id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
sequencelengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/9904006 | Wen Chen | W. Chen | Jacobian matrix: a bridge between linear and nonlinear polynomial-only
problems | Six chapters, 28 pages, Original MS. Word format, interested readers
can contact me in [email protected] or [email protected] | null | null | null | cs.CE cs.NA | null | By using the Hadamard matrix product concept, this paper introduces two
generalized matrix formulation forms of numerical analogue of nonlinear
differential operators. The SJT matrix-vector product approach is found to be a
simple, efficient and accurate technique in the calculation of the Jacobian
matrix of the nonlinear discretization by finite difference, finite volume,
collocation, dual reciprocity BEM or radial functions based numerical methods.
We also present and prove simple underlying relationship (theorem (3.1))
between general nonlinear analogue polynomials and their corresponding Jacobian
matrices, which forms the basis of this paper. By means of theorem 3.1,
stability analysis of numerical solutions of nonlinear initial value problems
can be easily handled based on the well-known results for linear problems.
Theorem 3.1 also leads naturally to the straightforward extension of various
linear iterative algorithms such as the SOR, Gauss-Seidel and Jacobi methods to
nonlinear algebraic equations. Since an exact alternative of the quasi-Newton
equation is established via theorem 3.1, we derive a modified BFGS quasi-Newton
method. A simple formula is also given to examine the deviation between the
approximate and exact Jacobian matrices. Furthermore, in order to avoid the
evaluation of the Jacobian matrix and its inverse, the pseudo-Jacobian matrix
is introduced with a general applicability of any nonlinear systems of
equations. It should be pointed out that a large class of real-world nonlinear
problems can be modeled or numerically discretized polynomial-only algebraic
system of equations. The results presented here are in general applicable for
all these problems. This paper can be considered as a starting point in the
research of nonlinear computation and analysis from an innovative viewpoint.
| [
{
"version": "v1",
"created": "Thu, 15 Apr 1999 12:31:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chen",
"W.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
cs/9904007 | Wen Chen | W. Chen (Corresponding author) and Tingxiu Zhong | The Study on the Nonlinear Computations of the DQ and DC Methods | 31 pages, 1 table, Original Word format, interested readers may
contact Dr. Chen in [email protected] or [email protected] | null | null | null | cs.CE cs.NA | null | This paper points out that the differential quadrature (DQ) and differential
cubature (DC) methods due to their global domain property are more efficient
for nonlinear problems than the traditional numerical techniques such as finite
element and finite difference methods. By introducing the Hadamard product of
matrices, we obtain an explicit matrix formulation for the DQ and DC solutions
of nonlinear differential and integro-differential equations. Due to its
simplicity and flexibility, the present Hadamard product approach makes the DQ
and DC methods much easier to be used. Many studies on the Hadamard product can
be fully exploited for the DQ and DC nonlinear computations. Furthermore, we
first present SJT product of matrix and vector to compute accurately and
efficiently the Frechet derivative matrix in the Newton-Raphson method for the
solution of the nonlinear formulations. We also propose a simple approach to
simplify the DQ or DC formulations for some nonlinear differential operators
and thus the computational efficiency of these methods is improved
significantly. We give the matrix multiplication formulas to compute
efficiently the weighting coefficient matrices of the DC method. The spherical
harmonics are suggested as the test functions in the DC method to handle the
nonlinear differential equations occurring in global and hemispheric weather
forecasting problems. Some examples are analyzed to demonstrate the simplicity
and efficiency of the presented techniques. It is emphasized that innovations
presented are applicable to the nonlinear computations of the other numerical
methods as well.
