id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
sequencelengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/9811027 | J. P. Martin-Flatin | J.P. Martin-Flatin | Push vs. Pull in Web-Based Network Management | 21 pages, submitted to IM'99,
http://tcomwww.epfl.ch/~jpmf/papers/tr_1998_022.pdf | null | null | SSC/1998/022 | cs.NI | null | In this paper, we show how Web technologies can be used effectively to (i)
address some of the deficiencies of traditional IP network management
platforms, and (ii) render these expensive platforms redundant. We build on the
concept of embedded management application, proposed by Wellens and Auerbach,
and present two models of network management application designs that rely on
Web technologies. First, the pull model is based on the request/response
paradigm. It is typically used to perform data polling. Several commercial
management platforms already use Web technologies that rely on this model to
provide for ad hoc management; we demonstrate how to extend this to regular
management. Second, the push model is a novel approach which relies on the
publish/subscribe/distribute paradigm. It is better suited to regular
management than the pull model, and allows administrators to conserve network
bandwidth as well as CPU time on the management station. It can be seen as a
generalization of the paradigm commonly used for notification delivery.
Finally, we introduce the concept of the collapsed network management platform,
where these two models coexist.
| [
{
"version": "v1",
"created": "Fri, 20 Nov 1998 14:33:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Martin-Flatin",
"J. P.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9811028 | Shie-Yuan Wang | H.T. Kung and S.Y. Wang | TCP Trunking | postscript file | null | null | null | cs.NI | null | A TCP trunk is an IP tunnel under TCP control, capable of carrying packets
from any number of user flows. By exploiting properties of TCP, a TCP trunk
provides elastic and reliable transmission over a network, and automatically
shares the network fairly with other competing trunks. Moreover, by aggregating
user flows into a single trunk flow, TCP trunking can significantly reduce the
number of flows that the network needs to manage, thereby allowing use of
simplified management to achieve improved perfor mance. For example, when
dealing with only a small number of TCP trunk flows, a router with a simple
FIFO buffer can experience low packet loss rates.
A TCP trunk is a "soft" circuit in the sense that it requires no flow states
to be maintained inside the network. Setting up a TCP trunk involves only
configuring the two end nodes. This is in contrast with traditional methods of
configuring circuits via signaling of network nodes.
A simple packet-dropping mechanism based on packet accounting at the
transmitter of a TCP trunk assures that, when the trunk reduces its bandwidth
in response to network congestion, user TCP flows carried by the trunk will
reduce their bandwidths by the same proportion. Simu lation results have
demonstrated that TCP trunks can provide improved network performance to users,
while achieving high network utilization.
| [
{
"version": "v1",
"created": "Fri, 20 Nov 1998 20:55:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kung",
"H. T.",
""
],
[
"Wang",
"S. Y.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9811029 | Igor Ivanisevic | I. Ivanisevic and V. Lumelsky | A Human - machine interface for teleoperation of arm manipulators in a
complex environment | Appeared in Proc. IROS, Oct. 1998 | null | null | RL-97006 | cs.RO cs.AI | null | This paper discusses the feasibility of using configuration space (C-space)
as a means of visualization and control in operator-guided real-time motion of
a robot arm manipulator. The motivation is to improve performance of the human
operator in tasks involving the manipulator motion in an environment with
obstacles. Unlike some other motion planning tasks, operators are known to make
expensive mistakes in such tasks, even in a simpler two-dimensional case. They
have difficulty learning better procedures and their performance improves very
little with practice. Using an example of a two-dimensional arm manipulator, we
show that translating the problem into C-space improves the operator
performance rather remarkably, on the order of magnitude compared to the usual
work space control. An interface that makes the transfer possible is described,
and an example of its use in a virtual environment is shown.
| [
{
"version": "v1",
"created": "Fri, 20 Nov 1998 21:06:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ivanisevic",
"I.",
""
],
[
"Lumelsky",
"V.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/9811030 | Otto Schnurr | Gerald Corrigan, Noel Massey and Orhan Karaali | Generating Segment Durations in a Text-To-Speech System: A Hybrid
Rule-Based/Neural Network Approach | 4 pages, PostScript | Proceedings of Eurospeech (1997) 2675-2678. Rhodes, Greece | null | null | cs.NE cs.HC | null | A combination of a neural network with rule firing information from a
rule-based system is used to generate segment durations for a text-to-speech
system. The system shows a slight improvement in performance over a neural
network system without the rule firing information. Synthesized speech using
segment durations was accepted by listeners as having about the same quality as
speech generated using segment durations extracted from natural speech.
| [
{
"version": "v1",
"created": "Tue, 24 Nov 1998 22:51:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Corrigan",
"Gerald",
""
],
[
"Massey",
"Noel",
""
],
[
"Karaali",
"Orhan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
cs/9811031 | Otto Schnurr | Orhan Karaali, Gerald Corrigan and Ira Gerson | Speech Synthesis with Neural Networks | 6 pages, PostScript | World Congress on Neural Networks (1996) 45-50. San Diego | null | null | cs.NE cs.HC | null | Text-to-speech conversion has traditionally been performed either by
concatenating short samples of speech or by using rule-based systems to convert
a phonetic representation of speech into an acoustic representation, which is
then converted into speech. This paper describes a system that uses a
time-delay neural network (TDNN) to perform this phonetic-to-acoustic mapping,
with another neural network to control the timing of the generated speech. The
neural network system requires less memory than a concatenation system, and
performed well in tests comparing it to commercial systems using other
technologies.
| [
{
"version": "v1",
"created": "Tue, 24 Nov 1998 23:33:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Karaali",
"Orhan",
""
],
[
"Corrigan",
"Gerald",
""
],
[
"Gerson",
"Ira",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
cs/9811032 | Otto Schnurr | Orhan Karaali, Gerald Corrigan, Ira Gerson and Noel Massey | Text-To-Speech Conversion with Neural Networks: A Recurrent TDNN
Approach | 4 pages, PostScript | Proceedings of Eurospeech (1997) 561-564. Rhodes, Greece | null | null | cs.NE cs.HC | null | This paper describes the design of a neural network that performs the
phonetic-to-acoustic mapping in a speech synthesis system. The use of a
time-domain neural network architecture limits discontinuities that occur at
phone boundaries. Recurrent data input also helps smooth the output parameter
tracks. Independent testing has demonstrated that the voice quality produced by
this system compares favorably with speech from existing commercial
text-to-speech systems.
| [
{
"version": "v1",
"created": "Tue, 24 Nov 1998 23:51:56 GMT"
}
] | 2016-08-31T00:00:00 | [
[
"Karaali",
"Orhan",
""
],
[
"Corrigan",
"Gerald",
""
],
[
"Gerson",
"Ira",
""
],
[
"Massey",
"Noel",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
cs/9812001 | Li Hang | Hang LI (NEC Corporation) | A Probabilistic Approach to Lexical Semantic Knowledge Acquisition and S
tructural Disambiguation | PhD. Thesis, Univ. of Tokyo, July 1998; latex file, eps figures; 136
pages, page numbers do not comfort to the original; ps font changes | null | null | null | cs.CL | null | In this thesis, I address the problem of automatically acquiring lexical
semantic knowledge, especially that of case frame patterns, from large corpus
data and using the acquired knowledge in structural disambiguation. The
approach I adopt has the following characteristics: (1) dividing the problem
into three subproblems: case slot generalization, case dependency learning, and
word clustering (thesaurus construction). (2) viewing each subproblem as that
of statistical estimation and defining probability models for each subproblem,
(3) adopting the Minimum Description Length (MDL) principle as learning
strategy, (4) employing efficient learning algorithms, and (5) viewing the
disambiguation problem as that of statistical prediction. Major contributions
of this thesis include: (1) formalization of the lexical knowledge acquisition
problem, (2) development of a number of learning methods for lexical knowledge
acquisition, and (3) development of a high-performance disambiguation method.
| [
{
"version": "v1",
"created": "Tue, 1 Dec 1998 11:43:32 GMT"
},
{
"version": "v2",
"created": "Wed, 2 Dec 1998 01:24:22 GMT"
},
{
"version": "v3",
"created": "Thu, 3 Dec 1998 04:18:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"LI",
"Hang",
"",
"NEC Corporation"
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/9812002 | Aristidis Likas | A. Likas and I. E. Lagaris | Training Reinforcement Neurocontrollers Using the Polytope Algorithm | null | null | null | Preprint, Dept. of Computer Science, Univ. of Ioannina, 1996 | cs.NE | null | A new training algorithm is presented for delayed reinforcement learning
problems that does not assume the existence of a critic model and employs the
polytope optimization algorithm to adjust the weights of the action network so
that a simple direct measure of the training performance is maximized.
Experimental results from the application of the method to the pole balancing
problem indicate improved training performance compared with critic-based and
genetic reinforcement approaches.
| [
{
"version": "v1",
"created": "Thu, 3 Dec 1998 09:08:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Likas",
"A.",
""
],
[
"Lagaris",
"I. E.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
cs/9812003 | Aristidis Likas | I. E. Lagaris, A. Likas and D. G. Papageorgiou | Neural Network Methods for Boundary Value Problems Defined in
Arbitrarily Shaped Domains | null | null | null | Preprint no. 7-98, Dept. of Computer Science, Univ. of Ioannina,
Greece, 1998 | cs.NE cond-mat.dis-nn cs.NA math-ph math.MP math.NA physics.comp-ph | null | Partial differential equations (PDEs) with Dirichlet boundary conditions
defined on boundaries with simple geometry have been succesfuly treated using
sigmoidal multilayer perceptrons in previous works. This article deals with the
case of complex boundary geometry, where the boundary is determined by a number
of points that belong to it and are closely located, so as to offer a
reasonable representation. Two networks are employed: a multilayer perceptron
and a radial basis function network. The later is used to account for the
satisfaction of the boundary conditions. The method has been successfuly tested
on two-dimensional and three-dimensional PDEs and has yielded accurate
solutions.
| [
{
"version": "v1",
"created": "Thu, 3 Dec 1998 10:09:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lagaris",
"I. E.",
""
],
[
"Likas",
"A.",
""
],
[
"Papageorgiou",
"D. G.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Physics",
"code": "math-ph",
"description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Mathematics",
"code": "math.MP",
"description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Mathematics",
"code": "math.NA",
"description": "Numerical algorithms for problems in analysis and algebra, scientific computation",
"span": "(Numerical Analysis)"
},
{
"class": "Physics",
"code": "physics.comp-ph",
"description": "All aspects of computational science applied to physics.",
"span": "(Computational Physics)"
}
] |
cs/9812004 | Mark D. Roberts | Mark D. Roberts | Name Strategy: Its Existence and Implications | 32 pages, 2 ascii diagrams | Int.J.Computational Cognition Volume 3 Pages 1-14 (2005). | null | null | cs.CL cs.AI math.HO | null | It is argued that colour name strategy, object name strategy, and chunking
strategy in memory are all aspects of the same general phenomena, called
stereotyping. It is pointed out that the Berlin-Kay universal partial ordering
of colours and the frequency of traffic accidents classified by colour are
surprisingly similar. Some consequences of the existence of a name strategy for
the philosophy of language and mathematics are discussed. It is argued that
real valued quantities occur {\it ab initio}. The implication of real valued
truth quantities is that the {\bf Continuum Hypothesis} of pure mathematics is
side-stepped. The existence of name strategy shows that thought/sememes and
talk/phonemes can be separate, and this vindicates the assumption of thought
occurring before talk used in psycholinguistic speech production models.
| [
{
"version": "v1",
"created": "Fri, 4 Dec 1998 12:28:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Roberts",
"Mark D.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Mathematics",
"code": "math.HO",
"description": "Biographies, philosophy of mathematics, mathematics education, recreational mathematics, communication of mathematics, ethics in mathematics",
"span": "(History and Overview)"
}
] |
cs/9812005 | Oskari Heinonen | Oskari Heinonen (University of Helsinki) | Optimal Multi-Paragraph Text Segmentation by Dynamic Programming | 5 pages, 3 eps figures, LaTeX2e; includes errata; uses colacl, epsf,
times | Proceedings of COLING-ACL '98, pp. 1484-1486, Montreal, Canada | null | null | cs.CL | null | There exist several methods of calculating a similarity curve, or a sequence
of similarity values, representing the lexical cohesion of successive text
constituents, e.g., paragraphs. Methods for deciding the locations of fragment
boundaries are, however, scarce. We propose a fragmentation method based on
dynamic programming. The method is theoretically sound and guaranteed to
provide an optimal splitting on the basis of a similarity curve, a preferred
fragment length, and a cost function defined. The method is especially useful
when control on fragment size is of importance.
| [
{
"version": "v1",
"created": "Fri, 4 Dec 1998 16:16:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Heinonen",
"Oskari",
"",
"University of Helsinki"
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/9812006 | Otto Schnurr | Orhan Karaali, Gerald Corrigan, Noel Massey, Corey Miller, Otto
Schnurr and Andrew Mackie | A High Quality Text-To-Speech System Composed of Multiple Neural
Networks | Source link (9812006.tar.gz) contains: 1 PostScript file (4 pages)
and 3 WAV audio files. If your system does not support Windows WAV files, try
a tool like "sox" to translate the audio into a format of your choice | Proceedings of the IEEE International Conference on Acoustics,
Speech and Signal Processing (1998) 2:1237-1240. Seattle, Washington | 10.1109/ICASSP.1998.675495 | null | cs.NE cs.HC | null | While neural networks have been employed to handle several different
text-to-speech tasks, ours is the first system to use neural networks
throughout, for both linguistic and acoustic processing. We divide the
text-to-speech task into three subtasks, a linguistic module mapping from text
to a linguistic representation, an acoustic module mapping from the linguistic
representation to speech, and a video module mapping from the linguistic
representation to animated images. The linguistic module employs a
letter-to-sound neural network and a postlexical neural network. The acoustic
module employs a duration neural network and a phonetic neural network. The
visual neural network is employed in parallel to the acoustic module to drive a
talking head. The use of neural networks that can be retrained on the
characteristics of different voices and languages affords our system a degree
of adaptability and naturalness heretofore unavailable.
