | Chunlei Liu | Raj Jain, Shiv Kalyanaraman, Ram Viswanathan | The OSU Scheme for Congestion Avoidance in ATM networks Using Explicit
Rate Indication | Proceedings WATM'95 First Workshop on ATM Traffic Management, Paris,
December 1995 (proceedings also to appear in book form) | null | null | null | cs.NI | null | An explicit rate indication scheme for congestion avoidance in computer and
telecommunication networks is proposed. The sources monitor their load and
provide the information periodically to the switches. The switches, in turn,
compute the load level and ask the sources to adjust their rates up or down.
The scheme achieves high link utilization, fair allocation of rates among
contending sources and provides quick convergence. A backward congestion
notification option is also provided. The conditions under which this option is
useful are indicated.
| [
{
"version": "v1",
"created": "Thu, 24 Sep 1998 03:44:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Jain",
"Raj",
""
],
[
"Kalyanaraman",
"Shiv",
""
],
[
"Viswanathan",
"Ram",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9809081 | David Eppstein | Nina Amenta, Marshall Bern, David Eppstein | Optimal Point Placement for Mesh Smoothing | 12 pages, 3 figures. A preliminary version of this paper was
presented at the 8th ACM/SIAM Symp. on Discrete Algorithms (SODA '97). This
is the final version, and will appear in a special issue of J. Algorithms for
papers from SODA '97 | J. Algorithms 30 (1999) 302-322 | 10.1006/jagm.1998.0984 | null | cs.CG | null | We study the problem of moving a vertex in an unstructured mesh of
triangular, quadrilateral, or tetrahedral elements to optimize the shapes of
adjacent elements. We show that many such problems can be solved in linear time
using generalized linear programming. We also give efficient algorithms for
some mesh smoothing problems that do not fit into the generalized linear
programming paradigm.
| [
{
"version": "v1",
"created": "Thu, 24 Sep 1998 21:02:45 GMT"
}
] | 2010-01-21T00:00:00 | [
[
"Amenta",
"Nina",
""
],
[
"Bern",
"Marshall",
""
],
[
"Eppstein",
"David",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
cs/9809082 | Chunlei Liu | A. Charny, D. Clark, R. Jain | Congestion Control with Explicit Rate Indication | Proc. ICC'95, June 1995, pp1954-1963 | null | null | null | cs.NI | null | As the speed and the dynamic range of computer networks evolve, the issue of
efficient traffic management becomes increasingly important. This work
describes an approach to traffic management using explicit rate information
provided to the source by the network. We present an asynchronous distributed
algorithm for optimal rate calculation across the network, where optimality is
understood in the maxmin sense. The algorithm quickly converges to the optimal
rates and is shown to be well-behaved in transience.
| [
{
"version": "v1",
"created": "Thu, 24 Sep 1998 04:33:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Charny",
"A.",
""
],
[
"Clark",
"D.",
""
],
[
"Jain",
"R.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9809083 | Chunlei Liu | K. Siu and R. Jain | A Brief Overview of ATM: Protocol Layers, LAN Emulation, and Traffic
Management | 23 pages | Computer Communications Review (ACM SIGCOMM), vol 25, no 2, April
1995, pp6-28 | null | null | cs.NI | null | Asynchronous Transfer Mode (ATM) has emerged as the most promising technology
in supporting future broadband multimedia communication services. To accelerate
the deployment of ATM technology, the ATM Forum, which is a consortium of
service providers and equipment vendors in the communication industries has
been created to develop implementation and specification agreements. In this
article, we present a brief overview on ATM protocol layers and current
progress on LAN Emulation and Traffic Management in the ATM Forum.
| [
{
"version": "v1",
"created": "Thu, 24 Sep 1998 04:36:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Siu",
"K.",
""
],
[
"Jain",
"R.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9809084 | Chunlei Liu | R. Jain | ATM Networks: Issues and Challenges Ahead | InterOp+Networld Engineering Conference, March 1995, Las Vegas, NV | null | null | null | cs.NI | null | The paper begins with a discussion of current trends in networking and a
historical reviews of past networking technologies some of which failed. This
leads us to the discussion about what it takes for a new technology to succeed
and what challenges we face in making the current dream of a seamless
world-wide high-speed ATM network a reality.
Issues in using ATM cells for very high speed applications are presented.
Ensuring that the users benefit from ATM networks involves several other
related disciplines. These are reviewed.
| [
{
"version": "v1",
"created": "Thu, 24 Sep 1998 04:39:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Jain",
"R.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9809085 | Chunlei Liu | R. Jain | Congestion Control and Traffic Management in ATM Networks: Recent
Advances and A Survey | Invited submission to Computer Networks and ISDN Systems | Computer Networks and ISDN Systems, vol 28, no 13, February 1995,
pp1723-1738 | null | null | cs.NI | null | Congestion control mechanisms for ATM networks as selected by the ATM Forum
traffic management group are described. Reasons behind these selections are
explained. In particular, selection criteria for selection between rate-based
and credit-based approach and the key points of the debate between the two
approaches are presented. The approach that was finally selected and several
other schemes that were considered are described.
| [
{
"version": "v1",
"created": "Thu, 24 Sep 1998 04:41:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Jain",
"R.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9809086 | Chunlei Liu | R. Jain | FDDI: Current Issues and Future Trends | null | IEEE Communications Magazine, September 1993, pp. 98-105 | null | null | cs.NI | null | Key issues in upcoming FDDI standards including low-cost fiber, twisted-pair,
SONET mapping, and FDDI follow-on LAN are discussed after a brief introduction
to FDDI and FDDI-II
| [
{
"version": "v1",
"created": "Thu, 24 Sep 1998 04:44:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Jain",
"R.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9809087 | Chunlei Liu | R. Jain | A Comparison of Hashing Schemes for Address Lookup in Computer Networks | null | IEEE Transactions on Communications, Vol. 40, No. 3, October 1992,
pp. 1570-1573 | 10.1109/26.168785 | null | cs.NI | null | Using a trace of address references, we compared the efficiency of several
different hashing functions, such as cyclic redundancy checking (CRC)
polynomials, Fletcher checksum, folding of address octets using the
exclusive-or operation and bit extraction from the address. Guidelines are
provided for determining the size of the hashmark required to achieve a
specified level of performance.
| [
{
"version": "v1",
"created": "Thu, 24 Sep 1998 04:46:53 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Jain",
"R.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9809088 | Chunlei Liu | R. Jain | Myths about Congestion Management in High Speed Networks | null | Internetworking: Research and Experience, Volume 3, 1992, pp.
101-113 | null | null | cs.NI | null | Weaknesses in several recently proposed ideas about congestion control and
avoidance in high-speed netwroks are identified. Both sides of the debate
concerning prior reservation of resources versus walk-in service, open-loop
control versus feedback control, rate control versus window control, and
router-based control versus source-based control are presented. The
circumstances under which backpressure is useful or not are discussed, and it
is argued that a single congestion scheme is not sufficient, but that a
combination of several schemes is required for complete congestion management
in a network.
| [
{
"version": "v1",
"created": "Thu, 24 Sep 1998 04:48:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Jain",
"R.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9809089 | Chunlei Liu | R. Jain | Performance Analysis of FDDI Token Ring Networks: Effect of Parameters
and Guidelines for Setting TTRT | null | IEEE Lightwave Telecommunication Systems, vol 20, no 2, May 1991,
pp. 16-22 | 10.1109/80.93284 | null | cs.NI | null | The performance of Fiber-Distributed Data Interface (FDDI) depends upon
several workload parameters; for example; the arrival pattern, frame size, and
configuration parameters, such as the number of stations on the ring, extent of
the ring, and number of stations that are waiting to transmit. In addition, the
performance is affected by a parameter called the Target Token Rotation Time
(TTRT), which can be controlled by the network manager. We considered the
effect of TTRT on various performance metrics for different ring configurations
and concluded that a TTRT value of 8 ms provides a good performance over a wide
range of configurations and workloads.
| [
{
"version": "v1",
"created": "Thu, 24 Sep 1998 04:51:20 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Jain",
"R.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9809090 | Chunlei Liu | R. Jain | Error Characteristics of Fiber Distributed Data Interface (FDDI) | null | IEEE Transactions on Communications, Vol. 38, No. 8, August 1990,
pp. 1224-1252 | 10.1109/26.58757 | null | cs.NI | null | Fiber Distributed Data Interface (FDDI) is a 100 megabits per second fiber
optic local area network (LAN) standard being developed by the American
National Standard Institute (ANSI).
We analyze the impact of various design decisions on the error detection
capability of the protocol. In particular, we quantify frame error rate, token
loss rate, and undetected error rate. Several characteristics of the 32-bit
frame check sequence (FCS) polynomial, which is also used in IEEE 802 LAN
protocols, are discussed.
| [
{
"version": "v1",
"created": "Thu, 24 Sep 1998 04:54:27 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Jain",
"R.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9809091 | Chunlei Liu | R. Jain | Congestion Control in Computer Networks: Trends and Issues | null | IEEE Network, May 1990, pp. 24-30 | 10.1109/65.56532 | null | cs.NI | null | Popular myths that cheaper memory, high-speed links and high-speed processors
will solve the problem of congestion in computer networks are shown to be
false. A simple definition for congestion based on supply and demand of
resources is proposed and is then used to classify various congestion schemes.
The issues that make the congestion problem a difficult one are discussed, and
then the architectural decisions that affect the design of a congestion scheme
are presented. It is argued that long-, medium- and short-term congestion
problems require different solutions. Some of the recent schemes are brifly
surveyed, and areas for further research are discussed.
| [
{
"version": "v1",
"created": "Thu, 24 Sep 1998 04:56:33 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Jain",
"R.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9809092 | Chunlei Liu | R. Jain | Characteristics of Destination Address Locality in Computer Networks: A
Comparison of Caching Schemes | null | Journal of Computer Networks and ISDN, Vol. 18, 1989/90, pp.
243-254 | null | null | cs.NI | null | The size of computer networks, along with their bandwidths, is growing
exponentially. To support these large, high-speed networks, it is neccessary to
be able to forward packets in a few microseconds. One part of the forwarding
operation consists of searching through a large address databse. This problem
is encountered in the design of bridges, routers, gateways and name servers.
Caching can reduce the lookup time if there is a locality in the address
reference pattern. Using a destination reference trace measured on an extended
local are a network, we attempt to see if the destination refernces do have a
significant locality.
We compared the performance of MIN, LRU, FIFO, and random cache replacement
algorithms. We found that the interactive (terminal) traffic in our sample had
quite different locality behavior than that of the noninteractive traffic. The
interactive traffic did not follow the LRU stack model while the
noninteractivetraffic did. Examples are shown of the environments in which
caching can help as well as those in which caching can hurt, unless the cache
size is large.
| [
{
"version": "v1",
"created": "Thu, 24 Sep 1998 04:58:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Jain",
"R.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9809093 | Chunlei Liu | R. Jain | A Delay Based Approach for Congestion Avoidance in Interconnected
Heterogeneous Computer Networks | null | Computer Communications Review, ACM SIGCOMM, October 1989, pp.
56-71 | null | null | cs.NI | null | In heterogeneous networks, achieving congestion avoidance is difficult
because the congestion feedback from one subnetwork may have no meaning to
source on other other subnetworks. We propose using changes in round-trip delay
as an implicit feedback. Using a black-box model of the network, we derive an
expression for the optimal window as a function of the gradient of the
delay-window curve.
The problems of selfish optimum and social optimum are also addressed. It is
shown that without a careful design, it is possible to get into a race
condition during heavy congestion, where each user wants more resources than
others, thereby leading to a diverging congestion
It is shown that congestion avoidance using round trip delay is a promising
approach. The aproach has the advantage that there is absolutely no overhead
for the network itself. It is exemplified by a simple scheme. The performance
of the scheme is analyzed using a simulation model. The scheme is shown to be
efficient, fair, convergent and adaptive to changes in network configuration.
The scheme as described works only for networks that can ne modelled with
queueing servers with constant service times. Further research is required to
extend it for implementation in practical networks. Several directions for
future research have beensuggested.
| [
{
"version": "v1",
"created": "Thu, 24 Sep 1998 05:00:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Jain",
"R.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9809094 | Chunlei Liu | R. Jain, K. Ramakrishnan, D. Chiu | Congestion Avoidance in Computer Networks with a Connectionless Network
Layer | DEC-TR-506, reprinted in C. Partridge, Ed., "Innovations in
Internetworking," published by Artech House, October 1988 | null | null | null | cs.NI | null | Widespread use of computer networks and the use of varied technology for the
interconnection of computers has made congestion a significant problem.
In this report, we summarize our research on congestion avoidance. We compare
the concept of congestion avoidance with that of congestion control.
Briefly, congestion control is a recovery mechanism, while congestion
avoidance is a prevention mechanism. A congestion control scheme helps the
network to recover from the congestion state while a congestion avoidance
scheme allows a network to operate in the region of low delay and high
throughput with minimal queuing, thereby preventing it from entering the
congested state in which packets are lost due to buffer shortage.
A number of possible alternatives for congestion avoidance were identified.