| [
{
"version": "v1",
"created": "Thu, 15 Apr 1999 13:24:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chen",
"W.",
"",
"Corresponding author"
],
[
"Zhong",
"Tingxiu",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
cs/9904008 | Gertjan van Noord | Dale Gerdemann and Gertjan van Noord | Transducers from Rewrite Rules with Backreferences | 8 pages, EACL 1999 Bergen | null | null | null | cs.CL | null | Context sensitive rewrite rules have been widely used in several areas of
natural language processing, including syntax, morphology, phonology and speech
processing. Kaplan and Kay, Karttunen, and Mohri & Sproat have given various
algorithms to compile such rewrite rules into finite-state transducers. The
present paper extends this work by allowing a limited form of backreferencing
in such rules. The explicit use of backreferencing leads to more elegant and
general solutions.
| [
{
"version": "v1",
"created": "Thu, 15 Apr 1999 14:00:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gerdemann",
"Dale",
""
],
[
"van Noord",
"Gertjan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/9904009 | Mark Lee | Mark Lee and Yorick Wilks | An ascription-based approach to speech acts | 6 pages | Proceedings of COLING`96, Copenhagen. (1996) | null | null | cs.CL | null | The two principal areas of natural language processing research in pragmatics
are belief modelling and speech act processing. Belief modelling is the
development of techniques to represent the mental attitudes of a dialogue
participant. The latter approach, speech act processing, based on speech act
theory, involves viewing dialogue in planning terms. Utterances in a dialogue
are modelled as steps in a plan where understanding an utterance involves
deriving the complete plan a speaker is attempting to achieve. However,
previous speech act based approaches have been limited by a reliance upon
relatively simplistic belief modelling techniques and their relationship to
planning and plan recognition. In particular, such techniques assume
precomputed nested belief structures. In this paper, we will present an
approach to speech act processing based on novel belief modelling techniques
where nested beliefs are propagated on demand.
| [
{
"version": "v1",
"created": "Thu, 15 Apr 1999 16:03:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lee",
"Mark",
""
],
[
"Wilks",
"Yorick",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/9904010 | Lorrie Cranor | Lorrie Faith Cranor, Joseph Reagle, and Mark S. Ackerman | Beyond Concern: Understanding Net Users' Attitudes About Online Privacy | 5 figures and appendix | null | null | AT&T Labs-Research Technical Report TR 99.4.3 | cs.CY cs.HC | null | People are concerned about privacy, particularly on the Internet. While many
studies have provided evidence of this concern, few have explored the nature of
the concern in detail, especially for the online environment. With this study,
we have tried to better understand the nature of online privacy concerns; we
look beyond the fact that people are concerned and attempt to understand how
they are concerned. We hope our results will help inform both policy decisions
as well as the development of technology tools that can assist Internet users
in protecting their privacy.
We present results here from the analysis of 381 questionnaires completed
between November 6 and November 13, 1998 by American Internet users. The sample
was drawn from the FamilyPC magazine/Digital Research, Inc. Family Panel. While
this is not a statistically representative sample of US Internet users, our
respondents are heavy Internet users, and quite possibly lead innovators. As
such, we believe that this sample is important for understanding the future
Internet user population.
| [
{
"version": "v1",
"created": "Sun, 18 Apr 1999 19:04:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cranor",
"Lorrie Faith",
""
],
[
"Reagle",
"Joseph",
""
],
[
"Ackerman",
"Mark S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
cs/9904011 | Yin Zhang | Yin Zhang | WebScript -- A Scripting Language for the Web | 19 pages, 11 figures | null | null | null | cs.NI cs.PL | null | WebScript is a scripting language for processing Web documents. Designed as
an extension to Jacl, the Java implementation of Tcl, WebScript allows
programmers to manipulate HTML in the same way as Tcl manipulates text strings
and GUI elements. This leads to a completely new way of writing the next
generation of Web applications. This paper presents the motivation behind the
design and implementation of WebScript, an overview of its major features, as
well as some demonstrations of its power.