| [
{
"version": "v1",
"created": "Sat, 5 Dec 1998 00:00:57 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Karaali",
"Orhan",
""
],
[
"Corrigan",
"Gerald",
""
],
[
"Massey",
"Noel",
""
],
[
"Miller",
"Corey",
""
],
[
"Schnurr",
"Otto",
""
],
[
"Mackie",
"Andrew",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
cs/9812007 | David Karger | David R. Karger | Minimum Cuts in Near-Linear Time | null | null | null | null | cs.DS | null | We significantly improve known time bounds for solving the minimum cut
problem on undirected graphs. We use a ``semi-duality'' between minimum cuts
and maximum spanning tree packings combined with our previously developed
random sampling techniques. We give a randomized algorithm that finds a minimum
cut in an m-edge, n-vertex graph with high probability in O(m log^3 n) time. We
also give a simpler randomized algorithm that finds all minimum cuts with high
probability in O(n^2 log n) time. This variant has an optimal RNC
parallelization. Both variants improve on the previous best time bound of O(n^2
log^3 n). Other applications of the tree-packing approach are new, nearly tight
bounds on the number of near minimum cuts a graph may have and a new data
structure for representing them in a space-efficient manner.
| [
{
"version": "v1",
"created": "Tue, 8 Dec 1998 21:29:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Karger",
"David R.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/9812008 | David Karger | David Karger, Rajeev Motwani, and Madhu Sudan | Approximate Graph Coloring by Semidefinite Programming | null | JACM 45(2), mar. 1998, pp.246--265 | null | null | cs.DS | null | We consider the problem of coloring k-colorable graphs with the fewest
possible colors. We present a randomized polynomial time algorithm that colors
a 3-colorable graph on $n$ vertices with min O(Delta^{1/3} log^{1/2} Delta log
n), O(n^{1/4} log^{1/2} n) colors where Delta is the maximum degree of any
vertex. Besides giving the best known approximation ratio in terms of n, this
marks the first non-trivial approximation result as a function of the maximum
degree Delta. This result can be generalized to k-colorable graphs to obtain a
coloring using min O(Delta^{1-2/k} log^{1/2} Delta log n), O(n^{1-3/(k+1)}
log^{1/2} n) colors. Our results are inspired by the recent work of Goemans and
Williamson who used an algorithm for semidefinite optimization problems, which
generalize linear programs, to obtain improved approximations for the MAX CUT
and MAX 2-SAT problems. An intriguing outcome of our work is a duality
relationship established between the value of the optimum solution to our
semidefinite program and the Lovasz theta-function. We show lower bounds on the
gap between the optimum solution of our semidefinite program and the actual
chromatic number; by duality this also demonstrates interesting new facts about
the theta-function.
| [
{
"version": "v1",
"created": "Tue, 8 Dec 1998 22:03:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Karger",
"David",
""
],
[
"Motwani",
"Rajeev",
""
],
[
"Sudan",
"Madhu",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/9812009 | Fabio Crestani | Fabio Crestani | Vocal Access to a Newspaper Archive: Design Issues and Preliminary
Investigation | null | null | null | null | cs.DL | null | This paper presents the design and the current prototype implementation of an
interactive vocal Information Retrieval system that can be used to access
articles of a large newspaper archive using a telephone. The results of
preliminary investigation into the feasibility of such a system are also
presented.
| [
{
"version": "v1",
"created": "Thu, 10 Dec 1998 13:49:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Crestani",
"Fabio",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
cs/9812010 | Erik T. Mueller | Erik T. Mueller, Michael G. Dyer | Towards a computational theory of human daydreaming | 10 pages. Appears in: Proceedings of the Seventh Annual Conference of
the Cognitive Science Society (pp. 120-129). Irvine, CA. 1985 | null | null | null | cs.AI | null | This paper examines the phenomenon of daydreaming: spontaneously recalling or
imagining personal or vicarious experiences in the past or future. The
following important roles of daydreaming in human cognition are postulated:
plan preparation and rehearsal, learning from failures and successes, support
for processes of creativity, emotion regulation, and motivation.
A computational theory of daydreaming and its implementation as the program
DAYDREAMER are presented. DAYDREAMER consists of 1) a scenario generator based
on relaxed planning, 2) a dynamic episodic memory of experiences used by the
scenario generator, 3) a collection of personal goals and control goals which
guide the scenario generator, 4) an emotion component in which daydreams
initiate, and are initiated by, emotional states arising from goal outcomes,
and 5) domain knowledge of interpersonal relations and common everyday
occurrences.
The role of emotions and control goals in daydreaming is discussed. Four
control goals commonly used in guiding daydreaming are presented:
rationalization, failure/success reversal, revenge, and preparation. The role
of episodic memory in daydreaming is considered, including how daydreamed
information is incorporated into memory and later used. An initial version of
DAYDREAMER which produces several daydreams (in English) is currently running.
| [
{
"version": "v1",
"created": "Thu, 10 Dec 1998 16:29:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mueller",
"Erik T.",
""
],
[
"Dyer",
"Michael G.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/9812011 | Erik T. Mueller | Erik T. Mueller, Johanna D. Moore, and Gerald J. Popek | A nested transaction mechanism for LOCUS | 17 pages. Appears in: Proceedings of the Ninth ACM Symposium on
Operating Systems Principles (pp. 71-87). Operating Systems Review. Vol. 17,
No. 5. New York: Association for Computing Machinery. 1983 | null | null | null | cs.OS cs.DC | null | A working implementation of nested transactions has been produced for LOCUS,
an integrated distributed operating system which provides a high degree of
network transparency. Several aspects of our mechanism are novel. First, the
mechanism allows a transaction to access objects directly without regard to the
location of the object. Second, processes running on behalf of a single
transaction may be located at many sites. Thus there is no need to invoke a new
transaction to perform processing or access objects at a remote site. Third,
unlike other environments, LOCUS allows replication of data objects at more
than one site in the network, and this capability is incorporated into the
transaction mechanism. If the copy of an object that is currently being
accessed becomes unavailable, it is possible to continue work by using another
one of the replicated copies. Finally, an efficient orphan removal algorithm is
presented, and the problem of providing continued operation during network
partitions is addressed in detail.
| [
{
"version": "v1",
"created": "Thu, 10 Dec 1998 16:49:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mueller",
"Erik T.",
""
],
[
"Moore",
"Johanna D.",
""
],
[
"Popek",
"Gerald J.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OS",
"description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.",
"span": "(Operating Systems)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/9812012 | John Watrous | John Watrous (University of Montreal) | Quantum simulations of classical random walks and undirected graph
connectivity | 11 pages, submitted to Complexity'99 | null | null | null | cs.CC quant-ph | null | It is not currently known if quantum Turing machines can efficiently simulate
probabilistic computations in the space-bounded case. In this paper we show
that space-bounded quantum Turing machines can efficiently simulate a limited
class of random processes: random walks on undirected graphs. By means of such
simulations, it is demonstrated that the undirected graph connectivity problem
for regular graphs can be solved by one-sided error quantum Turing machines
that run in logspace and halt absolutely. It follows that symmetric logspace is
contained in the quantum analogue of randomized logspace.
| [
{
"version": "v1",
"created": "Fri, 11 Dec 1998 00:06:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Watrous",
"John",
"",
"University of Montreal"
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
] |
cs/9812013 | Babak Hodjat | Babak Hodjat and Makoto Amamiya | The Self-Organizing Symbiotic Agent | 12 pages, 2 figures | null | null | null | cs.NE cs.CC | null | In [N. A. Baas, Emergence, Hierarchies, and Hyper-structures, in C.G. Langton
ed., Artificial Life III, Addison Wesley, 1994.] a general framework for the
study of Emergence and hyper-structure was presented. This approach is mostly
concerned with the description of such systems. In this paper we will try to
bring forth a different aspect of this model we feel will be useful in the
engineering of agent based solutions, namely the symbiotic approach. In this
approach a self-organizing method of dividing the more complex "main-problem"
to a hyper-structure of "sub-problems" with the aim of reducing complexity is
desired. A description of the general problem will be given along with some
instances of related work. This paper is intended to serve as an introductory
challenge for general solutions to the described problem.
| [
{
"version": "v1",
"created": "Fri, 11 Dec 1998 20:51:38 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hodjat",
"Babak",
""
],
[
"Amamiya",
"Makoto",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/9812014 | Babak Hodjat | Babak Hodjat, Christopher J. Savoie, and Makoto Amamiya | An Adaptive Agent Oriented Software Architecture | 14 pages, 5 figures. Presemted at PRICAI '98 (5th Pacific Rim
Conference on Artificial Intelligence) | null | null | null | cs.DC cs.MA | null | A new approach to software design based on an agent-oriented architecture is
presented. Unlike current research, we consider software to be designed and
implemented with this methodology in mind. In this approach agents are
considered adaptively communicating concurrent modules which are divided into a
white box module responsible for the communications and learning, and a black
box which is the independent specialized processes of the agent. A distributed
Learning policy is also introduced for adaptability.
| [
{
"version": "v1",
"created": "Fri, 11 Dec 1998 22:36:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hodjat",
"Babak",
""
],
[
"Savoie",
"Christopher J.",
""
],
[
"Amamiya",
"Makoto",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
cs/9812015 | Babak Hodjat | Babak Hodjat and Makoto Amamiya | Adaptive Interaction Using the Adaptive Agent Oriented Software
Architecture (AAOSA) | 14 pages, 4 figures | null | null | null | cs.HC cs.DC | null | User interfaces that adapt their characteristics to those of the user are
referred to as adaptive interfaces. We propose Adaptive Agent Oriented Software
Architecture (AAOSA) as a new way of designing adaptive interfaces. AAOSA is a
new approach to software design based on an agent-oriented architecture. In
this approach agents are considered adaptively communicating concurrent modules
which are divided into a white box module responsible for the communications
and learning, and a black box which is responsible for the independent
specialized processes of the agent. A distributed learning policy that makes
use of this architecture is used for purposes of system adaptability.
| [
{
"version": "v1",
"created": "Fri, 11 Dec 1998 23:05:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hodjat",
"Babak",
""
],
[
"Amamiya",
"Makoto",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/9812016 | Steve Hitchcock | Steve Hitchcock, Les Carr and Wendy Hall | Making the most of electronic journals | 11 pages | null | null | null | cs.DL | null | As most electronic journals available today have been derived from print
originals, print journals have become a vital element in the broad development
of electronic journals publishing. Further dependence on the print publishing
model, however, will be a constraint on the continuing development of
e-journals, and a series of conflicts are likely to arise. Making the most of
e-journals requires that a distinctive new publishing model is developed. We
consider some of the issues that will be fundamental in this new model,
starting with user motivations and some reported publisher experiences, both of
which suggest a broadening desire for comprehensive linked archives. This leads
in turn to questions about the impact of rights assignment by authors, in
particular the common practice of giving exlusive rights to publishers for
individual works. Some non-prescriptive solutions are suggested, and four steps
towards optimum e-journals are proposed.
| [
{
"version": "v1",
"created": "Mon, 14 Dec 1998 18:24:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hitchcock",
"Steve",
""
],
[
"Carr",
"Les",
""
],
[
"Hall",
"Wendy",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
cs/9812017 | Wolfgang Slany | Andreas Raggl, Wolfgang Slany | A reusable iterative optimization software library to solve
combinatorial problems with approximate reasoning | 33 pages, 9 figures; for a project overview see
http://www.dbai.tuwien.ac.at/proj/StarFLIP/ | International Journal of Approximate Reasoning, 19(1--2):161--191,
July/August 1998 | null | DBAI-TR-98-23 | cs.AI | null | Real world combinatorial optimization problems such as scheduling are
typically too complex to solve with exact methods. Additionally, the problems
often have to observe vaguely specified constraints of different importance,
the available data may be uncertain, and compromises between antagonistic
criteria may be necessary. We present a combination of approximate reasoning
based constraints and iterative optimization based heuristics that help to
model and solve such problems in a framework of C++ software libraries called
StarFLIP++. While initially developed to schedule continuous caster units in
steel plants, we present in this paper results from reusing the library
components in a shift scheduling system for the workforce of an industrial
production plant.
| [
{
"version": "v1",
"created": "Tue, 15 Dec 1998 21:45:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Raggl",
"Andreas",
""
],
[
"Slany",
"Wolfgang",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/9812018 | Stephan Busemann | Stephan Busemann and Helmut Horacek (DFKI GmbH) | A Flexible Shallow Approach to Text Generation | LaTeX, 10 pages | Proc. 9th International Workshop on Natural Language Generation,
Niagara-on-the-Lake, Canada, August 1998, 238-247 | null | null | cs.CL | null | In order to support the efficient development of NL generation systems, two
orthogonal methods are currently pursued with emphasis: (1) reusable, general,
and linguistically motivated surface realization components, and (2) simple,
task-oriented template-based techniques. In this paper we argue that, from an
application-oriented perspective, the benefits of both are still limited. In
order to improve this situation, we suggest and evaluate shallow generation
methods associated with increased flexibility. We advise a close connection
between domain-motivated and linguistic ontologies that supports the quick
adaptation to new tasks and domains, rather than the reuse of general
resources. Our method is especially designed for generating reports with
limited linguistic variations.
| [
{
"version": "v1",
"created": "Wed, 16 Dec 1998 16:37:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Busemann",
"Stephan",
"",
"DFKI GmbH"
],
[
"Horacek",
"Helmut",
"",
"DFKI GmbH"
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/9812019 | Peter M. Hines | Peter M. Hines | Symmetries and transitions of bounded Turing machines | 21 pages, submitted | null | null | null | cs.LO math.CT | null | We consider the structures given by repeatedly generalising the definition of
finite state automata by symmetry considerations, and constructing analogues of
transition monoids at each step. This approach first gives us non-deterministic
automata, then (non-deterministic) two-way automata and bounded Turing machines
--- that is, Turing machines where the read / write head is unable to move past
the end of the input word.
In the case of two-way automata, the transition monoids generalise to
endomorphism monoids in compact closed categories. These use Girard's
resolution formula (from the Geometry of Interaction representation of linear
logic) to construct the images of singleton words.