From these alternatives we selected one called the binary feedback scheme in
which the network uses a single bit in the network layer header to feed back
the congestion information to its users, which then increase or decrease their
load to make optimal use of the resources. The concept of global optimality in
a distributed system is defined in terms of efficiency and fairness such that
they can be independently quantified and apply to any number of resources and
users.
The proposed scheme has been simulated and shown to be globally efficient,
fair, responsive, convergent, robust, distributed, and
configuration-independent.
| [
{
"version": "v1",
"created": "Thu, 24 Sep 1998 05:05:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Jain",
"R.",
""
],
[
"Ramakrishnan",
"K.",
""
],
[
"Chiu",
"D.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9809095 | Chunlei Liu | R. Jain, K. Ramakrishnan | Congestion Avoidance in Computer Networks with a Connectionless Network
Layer, Part I: Concepts, Goals and Methodology | roc. Computer Networking Symposium, Washington, D.C., April 11-13,
1988, pp. 134-143 | null | null | null | cs.NI | null | Congestion is said to occur in the network when the resource demands exceed
the capacity and packets are lost due to too much queuing in the network.
During congestion, the network throughput may drop to zero and the path delay
may become very high. A congestion control scheme helps the network to recover
from the congestion state. A congestion avoidance scheme allows a network to
operate in the region of low delay and high throughput. Such schemes prevent a
network from entering the congested state. Congestion avoidance is a prevention
mechanism while congestion control is a recovery mechanism. We compare the
concept of congestion avoidance with that of flow control and congestion
control. A number of possible alternative for congestion avoidance have been
identified. From these a few were selected for study. The criteria for
selection and goals for these schemes have been described. In particular, we
wanted the scheme to be globally efficient, fair, dynamic, convergent, robust,
distributed, configuration independent, etc. These goals and the test cases
used to verify whether a particular scheme has met the goals have been
described. We model the network and the user policies for congestion avoidance
as a feedback control system. The key components of a generic congestion
avoidance scheme are: congestion detection, congestion feedback, feedback
selector, signal filter, decision function, and increase/decrease algorithms.
These components have been explained.
| [
{
"version": "v1",
"created": "Thu, 24 Sep 1998 05:10:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Jain",
"R.",
""
],
[
"Ramakrishnan",
"K.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9809096 | Chunlei Liu | R. Jain | A Timeout Based Congestion Control Scheme for Window Flow- Controlled
Networks | also reprinted in C. Partridge, Ed., "Innovations in
Internetworking," Artech House, Norwood, MA 1988 | IEEE Journal of Selected Areas in Communications, Vol. SAC-4, No.
7, October 1986, pp. 1162-1167 | 10.1109/JSAC.1986.1146431 | null | cs.NI | null | During overload, most networks drop packets due to buffer unavailability. The
resulting timeouts at the source provide an implicit mechanism to convey
congestion signals from the network to the source. On a timeout, a source
should not only retransmit the lost packet, but it should also reduce its load
on the network. Based on this realization, we have developed a simple
congestion control scheme using the acknowledgment timeouts as indications of
packet loss and congestion. This scheme does not require any new message
formats, therefore, it can be used in any network with window flow control,
e.g., ARPAnet or ISO.
| [
{
"version": "v1",
"created": "Thu, 24 Sep 1998 05:12:55 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Jain",
"R.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9809097 | Chunlei Liu | R. Jain | Divergence of Timeout Algorithms for Packet Retransmissions | Proceedings IEEE Phoenix Conference on Computers and Communication,
March 1986, pp. 174-179 | null | null | null | cs.NI | null | The problem of adaptively setting the timeout interval for retransmitting a
packet has been discussed. A layered view of the algorithms has been presented.
It is shown that a timeout algorithm consists of essentially five layers or
procedures which can be independently chosen and modified. A number of timeout
algorithms proposed in the literature have been decomposed into these five
layers.
One of the key layers not discussed in the literature is that of determining
the sample round trip delay for packets that have been transmitted more than
once. It is shown that this layer has a significant impact on the network
performance.
Under repeated packet loss, most timeout algorithms either diverge or
converge to a wrong value. A number of alternative schemes have been presented.
It is argued that divergence is preferable to false convergence. It is a
feature that is helpful in reducing network traffic congestion.
| [
{
"version": "v1",
"created": "Thu, 24 Sep 1998 05:19:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Jain",
"R.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9809098 | Chunlei Liu | R. Jain | On Caching out-of-order packets in window flow controlled networks | DEC Technical Report DEC-TR-342, January 1985 | null | null | DEC-TR-342 | cs.NI | null | In window flow controlled networks, if a packet is lost the destination has
to decide whether to save (cache) subsequent out-of-order packets. Also, the
source has to decide whether to send just one packet or to send all packets
following it. This leads to four different types of caching schemes.
Simulations show, against our immediate intuition, that regardless of whether
the destination is caching or not, the source should retransmit only one
packet. This paper describes the alternatives to, and provides justification
for, schemes used in Digital Network Architecture and ARPAnet TCP.
| [
{
"version": "v1",
"created": "Thu, 24 Sep 1998 05:23:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Jain",
"R.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9809099 | Chunlei Liu | R. Jain, D. Chiu, and W. Hawe | A Quantitative Measure Of Fairness And Discrimination For Resource
Allocation In Shared Computer Systems | DEC Research Report TR-301, September 1984 | null | null | TR-301 | cs.NI | null | Fairness is an important performance criterion in all resource allocation
schemes, including those in distributed computer systems. However, it is often
specified only qualitatively. The quantitative measures proposed in the
literature are either too specific to a particular application, or suffer from
some undesirable characteristics. In this paper, we have introduced a
quantitative measure called Indiex of FRairness. The index is applicable to any
resource sharing or allocation problem. It is independent of the amount of the
resource. The fairness index always lies between 0 and 1. This boundedness aids
intuitive understanding of the fairness index. For example, a distribution
algorithm with a fairness of 0.10 means that it is unfair to 90% of the users.
Also, the discrimination index can be defined as 1 - fairness index.
| [
{
"version": "v1",
"created": "Thu, 24 Sep 1998 05:27:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Jain",
"R.",
""
],
[
"Chiu",
"D.",
""
],
[
"Hawe",
"W.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9809100 | Chunlei Liu | R. Jain | Data Flies Standby with ABR Service | null | Network World, June 12, 1995, page 43 | null | null | cs.NI | null | Explanation of ABR service in plain language.
| [
{
"version": "v1",
"created": "Thu, 24 Sep 1998 05:31:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Jain",
"R.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9809101 | Jaihyung Cho | Jaihyung Cho, James Breen | Flood Routing Technique for Data Networks | null | ICICS`97;First International Conference on Information,
Communications and Signal Processing, IEEE Singapore, vo. 3, Sep 1997. pp.
1418-1422 | null | null | cs.NI | null | In this paper, a new routing algorithm based on a flooding method is
introduced. Flooding techniques have been used previously, e.g. for
broadcasting the routing table in the ARPAnet [1] and other special purpose
networks [3][4][5]. However, sending data using flooding can often saturate the
network [2] and it is usually regarded as an inefficient broadcast mechanism.
Our approach is to flood a very short packet to explore an optimal route
without relying on a pre-established routing table, and an efficient flood
control algorithm to reduce the signalling traffic overhead. This is an
inherently robust mechanism in the face of a network configuration change,
achieves automatic load sharing across alternative routes and has potential to
solve many contemporary routing problems. An earlier version of this mechanism
was originally developed for virtual circuit establishment in the experimental
Caroline ATM LAN [6][7] at Monash University.
| [
{
"version": "v1",
"created": "Thu, 24 Sep 1998 07:53:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cho",
"Jaihyung",
""
],
[
"Breen",
"James",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9809102 | Jaihyung Cho | Jaihyung Cho, James Breen | Analysis of Performance of Dynamic Multicast Routing Algorithms | null | ICCCN`98;IEEE 7th International Conference onComputer
Communications and Networks, lafayett Louisiana, U.S.A, Oct. 1998 | 10.1016/S0140-3664(99)00009-2 | null | cs.NI | null | In this paper, three new dynamic multicast routing algorithms based on the
greedy tree technique are proposed; Source Optimised Tree, Topology Based Tree
and Minimum Diameter Tree. A simulation analysis is presented showing various
performance aspects of the algorithms, in which a comparison is made with the
greedy and core based tree techniques. The effects of the tree source location
on dynamic membership change are also examined. The simulations demonstrate
that the Source Optimised Tree algorithm achieves a significant improvement in
terms of delay and link usage when compared to the Core Based Tree, and greedy
algorithm.
| [
{
"version": "v1",
"created": "Thu, 24 Sep 1998 08:04:52 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Cho",
"Jaihyung",
""
],
[
"Breen",
"James",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9809103 | Madhav Marathe | Madhav V. Marathe, R. Ravi, Ravi Sundaram, S. S. Ravi, Daniel J.
Rosenkrantz, Harry B. Hunt III | Bicriteria Network Design Problems | 24 pages 1 figure | J. Algorithms, 28, 142-171, (1998) | null | null | cs.CC cs.DS | null | We study a general class of bicriteria network design problems. A generic
problem in this class is as follows: Given an undirected graph and two
minimization objectives (under different cost functions), with a budget
specified on the first, find a <subgraph \from a given subgraph-class that
minimizes the second objective subject to the budget on the first. We consider
three different criteria - the total edge cost, the diameter and the maximum
degree of the network. Here, we present the first polynomial-time approximation
algorithms for a large class of bicriteria network design problems for the
above mentioned criteria. The following general types of results are presented.
First, we develop a framework for bicriteria problems and their
approximations. Second, when the two criteria are the same %(note that the cost
functions continue to be different) we present a ``black box'' parametric
search technique. This black box takes in as input an (approximation) algorithm
for the unicriterion situation and generates an approximation algorithm for the
bicriteria case with only a constant factor loss in the performance guarantee.
Third, when the two criteria are the diameter and the total edge costs we use a
cluster-based approach to devise a approximation algorithms --- the solutions
output violate both the criteria by a logarithmic factor. Finally, for the
class of treewidth-bounded graphs, we provide pseudopolynomial-time algorithms
for a number of bicriteria problems using dynamic programming. We show how
these pseudopolynomial-time algorithms can be converted to fully
polynomial-time approximation schemes using a scaling technique.
| [
{
"version": "v1",
"created": "Thu, 24 Sep 1998 17:48:18 GMT"
}
] | 2019-08-17T00:00:00 | [
[
"Marathe",
"Madhav V.",
""
],
[
"Ravi",
"R.",
""
],
[
"Sundaram",
"Ravi",
""
],
[
"Ravi",
"S. S.",
""
],
[
"Rosenkrantz",
"Daniel J.",
""
],
[
"Hunt",
"Harry B.",
"III"
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/9809104 | Brett J. Vickers | Brett J. Vickers, Celio Albuquerque and Tatsuya Suda | Adaptive Multicast of Multi-Layered Video: Rate-Based and Credit-Based
Approaches | 11 pages | Proceedings of IEEE Infocom '98, pp. 1073-1083, April 1998 | 10.1109/INFCOM.1998.662917 | null | cs.NI cs.MM | null | Network architectures that can efficiently transport high quality, multicast
video are rapidly becoming a basic requirement of emerging multimedia
applications. The main problem complicating multicast video transport is
variation in network bandwidth constraints. An attractive solution to this
problem is to use an adaptive, multi-layered video encoding mechanism. In this
paper, we consider two such mechanisms for the support of video multicast; one
is a rate-based mechanism that relies on explicit rate congestion feedback from
the network, and the other is a credit-based mechanism that relies on
hop-by-hop congestion feedback. The responsiveness, bandwidth utilization,
scalability and fairness of the two mechanisms are evaluated through
simulations. Results suggest that while the two mechanisms exhibit performance
trade-offs, both are capable of providing a high quality video service in the
presence of varying bandwidth constraints.
| [
{
"version": "v1",
"created": "Thu, 24 Sep 1998 18:12:21 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Vickers",
"Brett J.",
""
],
[
"Albuquerque",
"Celio",
""
],
[
"Suda",
"Tatsuya",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
] |
cs/9809105 | Thomas Lippert | Thomas Lippert, Nikolay Petkov, Paolo Palazzari, and Klaus Schilling | Hyper-Systolic Matrix Multiplication | 29 pages, 13 figures | null | null | HLRZ1998-59 | cs.MS | null | A novel parallel algorithm for matrix multiplication is presented. The
hyper-systolic algorithm makes use of a one-dimensional processor abstraction.