| [
{
"version": "v1",
"created": "Wed, 21 Apr 1999 19:21:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Zhang",
"Yin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/9904012 | Stephen F. Bush | Stephen F. Bush | Active Virtual Network Management Protocol | presented at PADS'99 | null | null | null | cs.NI | null | This paper introduces a novel algorithm, the Active Virtual Network
Management Protocol (AVNMP), for predictive network management. It explains how
the AVNMP facilitates the management of an active network by allowing future
predicted state information within an active network to be available to network
management algorithms. This is accomplished by coupling ideas from optimistic
discrete event simulation with active networking. The optimistic discrete event
simulation method used is a form of self-adjusting Time Warp. It is
self-adjusting because the system adjusts for predictions which are inaccurate
beyond a given tolerance. The concept of a streptichron and autoanaplasis are
introduced as mechanisms which take advantage of the enhanced flexibility and
intelligence of active packets. Finally, it is demonstrated that the AVNMP is a
feasible concept.
| [
{
"version": "v1",
"created": "Wed, 21 Apr 1999 21:35:03 GMT"
}
] | 2009-09-25T00:00:00 | [
[
"Bush",
"Stephen F.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9904013 | Stephen F. Bush | Stephen F. Bush and Victor S. Frost and Joseph B. Evans | Network Management of Predictive Mobile Networks | null | Journal of Network and Systems Management, volume 7, number 2,
June, 1999 | null | null | cs.NI | null | There is a trend toward the use of predictive systems in communications
networks. At the systems and network management level predictive capabilities
are focused on anticipating network faults and performance degradation.
Simultaneously, mobile communication networks are being developed with
predictive location and tracking mechanisms. The interactions and synergies
between these systems present a new set of problems. A new predictive network
management framework is developed and examined. The interaction between a
predictive mobile network and the proposed network management system is
discussed. The Rapidly Deployable Radio Network is used as a specific example
to illustrate these interactions.
| [
{
"version": "v1",
"created": "Wed, 21 Apr 1999 21:58:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bush",
"Stephen F.",
""
],
[
"Frost",
"Victor S.",
""
],
[
"Evans",
"Joseph B.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9904014 | Stephen F. Bush | Stephen F. Bush and Sunil Jagannath and Joseph B. Evans and Victor
Frost and Gary Minden and K. Sam Shanmugan | A Control and Management Network for Wireless ATM Systems | author's web page at http://www.crd.ge.com/people/bush | ACM-Baltzer Wireless Networks (WINET), volume 3, pages
267-283,1997 | null | null | cs.NI | null | This paper describes the design of a control and management network
(orderwire) for a mobile wireless Asynchronous Transfer Mode (ATM) network.
This mobile wireless ATM network is part of the Rapidly Deployable Radio
Network (RDRN). The orderwire system consists of a packet radio network which
overlays the mobile wireless ATM network, each network element in this network
uses Global Positioning System (GPS) information to control a beamforming
antenna subsystem which provides for spatial reuse. This paper also proposes a
novel Virtual Network Configuration (VNC) algorithm for predictive network
configuration. A mobile ATM Private Network-Network Interface (PNNI) based on
VNC is also discussed. Finally, as a prelude to the system implementation,
results of a Maisie simulation of the orderwire system are discussed.
| [
{
"version": "v1",
"created": "Thu, 22 Apr 1999 12:58:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bush",
"Stephen F.",
""
],
[
"Jagannath",
"Sunil",
""
],
[
"Evans",
"Joseph B.",
""
],
[
"Frost",
"Victor",
""
],
[
"Minden",
"Gary",
""
],
[
"Shanmugan",
"K. Sam",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9904015 | Stephen F. Bush | Stephen F. Bush and Sunil Jagannath and Joseph B. Evans and Victor
Frost | Mobile ATM Buffer Capacity Analysis | author's web page at http://www.crd.ge.com/people/bush | ACM-Baltzer Mobile Networks and Nomadic Applications (NOMAD),1996,
volume 1, number 1, pages 67-73, February | null | null | cs.NI | null | This paper extends a stochastic theory for buffer fill distribution for
multiple ``on'' and ``off'' sources to a mobile environment. Queue fill
distribution is described by a set of differential equations assuming sources
alternate asynchronously between exponentially distributed periods in ``on''
and ``off'' states. This paper includes the probabilities that mobile sources
have links to a given queue. The sources represent mobile user nodes, and the
queue represents the capacity of a switch. This paper presents a method of
analysis which uses mobile parameters such as speed, call rates per unit area,
cell area, and call duration and determines queue fill distribution at the ATM
cell level. The analytic results are compared with simulation results.