In the case of bounded Turing machines, the transition homomorphism
generalises to a monoid homomorphism from the natural numbers to a monoid
constructed from the union of endomorphism monoids of a compact closed
category, together with an appropriate composition. These use Girard's
execution formula (also from the Geometry of Interaction representation of
linear logic) to construct images of singletons.
| [
{
"version": "v1",
"created": "Wed, 16 Dec 1998 20:49:46 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hines",
"Peter M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Mathematics",
"code": "math.CT",
"description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra",
"span": "(Category Theory)"
}
] |
cs/9812020 | Carl Lagoze | Joseph Y. Halpern, Carl Lagoze | The Computing Research Repository: Promoting the Rapid Dissemination and
Archiving of Computer Science Research | Submission to ACM DL99 | null | null | null | cs.DL | null | We describe the Computing Research Repository (CoRR), a new electronic
archive for rapid dissemination and archiving of computer science research
results. CoRR was initiated in September 1998 through the cooperation of ACM,
LANL (Los Alamos National Laboratory) e-Print archive, and NCSTRL (Networked
Computer Science Technical Research Library. Through its implementation of the
Dienst protocol, CoRR combines the open and extensible architecture of NCSTRL
with the reliable access and well-established management practices of the LANL
XXX e-Print repository. This architecture will allow integration with other
e-Print archives and provides a foundation for a future broad-based scholarly
digital library. We describe the decisions that were made in creating CoRR, the
architecture of the CoRR/NCSTRL interoperation, and issues that have arisen
during the operation of CoRR.
| [
{
"version": "v1",
"created": "Tue, 22 Dec 1998 11:49:29 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Halpern",
"Joseph Y.",
""
],
[
"Lagoze",
"Carl",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
cs/9812021 | Antal van den Bosch | Walter Daelemans, Antal van den Bosch, and Jakub Zavrel | Forgetting Exceptions is Harmful in Language Learning | 31 pages, 7 figures, 10 tables. uses 11pt, fullname, a4wide tex
styles. Pre-print version of article to appear in Machine Learning 11:1-3,
Special Issue on Natural Language Learning. Figures on page 22 slightly
compressed to avoid page overload | null | null | null | cs.CL cs.LG | null | We show that in language learning, contrary to received wisdom, keeping
exceptional training instances in memory can be beneficial for generalization
accuracy. We investigate this phenomenon empirically on a selection of
benchmark natural language processing tasks: grapheme-to-phoneme conversion,
part-of-speech tagging, prepositional-phrase attachment, and base noun phrase
chunking. In a first series of experiments we combine memory-based learning
with training set editing techniques, in which instances are edited based on
their typicality and class prediction strength. Results show that editing
exceptional instances (with low typicality or low class prediction strength)
tends to harm generalization accuracy. In a second series of experiments we
compare memory-based learning and decision-tree learning methods on the same
selection of tasks, and find that decision-tree learning often performs worse
than memory-based learning. Moreover, the decrease in performance can be linked
to the degree of abstraction from exceptions (i.e., pruning or eagerness). We
provide explanations for both results in terms of the properties of the natural
language processing tasks and the learning algorithms.
| [
{
"version": "v1",
"created": "Tue, 22 Dec 1998 16:33:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Daelemans",
"Walter",
""
],
[
"Bosch",
"Antal van den",
""
],
[
"Zavrel",
"Jakub",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/9812022 | Francesco Scarcello | G. Gottlob, N. Leone, F. Scarcello | Hypertree Decompositions and Tractable Queries | 30 pages, 7 figures, uses fancybox, epsfig, epic, and eepic | Journal of Computer and System Sciences, 64(3):579-627, 2002 | 10.1006/jcss.2001.1809 | DBAI-TR-98/21 | cs.DB cs.AI | null | Several important decision problems on conjunctive queries (CQs) are
NP-complete in general but become tractable, and actually highly
parallelizable, if restricted to acyclic or nearly acyclic queries. Examples
are the evaluation of Boolean CQs and query containment. These problems were
shown tractable for conjunctive queries of bounded treewidth and of bounded
degree of cyclicity. The so far most general concept of nearly acyclic queries
was the notion of queries of bounded query-width introduced by Chekuri and
Rajaraman (1997). While CQs of bounded query width are tractable, it remained
unclear whether such queries are efficiently recognizable. Chekuri and
Rajaraman stated as an open problem whether for each constant k it can be
determined in polynomial time if a query has query width less than or equal to
k. We give a negative answer by proving this problem NP-complete (specifically,
for k=4). In order to circumvent this difficulty, we introduce the new concept
of hypertree decomposition of a query and the corresponding notion of hypertree
width. We prove: (a) for each k, the class of queries with query width bounded
by k is properly contained in the class of queries whose hypertree width is
bounded by k; (b) unlike query width, constant hypertree-width is efficiently
recognizable; (c) Boolean queries of constant hypertree width can be
efficiently evaluated.
| [
{
"version": "v1",
"created": "Mon, 28 Dec 1998 12:30:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gottlob",
"G.",
""
],
[
"Leone",
"N.",
""
],
[
"Scarcello",
"F.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/9812023 | Soumyadeep Paul | Soumyadeep Paul, Sudipta N. Sinha and Amitabha Mukerjee | Virtual Kathakali : Gesture Driven Metamorphosis | Proceedings of International Conference on Knowledge Based Computer
Systems, Mumbai, India, Dec '98. 12 pages, 19 figures | null | null | null | cs.HC | null | Training in motor skills such as athletics, dance, or gymnastics is not
possible today except in the direct presence of the coach/instructor. This
paper describes a computer vision based gesture recognition system which is
used to metamorphose the user into a Virtual person, e.g. as a Kathakali
dancer, which is graphically recreated at a near or diatant location. Thus this
can be seen by an off-site coach using low-bandwidth joint-motion data which
permits real time animation. The metamorphosis involves altering the appearance
and identity of the user and also creating a specific environment possibly in
interaction with other virtual creatures.
A robust vision module is used to identify the user, based on very simple
binary image processing in real time which also manages to resolve
self-occlusion, correct for clothing/colour and other variations among users.
Gestures are identified by locating key points at the shoulder, elbow and wrist
joint, which are then recreated in an articulated humanoid model, which in this
instance, representes a Kathakali dancer in elaborate traditional dress. Unlike
glove based or other and movement tracking systems, this application requires
the user to wear no hardwire devices and is aimed at making gesture tracking
simpler, cheaper, and more user friendly.
| [
{
"version": "v1",
"created": "Tue, 29 Dec 1998 16:50:27 GMT"
}
] | 2009-09-25T00:00:00 | [
[
"Paul",
"Soumyadeep",
""
],
[
"Sinha",
"Sudipta N.",
""
],
[
"Mukerjee",
"Amitabha",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
cs/9901001 | Lex Weaver | Jonathan Baxter, Andrew Tridgell, and Lex Weaver | TDLeaf(lambda): Combining Temporal Difference Learning with Game-Tree
Search | 5 pages. Also in Proceedings of the Ninth Australian Conference on
Neural Networks (ACNN'98), Brisbane QLD, February 1998, pages 168-172 | Australian Journal of Intelligent Information Processing Systems,
ISSN 1321-2133, Vol. 5 No. 1, Autumn 1998, pages 39-43 | null | null | cs.LG cs.AI | null | In this paper we present TDLeaf(lambda), a variation on the TD(lambda)
algorithm that enables it to be used in conjunction with minimax search. We
present some experiments in both chess and backgammon which demonstrate its
utility and provide comparisons with TD(lambda) and another less radical
variant, TD-directed(lambda). In particular, our chess program, ``KnightCap,''
used TDLeaf(lambda) to learn its evaluation function while playing on the Free
Internet Chess Server (FICS, fics.onenet.net). It improved from a 1650 rating
to a 2100 rating in just 308 games. We discuss some of the reasons for this
success and the relationship between our results and Tesauro's results in
backgammon.
| [
{
"version": "v1",
"created": "Tue, 5 Jan 1999 00:56:54 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Baxter",
"Jonathan",
""
],
[
"Tridgell",
"Andrew",
""
],
[
"Weaver",
"Lex",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/9901002 | Lex Weaver | Jonathan Baxter, Andrew Tridgell, and Lex Weaver | KnightCap: A chess program that learns by combining TD(lambda) with
game-tree search | 9 pages | MACHINE LEARNING Proceedings of the Fifteenth International
Conference (ICML '98), ISBN 1-55860-556-8, ISSN 1049-1910, Madison WISCONSIN,
July 24-27 1998, pages 28-36 | null | null | cs.LG cs.AI | null | In this paper we present TDLeaf(lambda), a variation on the TD(lambda)
algorithm that enables it to be used in conjunction with game-tree search. We
present some experiments in which our chess program ``KnightCap'' used
TDLeaf(lambda) to learn its evaluation function while playing on the Free
Internet Chess Server (FICS, fics.onenet.net). The main success we report is
that KnightCap improved from a 1650 rating to a 2150 rating in just 308 games
and 3 days of play. As a reference, a rating of 1650 corresponds to about level
B human play (on a scale from E (1000) to A (1800)), while 2150 is human master
level. We discuss some of the reasons for this success, principle among them
being the use of on-line, rather than self-play.
| [
{
"version": "v1",
"created": "Sun, 10 Jan 1999 03:21:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Baxter",
"Jonathan",
""
],
[
"Tridgell",
"Andrew",
""
],
[
"Weaver",
"Lex",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/9901003 | Yao Han | M. Denecker and V. Marek and M. Truszczynski | Fixpoint 3-valued semantics for autoepistemic logic | Proceedings of the Fifteenth National Conference on Artificial
Intelligence (AAAI-98), pages 840--845, (MIT Press, 1998) | null | null | null | cs.LO cs.AI | null | The paper presents a constructive fixpoint semantics for autoepistemic logic
(AEL). This fixpoint characterizes a unique but possibly three-valued belief
set of an autoepistemic theory. It may be three-valued in the sense that for a
subclass of formulas F, the fixpoint may not specify whether F is believed or
not. The paper presents a constructive 3-valued semantics for autoepistemic
logic (AEL). We introduce a derivation operator and define the semantics as its
least fixpoint. The semantics is 3-valued in the sense that, for some formulas,
the least fixpoint does not specify whether they are believed or not. We show
that complete fixpoints of the derivation operator correspond to Moore's stable
expansions. In the case of modal representations of logic programs our least
fixpoint semantics expresses well-founded semantics or 3-valued Fitting-Kunen
semantics (depending on the embedding used). We show that, computationally, our
semantics is simpler than the semantics proposed by Moore (assuming that the
polynomial hierarchy does not collapse).
| [
{
"version": "v1",
"created": "Tue, 12 Jan 1999 18:44:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Denecker",
"M.",
""
],
[
"Marek",
"V.",
""
],
[
"Truszczynski",
"M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/9901004 | Vladimir Pestov | Vladimir Pestov | On the geometry of similarity search: dimensionality curse and
concentration of measure | 7 pages, LaTeX 2e | Information Processing Letters 73 (2000), 47-51. | null | RP-99-01, Victoria University of Wellington, NZ | cs.IR cs.CG cs.DB cs.DS | null | We suggest that the curse of dimensionality affecting the similarity-based
search in large datasets is a manifestation of the phenomenon of concentration
of measure on high-dimensional structures. We prove that, under certain
geometric assumptions on the query domain $\Omega$ and the dataset $X$, if
$\Omega$ satisfies the so-called concentration property, then for most query
points $x^\ast$ the ball of radius $(1+\e)d_X(x^\ast)$ centred at $x^\ast$
contains either all points of $X$ or else at least $C_1\exp(-C_2\e^2n)$ of
them. Here $d_X(x^\ast)$ is the distance from $x^\ast$ to the nearest neighbour
in $X$ and $n$ is the dimension of $\Omega$.
| [
{
"version": "v1",
"created": "Tue, 12 Jan 1999 21:56:39 GMT"
}
] | 2009-11-17T00:00:00 | [
[
"Pestov",
"Vladimir",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/9901005 | Tom O'Hara | Janyce Wiebe, Thomas P. O'Hara, Thorsten Ohrstrom-Sandgren, and
Kenneth K. McKeever (New Mexico State University) | An Empirical Approach to Temporal Reference Resolution (journal version) | Tar archive with LaTeX source, postscript figures, and style files | Journal of Artificial Intelligence Research (JAIR), 9:247-293 | null | null | cs.CL | null | Scheduling dialogs, during which people negotiate the times of appointments,
are common in everyday life. This paper reports the results of an in-depth
empirical investigation of resolving explicit temporal references in scheduling
dialogs. There are four phases of this work: data annotation and evaluation,
model development, system implementation and evaluation, and model evaluation
and analysis. The system and model were developed primarily on one set of data,
and then applied later to a much more complex data set, to assess the
generalizability of the model for the task being performed. Many different
types of empirical methods are applied to pinpoint the strengths and weaknesses
of the approach. Detailed annotation instructions were developed and an
intercoder reliability study was performed, showing that naive annotators can
reliably perform the targeted annotations. A fully automatic system has been
developed and evaluated on unseen test data, with good results on both data
sets. We adopt a pure realization of a recency-based focus model to identify
precisely when it is and is not adequate for the task being addressed. In
addition to system results, an in-depth evaluation of the model itself is
presented, based on detailed manual annotations. The results are that few
errors occur specifically due to the model of focus being used, and the set of
anaphoric relations defined in the model are low in ambiguity for both data
sets.
| [
{
"version": "v1",
"created": "Wed, 13 Jan 1999 17:37:00 GMT"
}
] | 2009-09-25T00:00:00 | [
[
"Wiebe",
"Janyce",
"",
"New Mexico State University"
],
[
"O'Hara",
"Thomas P.",
"",
"New Mexico State University"
],
[
"Ohrstrom-Sandgren",
"Thorsten",
"",
"New Mexico State University"
],
[
"McKeever",
"Kenneth K.",
"",
"New Mexico State University"
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/9901006 | Alexander Yu. Vlasov | Alexander Yu. Vlasov (FCR/IRH, St.-Petersburg, Russia) | Object Oriented and Functional Programming for Symbolic Manipulation | 6 pages, LaTeX, poster presentation at 5th International Workshop on
New Computing Techniques in Physics Research (AIHENP'96),
http://lapphp0.in2p3.fr/aihep/aihep96/abstracts/sm.html , EPFL Lausanne,
(Switzerland), 2 - 6 Sep 1996; corrected due to referee suggestions (Nov 96),
adjusted to LaTeX2e article class (Jan 99) | null | null | null | cs.SC cs.PL | null | The advantages of mixed approach with using different kinds of programming
techniques for symbolic manipulation are discussed. The main purpose of
approach offered is merge the methods of object oriented programming that
convenient for presentation data and algorithms for user with advantages of
functional languages for data manipulation, internal presentation, and
portability of software.
| [
{
"version": "v1",
"created": "Wed, 13 Jan 1999 20:40:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vlasov",
"Alexander Yu.",
"",
"FCR/IRH, St.-Petersburg, Russia"
]
] | [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/9901007 | Alexander Yu. Vlasov | Alexander Yu. Vlasov (FCR/IRH, St.-Petersburg, Russia) | Universal Object Oriented Languages and Computer Algebra | 5 pages LaTeX, (3 pages extended abstract of talk at International
Conference: Computer Algebra in Scientific Computing, CASC'98, 20-24 Apr
1998, St.-Petersburg, Russia; + 2 pages of comments to 3 slides included as 3
separate ps files) | Computer Algebra in Scientific Computing. Extended abstracts of
the International Conference CASC-98, ed by N.N.Vasiliev -- St.-Petersburg,
1998, pages 130 -- 132 | null | null | cs.PL | null | The universal object oriented languages made programming more simple and
efficient. In the article is considered possibilities of using similar methods
in computer algebra. A clear and powerful universal language is useful if
particular problem was not implemented in standard software packages like
REDUCE, MATHEMATICA, etc. and if the using of internal programming languages of
the packages looks not very efficient.