The procedure can be implemented on all types of parallel systems. It can
handle matrix-vector multiplications as well as transposed matrix products.
| [
{
"version": "v1",
"created": "Thu, 24 Sep 1998 20:56:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lippert",
"Thomas",
""
],
[
"Petkov",
"Nikolay",
""
],
[
"Palazzari",
"Paolo",
""
],
[
"Schilling",
"Klaus",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
}
] |
cs/9809106 | Markus Walther | Petra Barg and Markus Walther (University of Duesseldorf) | Processing Unknown Words in HPSG | 5 pp., 1 PostScript figure | Proceedings COLING-ACL'98, vol.I, 91-95 | null | null | cs.CL | null | The lexical acquisition system presented in this paper incrementally updates
linguistic properties of unknown words inferred from their surrounding context
by parsing sentences with an HPSG grammar for German. We employ a gradual,
information-based concept of ``unknownness'' providing a uniform treatment for
the range of completely known to maximally unknown lexical entries. ``Unknown''
information is viewed as revisable information, which is either generalizable
or specializable. Updating takes place after parsing, which only requires a
modified lexical lookup. Revisable pieces of information are identified by
grammar-specified declarations which provide access paths into the parse
feature structure. The updating mechanism revises the corresponding places in
the lexical feature structures iff the context actually provides new
information. For revising generalizable information, type union is required. A
worked-out example demonstrates the inferential capacity of our implemented
system.
| [
{
"version": "v1",
"created": "Fri, 25 Sep 1998 11:02:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Barg",
"Petra",
"",
"University of Duesseldorf"
],
[
"Walther",
"Markus",
"",
"University of Duesseldorf"
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/9809107 | Markus Walther | Markus Walther (University of Marburg) | Computing Declarative Prosodic Morphology | 10 pages | Proceedings of SIGPHON'98, pp. 11-20 (COLING-ACL'98
Post-Conference Workshop on The Computation of Phonological Constraints) | null | null | cs.CL | null | This paper describes a computational, declarative approach to prosodic
morphology that uses inviolable constraints to denote small finite candidate
sets which are filtered by a restrictive incremental optimization mechanism.
The new approach is illustrated with an implemented fragment of Modern Hebrew
verbs couched in MicroCUF, an expressive constraint logic formalism. For
generation and parsing of word forms, I propose a novel off-line technique to
eliminate run-time optimization. It produces a finite-state oracle that
efficiently restricts the constraint interpreter's search space. As a
byproduct, unknown words can be analyzed without special mechanisms. Unlike
pure finite-state transducer approaches, this hybrid setup allows for more
expressivity in constraints to specify e.g. token identity for reduplication or
arithmetic constraints for phonetics.
| [
{
"version": "v1",
"created": "Fri, 25 Sep 1998 14:32:38 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Walther",
"Markus",
"",
"University of Marburg"
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/9809108 | Jose M. Vidal | Jose M. Vidal and Edmund H. Durfee | Learning Nested Agent Models in an Information Economy | null | Journal of Experimental and Theoretical Artificial Intelligence.
10(1998)291-308 | null | null | cs.MA cs.AI | null | We present our approach to the problem of how an agent, within an economic
Multi-Agent System, can determine when it should behave strategically (i.e.
learn and use models of other agents), and when it should act as a simple
price-taker. We provide a framework for the incremental implementation of
modeling capabilities in agents, and a description of the forms of knowledge
required. The agents were implemented and different populations simulated in
order to learn more about their behavior and the merits of using and learning
agent models. Our results show, among other lessons, how savvy buyers can avoid
being ``cheated'' by sellers, how price volatility can be used to
quantitatively predict the benefits of deeper models, and how specific types of
agent populations influence system behavior.
| [
{
"version": "v1",
"created": "Sat, 26 Sep 1998 17:43:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vidal",
"Jose M.",
""
],
[
"Durfee",
"Edmund H.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/9809109 | David Eppstein | David Eppstein | Linear Complexity Hexahedral Mesh Generation | 12 pages, 17 figures. A preliminary version of this paper appeared at
the 12th ACM Symp. on Computational Geometry. This is the final version, and
will appear in a special issue of Computational Geometry: Theory and
Applications for papers from SCG '96 | Comp. Geom. Theory & Appl. 12 (1999) 3-16 | 10.1016/S0925-7721(98)00032-7 | null | cs.CG | null | We show that any polyhedron forming a topological ball with an even number of
quadrilateral sides can be partitioned into O(n) topological cubes, meeting
face to face. The result generalizes to non-simply-connected polyhedra
satisfying an additional bipartiteness condition. The same techniques can also
be used to reduce the geometric version of the hexahedral mesh generation
problem to a finite case analysis amenable to machine solution.
| [
{
"version": "v1",
"created": "Sat, 26 Sep 1998 23:44:27 GMT"
}
] | 2010-01-21T00:00:00 | [
[
"Eppstein",
"David",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
cs/9809110 | Fernando C. N. Pereira | Ido Dagan, Lillian Lee and Fernando C. N. Pereira | Similarity-Based Models of Word Cooccurrence Probabilities | 26 pages, 5 figures | Machine Learning, 34, 43-69 (1999) | null | null | cs.CL cs.AI cs.LG | null | In many applications of natural language processing (NLP) it is necessary to
determine the likelihood of a given word combination. For example, a speech
recognizer may need to determine which of the two word combinations ``eat a
peach'' and ``eat a beach'' is more likely. Statistical NLP methods determine
the likelihood of a word combination from its frequency in a training corpus.
However, the nature of language is such that many word combinations are
infrequent and do not occur in any given corpus. In this work we propose a
method for estimating the probability of such previously unseen word
combinations using available information on ``most similar'' words.
We describe probabilistic word association models based on distributional
word similarity, and apply them to two tasks, language modeling and pseudo-word
disambiguation. In the language modeling task, a similarity-based model is used
to improve probability estimates for unseen bigrams in a back-off language
model. The similarity-based method yields a 20% perplexity improvement in the
prediction of unseen bigrams and statistically significant reductions in
speech-recognition error.
We also compare four similarity-based estimation methods against back-off and
maximum-likelihood estimation methods on a pseudo-word sense disambiguation
task in which we controlled for both unigram and bigram frequency to avoid
giving too much weight to easy-to-disambiguate high-frequency configurations.
The similarity-based methods perform up to 40% better on this particular task.
| [
{
"version": "v1",
"created": "Sun, 27 Sep 1998 18:42:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dagan",
"Ido",
""
],
[
"Lee",
"Lillian",
""
],
[
"Pereira",
"Fernando C. N.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/9809111 | Lex Weaver | Lex Weaver and Terry Bossomaier | Evolution of Neural Networks to Play the Game of Dots-and-Boxes | 8 pages, 5 figures, LaTeX 2.09 (works with LaTeX2e) | Alife V: Poster Presentations, May 16-18 1996, pages 43-50 | null | null | cs.NE cs.LG | null | Dots-and-Boxes is a child's game which remains analytically unsolved. We
implement and evolve artificial neural networks to play this game, evaluating
them against simple heuristic players. Our networks do not evaluate or predict
the final outcome of the game, but rather recommend moves at each stage.
Superior generalisation of play by co-evolved populations is found, and a
comparison made with networks trained by back-propagation using simple
heuristics as an oracle.
| [
{
"version": "v1",
"created": "Mon, 28 Sep 1998 03:48:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Weaver",
"Lex",
""
],
[
"Bossomaier",
"Terry",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/9809112 | Lluis Padro | L. Padro & L. Marquez (Universitat Politecnica de Catalunya) | On the Evaluation and Comparison of Taggers: The Effect of Noise in
Testing Corpora | Appears in proceedings of joint COLING-ACL 1998, Montreal, Canada | null | null | null | cs.CL | null | This paper addresses the issue of {\sc pos} tagger evaluation. Such
evaluation is usually performed by comparing the tagger output with a reference
test corpus, which is assumed to be error-free. Currently used corpora contain
noise which causes the obtained performance to be a distortion of the real
value. We analyze to what extent this distortion may invalidate the comparison
between taggers or the measure of the improvement given by a new system. The
main conclusion is that a more rigorous testing experimentation
setting/designing is needed to reliably evaluate and compare tagger accuracies.
| [
{
"version": "v1",
"created": "Mon, 28 Sep 1998 07:49:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Padro",
"L.",
"",
"Universitat Politecnica de Catalunya"
],
[
"Marquez",
"L.",
"",
"Universitat Politecnica de Catalunya"
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/9809113 | Lluis Padro | L. Marquez, L. Padro & H. Rodriguez (Universitat Politecnica de
Catalunya) | Improving Tagging Performance by Using Voting Taggers | Appears in proceedings of NLP+IA/TAL+AI'98. Moncton, New Brunswick,
Canada, 1998 | null | null | null | cs.CL | null | We present a bootstrapping method to develop an annotated corpus, which is
specially useful for languages with few available resources. The method is
being applied to develop a corpus of Spanish of over 5Mw. The method consists
on taking advantage of the collaboration of two different POS taggers. The
cases in which both taggers agree present a higher accuracy and are used to
retrain the taggers.
| [
{
"version": "v1",
"created": "Mon, 28 Sep 1998 07:50:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Marquez",
"L.",
"",
"Universitat Politecnica de\n Catalunya"
],
[
"Padro",
"L.",
"",
"Universitat Politecnica de\n Catalunya"
],
[
"Rodriguez",
"H.",
"",
"Universitat Politecnica de\n Catalunya"
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/9809114 | Heribert Vollmer | Clemens Lautemann and Pierre McKenzie and Thomas Schwentick and
Heribert Vollmer | The descriptive complexity approach to LOGCFL | 10 pages, 1 figure | null | null | null | cs.CC | null | Building upon the known generalized-quantifier-based first-order
characterization of LOGCFL, we lay the groundwork for a deeper investigation.
Specifically, we examine subclasses of LOGCFL arising from varying the arity
and nesting of groupoidal quantifiers. Our work extends the elaborate theory
relating monoidal quantifiers to NC1 and its subclasses. In the absence of the
BIT predicate, we resolve the main issues: we show in particular that no single
outermost unary groupoidal quantifier with FO can capture all the context-free
languages, and we obtain the surprising result that a variant of Greibach's
``hardest context-free language'' is LOGCFL-complete under quantifier-free
BIT-free projections. We then prove that FO with unary groupoidal quantifiers
is strictly more expressive with the BIT predicate than without. Considering a
particular groupoidal quantifier, we prove that first-order logic with majority
of pairs is strictly more expressive than first-order with majority of
individuals. As a technical tool of independent interest, we define the notion
of an aperiodic nondeterministic finite automaton and prove that FO
translations are precisely the mappings computed by single-valued aperiodic
nondeterministic finite transducers.
| [
{
"version": "v1",
"created": "Mon, 28 Sep 1998 07:57:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lautemann",
"Clemens",
""
],
[
"McKenzie",
"Pierre",
""
],
[
"Schwentick",
"Thomas",
""
],
[
"Vollmer",
"Heribert",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/9809115 | Heribert Vollmer | Heribert Vollmer | A Generalized Quantifier Concept in Computational Complexity Theory | null | null | null | null | cs.CC | null | A notion of generalized quantifier in computational complexity theory is
explored and used to give a unified treatment of leaf language definability,
oracle separations, type 2 operators, and circuits with monoidal gates.
Relations to Lindstroem quantifiers are pointed out.
| [
{
"version": "v1",
"created": "Mon, 28 Sep 1998 08:20:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vollmer",
"Heribert",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/9809116 | Heribert Vollmer | Steffen Reith and Heribert Vollmer | The Complexity of Computing Optimal Assignments of Generalized
Propositional Formulae | 17 pages, 1 figure | null | null | null | cs.CC | null | We consider the problems of finding the lexicographically minimal (or
maximal) satisfying assignment of propositional formulae for different
restricted formula classes. It turns out that for each class from our
framework, the above problem is either polynomial time solvable or complete for
OptP. We also consider the problem of deciding if in the optimal assignment the
largest variable gets value 1. We show that this problem is either in P or P^NP
complete.
| [
{
"version": "v1",
"created": "Mon, 28 Sep 1998 08:38:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Reith",
"Steffen",
""
],
[
"Vollmer",
"Heribert",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/9809117 | Osamu Watanabe | Satoshi Horie and Osamu Watanabe | Hard instance generation for SAT | null | In the Proc. of ISAAC'97, Lecture Notes in CS, Vol.1350, 22-31,
1997 | null | TR98-0007 | cs.CC | null | We propose an algorithm of generating hard instances for the Satisfying
Assignment Search Problem (in short, SAT). The algorithm transforms instances
of the integer factorization problem into SAT instances efficiently by using
the Chinese Remainder Theorem. For example, it is possible to construct SAT
instances with about 5,600 variables that is as hard as factorizing 100 bit
integers.
| [
{
"version": "v1",
"created": "Mon, 28 Sep 1998 10:50:03 GMT"
},
{
"version": "v2",
"created": "Tue, 29 Sep 1998 00:58:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Horie",
"Satoshi",
""
],
[
"Watanabe",
"Osamu",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/9809118 | Heinz Schmitz | Heinz Schmitz and Klaus W. Wagner | The Boolean Hierarchy over Level 1/2 of the Straubing-Therien Hierarchy | null | null | null | 201 | cs.CC cs.FL | null | For some fixed alphabet A, a language L of A* is in the class L(1/2) of the
Straubing-Therien hierarchy if and only if it can be expressed as a finite
union of languages A*aA*bA*...A*cA*, where a,b,...,c are letters. The class
L(1) is defined as the boolean closure of L(1/2). It is known that the classes
L(1/2) and L(1) are decidable. We give a membership criterion for the single
classes of the boolean hierarchy over L(1/2). From this criterion we can
conclude that this boolean hierarchy is proper and that its classes are
decidable.In finite model theory the latter implies the decidability of the
classes of the boolean hierarchy over the class Sigma(1) of the FO(<)-logic.