| [
{
"version": "v1",
"created": "Thu, 22 Apr 1999 15:18:15 GMT"
}
] | 2009-09-25T00:00:00 | [
[
"Bush",
"Stephen F.",
""
],
[
"Jagannath",
"Sunil",
""
],
[
"Evans",
"Joseph B.",
""
],
[
"Frost",
"Victor",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9904016 | Stephen F. Bush | Stephen F. Bush, John Hershey and Kirby Vosburgh | Brittle System Analysis | null | null | null | null | cs.NI cs.CC cs.GL cs.PF | null | The goal of this paper is to define and analyze systems which exhibit brittle
behavior. This behavior is characterized by a sudden and steep decline in
performance as the system approaches the limits of tolerance. This can be due
to input parameters which exceed a specified input, or environmental conditions
which exceed specified operating boundaries. An analogy is made between brittle
commmunication systems in particular and materials science.
| [
{
"version": "v1",
"created": "Thu, 22 Apr 1999 15:47:22 GMT"
}
] | 2009-09-25T00:00:00 | [
[
"Bush",
"Stephen F.",
""
],
[
"Hershey",
"John",
""
],
[
"Vosburgh",
"Kirby",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.GL",
"description": "Covers introductory material, survey material, predictions of future trends, biographies, and miscellaneous computer-science related material. Roughly includes all of ACM Subject Class A, except it does not include conference proceedings (which will be listed in the appropriate subject area).",
"span": "(General Literature)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
cs/9904017 | David R. Hanson | David R. Hanson | A Machine-Independent Debugger--Revisited | 12 pages; 6 figures; 3 tables | Software--Practice & Experience, vol. 29, no. 10, 849-862, Aug.
1999 | null | Microsoft Research MSR-TR-99-04 | cs.PL cs.SE | null | Most debuggers are notoriously machine-dependent, but some recent research
prototypes achieve varying degrees of machine-independence with novel designs.
Cdb, a simple source-level debugger for C, is completely independent of its
target architecture. This independence is achieved by embedding symbol tables
and debugging code in the target program, which costs both time and space. This
paper describes a revised design and implementation of cdb that reduces the
space cost by nearly one-half and the time cost by 13% by storing symbol tables
in external files. A symbol table is defined by a 31-line grammar in the
Abstract Syntax Description Language (ASDL). ASDL is a domain-specific language
for specifying tree data structures. The ASDL tools accept an ASDL grammar and
generate code to construct, read, and write these data structures. Using ASDL
automates implementing parts of the debugger, and the grammar documents the
symbol table concisely. Using ASDL also suggested simplifications to the
interface between the debugger and the target program. Perhaps most important,
ASDL emphasizes that symbol tables are data structures, not file formats. Many
of the pitfalls of working with low-level file formats can be avoided by
focusing instead on high-level data structures and automating the
implementation details.
| [
{
"version": "v1",
"created": "Fri, 23 Apr 1999 18:34:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hanson",
"David R.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/9904018 | Janet E. Cahn | Janet E. Cahn | A Computational Memory and Processing Model for Processing for Prosody | 4 pages, 5 figures | null | null | null | cs.CL | null | This paper links prosody to the information in a text and how it is processed
by the speaker. It describes the operation and output of LOQ, a text-to-speech
implementation that includes a model of limited attention and working memory.