Functional languages like LISP had some advantages and traditions for
algebraic and symbolic manipulations. Functional and object oriented
programming are not incompatible ones. An extension of the model of an object
for manipulation with pure functions and algebraic expressions is considered.
| [
{
"version": "v1",
"created": "Fri, 15 Jan 1999 19:28:58 GMT"
}
] | 2016-08-31T00:00:00 | [
[
"Vlasov",
"Alexander Yu.",
"",
"FCR/IRH, St.-Petersburg, Russia"
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/9901008 | Eirik Fossgaard | Eirik Fossgaard | Fast Computational Algorithms for the Discrete Wavelet Transform and
Applications of Localized Orthonormal Bases in Signal Classification | 127 pages, 25 figures, LaTeX2e | null | null | 82-90487-93-2 | cs.MS cs.CE | null | We construct an algorithm for implementing the discrete wavelet transform by
means of matrices in SO_2(R) for orthonormal compactly supported wavelets and
matrices in SL_m(R), m > = 2, for compactly supported biorthogonal wavelets. We
show that in 1 dimension the total operation count using this algorithm can be
reduced to about 50% of the conventional convolution and downsampling by
2-operation for both orthonormal and biorthogonal filters. In the special case
of biorthogonal symmetric odd-odd filters, we show an implementation yielding a
total operation count of about 38% of the conventional method. In 2 dimensions
we show an implementation of this algorithm yielding a reduction in the total
operation count of about 70% when the filters are orthonormal, a reduction of
about 62% for general biorthogonal filters, and a reduction of about 70% if the
filters are symmetric odd-odd length filters. We further extend these results
to 3 dimensions. We also show how the SO_2(R)-method for implementing the
discrete wavelet transform may be exploited to compute short FIR filters, and
we construct edge mappings where we try to improve upon the degree of
preservation of regularity in the conventional methods. We also consider a
two-class waveform discrimination problem. A statistical space-frequency
analysis is performed on a training data set using the LDB-algorithm of N.Saito
and R.Coifman. The success of the algorithm on this particular problem is
evaluated on a disjoint test data set.
| [
{
"version": "v1",
"created": "Sat, 16 Jan 1999 16:54:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fossgaard",
"Eirik",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
cs/9901009 | Andrew Odlyzko | Andrew Odlyzko | Competition and cooperation: Libraries and publishers in the transition
to electronic scholarly journals | null | null | null | null | cs.DL | null | The conversion of scholarly journals to digital format is proceeding rapidly,
especially for those from large commercial and learned society publishers. This
conversion offers the best hope for survival for such publishers. The infamous
"journal crisis" is more of a library cost crisis than a publisher pricing
problem, with internal library costs much higher than the amount spent on
purchasing books and journals. Therefore publishers may be able to retain or
even increase their revenues and profits, while at the same time providing a
superior service. To do this, they will have to take over many of the function
of libraries, and they can do that only in the digital domain. This paper
examines publishers' strategies, how they are likely to evolve, and how they
will affect libraries.
| [
{
"version": "v1",
"created": "Wed, 20 Jan 1999 13:01:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Odlyzko",
"Andrew",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
cs/9901010 | Tao Jiang | Tao Jiang (McMaster U.), Ming Li (U of Waterloo), Paul Vitanyi (CWI
and U of Amsterdam) | Average-Case Complexity of Shellsort | 11 pages. Submitted to ICALP'99 | null | null | null | cs.DS cs.CC | null | We prove a general lower bound on the average-case complexity of Shellsort:
the average number of data-movements (and comparisons) made by a $p$-pass
Shellsort for any incremental sequence is $\Omega (pn^{1 + 1/p)$ for all $p
\leq \log n$. Using similar arguments, we analyze the average-case complexity
of several other sorting algorithms.
| [
{
"version": "v1",
"created": "Wed, 20 Jan 1999 16:32:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Jiang",
"Tao",
"",
"McMaster U."
],
[
"Li",
"Ming",
"",
"U of Waterloo"
],
[
"Vitanyi",
"Paul",
"",
"CWI\n and U of Amsterdam"
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/9901011 | Barry M. Leiner | Barry M. Leiner, Vinton G. Cerf, David D. Clark, Robert E. Kahn,
Leonard Kleinrock, Daniel C. Lynch, Jon Postel, Larry G. Roberts, and Stephen
Wolf | A Brief History of the Internet | null | null | null | null | cs.NI | null | The Internet has revolutionized the computer and communications world like
nothing before. The invention of the telegraph, telephone, radio, and computer
set the stage for this unprecedented integration of capabilities. The Internet
is at once a world-wide broadcasting capability, a mechanism for information
dissemination, and a medium for collaboration and interaction between
individuals and their computers without regard for geographic location.
In this paper, several of us involved in the development and evolution of the
Internet share our views of its origins and history. This is intended to be a
brief, necessarily cursory and incomplete history. This history revolves around
four distinct aspects. There is the technological evolution that began with
early research on packet switching and the ARPANET (and related technologies),
and where current research continues to expand the horizons of the
infrastructure along several dimensions, such as scale, performance, and higher
level functionality. There is the operations and management aspect of a global
and complex operational infrastructure. There is the social aspect, which
resulted in a broad community of Internauts working together to create and
evolve the technology. And there is the commercialization aspect, resulting in
an extremely effective transition of research results into a broadly deployed
and available information infrastructure.
| [
{
"version": "v1",
"created": "Sat, 23 Jan 1999 00:37:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Leiner",
"Barry M.",
""
],
[
"Cerf",
"Vinton G.",
""
],
[
"Clark",
"David D.",
""
],
[
"Kahn",
"Robert E.",
""
],
[
"Kleinrock",
"Leonard",
""
],
[
"Lynch",
"Daniel C.",
""
],
[
"Postel",
"Jon",
""
],
[
"Roberts",
"Larry G.",
""
],
[
"Wolf",
"Stephen",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9901012 | Miroslaw Truszczynski | Pawel Cholewinski, Miroslaw Truszczynski | Extremal problems in logic programming and stable model computation | null | Journal of Logic Programming, 38(1999), pp. 219-242 | null | null | cs.LO cs.AI | null | We study the following problem: given a class of logic programs C, determine
the maximum number of stable models of a program from C. We establish the
maximum for the class of all logic programs with at most n clauses, and for the
class of all logic programs of size at most n. We also characterize the
programs for which the maxima are attained. We obtain similar results for the
class of all disjunctive logic programs with at most n clauses, each of length
at most m, and for the class of all disjunctive logic programs of size at most
n. Our results on logic programs have direct implication for the design of
algorithms to compute stable models. Several such algorithms, similar in spirit
to the Davis-Putnam procedure, are described in the paper. Our results imply
that there is an algorithm that finds all stable models of a program with n
clauses after considering the search space of size O(3^{n/3}) in the worst
case. Our results also provide some insights into the question of
representability of families of sets as families of stable models of logic
programs.
| [
{
"version": "v1",
"created": "Mon, 25 Jan 1999 14:44:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cholewinski",
"Pawel",
""
],
[
"Truszczynski",
"Miroslaw",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/9901013 | David M. Mount | Songrit Maneewongvatana and David M. Mount | Analysis of approximate nearest neighbor searching with clustered point
sets | 20 pages, 8 figures. Presented at ALENEX '99, Baltimore, MD, Jan
15-16, 1999 | null | null | null | cs.CG | null | We present an empirical analysis of data structures for approximate nearest
neighbor searching. We compare the well-known optimized kd-tree splitting
method against two alternative splitting methods. The first, called the
sliding-midpoint method, which attempts to balance the goals of producing
subdivision cells of bounded aspect ratio, while not producing any empty cells.
The second, called the minimum-ambiguity method is a query-based approach. In
addition to the data points, it is also given a training set of query points
for preprocessing. It employs a simple greedy algorithm to select the splitting
plane that minimizes the average amount of ambiguity in the choice of the
nearest neighbor for the training points. We provide an empirical analysis
comparing these two methods against the optimized kd-tree construction for a
number of synthetically generated data and query sets. We demonstrate that for
clustered data and query sets, these algorithms can provide significant
improvements over the standard kd-tree construction for approximate nearest
neighbor searching.
| [
{
"version": "v1",
"created": "Tue, 26 Jan 1999 21:23:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Maneewongvatana",
"Songrit",
""
],
[
"Mount",
"David M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
cs/9901014 | null | Paul Vitanyi (CWI and University of Amsterdam), Ming Li (University of
Waterloo) | Minimum Description Length Induction, Bayesianism, and Kolmogorov
Complexity | 35 pages, Latex. Submitted IEEE Trans. Inform. Theory | IEEE Transactions on Information Theory, 46:2(2000), 446-464 | null | CWI Tech Report 1998 | cs.LG cs.AI cs.CC cs.IT cs.LO math.IT math.PR physics.data-an | null | The relationship between the Bayesian approach and the minimum description
length approach is established. We sharpen and clarify the general modeling
principles MDL and MML, abstracted as the ideal MDL principle and defined from
Bayes's rule by means of Kolmogorov complexity. The basic condition under which
the ideal principle should be applied is encapsulated as the Fundamental
Inequality, which in broad terms states that the principle is valid when the
data are random, relative to every contemplated hypothesis and also these
hypotheses are random relative to the (universal) prior. Basically, the ideal
principle states that the prior probability associated with the hypothesis
should be given by the algorithmic universal probability, and the sum of the
log universal probability of the model plus the log of the probability of the
data given the model should be minimized. If we restrict the model class to the
finite sets then application of the ideal principle turns into Kolmogorov's
minimal sufficient statistic. In general we show that data compression is
almost always the best strategy, both in hypothesis identification and
prediction.
| [
{
"version": "v1",
"created": "Wed, 27 Jan 1999 17:48:14 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Vitanyi",
"Paul",
"",
"CWI and University of Amsterdam"
],
[
"Li",
"Ming",
"",
"University of\n Waterloo"
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
}
] |
cs/9901015 | John Watrous | John Watrous | PSPACE has 2-round quantum interactive proof systems | 13 pages | null | null | null | cs.CC quant-ph | null | In this paper we consider quantum interactive proof systems, i.e.,
interactive proof systems in which the prover and verifier may perform quantum
computations and exchange quantum messages. It is proved that every language in
PSPACE has a quantum interactive proof system that requires only two rounds of
communication between the prover and verifier, while having exponentially small
(one-sided) probability of error. It follows that quantum interactive proof
systems are strictly more powerful than classical interactive proof systems in
the constant-round case unless the polynomial time hierarchy collapses to the
second level.
| [
{
"version": "v1",
"created": "Wed, 27 Jan 1999 21:35:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Watrous",
"John",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
] |
cs/9901016 | Yao Han | Victor Marek, Jan Treur, Miroslaw Truszczynski | Representation Theory for Default Logic | Annals of Mathematics and Artificial Intelligence, 21 (1997), pp.
343-358 | null | null | null | cs.LO cs.AI | null | Default logic can be regarded as a mechanism to represent families of belief
sets of a reasoning agent. As such, it is inherently second-order. In this
paper, we study the problem of representability of a family of theories as the
set of extensions of a default theory. We give a complete solution to the
representability by means of normal default theories. We obtain partial results
on representability by arbitrary default theories. We construct examples of
denumerable families of non-including theories that are not representable. We
also study the concept of equivalence between default theories.
| [
{
"version": "v1",
"created": "Thu, 28 Jan 1999 21:57:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Marek",
"Victor",
""
],
[
"Treur",
"Jan",
""
],
[
"Truszczynski",
"Miroslaw",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/9902001 | Alexander Krotov | Alexander Krotov, Mark Hepple, Robert Gaizauskas and Yorick Wilks
(Department of Computer Science, University of Sheffield, UK) | Compacting the Penn Treebank Grammar | 5 pages, 2 figures | In Proceedings of COLING-98 (Montreal), pages 699-703 | null | null | cs.CL | null | Treebanks, such as the Penn Treebank (PTB), offer a simple approach to
obtaining a broad coverage grammar: one can simply read the grammar off the
parse trees in the treebank. While such a grammar is easy to obtain, a
square-root rate of growth of the rule set with corpus size suggests that the
derived grammar is far from complete and that much more treebanked text would
be required to obtain a complete grammar, if one exists at some limit. However,
we offer an alternative explanation in terms of the underspecification of
structures within the treebank. This hypothesis is explored by applying an
algorithm to compact the derived grammar by eliminating redundant rules --
rules whose right hand sides can be parsed by other rules. The size of the
resulting compacted grammar, which is significantly less than that of the full
treebank grammar, is shown to approach a limit. However, such a compacted
grammar does not yield very good performance figures. A version of the
compaction algorithm taking rule probabilities into account is proposed, which
is argued to be more linguistically motivated. Combined with simple
thresholding, this method can be used to give a 58% reduction in grammar size
without significant change in parsing performance, and can produce a 69%
reduction with some gain in recall, but a loss in precision.