Moreover we prove a ``forbidden-pattern'' characterization of L(1) of the type:
L is in L(1) if and only if a certain pattern does not appear in the transition
graph of a deterministic finite automaton accepting L. We discuss complexity
theoretical consequences of our results.
| [
{
"version": "v1",
"created": "Mon, 28 Sep 1998 12:35:34 GMT"
}
] | 2016-01-18T00:00:00 | [
[
"Schmitz",
"Heinz",
""
],
[
"Wagner",
"Klaus W.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
] |
cs/9809119 | Denis V. Juriev | Denis V. Juriev | Droems: experimental mathematics, informatics and infinite dimensional
geometry | bilingual version [English translation+Russian original]: 43 pages,
AMSTEX | null | null | RCMPI/96-05+ | cs.HC cs.GR math.RT | null | The article is devoted to a problem of elaboration of the real-time
interactive videosystems for accelerated nonverbal cognitive computer and
telecommunications. The proposed approach is based on the using of droems
(dynamically reconstructed objects of experimental mathematics) and
interpretational figures as pointers to them. Four paragraphs of the article
are devoted to (1) an exposition of basic notions of the interpretational
geometry, (2) the operator methods in the theory of interactive dynamical
videosystems, (3) the general concept of organization of the integrated
interactive real-time videocognitive systems, (4) the droems and processes of
their dynamical reconstruction, where the general notions are illustrated by a
concrete example related to the infinite dimensional geometry. The exposition
is presumably heuristic and conceptual (the first and the third paragraphs)
though some particular aspects such as content of the second and the fourth
paragraphs, which allow deeper formalization and detailing in present, are
exposed on the mathematical level of rigor.
| [
{
"version": "v1",
"created": "Tue, 29 Sep 1998 07:06:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Juriev",
"Denis V.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
},
{
"class": "Mathematics",
"code": "math.RT",
"description": "Linear representations of algebras and groups, Lie theory, associative algebras, multilinear algebra",
"span": "(Representation Theory)"
}
] |
cs/9809120 | Marino Miculan | Marino Miculan | A Natural Deduction style proof system for propositional $\mu$-calculus
and its formalization in inductive type theories | 17 pages; longer version of the paper which will appear in Proc.
ICTCS'98 (World Scientific) | null | null | null | cs.LO | null | In this paper, we present a formalization of Kozen's propositional modal
$\mu$-calculus, in the Calculus of Inductive Constructions. We address several
problematic issues, such as the use of higher-order abstract syntax in
inductive sets in presence of recursive constructors, the encoding of modal
(``proof'') rules and of context sensitive grammars. The encoding can be used
in the \Coq system, providing an experimental computer-aided proof environment
for the interactive development of error-free proofs in the $\mu$-calculus. The
techniques we adopted can be readily ported to other languages and proof
systems featuring similar problematic issues.
| [
{
"version": "v1",
"created": "Tue, 29 Sep 1998 11:57:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Miculan",
"Marino",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/9809121 | Neil C. Rowe | Neil C. Rowe | Using Local Optimality Criteria for Efficient Information Retrieval with
Redundant Information Filters | null | ACM Transactions on Information Systems, 14, 2 (April 1996),
138-174 | null | null | cs.IR cs.AI | null | We consider information retrieval when the data, for instance multimedia, is
coputationally expensive to fetch. Our approach uses "information filters" to
considerably narrow the universe of possiblities before retrieval. We are
especially interested in redundant information filters that save time over more
general but more costly filters. Efficient retrieval requires that decision
must be made about the necessity, order, and concurrent processing of proposed
filters (an "execution plan"). We develop simple polynomial-time local criteria
for optimal execution plans, and show that most forms of concurrency are
suboptimal with information filters. Although the general problem of finding an
optimal execution plan is likely exponential in the number of filters, we show
experimentally that our local optimality criteria, used in a polynomial-time
algorithm, nearly always find the global optimum with 15 filters or less, a
sufficient number of filters for most applications. Our methods do not require
special hardware and avoid the high processor idleness that is characteristic
of massive parallelism solutions to this problem. We apply our ideas to an
important application, information retrieval of cpationed data using
natural-language understanding, a problem for which the natural-language
processing can be the bottleneck if not implemented well.
| [
{
"version": "v1",
"created": "Tue, 29 Sep 1998 21:55:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rowe",
"Neil C.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/9809122 | Osamu Watanabe | Carlos Domingo, Ricard Gavalda, and Osamu Watanabe | Practical algorithms for on-line sampling | To appear in the Proc. of Discovery Science '98, Dec. 1998 | null | null | C-123 | cs.LG cs.DS | null | One of the core applications of machine learning to knowledge discovery
consists on building a function (a hypothesis) from a given amount of data (for
instance a decision tree or a neural network) such that we can use it
afterwards to predict new instances of the data. In this paper, we focus on a
particular situation where we assume that the hypothesis we want to use for
prediction is very simple, and thus, the hypotheses class is of feasible size.
We study the problem of how to determine which of the hypotheses in the class
is almost the best one. We present two on-line sampling algorithms for
selecting hypotheses, give theoretical bounds on the number of necessary
examples, and analize them exprimentally. We compare them with the simple batch
sampling approach commonly used and show that in most of the situations our
algorithms use much fewer number of examples.
| [
{
"version": "v1",
"created": "Wed, 30 Sep 1998 03:44:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Domingo",
"Carlos",
""
],
[
"Gavalda",
"Ricard",
""
],
[
"Watanabe",
"Osamu",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/9809123 | Osamu Watanabe | Carlos Domingo, Osamu Watanabe, and Tadashi Yamazaki | A role of constraint in self-organization | To appear in the Proc. RANDOM'98, Oct. 1998 | null | null | C-124 | cs.NE cs.CG | null | In this paper we introduce a neural network model of self-organization. This
model uses a variation of Hebb rule for updating its synaptic weights, and
surely converges to the equilibrium status. The key point of the convergence is
the update rule that constrains the total synaptic weight and this seems to
make the model stable. We investigate the role of the constraint and show that
it is the constraint that makes the model stable. For analyzing this setting,
we propose a simple probabilistic game that models the neural network and the
self-organization process. Then, we investigate the characteristics of this
game, namely, the probability that the game becomes stable and the number of
the steps it takes.
| [
{
"version": "v1",
"created": "Wed, 30 Sep 1998 04:06:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Domingo",
"Carlos",
""
],
[
"Watanabe",
"Osamu",
""
],
[
"Yamazaki",
"Tadashi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
cs/9809124 | James A. Hoagland | James A. Hoagland, Raju Pandey, Karl N. Levitt | Security Policy Specification Using a Graphical Approach | 28 pages, 22 figures, in color (but color is not essential for
viewing); UC Davis CS department technical report (July 22, 1998) | null | null | CSE-98-3 | cs.CR | null | A security policy states the acceptable actions of an information system, as
the actions bear on security. There is a pressing need for organizations to
declare their security policies, even informal statements would be better than
the current practice. But, formal policy statements are preferable to support
(1) reasoning about policies, e.g., for consistency and completeness, (2)
automated enforcement of the policy, e.g., using wrappers around legacy systems
or after the fact with an intrusion detection system, and (3) other formal
manipulation of policies, e.g., the composition of policies. We present LaSCO,
the Language for Security Constraints on Objects, in which a policy consists of
two parts: the domain (assumptions about the system) and the requirement (what
is allowed assuming the domain is satisfied). Thus policies defined in LaSCO
have the appearance of conditional access control statements. LaSCO policies
are specified as expressions in logic and as directed graphs, giving a visual
view of policy. LaSCO has a simple semantics in first order logic (which we
provide), thus permitting policies we write, even for complex policies, to be
very perspicuous. LaSCO has syntax to express many of the situations we have
found to be useful on policies or, more interesting, the composition of
policies. LaSCO has an object-oriented structure, permitting it to be useful to
describe policies on the objects and methods of an application written in an
object-oriented language, in addition to the traditional policies on operating
system objects. A LaSCO specification can be automatically translated into
executable code that checks an invocation of a program with respect to a
policy. The implementation of LaSCO is in Java, and generates wrappers to check
Java programs with respect to a policy.
| [
{
"version": "v1",
"created": "Wed, 30 Sep 1998 17:00:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hoagland",
"James A.",
""
],
[
"Pandey",
"Raju",
""
],
[
"Levitt",
"Karl N.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/9809125 | Michael Manthey | Michael Manthey | Distributed Computation, the Twisted Isomorphism, and Auto-Poiesis | 26 pages, 4 figures. Originally submitted to the neuro-sys archive
which was never publicly announced (was 9809001) | CASYS'97 First International Conference on Computing Anticipatory
Systems, Liege (Belgium), August 11-15, 1997. D. Dubois, Ed (Dept.of
Mathematics, University of Liege) | null | null | cs.DC | null | This paper presents a synchronization-based, multi-process computational
model of anticipatory systems called the Phase Web. It describes a
self-organizing paradigm that explicitly recognizes and exploits the existence
of a boundary between inside and outside, accepts and exploits intentionality,
and uses explicit self-reference to describe eg. auto-poiesis. The model
explicitly connects computation to a discrete Clifford algebraic formalization
that is in turn extended into homology and co-homology, wherein the recursive
nature of objects and boundaries becomes apparent and itself subject to
hierarchical recursion. Topsy, a computer program embodying the Phase Web, is
available at www.cs.auc.dk/topsy.
| [
{
"version": "v1",
"created": "Mon, 14 Sep 1998 14:42:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Manthey",
"Michael",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/9810001 | Lunjin Lu | Lunjin Lu and John G. Cleary | On Dart-Zobel Algorithm for Testing Regular Type Inclusion | 16 pages | null | null | null | cs.LO cs.PL | null | This paper answers open questions about the correctness and the completeness
of Dart-Zobel algorithm for testing the inclusion relation between two regular
types. We show that the algorithm is incorrect for regular types. We also prove
that the algorithm is complete for regular types as well as correct for tuple
distributive regular types. Also presented is a simplified version of
Dart-Zobel algorithm for tuple distributive regular types.
| [
{
"version": "v1",
"created": "Thu, 1 Oct 1998 02:33:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lu",
"Lunjin",
""
],
[
"Cleary",
"John G.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/9810002 | Lex Weaver | Lex Weaver and Chris Johnson | Pre-fetching tree-structured data in distributed memory | 8 pages; added PDF version | Proceedings of the Third Fujitsu Parallel Computing Workshop,
pages P1-J-1 to P1-J-8, Kawasaki, Japan, November 1994. Fujitsu Laboratories
Ltd | null | null | cs.DC cs.DB | null | A distributed heap storage manager has been implemented on the Fujitsu AP1000
multicomputer. The performance of various pre-fetching strategies is
experimentally compared. Subjective programming benefits and objective
performance benefits of up to 10% in pre-fetching are found for certain
applications, but not for all. The performance benefits of pre-fetching depend
on the specific data structure and access patterns. We suggest that control of
pre-fetching strategy be dynamically under the control of the application.
| [
{
"version": "v1",
"created": "Fri, 2 Oct 1998 04:41:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Weaver",
"Lex",
""
],
[
"Johnson",
"Chris",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
cs/9810003 | Andreas Siebert | Andreas Siebert | A Linear Shift Invariant Multiscale Transform | 4 pages, 5 figures | Proceedings 1998 International Conference on Image Processing,
Chicago, 4-7 October 1998 | null | null | cs.CV | null | This paper presents a multiscale decomposition algorithm. Unlike standard
wavelet transforms, the proposed operator is both linear and shift invariant.
The central idea is to obtain shift invariance by averaging the aligned wavelet
transform projections over all circular shifts of the signal. It is shown how
the same transform can be obtained by a linear filter bank.
| [
{
"version": "v1",
"created": "Fri, 2 Oct 1998 03:34:38 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Siebert",
"Andreas",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
cs/9810004 | James P. Cohoon | Bruce R. Childers, James P. Cohoon, Jack W. Davidson, Peter Valle | The Design of EzWindows: A Graphics API for an Introductory Programming
Course | 5 pages, 5 figures, conference submission | null | null | null | cs.CY cs.GR | null | Teaching object-oriented programming in an introductory programming course
poses considerable challenges to the instructor. An often advocated approach to
meeting this challenge is the use of a simple, object-oriented graphics
library. We have developed a simple, portable graphics library for teaching
object-oriented programming using C++. The library, EzWindows, allows beginning
programmers to design and write programs that use the graphical display found
on all modern desktop computers. In addition to providing simple graphical
objects such as windows, geometric shapes, and bitmaps, EzWindows provides
facilities for introducing event-based programming using the mouse and timers.