Attentional limitations are key. Varying the attentional parameter in the
simulations varies in turn what counts as given and new in a text, and
therefore, the intonational contours with which it is uttered. Currently, the
system produces prosody in three different styles: child-like, adult
expressive, and knowledgeable. This prosody also exhibits differences within
each style -- no two simulations are alike. The limited resource approach
captures some of the stylistic and individual variety found in natural prosody.
| [
{
"version": "v1",
"created": "Sat, 24 Apr 1999 23:45:26 GMT"
}
] | 2022-04-04T00:00:00 | [
[
"Cahn",
"Janet E.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/9904019 | Ronald de Wolf | H. Buhrman (CWI), R. Cleve (U.Calgary), R. de Wolf (CWI and
U.Amsterdam), and Ch. Zalka (LANL) | Bounds for Small-Error and Zero-Error Quantum Algorithms | 11 pages, LaTeX. New title and some sections are rewritten. This
version to appear in IEEE FOCS'99 | null | null | null | cs.CC quant-ph | null | We present a number of results related to quantum algorithms with small error
probability and quantum algorithms that are zero-error. First, we give a tight
analysis of the trade-offs between the number of queries of quantum search
algorithms, their error probability, the size of the search space, and the
number of solutions in this space. Using this, we deduce new lower and upper
bounds for quantum versions of amplification problems. Next, we establish
nearly optimal quantum-classical separations for the query complexity of
monotone functions in the zero-error model (where our quantum zero-error model
is defined so as to be robust when the quantum gates are noisy). Also, we
present a communication complexity problem related to a total function for
which there is a quantum-classical communication complexity gap in the
zero-error model. Finally, we prove separations for monotone graph properties
in the zero-error and other error models which imply that the evasiveness
conjecture for such properties does not hold for quantum computers.
| [
{
"version": "v1",
"created": "Mon, 26 Apr 1999 08:54:21 GMT"
},
{
"version": "v2",
"created": "Tue, 17 Aug 1999 12:05:16 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Buhrman",
"H.",
"",
"CWI"
],
[
"Cleve",
"R.",
"",
"U.Calgary"
],
[
"de Wolf",
"R.",
"",
"CWI and\n U.Amsterdam"
],
[
"Zalka",
"Ch.",
"",
"LANL"
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
] |
cs/9904020 | Walter Eaves | Walter Eaves | ODP channel objects that provide services transparently for distributing
processing systems | 35 pages, 10 figures | null | null | null | cs.DC cs.OS | null | This paper describes an architecture for a distributing processing system
that would allow remote procedure calls to invoke other services as messages
are passed between clients and servers. It proposes that an additional class of
data processing objects be located in the software communications channel. The
objects in this channel would then be used to enforce protocols on
client-server applications without any additional effort by the application
programmers. For example, services such as key-management, time-stamping,
sequencing and encryption can be implemented at different levels of the
software communications stack to provide a complete authentication service. A
distributing processing environment could be used to control broadband network
data delivery. Architectures and invocation semantics are discussed, Example
classes and interfaces for channel objects are given in the Java programming
language.
| [
{
"version": "v1",
"created": "Mon, 26 Apr 1999 21:13:00 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Eaves",
"Walter",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.OS",
"description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.",
"span": "(Operating Systems)"
}
] |
cs/9904021 | Wen Chen | W. Chen | Hadamard product nonlinear formulation of Galerkin and finite element
methods | 8 pages, welcome any comments to author: [email protected]
or [email protected] | null | null | null | cs.CE cs.NA | null | A novel nonlinear formulation of the finite element and Galerkin methods is
presented here, which leads to the Hadamard product expression of the resultant
nonlinear algebraic analogue. The presented formulation attains the advantages
of weak formulation in the standard finite element and Galerkin schemes and
avoids the costly repeated numerical integration of the Jacobian matrix via the
recently developed SJT product approach. This also provides possibility of the
nonlinear decoupling computations.