| [
{
"version": "v1",
"created": "Sun, 31 Jan 1999 18:57:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Krotov",
"Alexander",
"",
"Department of Computer Science, University of Sheffield, UK"
],
[
"Hepple",
"Mark",
"",
"Department of Computer Science, University of Sheffield, UK"
],
[
"Gaizauskas",
"Robert",
"",
"Department of Computer Science, University of Sheffield, UK"
],
[
"Wilks",
"Yorick",
"",
"Department of Computer Science, University of Sheffield, UK"
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/9902002 | Kuang-hua Chen | Kuang-hua Chen | Automatic Identification of Subjects for Textual Documents in Digital
Libraries | 7 pages, 6 tables | null | null | null | cs.DL cs.CL | null | The amount of electronic documents in the Internet grows very quickly. How to
effectively identify subjects for documents becomes an important issue. In
past, the researches focus on the behavior of nouns in documents. Although
subjects are composed of nouns, the constituents that determine which nouns are
subjects are not only nouns. Based on the assumption that texts are
well-organized and event-driven, nouns and verbs together contribute the
process of subject identification. This paper considers four factors: 1) word
importance, 2) word frequency, 3) word co-occurrence, and 4) word distance and
proposes a model to identify subjects for textual documents. The preliminary
experiments show that the performance of the proposed model is close to that of
human beings.
| [
{
"version": "v1",
"created": "Mon, 1 Feb 1999 11:01:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chen",
"Kuang-hua",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/9902003 | Eric Lease Morgan | Eric Lease Morgan | MyLibrary: A Model for Implementing a User-centered, Customizable
Interface to a Library's Collection of Information Resources | 10 pages, 6 figures | null | null | null | cs.DL | null | The paper describes an extensible model for implementing a user-centered,
customizable interface to a library's collection of information resources. This
model, called MyLibrary, integrates the principles of librarianship
(collection, organization, dissemination, and evaluation) with globally
networked computing resources creating a dynamic, customer-driven front-end to
any library's set of materials. The model supports a framework for libraries to
provide enhanced access to local and remote sets of data, information, and
knowledge. At the same, the model does not overwhelm its users with too much
information because the users control exactly how much information is displayed
to them at any given time. The model is active and not passive; direct human
interaction, computer mediated guidance and communication technologies, as well
as current awareness services all play indispensable roles in this system.
| [
{
"version": "v1",
"created": "Tue, 2 Feb 1999 13:41:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Morgan",
"Eric Lease",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
cs/9902004 | Eric Lease Morgan | Eric Lease Morgan | The Alex Catalogue, A Collection of Digital Texts with Automatic Methods
for Acquisition and Cataloging, User-Defined Typography, Cross-searching of
Indexed Content, and a Sense of Community | 9 pages, 2 figures | null | null | null | cs.DL | null | This paper describes the Alex Catalogue of Electronic Texts, the only
Internet-accessible collection of digital documents allowing the user to 1)
dynamically create customized, typographically readable documents on demand, 2)
search the content of one or more documents from the collection simultaneously,
3) create sets of documents from the collection for review and annotation, and
4) publish these sets of annotated documents in turn fostering a sense of
community around the Catalogue. More than a just a collection of links that
will break over time, Alex is an archive of electronic texts providing
unprecedented access to its content and features allowing it to meet the needs
of a wide variety of users and settings. Furthermore, the process of
maintaining the Catalogue is streamlined with tools for automatic acquisition
and cataloging making it possible to sustain the service with a minimum of
personnel.
| [
{
"version": "v1",
"created": "Tue, 2 Feb 1999 14:14:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Morgan",
"Eric Lease",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
cs/9902005 | Paul Vitanyi | Harry Buhrman (CWI), Matthew Franklin (Xerox PARC), Juan A. Garay
(Bell Labs - Lucent Technologies), Jaap-Henk Hoepman (University Twente),
John Tromp (CWI), Paul Vitanyi (CWI and University of Amsterdam) | Mutual Search | 18 pages, Latex, 5 figures, J. Assoc. Comp. Mach., To appear | null | null | null | cs.DS cs.CC cs.DB cs.DC cs.DM cs.IR | null | We introduce a search problem called ``mutual search'' where $k$ \agents,
arbitrarily distributed over $n$ sites, are required to locate one another by
posing queries of the form ``Anybody at site $i$?''. We ask for the least
number of queries that is necessary and sufficient. For the case of two \agents
using deterministic protocols we obtain the following worst-case results: In an
oblivious setting (where all pre-planned queries are executed) there is no
savings: $n-1$ queries are required and are sufficient. In a nonoblivious
setting we can exploit the paradigm of ``no news is also news'' to obtain
significant savings: in the synchronous case $0.586n$ queries suffice and
$0.536n$ queries are required; in the asynchronous case $0.896n$ queries
suffice and a fortiori 0.536 queries are required; for $o(\sqrt{n})$ \agents
using a deterministic protocol less than $n$ queries suffice; there is a simple
randomized protocol for two \agents with worst-case expected $0.5n$ queries and
all randomized protocols require at least $0.125n$ worst-case expected queries.
The graph-theoretic framework we formulate for expressing and analyzing
algorithms for this problem may be of independent interest.
| [
{
"version": "v1",
"created": "Tue, 2 Feb 1999 15:46:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Buhrman",
"Harry",
"",
"CWI"
],
[
"Franklin",
"Matthew",
"",
"Xerox PARC"
],
[
"Garay",
"Juan A.",
"",
"Bell Labs - Lucent Technologies"
],
[
"Hoepman",
"Jaap-Henk",
"",
"University Twente"
],
[
"Tromp",
"John",
"",
"CWI"
],
[
"Vitanyi",
"Paul",
"",
"CWI and University of Amsterdam"
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/9902006 | Paul Vitanyi | Paul Vitanyi | A Discipline of Evolutionary Programming | 25 pages, LaTeX source, Theoretical Computer Science, To appear | Theoret. Comp. Sci., 241:1-2 (2000), 3--23. | null | null | cs.NE cs.AI cs.CC cs.DS cs.LG cs.MA | null | Genetic fitness optimization using small populations or small population
updates across generations generally suffers from randomly diverging
evolutions. We propose a notion of highly probable fitness optimization through
feasible evolutionary computing runs on small size populations. Based on
rapidly mixing Markov chains, the approach pertains to most types of
evolutionary genetic algorithms, genetic programming and the like. We establish
that for systems having associated rapidly mixing Markov chains and appropriate
stationary distributions the new method finds optimal programs (individuals)
with probability almost 1. To make the method useful would require a structured
design methodology where the development of the program and the guarantee of
the rapidly mixing property go hand in hand. We analyze a simple example to
show that the method is implementable. More significant examples require
theoretical advances, for example with respect to the Metropolis filter.
| [
{
"version": "v1",
"created": "Tue, 2 Feb 1999 16:17:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Vitanyi",
"Paul",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
cs/9902007 | Craig Nevill-Manning | Ian H. Witten, Gordon W. Paynter, Eibe Frank, Carl Gutwin and Craig G.
Nevill-Manning | KEA: Practical Automatic Keyphrase Extraction | 9 pages | null | null | null | cs.DL | null | Keyphrases provide semantic metadata that summarize and characterize
documents. This paper describes Kea, an algorithm for automatically extracting
keyphrases from text. Kea identifies candidate keyphrases using lexical
methods, calculates feature values for each candidate, and uses a
machine-learning algorithm to predict which candidates are good keyphrases. The
machine learning scheme first builds a prediction model using training
documents with known keyphrases, and then uses the model to find keyphrases in
new documents. We use a large test corpus to evaluate Kea's effectiveness in
terms of how many author-assigned keyphrases are correctly identified. The
system is simple, robust, and publicly available.
| [
{
"version": "v1",
"created": "Fri, 5 Feb 1999 03:15:45 GMT"
}
] | 2016-08-31T00:00:00 | [
[
"Witten",
"Ian H.",
""
],
[
"Paynter",
"Gordon W.",
""
],
[
"Frank",
"Eibe",
""
],
[
"Gutwin",
"Carl",
""
],
[
"Nevill-Manning",
"Craig G.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
cs/9902008 | Mario Winter | Mario Winter | Managing Object-Oriented Integration and Regression Testing | Proc. 6th euroSTAR, Munich, 30 November-4 December 1998 | null | null | null | cs.SE | null | Systematic testing of object-oriented software turned out to be much more
complex than testing conventional software. Especially the highly incremental
and iterative development cycle demands both many more changes and partially
implemented resp. re-implemented classes. Much more integration and regression
testing has to be done to reach stable stages during the development. In this
presentation we propose a diagram capturing all possible dependencies and
interactions in an object-oriented program. Then we give algorithms and
coverage criteria to identify integration resp. regression test strategys and
all test cases to be executed after some implementation resp. modification
activities. Finally, we summarize some practical experiences and heuristics.
| [
{
"version": "v1",
"created": "Fri, 5 Feb 1999 12:01:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Winter",
"Mario",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/9902009 | Roger Hartley | Roger T. Hartley, Kathleen Crumpton | Quality of OCR for Degraded Text Images | 7 pages | null | null | null | cs.DL | null | Commercial OCR packages work best with high-quality scanned images. They
often produce poor results when the image is degraded, either because the
original itself was poor quality, or because of excessive photocopying. The
ability to predict the word failure rate of OCR from a statistical analysis of
the image can help in making decisions in the trade-off between the success
rate of OCR and the cost of human correction of errors. This paper describes an
investigation of OCR of degraded text images using a standard OCR engine (Adobe
Capture). The documents were selected from those in the archive at Los Alamos
National Laboratory. By introducing noise in a controlled manner into perfect
documents, we show how the quality of OCR can be predicted from the nature of
the noise. The preliminary results show that a simple noise model can give good
prediction of the number of OCR errors.
| [
{
"version": "v1",
"created": "Fri, 5 Feb 1999 20:52:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hartley",
"Roger T.",
""
],
[
"Crumpton",
"Kathleen",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
cs/9902010 | Stiglic Anton | Adam Smith and Anton Stiglic | Multiparty computation unconditionally secure against Q^2 adversary
structures | 11 pages. McGill University School of Computer Science tech. report | null | null | SOCS-98.2 | cs.CR | null | We present here a generalization of the work done by Rabin and Ben-Or. We
give a protocol for multiparty computation which tolerates any Q^2 active
adversary structure based on the existence of a broadcast channel, secure
communication between each pair of participants, and a monotone span program
with multiplication tolerating the structure. The secrecy achieved is
unconditional although we allow an exponentially small probability of error.
This is possible due to a protocol for computing the product of two values
already shared by means of a homomorphic commitment scheme which appeared
originally in a paper of Chaum, Evertse and van de Graaf.
| [
{
"version": "v1",
"created": "Mon, 8 Feb 1999 23:33:46 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Smith",
"Adam",
""
],
[
"Stiglic",
"Anton",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/9902011 | Raymond J. Mooney | Raymond J. Mooney and Loriene Roy (University of Texas at Austin) | Content-Based Book Recommending Using Learning for Text Categorization | 8 pages, 3 figures, Submission to Fourth ACM Conference on Digital
Libraries | null | null | null | cs.DL | null | Recommender systems improve access to relevant products and information by
making personalized suggestions based on previous examples of a user's likes
and dislikes. Most existing recommender systems use social filtering methods
that base recommendations on other users' preferences. By contrast,
content-based methods use information about an item itself to make suggestions.
This approach has the advantage of being able to recommended previously unrated
items to users with unique interests and to provide explanations for its
recommendations. We describe a content-based book recommending system that
utilizes information extraction and a machine-learning algorithm for text
categorization. Initial experimental results demonstrate that this approach can
produce accurate recommendations.
| [
{
"version": "v1",
"created": "Sun, 7 Feb 1999 20:03:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mooney",
"Raymond J.",
"",
"University of Texas at Austin"
],
[
"Roy",
"Loriene",
"",
"University of Texas at Austin"
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
cs/9902012 | Robert e. McGrath | Robert E. McGrath, Joe Futrelle, Ray Plante, Damien Guillaume | Digital Library Technology for Locating and Accessing Scientific Data | null | null | null | null | cs.DL | null | In this paper we describe our efforts to bring scientific data into the
digital library. This has required extension of the standard WWW, and also the
extension of metadata standards far beyond the Dublin Core. Our system
demonstrates this technology for real scientific data from astronomy.
| [
{
"version": "v1",
"created": "Sun, 7 Feb 1999 20:06:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"McGrath",
"Robert E.",
""
],
[
"Futrelle",
"Joe",
""
],
[
"Plante",
"Ray",
""
],
[
"Guillaume",
"Damien",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
cs/9902013 | Robert K. France | Robert K. France, Lucy Terry Nowell, Edward A. Fox, Rani A. Saad and
Jianxin Zhao | Use and usability in a digital library search system | System paper | null | null | null | cs.DL | null | Digital libraries must reach out to users from all walks of life, serving
information needs at all levels. To do this, they must attain high standards of
usability over an extremely broad audience. This paper details the evolution of
one important digital library component as it has grown in functionality and
usefulness over several years of use by a live, unrestricted community. Central
to its evolution have been user studies, analysis of use patterns, and
formative usability evaluation. We extrapolate that all three components are
necessary in the production of successful digital library systems.
| [
{
"version": "v1",
"created": "Mon, 8 Feb 1999 23:08:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"France",
"Robert K.",
""
],
[
"Nowell",
"Lucy Terry",
""
],
[
"Fox",
"Edward A.",
""
],
[
"Saad",
"Rani A.",
""
],
[
"Zhao",
"Jianxin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
cs/9902014 | Barry M. Leiner | Barry M. Leiner and Ekaterina A. Drozdova | Proceedings from Critical Infrastructure: The Path Ahead (XIWT Symposium
on Cross-Industry Activities for Information Infrastructure Robustness) | null | null | null | null | cs.NI | null | The Cross-Industry Working Team (XIWT), with the support of the Stanford
University Consortium for Research on Information Security and Policy (CRISP),
sponsored a symposium on cross-industry activities aimed at improving the
reliability, dependability, and robustness of the information infrastructure.