EzWindows has proven to be extremely popular; it is currently in use at over
200 universities, colleges, and high schools. This paper describes the
rationale for EzWindows and its high-level design.
| [
{
"version": "v1",
"created": "Sat, 3 Oct 1998 12:04:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Childers",
"Bruce R.",
""
],
[
"Cohoon",
"James P.",
""
],
[
"Davidson",
"Jack W.",
""
],
[
"Valle",
"Peter",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
}
] |
cs/9810005 | Kate Larson | Tuomas Sandholm, Kate Larson, Martin Andersson, Onn Shehory, Fernando
Tohme | Anytime Coalition Structure Generation with Worst Case Guarantees | null | Proceedings of the National Conference on Artificial Intelligence,
pp 46-53, Madison, WI, July 1998 | null | null | cs.MA cs.AI | null | Coalition formation is a key topic in multiagent systems. One would prefer a
coalition structure that maximizes the sum of the values of the coalitions, but
often the number of coalition structures is too large to allow exhaustive
search for the optimal one. But then, can the coalition structure found via a
partial search be guaranteed to be within a bound from optimum? We show that
none of the previous coalition structure generation algorithms can establish
any bound because they search fewer nodes than a threshold that we show
necessary for establishing a bound. We present an algorithm that establishes a
tight bound within this minimal amount of search, and show that any other
algorithm would have to search strictly more. The fraction of nodes needed to
be searched approaches zero as the number of agents grows. If additional time
remains, our anytime algorithm searches further, and establishes a
progressively lower tight bound. Surprisingly, just searching one more node
drops the bound in half. As desired, our algorithm lowers the bound rapidly
early on, and exhibits diminishing returns to computation. It also drastically
outperforms its obvious contenders. Finally, we show how to distribute the
desired search across self-interested manipulative agents.
| [
{
"version": "v1",
"created": "Mon, 5 Oct 1998 16:08:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sandholm",
"Tuomas",
""
],
[
"Larson",
"Kate",
""
],
[
"Andersson",
"Martin",
""
],
[
"Shehory",
"Onn",
""
],
[
"Tohme",
"Fernando",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/9810006 | Kersten Barney | Nick McKeown (Stanford University), Martin Izzard (Texas Instruments),
Adisak Mekkittikul (Stanford University), Bill Ellersick (Stanford
University) and Mark Horowitz (Stanford University) | The Tiny Tera: A Packet Switch Core | 13 pages, 10 figures | Hot Interconnects V, Stanford University, August 1996; IEEE Micro
Jan/Feb 1997, pp 26-33 | null | null | cs.NI | null | The objective is to design and build a small, high-bandwidth switch.
| [
{
"version": "v1",
"created": "Mon, 5 Oct 1998 17:50:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"McKeown",
"Nick",
"",
"Stanford University"
],
[
"Izzard",
"Martin",
"",
"Texas Instruments"
],
[
"Mekkittikul",
"Adisak",
"",
"Stanford University"
],
[
"Ellersick",
"Bill",
"",
"Stanford\n University"
],
[
"Horowitz",
"Mark",
"",
"Stanford University"
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9810007 | Devillers | Olivier Devillers | Randomization yields simple O(n log star n) algorithms for difficult
Omega(n) problems | 16 pages, 6 figures, Proc. 3rd Canad. Conf. Comput. Geom., 1991 | Internat. J. Comput. Geom. Appl., 2(1):621--635, 1992 | null | Rapport de recherche 1412, INRIA, 1991 | cs.CG | null | We use here the results on the influence graph by Boissonnat et al. to adapt
them for particular cases where additional information is available. In some
cases, it is possible to improve the expected randomized complexity of
algorithms from O(n log n) to O(n log star n).
This technique applies in the following applications: triangulation of a
simple polygon, skeleton of a simple polygon, Delaunay triangulation of points
knowing the EMST (euclidean minimum spanning tree).
| [
{
"version": "v1",
"created": "Wed, 7 Oct 1998 08:03:32 GMT"
},
{
"version": "v2",
"created": "Thu, 8 Oct 1998 08:28:12 GMT"
}
] | 2009-09-25T00:00:00 | [
[
"Devillers",
"Olivier",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
cs/9810008 | Rob van Glabbeek | R. J. van Glabbeek (Stanford) | Axiomatizing Flat Iteration | 15 pages. LaTeX 2.09. Filename: flat.tex.gz. On A4 paper print with:
dvips -t a4 -O -2.15cm,-2.22cm -x 1225 flat. For US letter with: dvips -t
letter -O -0.73in,-1.27in -x 1225 flat. More info at
http://theory.stanford.edu/~rvg/abstracts.html#38 | Proc. CONCUR '97, Warsaw, Poland, July 1997 (A. Mazurkiewicz and
J. Winkowski, eds.), LNCS 1243, Springer-Verlag, 1997, pp. 228-242 | null | STAN-CS-TN-97-57 | cs.LO | null | Flat iteration is a variation on the original binary version of the Kleene
star operation P*Q, obtained by restricting the first argument to be a sum of
atomic actions. It generalizes prefix iteration, in which the first argument is
a single action. Complete finite equational axiomatizations are given for five
notions of bisimulation congruence over basic CCS with flat iteration, viz.
strong congruence, branching congruence, eta-congruence, delay congruence and
weak congruence. Such axiomatizations were already known for prefix iteration
and are known not to exist for general iteration. The use of flat iteration has
two main advantages over prefix iteration: 1.The current axiomatizations
generalize to full CCS, whereas the prefix iteration approach does not allow an
elimination theorem for an asynchronous parallel composition operator. 2.The
greater expressiveness of flat iteration allows for much shorter completeness
proofs.
In the setting of prefix iteration, the most convenient way to obtain the
completeness theorems for eta-, delay, and weak congruence was by reduction to
the completeness theorem for branching congruence. In the case of weak
congruence this turned out to be much simpler than the only direct proof found.
In the setting of flat iteration on the other hand, the completeness theorems
for delay and weak (but not eta-) congruence can equally well be obtained by
reduction to the one for strong congruence, without using branching congruence
as an intermediate step. Moreover, the completeness results for prefix
iteration can be retrieved from those for flat iteration, thus obtaining a
second indirect approach for proving completeness for delay and weak congruence
in the setting of prefix iteration.
| [
{
"version": "v1",
"created": "Wed, 7 Oct 1998 22:39:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"van Glabbeek",
"R. J.",
"",
"Stanford"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/9810009 | Maurizio Pizzonia | Maurizio Pizzonia, Giuseppe Di Battista | Object-Oriented Design of Graph Oriented Data Structures | 10 pages, 9 figures, code examples, ALENEX (accepted) | null | null | null | cs.SE cs.CG cs.DS | null | Applied research in graph algorithms and combinatorial structures needs
comprehensive and versatile software libraries. However, the design and the
implementation of flexible libraries are challenging activities. Among the
other problems involved in such a difficult field, a very special role is
played by graph classification issues.
We propose new techniques devised to help the designer and the programmer in
the development activities. Such techniques are especially suited for dealing
with graph classification problems and rely on an extension of the usual
object-oriented paradigm. In order to support the usage of our approach, we
devised an extension of the C++ programming language and implemented the
corresponding pre-compiler.
| [
{
"version": "v1",
"created": "Thu, 8 Oct 1998 23:54:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pizzonia",
"Maurizio",
""
],
[
"Di Battista",
"Giuseppe",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/9810010 | Todd Veldhuizen | Todd L. Veldhuizen | C++ Templates as Partial Evaluation | 13 pages | null | null | IUCS 519 | cs.PL cs.PF | null | This paper explores the relationship between C++ templates and partial
evaluation. Templates were designed to support generic programming, but
unintentionally provided the ability to perform compile-time computations and
code generation. These features are completely accidental, and as a result
their syntax is awkward. By recasting these features in terms of partial
evaluation, a much simpler syntax can be achieved. C++ may be regarded as a
two-level language in which types are first-class values. Template
instantiation resembles an offline partial evaluator. This paper describes
preliminary work toward a single mechanism based on Partial Evaluation which
unifies generic programming, compile-time computation and code generation. The
language Catat is introduced to illustrate these ideas.
| [
{
"version": "v1",
"created": "Fri, 9 Oct 1998 20:29:43 GMT"
},
{
"version": "v2",
"created": "Mon, 2 Nov 1998 21:39:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Veldhuizen",
"Todd L.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
cs/9810011 | Dr. Wolfram Hardt | Wolfram Hardt, Bernd Kleinjohann | Flysig: Dataflow Oriented Delay-Insensitive Processor for Rapid
Prototyping of Signal Processing | 6 pages, 10 figures | Nineth IEEE International Workshop on Rapid System Prototyping
1998, Belgium, IEEE Computer Society Press | 10.1109/IWRSP.1998.676682 | null | cs.AR | null | As the one-chip integration of HW-modules designed by different companies
becomes more and more popular reliability of a HW-design and evaluation of the
timing behavior during the prototype stage are absolutely necessary. One way to
guarantee reliability is the use of robust design styles, e.g.,
delay-insensitivity. For early timing evaluation two aspects must be
considered: a) The timing needs to be proportional to technology variations and
b) the implemented architecture should be identical for prototype and target.
The first can be met also by delay-insensitive implementation. The latter one
is the key point. A unified architecture is needed for prototyping as well as
implementation. Our new approach to rapid prototyping of signal processing
tasks is based on a configurable, delay-insensitive implemented processor
called Flysig. In essence, the Flysig processor can be understood as a complex
FPGA where the CLBs are substituted by bit-serial operators. In this paper the
general concept is detailed and first experimental results are given for
demonstration of the main advantages: delay-insensitive design style, direct
correspondence between prototyping and target architecture, high performance
and reasonable shortening of the design cycle.
| [
{
"version": "v1",
"created": "Mon, 12 Oct 1998 10:11:05 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Hardt",
"Wolfram",
""
],
[
"Kleinjohann",
"Bernd",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
cs/9810012 | Mark D. Roberts | Mark D. Roberts | Ultrametric Distance in Syntax | 28 pages, 55508 bytes, 16 eps diagrams, 39 references, some small
changes from the previous version, matrices reset, background to this work
can be found at:
http://cosmology.mth.uct.ac.za/~roberts/pastresearch/ultrametric.html | Prague Bulletin of Mathematical Linguistics 103 (2015) 111-130 | null | null | cs.CL q-bio.NC | null | Phrase structure trees have a hierarchical structure. In many subjects, most
notably in Taxonomy such tree structures have been studied using ultrametrics.
Here syntactical hierarchical phrase trees are subject to a similar analysis,
which is much siompler as the branching structure is more readily discernible
and switched. The occurence of hierarchical structure elsewhere in linguistics
is mentioned. The phrase tree can be represented by a matrix and the elements
of the matrix can be represented by triangles. The height at which branching
occurs is not prescribed in previous syntatic models, but it is by using the
ultrametric matrix. The ambiguity of which branching height to choose is
resolved by postulating that branching occurs at the lowest height available.
An ultrametric produces a measure of the complexity of sentences: presumably
the complexity of sentence increases as a language is aquired so that this can
be tested. A All ultrametric triangles are equilateral or isocles, here it is
shown that X structur implies that there are no equilateral triangles.
Restricting attention to simple syntax a minium ultrametric distance between
lexical categories is calculatex. This ultrametric distance is shown to be
different than the matrix obtasined from feaures. It is shown that the
definition of c-commabnd can be replaced by an equivalent ultrametric
definition. The new definition invokes a minimum distance between nodes and
this is more aesthetically satisfing than previouv varieties of definitions.
From the new definition of c-command follows a new definition of government.
| [
{
"version": "v1",
"created": "Tue, 13 Oct 1998 10:24:56 GMT"
},
{
"version": "v2",
"created": "Sat, 30 Jan 1999 14:41:37 GMT"
},
{
"version": "v3",
"created": "Mon, 17 Jan 2000 18:01:36 GMT"
},
{
"version": "v4",
"created": "Sun, 8 Jul 2001 19:42:43 GMT"
}
] | 2015-12-04T00:00:00 | [
[
"Roberts",
"Mark D.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.NC",
"description": "Synapse, cortex, neuronal dynamics, neural network, sensorimotor control, behavior, attention",
"span": "(Neurons and Cognition)"
}
] |
cs/9810013 | David R. Hanson | David R. Hanson | Early Experience with ASDL in lcc | 16 pages, 12 figures | Software--Practice & Experience, vol. 29, no. 5, 417-435, Apr.
1999 | null | Microsoft Research MSR-TR-98-50 | cs.PL cs.SE | null | The Abstract Syntax Description Language (ASDL) is a language for specifying
the tree data structures often found in compiler intermediate representations.