| [
{
"version": "v1",
"created": "Wed, 28 Apr 1999 13:12:47 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chen",
"W.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
cs/9905001 | Rebecca Hwa | Rebecca Hwa | Supervised Grammar Induction Using Training Data with Limited
Constituent Information | 7 pages, 2 figures, to appear in the proc. of ACL '99 | null | null | null | cs.CL | null | Corpus-based grammar induction generally relies on hand-parsed training data
to learn the structure of the language. Unfortunately, the cost of building
large annotated corpora is prohibitively expensive. This work aims to improve
the induction strategy when there are few labels in the training data. We show
that the most informative linguistic constituents are the higher nodes in the
parse trees, typically denoting complex noun phrases and sentential clauses.
They account for only 20% of all constituents. For inducing grammars from
sparsely labeled training data (e.g., only higher-level constituent labels), we
propose an adaptation strategy, which produces grammars that parse almost as
well as grammars induced from fully labeled corpora. Our results suggest that
for a partial parser to replace human annotators, it must be able to
automatically extract higher-level constituents rather than base noun phrases.
| [
{
"version": "v1",
"created": "Sun, 2 May 1999 20:48:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hwa",
"Rebecca",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/9905002 | Burkhard D. Burow | Burkhard D. Burow | DRAFT : Task System and Item Architecture (TSIA) | vii+244 pages, including 126 figures of diagrams and code examples.
Submitted to Springer Verlag. For further information see http://www.tsia.org | null | null | DESY 99-066 | cs.PL cs.DC cs.OS | null | During its execution, a task is independent of all other tasks. For an
application which executes in terms of tasks, the application definition can be
free of the details of the execution. Many projects have demonstrated that a
task system (TS) can provide such an application with a parallel, distributed,
heterogeneous, adaptive, dynamic, real-time, interactive, reliable, secure or
other execution. A task consists of items and thus the application is defined
in terms of items. An item architecture (IA) can support arrays, routines and
other structures of items, thus allowing for a structured application
definition. Taking properties from many projects, the support can extend
through to currying, application defined types, conditional items, streams and
other definition elements. A task system and item architecture (TSIA) thus
promises unprecedented levels of support for application execution and
definition.
| [
{
"version": "v1",
"created": "Wed, 5 May 1999 01:43:13 GMT"
}
] | 2021-08-23T00:00:00 | [
[
"Burow",
"Burkhard D.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.OS",
"description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.",
"span": "(Operating Systems)"
}
] |
cs/9905003 | Walter Eaves | Walter Eaves | Collective Choice Theory in Collaborative Computing | 40 pages, 10 figures | null | null | null | cs.MA cs.DC | null | This paper presents some fundamental collective choice theory for information
system designers, particularly those working in the field of computer-supported
cooperative work. This paper is focused on a presentation of Arrow's
Possibility and Impossibility theorems which form the fundamental boundary on
the efficacy of collective choice: voting and selection procedures. It restates
the conditions that Arrow placed on collective choice functions in more
rigorous second-order logic, which could be used as a set of test conditions
for implementations, and a useful probabilistic result for analyzing votes on
issue pairs. It also describes some simple collective choice functions. There
is also some discussion of how enterprises should approach putting their
resources under collective control: giving an outline of a superstructure of
performative agents to carry out this function and what distributing processing
technology would be needed.
| [
{
"version": "v1",
"created": "Mon, 10 May 1999 17:07:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Eaves",
"Walter",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/9905004 | Kagan Tumer | David H. Wolpert, Kagan Tumer, Jeremy Frank | Using Collective Intelligence to Route Internet Traffic | 7 pages | Advances in Information Processing Systems - 11, eds M. Kearns, S.