Held 3-4 November 1998 in Crystal City, Virginia, the symposium engaged
representatives from industry, academia, and government in discussion of
current and potential cross-industry, cross-sector activities including
information exchange, collaborative operations, and cooperative research and
development. This proceedings summarizes the discussions and results of the
meeting.
| [
{
"version": "v1",
"created": "Mon, 8 Feb 1999 22:46:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Leiner",
"Barry M.",
""
],
[
"Drozdova",
"Ekaterina A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9902015 | Franck Chevalier | Franck Chevalier, David Harle, Geoffrey Smith | Resource Discovery in Trilogy | 9 pages, 5 figures, DL'99 conference | null | null | STRA1 | cs.DL cs.AI cs.MA | null | Trilogy is a collaborative project whose key aim is the development of an
integrated virtual laboratory to support research training within each
institution and collaborative projects between the partners. In this paper, the
architecture and underpinning platform of the system is described with
particular emphasis being placed on the structure and the integration of the
distributed database. A key element is the ontology that provides the
multi-agent system with a conceptualisation specification of the domain; this
ontology is explained, accompanied by a discussion how such a system is
integrated and used within the virtual laboratory. Although in this paper,
Telecommunications and in particular Broadband networks are used as exemplars,
the underlying system principles are applicable to any domain where a
combination of experimental and literature-based resources are required.
| [
{
"version": "v1",
"created": "Mon, 8 Feb 1999 21:23:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chevalier",
"Franck",
""
],
[
"Harle",
"David",
""
],
[
"Smith",
"Geoffrey",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
cs/9902016 | Ye Jian | Michael J. Hu, Ye Jian | Multimedia Description Framework (MDF) for Content Description of
Audio/Video Documents | 20 pages | null | null | null | cs.DL | null | MPEG is undertaking a new initiative to standardize content description of
audio and video data/documents. When it is finalized in 2001, MPEG-7 is
expected to provide standardized description schemes for concise and
unambiguous content description of data/documents of complex media types.
Meanwhile, other meta-data or description schemes, such as Dublin Core, XML,
etc., are becoming popular in different application domains. In this paper, we
propose the Multimedia Description Framework (MDF), which is designated to
accommodate multiple description (meta-data) schemes, both MPEG-7 and
non-MPEG-7, into integrated architecture. We will use examples to show how MDF
description makes use of combined strength of different description schemes to
enhance its expression power and flexibility. We conclude the paper with
discussion of using MDF description of a movie video to search/retrieve
required scene clips from the movie, on the MDF prototype system we have
implemented.
| [
{
"version": "v1",
"created": "Tue, 9 Feb 1999 02:17:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hu",
"Michael J.",
""
],
[
"Jian",
"Ye",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
cs/9902017 | Kurt D. Bollacker | Not Available | Not Available | null | null | null | null | cs.DL cs.DB | null | withdrawn by author
| [
{
"version": "v1",
"created": "Tue, 9 Feb 1999 04:02:55 GMT"
},
{
"version": "v2",
"created": "Thu, 11 Feb 1999 18:31:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Available",
"Not",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
cs/9902018 | Ee-Peng Lim | Yong Lin, Jian Xu, Ee-Peng Lim, Wee-Keong Ng | ZBroker: A Query Routing Broker for Z39.50 Databases | 10 pages, 8 figures | null | null | null | cs.DL cs.DB | null | A query routing broker is a software agent that determines from a large set
of accessing information sources the ones most relevant to a user's information
need. As the number of information sources on the Internet increases
dramatically, future users will have to rely on query routing brokers to decide
a small number of information sources to query without incurring too much query
processing overheads. In this paper, we describe a query routing broker known
as ZBroker developed for bibliographic database servers that support the Z39.50
protocol. ZBroker samples the content of each bibliographic database by using
training queries and their results, and summarizes the bibliographic database
content into a knowledge base. We present the design and implementation of
ZBroker and describe its Web-based user interface.
| [
{
"version": "v1",
"created": "Tue, 9 Feb 1999 03:50:24 GMT"
}
] | 2009-09-25T00:00:00 | [
[
"Lin",
"Yong",
""
],
[
"Xu",
"Jian",
""
],
[
"Lim",
"Ee-Peng",
""
],
[
"Ng",
"Wee-Keong",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
cs/9902019 | Wei Ding | Wei Ding, Gary Marchionini, Dagobert Soergel | Multimodal Surrogates for Video Browsing | 11 pages | null | null | null | cs.DL cs.HC | null | Three types of video surrogates - visual (keyframes), verbal
(keywords/phrases), and combination of the two - were designed and studied in a
qualitative investigation of user cognitive processes. The results favor the
combined surrogates in which verbal information and images reinforce each
other, lead to better comprehension, and may actually require less processing
time. The results also highlight image features users found most helpful. These
findings will inform the interface design and video representation for video
retrieval and browsing.
| [
{
"version": "v1",
"created": "Tue, 9 Feb 1999 04:56:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ding",
"Wei",
""
],
[
"Marchionini",
"Gary",
""
],
[
"Soergel",
"Dagobert",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
cs/9902020 | Carl Lagoze | Naomi Dushay, James C. French, and Carl Lagoze | Using Query Mediators for Distributed Searching in Federated Digital
Libraries | Submission to ACM DL99 Conference | null | null | null | cs.DL | null | We describe an architecture and investigate the characteristics of
distributed searching in federated digital libraries. We introduce the notion
of a query mediator as a digital library service responsible for selecting
among available search engines, routing queries to those search engines, and
aggregating results. We examine operational data from the NCSTRL distributed
digital library that reveals a number of characteristics of distributed
resource discovery. These include availability and response time of indexers
and the distinction between the query mediator view of these characteristics
and the indexer view.
| [
{
"version": "v1",
"created": "Tue, 9 Feb 1999 05:18:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dushay",
"Naomi",
""
],
[
"French",
"James C.",
""
],
[
"Lagoze",
"Carl",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
cs/9902021 | Sung Hyon Myaeng | Sa-Kwang Song & Sung Hyon Myaeng | Visualization of Retrieved Documents using a Presentation Server | 13 pages | null | null | null | cs.DL cs.IR | null | In any search-based digital library (DL) systems dealing with a non-trivial
number of documents, users are often required to go through a long list of
short document descriptions in order to identify what they are looking for. To
tackle the problem, a variety of document organization algorithms and/or
visualization techniques have been used to guide users in selecting relevant
documents. Since these techniques require heavy computations, however, we
developed a presentation server designed to serve as an intermediary between
retrieval servers and clients equipped with a visualization interface. In
addition, we designed our own visual interface by which users can view a set of
documents from different perspectives through layers of document maps. We
finally ran experiments to show that the visual interface, in conjunction with
the presentation server, indeed helps users in selecting relevant documents
from the retrieval results.
| [
{
"version": "v1",
"created": "Wed, 10 Feb 1999 09:30:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Song",
"Sa-Kwang",
""
],
[
"Myaeng",
"Sung Hyon",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/9902022 | Ulrich Schiel | Ulrich Schiel, Ianna M. Sodre Ferreira de Souza and Edberto Ferneda | Semi-Automatic Indexing of Multilingual Documents | 9 pages. Submission to the Fourth ACM Conference on Digital Libraries | null | null | null | cs.DL | null | With the growing significance of digital libraries and the Internet, more and
more electronic texts become accessible to a wide and geographically disperse
public. This requires adequate tools to facilitate indexing, storage, and
retrieval of documents written in different languages. We present a method for
semi-automatic indexing of electronic documents and construction of a
multilingual thesaurus, which can be used for query formulation and information
retrieval. We use special dictionaries and user interaction in order to solve
ambiguities and find adequate canonical terms in the language and adequate
abstract language-independent terms. The abstract thesaurus is updated
incrementally by new indexed documents and is used to search document
concerning terms in a query to the document base.
| [
{
"version": "v1",
"created": "Thu, 11 Feb 1999 00:19:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Schiel",
"Ulrich",
""
],
[
"de Souza",
"Ianna M. Sodre Ferreira",
""
],
[
"Ferneda",
"Edberto",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
cs/9902023 | Martin Wechsler | Martin Wechsler, Peter Schauble | A New Ranking Principle for Multimedia Information Retrieval | submission for DL'99. conference compliant format (two-column, etc.)
will be produced later | null | null | null | cs.DL | null | A theoretic framework for multimedia information retrieval is introduced
which guarantees optimal retrieval effectiveness. In particular, a Ranking
Principle for Distributed Multimedia-Documents (RPDM) is described together
with an algorithm that satisfies this principle. Finally, the RPDM is shown to
be a generalization of the Probability Ranking principle (PRP) which guarantees
optimal retrieval effectiveness in the case of text document retrieval. The PRP
justifies theoretically the relevance ranking adopted by modern search engines.
In contrast to the classical PRP, the new RPDM takes into account transmission
and inspection time, and most importantly, aspectual recall rather than simple
recall.
| [
{
"version": "v1",
"created": "Thu, 11 Feb 1999 12:33:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wechsler",
"Martin",
""
],
[
"Schauble",
"Peter",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
cs/9902024 | Gregory Khanlarov | Alexander V. Bogdanov, Nick Yu. Bykov, Igor A. Grishin, Gregory O.
Khanlarov, German A. Lukianov and Vladimir V. Zakharov | Algorithms of Two-Level Parallelization for DSMC of Unsteady Flows in
Molecular Gasdynamics | 20 pages, 17 postscript figures Submitted to the conference HPCN
Europe 99 | null | null | 10-98 | cs.CE cs.PF | null | The general scheme of two-level parallelization (TLP) for direct simulation
Monte Carlo of unsteady gas flows on shared memory multiprocessor computers has
been described. The high efficient algorithm of parallel independent runs is
used on the first level. The data parallelization is employed for the second
one. Two versions of TLP algorithm are elaborated with static and dynamic load
balancing. The method of dynamic processor reallocation is used for dynamic
load balancing. Two gasdynamic unsteady problems were used to study speedup and
efficiency of the algorithms. The conditions of efficient application field for
the algorithms have been determined.
| [
{
"version": "v1",
"created": "Thu, 11 Feb 1999 13:13:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bogdanov",
"Alexander V.",
""
],
[
"Bykov",
"Nick Yu.",
""
],
[
"Grishin",
"Igor A.",
""
],
[
"Khanlarov",
"Gregory O.",
""
],
[
"Lukianov",
"German A.",
""
],
[
"Zakharov",
"Vladimir V.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
cs/9902025 | Mattias Ohlsson | Mattias Ohlsson, Carsten Peterson and Bo S\"oderberg | An Efficient Mean Field Approach to the Set Covering Problem | 17 pages, 2 figures | null | null | null | cs.NE | null | A mean field feedback artificial neural network algorithm is developed and
explored for the set covering problem. A convenient encoding of the inequality
constraints is achieved by means of a multilinear penalty function. An
approximate energy minimum is obtained by iterating a set of mean field
equations, in combination with annealing. The approach is numerically tested
against a set of publicly available test problems with sizes ranging up to
5x10^3 rows and 10^6 columns. When comparing the performance with exact results
for sizes where these are available, the approach yields results within a few
percent from the optimal solutions. Comparisons with other approximate methods
also come out well, in particular given the very low CPU consumption required
-- typically a few seconds. Arbitrary problems can be processed using the
algorithm via a public domain server.
| [
{
"version": "v1",
"created": "Fri, 12 Feb 1999 09:18:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ohlsson",
"Mattias",
""
],
[
"Peterson",
"Carsten",
""
],
[
"Söderberg",
"Bo",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
cs/9902026 | Andris Ambainis | Andris Ambainis | Probabilistic Inductive Inference:a Survey | 16 pages, to appear in Theoretical Computer Science | null | null | null | cs.LG cs.CC cs.LO math.LO | null | Inductive inference is a recursion-theoretic theory of learning, first
developed by E. M. Gold (1967). This paper surveys developments in
probabilistic inductive inference. We mainly focus on finite inference of
recursive functions, since this simple paradigm has produced the most
interesting (and most complex) results.
| [
{
"version": "v1",
"created": "Mon, 15 Feb 1999 01:52:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ambainis",
"Andris",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
}
] |
cs/9902027 | Mark D. Roberts | Mark D. Roberts | Autocatalytic Theory of Meaning | 4 pages, no diagrams, LaTex2e | PSYCHOLOQUY.99.10.014 | null | null | cs.CL adap-org nlin.AO | null | Recently it has been argued that autocatalytic theory could be applied to the
origin of culture. Here possible application to a theory of meaning in the
philosophy of language, called radical interpretation, is commented upon and
compared to previous applications.
| [
{
"version": "v1",
"created": "Tue, 16 Feb 1999 15:34:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Roberts",
"Mark D.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
null,
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
}
] |
cs/9902028 | Donald Byrd | Donald Byrd | A Scrollbar-based Visualization for Document Navigation | 2 figures, about 12 pages; corrected references, added librarians'
Comments on the visualization | null | null | IR-163 | cs.IR cs.HC | null | We are interested in questions of improving user control in best-match
text-retrieval systems, specifically questions as to whether simple
visualizations that nonetheless go beyond the minimal ones generally available
can significantly help users. Recently, we have been investigating ways to help
users decide-given a set of documents retrieved by a query-which documents and
passages are worth closer examination. We built a document viewer incorporating
a visualization centered around a novel content-displaying scrollbar and color
term highlighting, and studied whether the visualization is helpful to
non-expert searchers. Participants' reaction to the visualization was very
positive, while the objective results were inconclusive.
| [
{
"version": "v1",
"created": "Wed, 24 Feb 1999 17:10:46 GMT"
},
{
"version": "v2",
"created": "Thu, 25 Feb 1999 16:35:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Byrd",
"Donald",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
cs/9902029 | Roberta Catizone | Yorick Wilks | The "Fodor"-FODOR fallacy bites back | null | null | null | cs-98-13 | cs.CL | null | The paper argues that Fodor and Lepore are misguided in their attack on
Pustejovsky's Generative Lexicon, largely because their argument rests on a
traditional, but implausible and discredited, view of the lexicon on which it
is effectively empty of content, a view that stands in the long line of
explaining word meaning (a) by ostension and then (b) explaining it by means of
a vacuous symbol in a lexicon, often the word itself after typographic
transmogrification. (a) and (b) both share the wrong belief that to a word must
correspond a simple entity that is its meaning. I then turn to the semantic
rules that Pustejovsky uses and argue first that, although they have novel
features, they are in a well-established Artificial Intelligence tradition of
explaining meaning by reference to structures that mention other structures
assigned to words that may occur in close proximity to the first. It is argued
that Fodor and Lepore's view that there cannot be such rules is without
foundation, and indeed systems using such rules have proved their practical
worth in computational systems. Their justification descends from line of
argument, whose high points were probably Wittgenstein and Quine that meaning
is not to be understood by simple links to the world, ostensive or otherwise,
but by the relationship of whole cultural representational structures to each
other and to the world as a whole.
| [
{
"version": "v1",
"created": "Thu, 25 Feb 1999 14:41:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wilks",
"Yorick",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/9902030 | Roberta Catizone | Yorick Wilks | Is Word Sense Disambiguation just one more NLP task? | null | null | null | cs-98-12 | cs.CL | null | This paper compares the tasks of part-of-speech (POS) tagging and
word-sense-tagging or disambiguation (WSD), and argues that the tasks are not
related by fineness of grain or anything like that, but are quite different
kinds of task, particularly becuase there is nothing in POS corresponding to
sense novelty. The paper also argues for the reintegration of sub-tasks that
are being separated for evaluation
| [
{
"version": "v1",
"created": "Thu, 25 Feb 1999 14:41:32 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wilks",
"Yorick",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/9903001 | Robert Milson | R. Milson | Introduction to the RSA algorithm and modular arithmetic | Notes for the Dalhousie Integrated Science Program | null | null | null | cs.CR | null | These notes are a brief introduction to the RSA algorithm and modular
arithmetic. They are intended for an undergraduate audience.
| [
{
"version": "v1",
"created": "Mon, 1 Mar 1999 02:44:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Milson",
"R.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/9903002 | Jan Heering | T. B. Dinesh (Academic Systems Corp.), M. Haveraaen (UiB) and J.