The ASDL generator reads an ASDL specification and generates code to construct,
read, and write instances of the trees specified. Using ASDL permits a compiler
to be decomposed into semi-independent components that communicate by reading
and writing trees. Each component can be written in a different language,
because the ASDL generator can emit code in several languages, and the files
written by ASDL-generated code are machine- and language-independent. ASDL is
part of the National Compiler Infrastructure project, which seeks to reduce
dramatically the overhead of computer systems research by making it much easier
to build high-quality compilers. This paper describes dividing lcc, a widely
used retargetable C compiler, into two components that communicate via trees
defined in ASDL. As the first use of ASDL in a `real' compiler, this experience
reveals much about the effort required to retrofit an existing compiler to use
ASDL, the overheads involved, and the strengths and weaknesses of ASDL itself
and, secondarily, of lcc.
| [
{
"version": "v1",
"created": "Tue, 13 Oct 1998 20:38:55 GMT"
}
] | 2014-11-17T00:00:00 | [
[
"Hanson",
"David R.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/9810014 | Min-Yen Kan | Judith L. Klavans (Columbia University), Kathleen R. McKeown (Columbia
University), Min-Yen Kan (Columbia University) and Susan Lee (University of
California at Berkeley) | Resources for Evaluation of Summarization Techniques | LaTeX source, 5 pages, US Letter, uses lrec98.sty | in Proc. of First International Conference on Language Resources
and Evaluation, Rubio, Gallardo, Castro, and Tejada (eds.), Granada, Spain,
1998 | null | null | cs.CL | null | We report on two corpora to be used in the evaluation of component systems
for the tasks of (1) linear segmentation of text and (2) summary-directed
sentence extraction. We present characteristics of the corpora, methods used in
the collection of user judgments, and an overview of the application of the
corpora to evaluating the component system. Finally, we discuss the problems
and issues with construction of the test set which apply broadly to the
construction of evaluation resources for language technologies.
| [
{
"version": "v1",
"created": "Tue, 13 Oct 1998 20:33:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Klavans",
"Judith L.",
"",
"Columbia University"
],
[
"McKeown",
"Kathleen R.",
"",
"Columbia\n University"
],
[
"Kan",
"Min-Yen",
"",
"Columbia University"
],
[
"Lee",
"Susan",
"",
"University of\n California at Berkeley"
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/9810015 | William Schuler | Giorgio Satta (Universita di Padova) and William Schuler (University
of Pennsylvania) | Restrictions on Tree Adjoining Languages | 7 pages LaTeX + 5 eps figures | Proceedings of COLING-ACL'98 | null | null | cs.CL | null | Several methods are known for parsing languages generated by Tree Adjoining
Grammars (TAGs) in O(n^6) worst case running time. In this paper we investigate
which restrictions on TAGs and TAG derivations are needed in order to lower
this O(n^6) time complexity, without introducing large runtime constants, and
without losing any of the generative power needed to capture the syntactic
constructions in natural language that can be handled by unrestricted TAGs. In
particular, we describe an algorithm for parsing a strict subclass of TAG in
O(n^5), and attempt to show that this subclass retains enough generative power
to make it useful in the general case.
| [
{
"version": "v1",
"created": "Tue, 13 Oct 1998 21:17:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Satta",
"Giorgio",
"",
"Universita di Padova"
],
[
"Schuler",
"William",
"",
"University\n of Pennsylvania"
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/9810016 | Ion Muslea | Ion Muslea | SYNERGY: A Linear Planner Based on Genetic Programming | 13 pages, European Conference on Planning 1997 | "Recent Advances in AI Planning" (Sam Steel & Rachid Alami eds.),
p. 312-325, Springer 1997 (LNAI 1348) | null | null | cs.AI | null | In this paper we describe SYNERGY, which is a highly parallelizable, linear
planning system that is based on the genetic programming paradigm. Rather than
reasoning about the world it is planning for, SYNERGY uses artificial
selection, recombination and fitness measure to generate linear plans that
solve conjunctive goals. We ran SYNERGY on several domains (e.g., the briefcase
problem and a few variants of the robot navigation problem), and the
experimental results show that our planner is capable of handling problem
instances that are one to two orders of magnitude larger than the ones solved
by UCPOP. In order to facilitate the search reduction and to enhance the
expressive power of SYNERGY, we also propose two major extensions to our
planning system: a formalism for using hierarchical planning operators, and a
framework for planning in dynamic environments.
| [
{
"version": "v1",
"created": "Fri, 16 Oct 1998 22:11:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Muslea",
"Ion",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/9810017 | Valerie Nowak | Stephen L. Adler | General Theory of Image Normalization | 33 pages, plain tex, no figures | null | null | IASSNS-HEP-95/89 | cs.CV | null | We give a systematic, abstract formulation of the image normalization method
as applied to a general group of image transformations, and then illustrate the
abstract analysis by applying it to the hierarchy of viewing transformations of
a planar object.
| [
{
"version": "v1",
"created": "Mon, 19 Oct 1998 20:46:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Adler",
"Stephen L.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
cs/9810018 | Krzysztof R. Apt | Krzysztof R. Apt | A Proof Theoretic View of Constraint Programming | 25 pages | Fundamenta Informaticae 34(1998), pp. 295-321 | null | null | cs.AI cs.PL | null | We provide here a proof theoretic account of constraint programming that
attempts to capture the essential ingredients of this programming style. We
exemplify it by presenting proof rules for linear constraints over interval
domains, and illustrate their use by analyzing the constraint propagation
process for the {\tt SEND + MORE = MONEY} puzzle. We also show how this
approach allows one to build new constraint solvers.
| [
{
"version": "v1",
"created": "Tue, 20 Oct 1998 11:23:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Apt",
"Krzysztof R.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/9810019 | Guruduth Banavar | Robert Strom, Guruduth Banavar, Tushar Chandra, Marc Kaplan, Kevan
Miller, Bodhi Mukherjee, Daniel Sturman, and Michael Ward | Gryphon: An Information Flow Based Approach to Message Brokering | Two page extended abstract | null | null | null | cs.DC | null | Gryphon is a distributed computing paradigm for message brokering, which is
the transferring of information in the form of streams of events from
information providers to information consumers. This extended abstract outlines
the major problems in message brokering and Gryphon's approach to solving them.
| [
{
"version": "v1",
"created": "Wed, 21 Oct 1998 18:43:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Strom",
"Robert",
""
],
[
"Banavar",
"Guruduth",
""
],
[
"Chandra",
"Tushar",
""
],
[
"Kaplan",
"Marc",
""
],
[
"Miller",
"Kevan",
""
],
[
"Mukherjee",
"Bodhi",
""
],
[
"Sturman",
"Daniel",
""
],
[
"Ward",
"Michael",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/9810020 | Joseph O'Rourke | Joseph O'Rourke | Computational Geometry Column 33 | null | Internat. J. Comput. Geom. Appl., 8(3) 381-384, 1998. Also in
SIGACT News, 29(2) (Issue 107) 14-16, 1998 | null | null | cs.CG cs.AI cs.GR | null | Several recent SIGGRAPH papers on surface simplification are described.
| [
{
"version": "v1",
"created": "Thu, 22 Oct 1998 20:44:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"O'Rourke",
"Joseph",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
}
] |
cs/9810021 | Joseph O'Rourke | Joseph O'Rourke | Computational Geometry Column 32 | null | Internat. J. Comput. Geom. Appl.,7(5) 509-513, 1997. Also in
SIGACT News, 29(2) (Issue 107) 14-16, 1998 | null | null | cs.CG cs.GR | null | The proof of Dey's new k-set bound is illustrated.
| [
{
"version": "v1",
"created": "Thu, 22 Oct 1998 21:01:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"O'Rourke",
"Joseph",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
}
] |
cs/9810022 | James K. Huggins | James K. Huggins | Broy-Lamport Specification Problem: A Gurevich Abstract State Machine
Solution | null | null | null | University of Michigan EECS Department Technical Report
CSE-TR-320-96 | cs.SE | null | We apply the Gurevich Abstract State Machine methodology to a benchmark
specification problem of Broy and Lamport.
| [
{
"version": "v1",
"created": "Mon, 26 Oct 1998 16:52:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Huggins",
"James K.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/9810023 | James K. Huggins | Yuri Gurevich and James K. Huggins | Equivalence is in the Eye of the Beholder | See also the ASM web site at http://www.eecs.umich.edu/gasm/ | Theoretical Computer Science (179) 1-2 (1997), 353-380 | null | null | cs.SE | null | In a recent provocative paper, Lamport points out "the insubstantiality of
processes" by proving the equivalence of two different decompositions of the
same intuitive algorithm by means of temporal formulas. We point out that the
correct equivalence of algorithms is itself in the eye of the beholder. We
discuss a number of related issues and, in particular, whether algorithms can
be proved equivalent directly.
| [
{
"version": "v1",
"created": "Mon, 26 Oct 1998 18:46:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gurevich",
"Yuri",
""
],
[
"Huggins",
"James K.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/9810024 | James K. Huggins | Yuri Gurevich and James K. Huggins | Evolving Algebras and Partial Evaluation | See also the web site at http://www.eecs.umich.edu/gasm/ | In IFIP 13th World Computer Congress 1994, Volume I: Technology
and Foundations, eds. B. Pehrson and I. Simon, North-Holland, Amsterdam,
587-592 | null | null | cs.SE | null | We describe an automated partial evaluator for evolving algebras implemented
at the University of Michigan.
| [
{
"version": "v1",
"created": "Mon, 26 Oct 1998 19:13:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gurevich",
"Yuri",
""
],
[
"Huggins",
"James K.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/9810025 | James K. Huggins | James K. Huggins | An Offline Partial Evaluator for Evolving Algebras | See also the web site at http://www.eecs.umich.edu/gasm/ | null | null | University of Michigan EECS Department Technical Report
CSE-TR-229-95 | cs.SE | null | We describe the architecture of an evolving algebra partial evaluator, a
program which specializes an evolving algebra with respect to a portion of its
input. We discuss the particular analysis, specialization, and optimization
techniques used and show an example of its use.
| [
{
"version": "v1",
"created": "Mon, 26 Oct 1998 19:19:04 GMT"
}
] | 2016-08-31T00:00:00 | [
[
"Huggins",
"James K.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/9810026 | James K. Huggins | Yuri Gurevich and James K. Huggins | The Railroad Crossing Problem: An Experiment with Instantaneous Actions
and Immediate Reactions | See also the web site at http://www.eecs.umich.edu/gasm/ | Selected papers from CSL'95, ed. H.K. Buening, Springer Lecture
Notes in Computer Science 1092, 1996, 266--290 | null | null | cs.SE | null | We give an evolving algebra solution for the well-known railroad crossing
problem and use the occasion to experiment with agents that perform
instantaneous actions in continuous time and in particular with agents that
fire at the moment they are enabled.
| [
{
"version": "v1",
"created": "Mon, 26 Oct 1998 19:24:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gurevich",
"Yuri",
""
],
[
"Huggins",
"James K.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/9810027 | Graham Kirby | G. N. C. Kirby, R. Morrison, D. W. Stemple | Linguistic Reflection in Java | 25 pages. Source code for examples at
http://www-ppg.dcs.st-and.ac.uk/Java/ReflectionExample/ Dynamic compilation
package at http://www-ppg.dcs.st-and.ac.uk/Java/DynamicCompilation/ | Software - Practice & Experience 28, 10 (1998) pp 1045-1077 | null | null | cs.PL | null | Reflective systems allow their own structures to be altered from within. Here
we are concerned with a style of reflection, called linguistic reflection,
which is the ability of a running program to generate new program fragments and
to integrate these into its own execution. In particular we describe how this
kind of reflection may be provided in the compiler-based, strongly typed
object-oriented programming language Java. The advantages of the programming
technique include attaining high levels of genericity and accommodating system
evolution. These advantages are illustrated by an example taken from persistent
programming which shows how linguistic reflection allows functionality (program
code) to be generated on demand (Just-In-Time) from a generic specification and
integrated into the evolving running program. The technique is evaluated
against alternative implementation approaches with respect to efficiency,
safety and ease of use.
| [
{
"version": "v1",
"created": "Thu, 29 Oct 1998 14:30:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kirby",
"G. N. C.",
""
],
[
"Morrison",
"R.",
""
],
[
"Stemple",
"D. W.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/9811001 | Lunjin Lu | Lunjin Lu (University of Waikato) | A Polymorphic Groundness Analysis of Logic Programs | 30 pages | null | null | null | cs.PL | null | A polymorphic analysis is an analysis whose input and output contain
parameters which serve as placeholders for information that is unknown before
analysis but provided after analysis. In this paper, we present a polymorphic
groundness analysis that infers parameterised groundness descriptions of the
variables of interest at a program point. The polymorphic groundness analysis
is designed by replacing two primitive operators used in a monomorphic
groundness analysis and is shown to be as precise as the monomorphic groundness
analysis for any possible values for mode parameters. Experimental results of a
prototype implementation of the polymorphic groundness analysis are given.
| [
{
"version": "v1",
"created": "Sat, 31 Oct 1998 07:20:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lu",
"Lunjin",
"",
"University of Waikato"
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/9811002 | Serguei P. Tsarev | Serguei P. Tsarev | Factorization of linear partial differential operators and Darboux
integrability of nonlinear PDEs | LaTeX 2.09, acmconf.sty (included in the tar file), 8 pages.
Presented at the Poster session of ISSAC'98 (Rostock, Germany) | null | null | null | cs.SC nlin.SI solv-int | null | Using a new definition of generalized divisors we prove that the lattice of
such divisors for a given linear partial differential operator is modular and
obtain analogues of the well-known theorems of the Loewy-Ore theory of
factorization of linear ordinary differential operators. Possible applications
to factorized Groebner bases computations in the commutative and
non-commutative cases are discussed, an application to finding criterions of
Darboux integrability of nonlinear PDEs is given.
| [
{
"version": "v1",
"created": "Sat, 31 Oct 1998 09:09:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Tsarev",
"Serguei P.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Physics",
"code": "nlin.SI",
"description": "Exactly solvable systems, integrable PDEs, integrable ODEs, Painleve analysis, integrable discrete maps, solvable lattice models, integrable quantum systems",
"span": "(Exactly Solvable and Integrable Systems)"
},
null
] |
cs/9811003 | Andy Golding | Andrew R. Golding and Dan Roth | A Winnow-Based Approach to Context-Sensitive Spelling Correction | To appear in Machine Learning, Special Issue on Natural Language
Learning, 1999. 25 pages | null | null | null | cs.LG cs.CL | null | A large class of machine-learning problems in natural language require the
characterization of linguistic context. Two characteristic properties of such
problems are that their feature space is of very high dimensionality, and their
target concepts refer to only a small subset of the features in the space.