Solla, D. Cohn, MIT Press, 1999 | null | null | cs.LG adap-org cond-mat.stat-mech cs.DC cs.NI nlin.AO | null | A COllective INtelligence (COIN) is a set of interacting reinforcement
learning (RL) algorithms designed in an automated fashion so that their
collective behavior optimizes a global utility function. We summarize the
theory of COINs, then present experiments using that theory to design COINs to
control internet traffic routing. These experiments indicate that COINs
outperform all previously investigated RL-based, shortest path routing
algorithms.
| [
{
"version": "v1",
"created": "Mon, 10 May 1999 20:52:23 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wolpert",
"David H.",
""
],
[
"Tumer",
"Kagan",
""
],
[
"Frank",
"Jeremy",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
null,
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
}
] |
cs/9905005 | Kagan Tumer | David H. Wolpert, Kevin R. Wheeler, Kagan Tumer | General Principles of Learning-Based Multi-Agent Systems | 7 pages, 6 figures | Proceedings of the Third International Conference on Autonomous
Agents, Seatle, WA 1999 | null | null | cs.MA adap-org cond-mat.stat-mech cs.DC cs.LG nlin.AO | null | We consider the problem of how to design large decentralized multi-agent
systems (MAS's) in an automated fashion, with little or no hand-tuning. Our
approach has each agent run a reinforcement learning algorithm. This converts
the problem into one of how to automatically set/update the reward functions
for each of the agents so that the global goal is achieved. In particular we do
not want the agents to ``work at cross-purposes'' as far as the global goal is
concerned. We use the term artificial COllective INtelligence (COIN) to refer
to systems that embody solutions to this problem. In this paper we present a
summary of a mathematical framework for COINs. We then investigate the
real-world applicability of the core concepts of that framework via two
computer experiments: we show that our COINs perform near optimally in a
difficult variant of Arthur's bar problem (and in particular avoid the tragedy
of the commons for that problem), and we also illustrate optimal performance
for our COINs in the leader-follower problem.
| [
{
"version": "v1",
"created": "Mon, 10 May 1999 22:20:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wolpert",
"David H.",
""
],
[
"Wheeler",
"Kevin R.",
""
],
[
"Tumer",
"Kagan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
null,
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
}
] |
cs/9905006 | Stephen F. Bush | Stephen F. Bush | The Design and Analysis of Virtual Network Configuration for a Wireless
Mobile ATM Network | PhD Thesis | null | null | null | cs.NI | null | This research concentrates on the design and analysis of an algorithm
referred to as Virtual Network Configuration (VNC) which uses predicted future
states of a system for faster network configuration and management. VNC is
applied to the configuration of a wireless mobile ATM network. VNC is built on
techniques from parallel discrete event simulation merged with constraints from
real-time systems and applied to mobile ATM configuration and handoff.
Configuration in a mobile network is a dynamic and continuous process.
Factors such as load, distance, capacity and topology are all constantly
changing in a mobile environment. The VNC algorithm anticipates configuration
changes and speeds the reconfiguration process by pre-computing and caching
results. VNC propagates local prediction results throughout the VNC enhanced
system. The Global Positioning System is an enabling technology for the use of
VNC in mobile networks because it provides location information and accurate
time for each node.
This research has resulted in well defined structures for the encapsulation
of physical processes within Logical Processes and a generic library for
enhancing a system with VNC. Enhancing an existing system with VNC is straight
forward assuming the existing physical processes do not have side effects. The
benefit of prediction is gained at the cost of additional traffic and
processing. This research includes an analysis of VNC and suggestions for
optimization of the VNC algorithm and its parameters.