Heering (CWI) | An Algebraic Programming Style for Numerical Software and its
Optimization | 19 pages. Submitted to Scientific Programming | Scientific Programming 8 (2000) 4 pages 247-259 (Special issue on
coordinate-free numerics) | null | SEN-R9844 (CWI, Amsterdam) | cs.SE cs.AI cs.CE cs.MS | null | The abstract mathematical theory of partial differential equations (PDEs) is
formulated in terms of manifolds, scalar fields, tensors, and the like, but
these algebraic structures are hardly recognizable in actual PDE solvers. The
general aim of the Sophus programming style is to bridge the gap between theory
and practice in the domain of PDE solvers. Its main ingredients are a library
of abstract datatypes corresponding to the algebraic structures used in the
mathematical theory and an algebraic expression style similar to the expression
style used in the mathematical theory. Because of its emphasis on abstract
datatypes, Sophus is most naturally combined with object-oriented languages or
other languages supporting abstract datatypes. The resulting source code
patterns are beyond the scope of current compiler optimizations, but are
sufficiently specific for a dedicated source-to-source optimizer. The limited,
domain-specific, character of Sophus is the key to success here. This kind of
optimization has been tested on computationally intensive Sophus style code
with promising results. The general approach may be useful for other styles and
in other application domains as well.
| [
{
"version": "v1",
"created": "Mon, 1 Mar 1999 11:03:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dinesh",
"T. B.",
"",
"Academic Systems Corp."
],
[
"Haveraaen",
"M.",
"",
"UiB"
],
[
"Heering",
"J.",
"",
"CWI"
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
}
] |
cs/9903003 | Steven Bird | Steven Bird and Mark Liberman (University of Pennsylvania) | A Formal Framework for Linguistic Annotation | 49 pages | null | null | Tech Report MS-CIS-99-01, Dept of Computer and Information Science | cs.CL | null | `Linguistic annotation' covers any descriptive or analytic notations applied
to raw language data. The basic data may be in the form of time functions --
audio, video and/or physiological recordings -- or it may be textual. The added
notations may include transcriptions of all sorts (from phonetic features to
discourse structures), part-of-speech and sense tagging, syntactic analysis,
`named entity' identification, co-reference annotation, and so on. While there
are several ongoing efforts to provide formats and tools for such annotations
and to publish annotated linguistic databases, the lack of widely accepted
standards is becoming a critical problem. Proposed standards, to the extent
they exist, have focussed on file formats. This paper focuses instead on the
logical structure of linguistic annotations. We survey a wide variety of
existing annotation formats and demonstrate a common conceptual core, the
annotation graph. This provides a formal framework for constructing,
maintaining and searching linguistic annotations, while remaining consistent
with many alternative data structures and file formats.
| [
{
"version": "v1",
"created": "Tue, 2 Mar 1999 12:30:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bird",
"Steven",
"",
"University of Pennsylvania"
],
[
"Liberman",
"Mark",
"",
"University of Pennsylvania"
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/9903004 | Denvil Smith | Denvil Smith | A Flit Level Simulator for Wormhole Routing | Complete Thesis 359 pages, 32 tables, 70 figures, HTML (add GIF
files) | null | null | null | cs.DC cs.OS | null | Wormhole routing, the latest switching technique to be utilized by massively
parallel computers, enjoys the distinct advantage of a low latency when
compared to other switching techniques. This low latency is due to the nearly
distance insensitive routing traits in the absence of channel contention. The
low latency of wormhole routing brings about a liability of this switching
technique, a chance of deadlock. Deadlock is a concern in wormhole routed
networks due to the fact a message does not release its allocated resources
until all flits of a message have completely traversed the router in which
these resources are associated. The deadlock condition is addressed in the
routing algorithm. Simulation tools are currently needed that will aid in the
size and number of resources necessary to obtain the optimum utilization of
network resources for an algorithm. Some of these resources include the
topology of the network along with the number of nodes for the topology, the
size of the message, and the number and size of buffers at each router.
| [
{
"version": "v1",
"created": "Thu, 4 Mar 1999 02:13:35 GMT"
},
{
"version": "v2",
"created": "Fri, 5 Mar 1999 02:09:59 GMT"
},
{
"version": "v3",
"created": "Sat, 20 Mar 1999 20:51:12 GMT"
},
{
"version": "v4",
"created": "Thu, 1 Apr 1999 00:41:47 GMT"
}
] | 2016-08-31T00:00:00 | [
[
"Smith",
"Denvil",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.OS",
"description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.",
"span": "(Operating Systems)"
}
] |
cs/9903005 | Lecomte Pierre | Pierre B. A. Lecomte, Michel Rigo | Numeration systems on a regular language | 15 pages | null | null | null | cs.OH | null | Generalizations of linear numeration systems in which the set of natural
numbers is recognizable by finite automata are obtained by describing an
arbitrary infinite regular language following the lexicographic ordering. For
these systems of numeration, we show that ultimately periodic sets are
recognizable. We also study the translation and the multiplication by constants
as well as the order dependence of the recognizability.
| [
{
"version": "v1",
"created": "Thu, 4 Mar 1999 08:35:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lecomte",
"Pierre B. A.",
""
],
[
"Rigo",
"Michel",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
cs/9903006 | Anatoly D. Plotnikov | Anatoly D. Plotnikov (Vinnitsa Institute of Regional Economics and
Management) | Designing SAT for HCP | 7 pages, 1 figures. It has sent to 6th Twente Workshop on Graphs and
Combinatorial Optimization | null | null | null | cs.LO | null | For arbitrary undirected graph $G$, we are designing SATISFIABILITY problem
(SAT) for HCP, using tools of Boolean algebra only. The obtained SAT be the
logic formulation of conditions for Hamiltonian cycle existence, and use $m$
Boolean variables, where $m$ is the number of graph edges. This Boolean
expression is true if and only if an initial graph is Hamiltonian. That is,
each satisfying assignment of the Boolean variables determines a Hamiltonian
cycle of $G$, and each Hamiltonian cycle of $G$ corresponds to a satisfying
assignment of the Boolean variables. In common case, the obtained Boolean
expression may has an exponential length (the number of Boolean literals).
| [
{
"version": "v1",
"created": "Fri, 5 Mar 1999 16:10:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Plotnikov",
"Anatoly D.",
"",
"Vinnitsa Institute of Regional Economics and\n Management"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/9903007 | Marc Dymetman | Marc Dymetman | Some Remarks on the Geometry of Grammar | 22 pages, 15 figures | null | null | null | cs.CL cs.LO | null | This paper, following (Dymetman:1998), presents an approach to grammar
description and processing based on the geometry of cancellation diagrams, a
concept which plays a central role in combinatorial group theory
(Lyndon-Schuppe:1977). The focus here is on the geometric intuitions and on
relating group-theoretical diagrams to the traditional charts associated with
context-free grammars and type-0 rewriting systems. The paper is structured as
follows. We begin in Section 1 by analyzing charts in terms of constructs
called cells, which are a geometrical counterpart to rules. Then we move in
Section 2 to a presentation of cancellation diagrams and show how they can be
used computationally. In Section 3 we give a formal algebraic presentation of
the concept of group computation structure, which is based on the standard
notions of free group and conjugacy. We then relate in Section 4 the geometric
and the algebraic views of computation by using the fundamental theorem of
combinatorial group theory (Rotman:1994). In Section 5 we study in more detail
the relationship between the two views on the basis of a simple grammar stated
as a group computation structure. In section 6 we extend this grammar to handle
non-local constructs such as relative pronouns and quantifiers. We conclude in
Section 7 with some brief notes on the differences between normal submonoids
and normal subgroups, group computation versus rewriting systems, and the use
of group morphisms to study the computational complexity of parsing and
generation.
| [
{
"version": "v1",
"created": "Fri, 5 Mar 1999 18:25:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dymetman",
"Marc",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/9903008 | Diane Litman | Diane J. Litman (AT&T Labs - Research) and Shimei Pan (Columbia
University) | Empirically Evaluating an Adaptable Spoken Dialogue System | to be published in the Proceedings of the 7th International
Conference on User Modeling (UM'99); uses llncs.cls,um97.sty | null | null | null | cs.CL | null | Recent technological advances have made it possible to build real-time,
interactive spoken dialogue systems for a wide variety of applications.
However, when users do not respect the limitations of such systems, performance
typically degrades. Although users differ with respect to their knowledge of
system limitations, and although different dialogue strategies make system
limitations more apparent to users, most current systems do not try to improve
performance by adapting dialogue behavior to individual users. This paper
presents an empirical evaluation of TOOT, an adaptable spoken dialogue system
for retrieving train schedules on the web. We conduct an experiment in which 20
users carry out 4 tasks with both adaptable and non-adaptable versions of TOOT,
resulting in a corpus of 80 dialogues. The values for a wide range of
evaluation measures are then extracted from this corpus. Our results show that
adaptable TOOT generally outperforms non-adaptable TOOT, and that the utility
of adaptation depends on TOOT's initial dialogue strategies.
| [
{
"version": "v1",
"created": "Fri, 5 Mar 1999 22:03:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Litman",
"Diane J.",
"",
"AT&T Labs - Research"
],
[
"Pan",
"Shimei",
"",
"Columbia\n University"
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/9903009 | Paul Vitanyi | Harry Buhrman (CWI), Jaap-Henk Hoepman, Paul Vitanyi (CWI and
University of Amsterdam) | Space-Efficient Routing Tables for Almost All Networks and the
Incompressibility Method | 19 pages, Latex, 1 table, 1 figure; SIAM J. Comput., To appear | null | null | CWI Tech Report 1997 | cs.DC cs.AR cs.CC cs.DS cs.NI | null | We use the incompressibility method based on Kolmogorov complexity to
determine the total number of bits of routing information for almost all
network topologies. In most models for routing, for almost all labeled graphs
$\Theta (n^2)$ bits are necessary and sufficient for shortest path routing. By
`almost all graphs' we mean the Kolmogorov random graphs which constitute a
fraction of $1-1/n^c$ of all graphs on $n$ nodes, where $c > 0$ is an arbitrary
fixed constant. There is a model for which the average case lower bound rises
to $\Omega(n^2 \log n)$ and another model where the average case upper bound
drops to $O(n \log^2 n)$. This clearly exposes the sensitivity of such bounds
to the model under consideration. If paths have to be short, but need not be
shortest (if the stretch factor may be larger than 1), then much less space is
needed on average, even in the more demanding models. Full-information routing
requires $\Theta (n^3)$ bits on average. For worst-case static networks we
prove a $\Omega(n^2 \log n)$ lower bound for shortest path routing and all
stretch factors $<2$ in some networks where free relabeling is not allowed.
| [
{
"version": "v1",
"created": "Wed, 10 Mar 1999 19:01:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Buhrman",
"Harry",
"",
"CWI"
],
[
"Hoepman",
"Jaap-Henk",
"",
"CWI and\n University of Amsterdam"
],
[
"Vitanyi",
"Paul",
"",
"CWI and\n University of Amsterdam"
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9903010 | Anatoly D. Plotnikov | Anatoly D. Plotnikov (Vinnitsa Institute of Regional Economics and
Management) | A class of problems of NP to be worth to search an efficient solving
algorithm | 9 pages, 1 figures | null | null | null | cs.DS | null | We examine possibility to design an efficient solving algorithm for problems
of the class \np. It is introduced a classification of \np problems by the
property that a partial solution of size $k$ can be extended into a partial
solution of size $k+1$ in polynomial time. It is defined an unique class
problems to be worth to search an efficient solving algorithm. The problems,
which are outside of this class, are inherently exponential. We show that the
Hamiltonian cycle problem is inherently exponential.
| [
{
"version": "v1",
"created": "Thu, 11 Mar 1999 19:36:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Plotnikov",
"Anatoly D.",
"",
"Vinnitsa Institute of Regional Economics and\n Management"
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/9903011 | Stephan Mertens | Stephan Mertens | A complete anytime algorithm for balanced number partitioning | 12 pages, 5 figures | null | null | null | cs.DS cond-mat.dis-nn cs.AI | null | Given a set of numbers, the balanced partioning problem is to divide them
into two subsets, so that the sum of the numbers in each subset are as nearly
equal as possible, subject to the constraint that the cardinalities of the
subsets be within one of each other. We combine the balanced largest
differencing method (BLDM) and Korf's complete Karmarkar-Karp algorithm to get
a new algorithm that optimally solves the balanced partitioning problem. For
numbers with twelve significant digits or less, the algorithm can optimally
solve balanced partioning problems of arbitrary size in practice. For numbers
with greater precision, it first returns the BLDM solution, then continues to
find better solutions as time allows.
| [
{
"version": "v1",
"created": "Thu, 11 Mar 1999 22:38:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Mertens",
"Stephan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/9903012 | Anatoly D. Plotnikov | Anatoly D. Plotnikov | Formalization of the class of problems solvable by a nondeterministic
Turing machine | 10 pages, 2 figures | Cybernetics and Systems Analysis. Vol. 33, 5(1997) pp. 635-640 | null | null | cs.DS cs.CC | null | The objective of this article is to formalize the definition of NP problems.
We construct a mathematical model of discrete problems as independence
systems with weighted elements. We introduce two auxiliary sets that
characterize the solution of the problem: the adjoint set, which contains the
elements from the original set none of which can be adjoined to the already
chosen solution elements; and the residual set, in which every element can be
adjoined to previously chosen solution elements.