Under such conditions, multiplicative weight-update algorithms such as Winnow
have been shown to have exceptionally good theoretical properties. We present
an algorithm combining variants of Winnow and weighted-majority voting, and
apply it to a problem in the aforementioned class: context-sensitive spelling
correction. This is the task of fixing spelling errors that happen to result in
valid words, such as substituting "to" for "too", "casual" for "causal", etc.
We evaluate our algorithm, WinSpell, by comparing it against BaySpell, a
statistics-based method representing the state of the art for this task. We
find: (1) When run with a full (unpruned) set of features, WinSpell achieves
accuracies significantly higher than BaySpell was able to achieve in either the
pruned or unpruned condition; (2) When compared with other systems in the
literature, WinSpell exhibits the highest performance; (3) The primary reason
that WinSpell outperforms BaySpell is that WinSpell learns a better linear
separator; (4) When run on a test set drawn from a different corpus than the
training set was drawn from, WinSpell is better able than BaySpell to adapt,
using a strategy we will present that combines supervised learning on the
training set with unsupervised learning on the (noisy) test set.
| [
{
"version": "v1",
"created": "Sat, 31 Oct 1998 19:33:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Golding",
"Andrew R.",
""
],
[
"Roth",
"Dan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/9811004 | Mark D. Roberts | Mark D. Roberts | Does Meaning Evolve? | title changed, completely rewritten, new version 37 pages previous
version 28 pages, to appear in Behaviour and Philosophy | null | null | null | cs.CL q-bio.PE | null | A common method of making a theory more understandable, is by comparing it to
another theory which has been better developed. Radical interpretation is a
theory which attempts to explain how communication has meaning. Radical
interpretation is treated as another time-dependent theory and compared to the
time dependent theory of biological evolution. The main reason for doing this
is to find the nature of the time dependence; producing analogs between the two
theories is a necessary prerequisite to this and brings up many problems. Once
the nature of the time dependence is better known it might allow the underlying
mechanism to be uncovered. Several similarities and differences are uncovered,
there appear to be more differences than similarities.
| [
{
"version": "v1",
"created": "Sun, 1 Nov 1998 11:18:22 GMT"
},
{
"version": "v2",
"created": "Thu, 24 Dec 1998 13:22:43 GMT"
},
{
"version": "v3",
"created": "Sun, 16 Jan 2000 17:29:43 GMT"
},
{
"version": "v4",
"created": "Sat, 14 Aug 2004 15:35:54 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Roberts",
"Mark D.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.PE",
"description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life",
"span": "(Populations and Evolution)"
}
] |
cs/9811005 | Lane A. Hemaspaandra | Lane A. Hemaspaandra and Alan L. Selman | Writing and Editing Complexity Theory: Tales and Tools | 11 pages. Will appear in the SIGACT News Complexity Theory Column | null | null | null | cs.GL cs.CC | null | Each researcher should have a full shelf---physical or virtual---of books on
writing and editing prose. Though we make no claim to any special degree of
expertise, we recently edited a book of complexity theory surveys (Complexity
Theory Retrospective II, Springer-Verlag, 1997), and in doing so we were
brought into particularly close contact with the subject of this article, and
with a number of the excellent resources available to writers and editors. In
this article, we list some of these resources, and we also relate some of the
adventures we had as our book moved from concept to reality.
| [
{
"version": "v1",
"created": "Sun, 1 Nov 1998 17:44:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Selman",
"Alan L.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GL",
"description": "Covers introductory material, survey material, predictions of future trends, biographies, and miscellaneous computer-science related material. Roughly includes all of ACM Subject Class A, except it does not include conference proceedings (which will be listed in the appropriate subject area).",
"span": "(General Literature)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/9811006 | Eric Bloedorn | Inderjeet Mani and Eric Bloedorn | Machine Learning of Generic and User-Focused Summarization | In Proceedings of the Fifteenth National Conference on AI (AAAI-98),
p. 821-826 | null | null | null | cs.CL cs.LG | null | A key problem in text summarization is finding a salience function which
determines what information in the source should be included in the summary.
This paper describes the use of machine learning on a training corpus of
documents and their abstracts to discover salience functions which describe
what combination of features is optimal for a given summarization task. The
method addresses both "generic" and user-focused summaries.
| [
{
"version": "v1",
"created": "Mon, 2 Nov 1998 18:57:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mani",
"Inderjeet",
""
],
[
"Bloedorn",
"Eric",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/9811007 | Barbara White | L. Bass, G. Chastek, P. Clements, L. Northrop, D. Smith, J. Withey | Second Product Line Practice Workshop Report | null | null | null | CMU/SEI-98-TR-015 | cs.SE | null | The second Software Engineering Institute Product Line Practice Workshop was
a hands-on meeting held in November 1997 to share industry practices in
software product lines and to explore the technical and non-technical issues
involved. This report synthesizes the workshop presentations and discussions,
which identified factors involved in product line practices and analyzed issues
in the areas of software engineering, technical management, and enterprise
management.
| [
{
"version": "v1",
"created": "Mon, 2 Nov 1998 19:34:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bass",
"L.",
""
],
[
"Chastek",
"G.",
""
],
[
"Clements",
"P.",
""
],
[
"Northrop",
"L.",
""
],
[
"Smith",
"D.",
""
],
[
"Withey",
"J.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/9811008 | Philip Edmonds | Philip Edmonds (University of Toronto) | Translating near-synonyms: Possibilities and preferences in the
interlingua | 8 pages, LaTeX2e, 1 eps figure, uses colacl.sty, epsfig.sty, avm.sty,
times.sty | Proceedings of the AMTA/SIG-IL Second Workshop on Interlinguas,
October 1998 | null | null | cs.CL | null | This paper argues that an interlingual representation must explicitly
represent some parts of the meaning of a situation as possibilities (or
preferences), not as necessary or definite components of meaning (or
constraints). Possibilities enable the analysis and generation of nuance,
something required for faithful translation. Furthermore, the representation of
the meaning of words, especially of near-synonyms, is crucial, because it
specifies which nuances words can convey in which contexts.
| [
{
"version": "v1",
"created": "Mon, 2 Nov 1998 21:29:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Edmonds",
"Philip",
"",
"University of Toronto"
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/9811009 | Philip Edmonds | Philip Edmonds (University of Toronto) | Choosing the Word Most Typical in Context Using a Lexical Co-occurrence
Network | 3 pages, LaTeX2e, 1 ps figure, uses mathptm.sty, colacl.sty,
psfig.sty | Proceedings of ACL-EACL '97, student session | null | null | cs.CL | null | This paper presents a partial solution to a component of the problem of
lexical choice: choosing the synonym most typical, or expected, in context. We
apply a new statistical approach to representing the context of a word through
lexical co-occurrence networks. The implementation was trained and evaluated on
a large corpus, and results show that the inclusion of second-order
co-occurrence relations improves the performance of our implemented lexical
choice program.
| [
{
"version": "v1",
"created": "Mon, 2 Nov 1998 23:06:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Edmonds",
"Philip",
"",
"University of Toronto"
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/9811010 | Dan Roth | Dan Roth | Learning to Resolve Natural Language Ambiguities: A Unified Approach | null | Proceedings of of AAAI'98 pp. 806--813 | null | null | cs.CL cs.LG | null | We analyze a few of the commonly used statistics based and machine learning
algorithms for natural language disambiguation tasks and observe that they can
be re-cast as learning linear separators in the feature space. Each of the
methods makes a priori assumptions, which it employs, given the data, when
searching for its hypothesis. Nevertheless, as we show, it searches a space
that is as rich as the space of all linear separators. We use this to build an
argument for a data driven approach which merely searches for a good linear
separator in the feature space, without further assumptions on the domain or a
specific problem.
We present such an approach - a sparse network of linear separators,
utilizing the Winnow learning algorithm - and show how to use it in a variety
of ambiguity resolution problems. The learning approach presented is
attribute-efficient and, therefore, appropriate for domains having very large
number of attributes.
In particular, we present an extensive experimental comparison of our
approach with other methods on several well studied lexical disambiguation
tasks such as context-sensitive spelling correction, prepositional phrase
attachment and part of speech tagging. In all cases we show that our approach
either outperforms other methods tried for these tasks or performs comparably
to the best.
| [
{
"version": "v1",
"created": "Tue, 3 Nov 1998 21:14:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Roth",
"Dan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/9811011 | Barbara White | Robert Ellison, Rick Linger, Thomas Longstaff, Nancy Mead | Case Study in Survivable Network System Analysis | null | null | null | CMU/SEI-98-TR-014 | cs.SE | null | This paper presents a method for analyzing the survivability of distributed
network systems and an example of its application.
| [
{
"version": "v1",
"created": "Wed, 4 Nov 1998 14:32:22 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ellison",
"Robert",
""
],
[
"Linger",
"Rick",
""
],
[
"Longstaff",
"Thomas",
""
],
[
"Mead",
"Nancy",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/9811012 | Lunjin Lu | Lunjin Lu (University of Waikato) | Deriving Abstract Semantics for Forward Analysis of Normal Logic
Programs | 39 pages | null | null | null | cs.PL cs.LO | null | The problem of forward abstract interpretation of {\em normal} logic programs
has not been formally addressed in the literature although negation as failure
is dealt with through the built-in predicate ! in the way it is implemented in
Prolog. This paper proposes a solution to this problem by deriving two generic
fixed-point abstract semantics $F^b and $F^\diamond for forward abstract
interpretation of {\em normal} logic programs. $F^b$ is intended for inferring
data descriptions for edges in the program graph where an edge denotes the
possibility that the control of execution transfers from its source program
point to its destination program point. $F^\diamond$ is derived from $F^b$ and
is intended for inferring data descriptions for textual program points.
| [
{
"version": "v1",
"created": "Fri, 6 Nov 1998 03:37:44 GMT"
}
] | 2016-08-31T00:00:00 | [
[
"Lu",
"Lunjin",
"",
"University of Waikato"
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/9811013 | Jim Gray | Phil Bernstein, Michael Brodie, Stefano Ceri, David DeWitt, Mike
Franklin, Hector Garcia-Molina, Jim Gray, Jerry Held, Joe Hellerstein, H. V.
Jagadish, Michael Lesk, Dave Maier, Jeff Naughton, Hamid Pirahesh, Mike
Stonebraker, Jeff Ullman | The Asilomar Report on Database Research | 20 pages in HTML; an original in MSword at
http://research.microsoft.com/~gray/Asilomar_DB_98.doc | ACM SIGMOD Record, December 1998 | null | MSR TR 98 57 | cs.DB cs.DL | null | The database research community is rightly proud of success in basic
research, and its remarkable record of technology transfer. Now the field needs
to radically broaden its research focus to attack the issues of capturing,
storing, analyzing, and presenting the vast array of online data. The database
research community should embrace a broader research agenda -- broadening the
definition of database management to embrace all the content of the Web and
other online data stores, and rethinking our fundamental assumptions in light
of technology shifts. To accelerate this transition, we recommend changing the
way research results are evaluated and presented. In particular, we advocate
encouraging more speculative and long-range work, moving conferences to a
poster format, and publishing all research literature on the Web.
| [
{
"version": "v1",
"created": "Mon, 9 Nov 1998 05:09:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bernstein",
"Phil",
""
],
[
"Brodie",
"Michael",
""
],
[
"Ceri",
"Stefano",
""
],
[
"DeWitt",
"David",
""
],
[
"Franklin",
"Mike",
""
],
[
"Garcia-Molina",
"Hector",
""
],
[
"Gray",
"Jim",
""
],
[
"Held",
"Jerry",
""
],
[
"Hellerstein",
"Joe",
""
],
[
"Jagadish",
"H. V.",
""
],
[
"Lesk",
"Michael",
""
],
[
"Maier",
"Dave",
""
],
[
"Naughton",
"Jeff",
""
],
[
"Pirahesh",
"Hamid",
""
],
[
"Stonebraker",
"Mike",
""
],
[
"Ullman",
"Jeff",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
cs/9811014 | James K. Huggins | Egon Boerger and James K. Huggins | Abstract State Machines 1988-1998: Commented ASM Bibliography | Also maintained as a BibTeX file at http://www.eecs.umich.edu/gasm/ | Formal Specification Column (H. Ehrig, ed.), EATCS Bulletin 64,
February 1998, 105--127 | null | null | cs.SE | null | An annotated bibliography of papers which deal with or use Abstract State
Machines (ASMs), as of January 1998.
| [
{
"version": "v1",
"created": "Mon, 9 Nov 1998 19:32:38 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Boerger",
"Egon",
""
],
[
"Huggins",
"James K.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/9811015 | Lunjin Lu | Lunjin Lu and John G. Cleary (University of Waikato) | An Emptiness Algorithm for Regular Types with Set Operators | 22 pages | null | null | null | cs.LO cs.PL | null | An algorithm to decide the emptiness of a regular type expression with set
operators given a set of parameterised type definitions is presented. The
algorithm can also be used to decide the equivalence of two regular type
expressions and the inclusion of one regular type expression in another. The
algorithm strictly generalises previous work in that tuple distributivity is
not assumed and set operators are permitted in type expressions.
| [
{
"version": "v1",
"created": "Wed, 11 Nov 1998 04:50:28 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lu",
"Lunjin",
"",
"University of Waikato"
],
[
"Cleary",
"John G.",
"",
"University of Waikato"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/9811016 | Martin Volk | Martin Volk and Gerold Schneider (University of Zurich) | Comparing a statistical and a rule-based tagger for German | 8 pages | null | null | null | cs.CL | null | In this paper we present the results of comparing a statistical tagger for
German based on decision trees and a rule-based Brill-Tagger for German. We
used the same training corpus (and therefore the same tag-set) to train both
taggers. We then applied the taggers to the same test corpus and compared their
respective behavior and in particular their error rates. Both taggers perform
similarly with an error rate of around 5%. From the detailed error analysis it
can be seen that the rule-based tagger has more problems with unknown words
than the statistical tagger. But the results are opposite for tokens that are
many-ways ambiguous. If the unknown words are fed into the taggers with the
help of an external lexicon (such as the Gertwol system) the error rate of the
rule-based tagger drops to 4.7%, and the respective rate of the statistical
taggers drops to around 3.7%. Combining the taggers by using the output of one
tagger to help the other did not lead to any further improvement.
| [
{
"version": "v1",
"created": "Wed, 11 Nov 1998 11:06:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Volk",
"Martin",
"",
"University of Zurich"
],
[
"Schneider",
"Gerold",
"",
"University of Zurich"
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/9811017 | Marc Bezem | Krzysztof R. Apt and Marc Bezem | Formulas as Programs | 34 pages, appears in: The Logic Programming Paradigm: a 25 Years
Perspective, K.R. Apt, V. Marek, M. Truszczynski and D.S. Warren (eds),
Springer-Verlag, Artificial Intelligence Series | null | null | null | cs.LO cs.SC | null | We provide here a computational interpretation of first-order logic based on
a constructive interpretation of satisfiability w.r.t. a fixed but arbitrary
interpretation. In this approach the formulas themselves are programs. This
contrasts with the so-called formulas as types approach in which the proofs of
the formulas are typed terms that can be taken as programs. This view of
computing is inspired by logic programming and constraint logic programming but
differs from them in a number of crucial aspects.
Formulas as programs is argued to yield a realistic approach to programming
that has been realized in the implemented programming language ALMA-0 (Apt et
al.) that combines the advantages of imperative and logic programming. The work
here reported can also be used to reason about the correctness of non-recursive
ALMA-0 programs that do not include destructive assignment.
| [
{
"version": "v1",
"created": "Wed, 11 Nov 1998 14:05:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Apt",
"Krzysztof R.",
""
],
[
"Bezem",
"Marc",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
cs/9811018 | Mark D. Roberts | Mark D. Roberts | P-model Alternative to the T-model | 28 pages, 73262 bytes, six eps diagrams, 53 references, background to
this work is described:
http://cosmology.mth.uct.ac.za/~roberts/pastresearch/pmodel.html | null | null | null | cs.CL q-bio.NC | null | Standard linguistic analysis of syntax uses the T-model. This model requires
the ordering: D-structure $>$ S-structure $>$ LF. Between each of these
representations there is movement which alters the order of the constituent
words; movement is achieved using the principles and parameters of syntactic
theory. Psychological serial models do not accommodate the T-model immediately
so that here a new model called the P-model is introduced. Here it is argued
that the LF representation should be replaced by a variant of Frege's three
qualities. In the F-representation the order of elements is not necessarily the
same as that in LF and it is suggested that the correct ordering is:
F-representation $>$ D-structure $>$ S-structure. Within this framework
movement originates as the outcome of emphasis applied to the sentence.
| [
{
"version": "v1",
"created": "Wed, 11 Nov 1998 14:17:09 GMT"
},
{
"version": "v2",
"created": "Sun, 13 Aug 2000 12:52:13 GMT"
},
{
"version": "v3",
"created": "Sun, 8 Jul 2001 18:51:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Roberts",
"Mark D.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.NC",
"description": "Synapse, cortex, neuronal dynamics, neural network, sensorimotor control, behavior, attention",
"span": "(Neurons and Cognition)"
}
] |
cs/9811019 | Joseph O'Rourke | T. Biedl, E. Demaine, M. Demaine, S. Lazard, A. Lubiw, J. O'Rourke, M.
Overmars, S. Robbins, I. Streinu, G. Toussaint, S. Whitesides | Locked and Unlocked Polygonal Chains in 3D | To appear in Proc. 10th ACM-SIAM Sympos. Discrete Algorithms, Jan.
1999 | Proc. 10th ACM-SIAM Sympos. Discrete Algorithms, Jan. 1999, pp.
S866-7. | null | null | cs.CG cs.DS cs.RO | null | In this paper, we study movements of simple polygonal chains in 3D. We say
that an open, simple polygonal chain can be straightened if it can be
continuously reconfigured to a straight sequence of segments in such a manner
that both the length of each link and the simplicity of the chain are
maintained throughout the movement. The analogous concept for closed chains is
convexification: reconfiguration to a planar convex polygon. Chains that cannot
be straightened or convexified are called locked. While there are open chains
in 3D that are locked, we show that if an open chain has a simple orthogonal
projection onto some plane, it can be straightened. For closed chains, we show
that there are unknotted but locked closed chains, and we provide an algorithm
for convexifying a planar simple polygon in 3D with a polynomial number of
moves.
| [
{
"version": "v1",
"created": "Wed, 11 Nov 1998 20:36:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Biedl",
"T.",
""
],
[
"Demaine",
"E.",
""
],
[
"Demaine",
"M.",
""
],
[
"Lazard",
"S.",
""
],
[
"Lubiw",
"A.",
""
],
[
"O'Rourke",
"J.",
""
],
[
"Overmars",
"M.",
""
],
[
"Robbins",
"S.",
""
],
[
"Streinu",
"I.",
""
],
[
"Toussaint",
"G.",
""
],
[
"Whitesides",
"S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
cs/9811020 | Cynthia Crego | Elizabeth Anderson, Robert Atkinson, Cynthia Crego, Jean Slisz and
Sara Tompson | Digitizing Legacy Documents: A Knowledge-Base Preservation Project | 21 pages, 5 figures | IllinoisLibraries80:211-219,1998 | null | Fermilab-TM-2056 | cs.DL | null | This paper addresses the issue of making legacy information (that material
held in paper format only) electronically searchable and retrievable. We used
proprietary software and commercial hardware to create a process for scanning,
cataloging, archiving and electronically disseminating full-text documents.
This process is relatively easy to implement and reasonably affordable.
| [
{
"version": "v1",
"created": "Wed, 11 Nov 1998 22:12:18 GMT"
}
] | 2008-11-26T00:00:00 | [
[
"Anderson",
"Elizabeth",
""
],
[
"Atkinson",
"Robert",
""
],
[
"Crego",
"Cynthia",
""
],
[
"Slisz",
"Jean",
""
],
[
"Tompson",
"Sara",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
cs/9811021 | Bernardo Kastrup | Bernardo Kastrup | Automatic Hardware Synthesis for a Hybrid Reconfigurable CPU Featuring
Philips CPLDs | 6 pages, 7 figures, PACT '98 Workshop on Reconfigurable Computing | null | null | null | cs.PL cs.AR | null | A high-level architecture of a Hybrid Reconfigurable CPU, based on a
Philips-supported core processor, is introduced. It features the Philips XPLA2
CPLD as a reconfigurable functional unit. A compilation chain is presented, in
which automatic implementation of time-critical program segments in custom
hardware is performed. The entire process is transparent from the programmer's
point of view. The hardware synthesis module of the chain, which translates
segments of assembly code into a hardware netlist, is discussed in details.
Application examples are also presented.
| [
{
"version": "v1",
"created": "Thu, 12 Nov 1998 09:49:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kastrup",
"Bernardo",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
cs/9811022 | Ciprian Chelba | Ciprian Chelba, Frederick Jelinek (CLSP The Johns Hopkins University) | Expoiting Syntactic Structure for Language Modeling | changed ACM-class membership and buggy author names | Proceedings of ACL'98, Montreal, Canada | null | null | cs.CL | null | The paper presents a language model that develops syntactic structure and
uses it to extract meaningful information from the word history, thus enabling
the use of long distance dependencies. The model assigns probability to every
joint sequence of words--binary-parse-structure with headword annotation and
operates in a left-to-right manner --- therefore usable for automatic speech
recognition. The model, its probabilistic parameterization, and a set of
experiments meant to evaluate its predictive power are presented; an
improvement over standard trigram modeling is achieved.
| [
{
"version": "v1",
"created": "Thu, 12 Nov 1998 17:31:17 GMT"
},
{
"version": "v2",
"created": "Tue, 25 Jan 2000 15:37:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chelba",
"Ciprian",
"",
"CLSP The Johns Hopkins University"
],
[
"Jelinek",
"Frederick",
"",
"CLSP The Johns Hopkins University"
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/9811023 | John D. Rogers | Lance Fortnow and John D. Rogers | Complexity limitations on quantum computation | 13 pages, no figures; presented at the 13th annual Conference on
Computational Complexity (1998); submitted to the Journal of Computer and
System Sciences | null | null | CTI-TR-97003 | cs.CC quant-ph | null | We use the powerful tools of counting complexity and generic oracles to help
understand the limitations of the complexity of quantum computation. We show
several results for the probabilistic quantum class BQP.
1. BQP is low for PP, i.e., PP^BQP=PP.
2. There exists a relativized world where P=BQP and the polynomial-time
hierarchy is infinite.
3. There exists a relativized world where BQP does not have complete sets.
4. There exists a relativized world where P=BQP but P is not equal to UP
intersect coUP and one-way functions exist. This gives a relativized answer to
an open question of Simon.
| [
{
"version": "v1",
"created": "Thu, 12 Nov 1998 17:55:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fortnow",
"Lance",
""
],
[
"Rogers",
"John D.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
] |
cs/9811024 | Krzysztof R. Apt | Krzysztof R. Apt | The Essence of Constraint Propagation | To appear in Theoretical Computer Science in the special issue
devoted to the 24th ICALP conference (Bologna 1997) | null | null | null | cs.AI | null | We show that several constraint propagation algorithms (also called (local)
consistency, consistency enforcing, Waltz, filtering or narrowing algorithms)
are instances of algorithms that deal with chaotic iteration. To this end we
propose a simple abstract framework that allows us to classify and compare
these algorithms and to establish in a uniform way their basic properties.
| [
{
"version": "v1",
"created": "Fri, 13 Nov 1998 13:04:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Apt",
"Krzysztof R.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/9811025 | Ciprian Chelba | Ciprian Chelba (CLSP, The Johns Hopkins University, USA) | A Structured Language Model | changed ACM-class membership, Proceedings of ACL-EACL'97, Student
Section, Madrid, Spain | null | null | null | cs.CL | null | The paper presents a language model that develops syntactic structure and
uses it to extract meaningful information from the word history, thus enabling
the use of long distance dependencies. The model assigns probability to every
joint sequence of words - binary-parse-structure with headword annotation. The
model, its probabilistic parametrization, and a set of experiments meant to
evaluate its predictive power are presented.
| [
{
"version": "v1",
"created": "Fri, 13 Nov 1998 16:53:15 GMT"
},
{
"version": "v2",
"created": "Tue, 25 Jan 2000 15:46:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chelba",
"Ciprian",
"",
"CLSP, The Johns Hopkins University, USA"
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/9811026 | Paul Muter | Tarjin Rahman and Paul Muter | Designing an interface to optimize reading with small display windows | null | Human Factors 41 (1999) 106-117 | null | null | cs.HC | null | The electronic presentation of text in small display windows is mushrooming.
In the present paper, four ways of presenting text in a small display window
were examined and compared to a Normal Page condition: rapid serial visual
presentation (RSVP), RSVP with a Completion Meter, Sentence-by-Sentence
presentation, and Sentence-by-Sentence presentation with a Completion Meter.
Dependent measures were reading efficiency - speed and comprehension - and
preference. For designers of hardware or software with small display windows,
the results suggest the following: (1) Though RSVP is disliked by readers, the
present methods of allowing self-pacing and regressions in RSVP, unlike earlier
tested methods, are efficient and feasible. (2) Slower reading in RSVP should
be achieved by increasing pauses between sentences or by repeating sentences,
not by decreasing the within-sentence rate. (3) Completion meters do not
interfere with performance, and are usually preferred. (4) The space-saving
Sentence-by-Sentence format is as efficient and as preferred as the Normal Page
format.
| [
{
"version": "v1",
"created": "Mon, 16 Nov 1998 19:42:30 GMT"
},
{
"version": "v2",
"created": "Wed, 8 Sep 1999 15:36:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rahman",
"Tarjin",
""
],
[
"Muter",
"Paul",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.