In a problem without lookahead, every adjoint set can be generated by the
solution algorithm effectively, in polynomial time.
The main result of the study is the assertion that the NP class is identical
with the class of problems without lookahead. Hence it follows that if we fail
to find an effective (polynomial-time) solution algorithm for a given problem,
then we need to look for an alternative formulation of the problem in set of
problems without lookahead.
| [
{
"version": "v1",
"created": "Tue, 16 Mar 1999 17:13:43 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Plotnikov",
"Anatoly D.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/9903013 | Tapas K. Das | Tapas Kumar Das | The Impact of Net Culture on Mainstream Societies: a Global Analysis | 8 pages, no figure, Submitted to The Economic and Political Weekly | null | null | null | cs.CY | null | In this work the impact of the Internet culture on standard mainstream
societies has been analyzed. After analytically establishing the fact that the
Net can be viewed as a pan-societal superstructure which supports its own
distinct culture, an ethnographic analysis is provided to find out the key
aspects of this culture. The elements of this culture which have an empowering
impacts on the standard mainstream societies, as well as the elements in it
which can cause discouraging social effects are then discussed by a global
investigation of the present status of various fundamental aspects (e,g,
education, economics, politics, entertainment etc) of the mainstream societies
as well as their links with the Net culture. Though immensely potential for
providing various prominent positive impacts, the key findings of this work
indicate that misuse of Internet can create tremendous harm to the members of
the mainstream societies by generating a set of morally crippled people as well
as a future generation completely void of principles and ethics. This
structured diagnostic approach to the social problems caused by the manhandling
of Internet leads to a concrete effort of providing the measures that can be
taken to enhance or to overcome the supporting and limiting effects of the Net
culture respectively with the intent to benefit our society and to protect the
teratoidation of certain ethical values.
| [
{
"version": "v1",
"created": "Thu, 18 Mar 1999 17:01:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Das",
"Tapas Kumar",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
cs/9903014 | Thomas Kistler | Thomas Kistler and Michael Franz | Perpetual Adaptation of Software to Hardware: An Extensible Architecture
for Providing Code Optimization as a Central System Service | 22 pages | null | null | ICS-TR-99-12 | cs.OS cs.PL | null | We present an open architecture for just-in-time code generation and dynamic
code optimization that is flexible, customizable, and extensible. While
previous research has primarily investigated functional aspects of such a
system, architectural aspects have so far remained unexplored. In this paper,
we argue that these properties are important to generate optimal code for a
variety of hardware architectures and different processor generations within
processor families. These properties are also important to make system-level
code generation useful in practice.
| [
{
"version": "v1",
"created": "Mon, 22 Mar 1999 21:24:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kistler",
"Thomas",
""
],
[
"Franz",
"Michael",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OS",
"description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.",
"span": "(Operating Systems)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/9903015 | Geoffrey McKim | Rob Kling and Geoffrey McKim | Scholarly Communication and the Continuum of Electronic Publishing | 35 pages | Journal of the American Society for Information Science 50(10):
890-906. (July 19, 1999) | null | null | cs.CY physics.soc-ph | null | Electronic publishing opportunities, manifested today in a variety of
electronic journals and Web-based compendia, have captured the imagination of
many scholars. These opportunities have also destabilized norms about the
character of legitimate scholarly publishing in some fields. Unfortunately,
much of the literature about scholarly e-publishing homogenizes the character
of publishing. This article provides an analytical approach for evaluating
disciplinary conventions and for proposing policies about scholarly
e-publishing. We characterize three dimensions of scholarly publishing as a
communicative practice -- publicity, access, and trustworthiness, and examine
several forms of paper and electronic publications in this framework. This
analysis shows how the common claim that e-publishing "substantially expands
access" is over-simplified. It also indicates how peer-reviewing (whether in
paper or electronically) provides valuable functions for scholarly
communication that are not effectively replaced by self-posting articles in
electronic media.
| [
{
"version": "v1",
"created": "Tue, 23 Mar 1999 02:05:06 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kling",
"Rob",
""
],
[
"McKim",
"Geoffrey",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
cs/9903016 | Journal of Artificial Intelligence Research | N Friedman, J.Y. Halpern | Modeling Belief in Dynamic Systems, Part II: Revision and Update | See http://www.jair.org/ for other files accompanying this article | Journal of Artificial Intelligence Research, Vol.10 (1999) 117-167 | null | null | cs.AI | null | The study of belief change has been an active area in philosophy and AI. In
recent years two special cases of belief change, belief revision and belief
update, have been studied in detail. In a companion paper (Friedman & Halpern,
1997), we introduce a new framework to model belief change. This framework
combines temporal and epistemic modalities with a notion of plausibility,
allowing us to examine the change of beliefs over time. In this paper, we show
how belief revision and belief update can be captured in our framework. This
allows us to compare the assumptions made by each method, and to better
understand the principles underlying them. In particular, it shows that Katsuno
and Mendelzon's notion of belief update (Katsuno & Mendelzon, 1991a) depends on
several strong assumptions that may limit its applicability in artificial
intelligence. Finally, our analysis allow us to identify a notion of minimal
change that underlies a broad range of belief change operations including
revision and update.
| [
{
"version": "v1",
"created": "Wed, 24 Mar 1999 00:22:01 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Friedman",
"N",
""
],
[
"Halpern",
"J. Y.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/9903017 | Martin Meier-Schellersheim | M. Meier-Schellersheim, G. Mack | SIMMUNE, a tool for simulating and analyzing immune system behavior | 23 pages, 10 figures | null | null | DESY-99-034 | cs.MA q-bio | null | We present a new approach to the simulation and analysis of immune system
behavior. The simulations that can be done with our software package called
SIMMUNE are based on immunological data that describe the behavior of immune
system agents (cells, molecules) on a microscopial (i.e. agent-agent
interaction) scale by defining cellular stimulus-response mechanisms. Since the
behavior of the agents in SIMMUNE can be very flexibly configured, its
application is not limited to immune system simulations. We outline the
principles of SIMMUNE's multiscale analysis of emergent structure within the
simulated immune system that allow the identification of immunological contexts
using minimal a priori assumptions about the higher level organization of the
immune system.
| [
{
"version": "v1",
"created": "Sun, 28 Mar 1999 20:46:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Meier-Schellersheim",
"M.",
""
],
[
"Mack",
"G.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
null
] |
cs/9903018 | Carlos Cassino | Carlos Cassino, Roberto Ierusalimschy, and Noemi Rodriguez | LuaJava - A Scripting Tool for Java | 10 pages, LaTeX, 1 figure. Available at
http://www.tecgraf.puc-rio.br/~cassino/luajava | null | null | PUC-RioInf.MCC02/99 | cs.SE | null | Scripting languages are becoming more and more important as a tool for
software development, as they provide great flexibility for rapid prototyping
and for configuring componentware applications. In this paper we present
LuaJava, a scripting tool for Java. LuaJava adopts Lua, a dynamically typed
interpreted language, as its script language. Great emphasis is given to the
transparency of the integration between the two languages, so that objects from
one language can be used inside the other like native objects. The final result
of this integration is a tool that allows the construction of configurable Java
applications, using off-the-shelf components, in a high abstraction level.
| [
{
"version": "v1",
"created": "Tue, 30 Mar 1999 11:28:44 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cassino",
"Carlos",
""
],
[
"Ierusalimschy",
"Roberto",
""
],
[
"Rodriguez",
"Noemi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/9903019 | Saulius Maskeliunas | Saulius Maskeliunas (Institute of Mathematics & Informatics, Vilnius) | Workflow Automation with Lotus Notes for the Governmental Administrative
Information System | 8 pages, 7 figures | null | null | MII.PSIS/SM.99-01 | cs.HC | null | The paper presents an introductory overview of the workflow automation area,
outlining the main types, basic technologies, the essential features of
workflow applications. Two sorts of process models for the definition of
workflows (according to the conversation-based and activity-based
methodologies) are sketched. Later on, the nature of Lotus Notes and its
capabilities (as an environment for workflow management systems development)
are indicated. Concluding, the experience of automating administrative
workflows (developing a Subsystem of Inter-institutional Document Management of
the VADIS project) is briefly outlined.
| [
{
"version": "v1",
"created": "Tue, 30 Mar 1999 21:28:07 GMT"
},
{
"version": "v2",
"created": "Wed, 31 Mar 1999 22:44:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Maskeliunas",
"Saulius",
"",
"Institute of Mathematics & Informatics, Vilnius"
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
cs/9903020 | Christoph D\"urr | Christoph Durr, Eric Goles, Ivan Rapaport, Eric Remila | Tiling with bars under tomographic constraints | Updated references | null | null | null | cs.DS cs.CC | null | We wish to tile a rectangle or a torus with only vertical and horizontal bars
of a given length, such that the number of bars in every column and row equals
given numbers. We present results for particular instances and for a more
general problem, while leaving open the initial problem.
| [
{
"version": "v1",
"created": "Wed, 31 Mar 1999 09:58:20 GMT"
},
{
"version": "v2",
"created": "Wed, 7 Jul 1999 06:51:42 GMT"
},
{
"version": "v3",
"created": "Fri, 28 Sep 2001 15:59:30 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Durr",
"Christoph",
""
],
[
"Goles",
"Eric",
""
],
[
"Rapaport",
"Ivan",
""
],
[
"Remila",
"Eric",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/9904001 | Bruce Edmonds | Bruce Edmonds | A Proposal for the Establishment of Review Boards - a flexible approach
to the selection of academic knowledge | Other formats at http://www.cpm.mmu.ac.uk/cpmrep50.html | null | null | CPM-99-50 | cs.CY cs.DL cs.IR | null | Paper journals use a small number of trusted academics to select information
on behalf of all their readers. This inflexibility in the selection was
justified due to the expense of publishing. The advent of cheap distribution
via the internet allows a new trade-off between time and expense and the
flexibility of the selection process. This paper explores one such possible
process one where the role of mark-up and archiving is separated from that of
review. The idea is that authors publish their papers on their own web pages or
in a public paper archive, a board of reviewers judge that paper on a number of
different criteria. The detailed results of the reviews are stored in such a
way as to enable readers to use these judgements to find the papers they want
using search engines on the web. Thus instead of journals using generic
selection criteria readers can set their own to suit their needs. The resulting
system might be even cheaper than web-journals to implement.
| [
{
"version": "v1",
"created": "Thu, 1 Apr 1999 07:54:36 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Edmonds",
"Bruce",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/9904002 | Vladimir Pestov | Vladimir Pestov | A geometric framework for modelling similarity search | 11 pages, LaTeX 2.e | Proc. 10-th Int. Workshop on Database and Expert Systems
Applications (DEXA'99), Sept. 1-3, 1999, Florence, Italy, IEEE Comp. Soc.,
pp. 150-154. | 10.1109/DEXA.1999.795158 | RP-99-12, School of Math and Comp Sci, Victoria University of
Wellington, New Zealand | cs.IR cs.DB cs.DS | null | The aim of this paper is to propose a geometric framework for modelling
similarity search in large and multidimensional data spaces of general nature,
which seems to be flexible enough to address such issues as analysis of
complexity, indexability, and the `curse of dimensionality.' Such a framework
is provided by the concept of the so-called similarity workload, which is a
probability metric space $\Omega$ (query domain) with a distinguished finite
subspace $X$ (dataset), together with an assembly of concepts, techniques, and
results from metric geometry. They include such notions as metric transform,
$\e$-entropy, and the phenomenon of concentration of measure on
high-dimensional structures. In particular, we discuss the relevance of the
latter to understanding the curse of dimensionality. As some of those concepts
and techniques are being currently reinvented by the database community, it
seems desirable to try and bridge the gap between database research and the
relevant work already done in geometry and analysis.
| [
{
"version": "v1",
"created": "Wed, 7 Apr 1999 04:16:02 GMT"
},
{
"version": "v2",
"created": "Mon, 21 Jun 1999 03:45:13 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Pestov",
"Vladimir",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/9904003 | Wen Chen | W. Chen, W. Wang, T. Zhong | The Structure of Weighting Coefficient Matrices of Harmonic Differential
Quadrature and Its Applications | 12 pages, 1 table, Original MS. Word format, published in Common.
Numer. Methods. Engrg | Commnuications in Numerical Methods in Engineering, 12 (1996), pp.
455-459 | null | null | cs.CE cs.NA | null | The structure of weighting coefficient matrices of Harmonic Differential
Quadrature (HDQ) is found to be either centrosymmetric or skew centrosymmetric
depending on the order of the corresponding derivatives. The properties of both
matrices are briefly discussed in this paper. It is noted that the
computational effort of the harmonic quadrature for some problems can be
further reduced up to 75 per cent by using the properties of the
above-mentioned matrices.
| [
{
"version": "v1",
"created": "Sun, 11 Apr 1999 08:21:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chen",
"W.",
""
],
[
"Wang",
"W.",
""
],
[
"Zhong",
"T.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
cs/9904004 | Mark Lee | Mark Lee and John Barnden | Mixing Metaphors | null | Proceedings of the AISB'99 Symposium on Metaphor, Artificial
Intelligence, and Cognition, pages 11-16, Edinburgh | null | null | cs.CL cs.AI | null | Mixed metaphors have been neglected in recent metaphor research. This paper
suggests that such neglect is short-sighted. Though mixing is a more complex
phenomenon than straight metaphors, the same kinds of reasoning and knowledge
structures are required. This paper provides an analysis of both parallel and
serial mixed metaphors within the framework of an AI system which is already
capable of reasoning about straight metaphorical manifestations and argues that
the processes underlying mixing are central to metaphorical meaning. Therefore,
any theory of metaphors must be able to account for mixing.
| [
{
"version": "v1",
"created": "Mon, 12 Apr 1999 11:37:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lee",
"Mark",
""
],
[
"Barnden",
"John",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/9904005 | Walter Eaves | Walter Eaves | Transport Level Security: a proof using the Gong-Needham-Yahalom Logic | 22 pages, 2 figures, 1 appendix | null | null | null | cs.CR | null | This paper provides a proof of the proposed Internet standard Transport Level
Security protocol using the Gong-Needham-Yahalom logic. It is intended as a
teaching aid and hopes to show to students: the potency of a formal method for
protocol design; some of the subtleties of authenticating parties on a network
where all messages can be intercepted; the design of what should be a widely
accepted standard.
| [
{
"version": "v1",
"created": "Wed, 14 Apr 1999 20:05:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Eaves",
"Walter",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.