| [
{
"version": "v1",
"created": "Tue, 11 May 1999 20:05:36 GMT"
}
] | 2009-09-25T00:00:00 | [
[
"Bush",
"Stephen F.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/9905007 | Michael R. Brent | Michael R. Brent | An Efficient, Probabilistically Sound Algorithm for Segmentation and
Word Discovery | 65 double-spaced ms. pages including 3 figures | Brent, M. R. (1999). An efficient, probabilistically sound
algorithm for segmentation and word discovery. Machine Learning 34, 71-105 | null | null | cs.CL cs.LG | null | This paper presents a model-based, unsupervised algorithm for recovering word
boundaries in a natural-language text from which they have been deleted. The
algorithm is derived from a probability model of the source that generated the
text. The fundamental structure of the model is specified abstractly so that
the detailed component models of phonology, word-order, and word frequency can
be replaced in a modular fashion. The model yields a language-independent,
prior probability distribution on all possible sequences of all possible words
over a given alphabet, based on the assumption that the input was generated by
concatenating words from a fixed but unknown lexicon. The model is unusual in
that it treats the generation of a complete corpus, regardless of length, as a
single event in the probability space. Accordingly, the algorithm does not
estimate a probability distribution on words; instead, it attempts to calculate
the prior probabilities of various word sequences that could underlie the
observed text. Experiments on phonemic transcripts of spontaneous speech by
parents to young children suggest that this algorithm is more effective than
other proposed algorithms, at least when utterance boundaries are given and the
text includes a substantial number of short utterances.
Keywords: Bayesian grammar induction, probability models, minimum description
length (MDL), unsupervised learning, cognitive modeling, language acquisition,
segmentation
| [
{
"version": "v1",
"created": "Wed, 12 May 1999 14:25:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Brent",
"Michael R.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/9905008 | Stefan Riezler | Mats Rooth, Stefan Riezler, Detlef Prescher, Glenn Carroll, and Franz
Beil (IMS, University of Stuttgart) | Inducing a Semantically Annotated Lexicon via EM-Based Clustering | 8 pages, uses colacl.sty. Proceedings of the 37th Annual Meeting of
the ACL, 1999 | null | null | null | cs.CL cs.AI cs.LG | null | We present a technique for automatic induction of slot annotations for
subcategorization frames, based on induction of hidden classes in the EM
framework of statistical estimation. The models are empirically evalutated by a
general decision test. Induction of slot labeling for subcategorization frames
is accomplished by a further application of EM, and applied experimentally on
frame observations derived from parsing large corpora. We outline an
interpretation of the learned representations as theoretical-linguistic
decompositional lexical entries.
| [
{
"version": "v1",
"created": "Wed, 19 May 1999 14:52:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rooth",
"Mats",
"",
"IMS, University of Stuttgart"
],
[
"Riezler",
"Stefan",
"",
"IMS, University of Stuttgart"
],
[
"Prescher",
"Detlef",
"",
"IMS, University of Stuttgart"
],
[
"Carroll",
"Glenn",
"",
"IMS, University of Stuttgart"
],
[
"Beil",
"Franz",
"",
"IMS, University of Stuttgart"
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/9905009 | Stefan Riezler | Franz Beil, Glenn Carroll, Detlef Prescher, Stefan Riezler, and Mats
Rooth (IMS, University of Stuttgart) | Inside-Outside Estimation of a Lexicalized PCFG for German | 8 pages, uses colacl.sty. Proceedings of the 37th Annual Meeting of
the ACL, 1999 | null | null | null | cs.CL cs.LG | null | The paper describes an extensive experiment in inside-outside estimation of a
lexicalized probabilistic context free grammar for German verb-final clauses.
Grammar and formalism features which make the experiment feasible are
described. Successive models are evaluated on precision and recall of phrase
markup.
| [
{
"version": "v1",
"created": "Wed, 19 May 1999 14:47:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Beil",
"Franz",
"",
"IMS, University of Stuttgart"
],
[
"Carroll",
"Glenn",
"",
"IMS, University of Stuttgart"
],
[
"Prescher",
"Detlef",
"",
"IMS, University of Stuttgart"
],
[
"Riezler",
"Stefan",
"",
"IMS, University of Stuttgart"
],
[
"Rooth",
"Mats",
"",
"IMS, University of Stuttgart"
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/9905010 | Stefan Riezler | Stefan Riezler (IMS, University of Stuttgart) | Statistical Inference and Probabilistic Modelling for Constraint-Based
NLP | 12 pages, uses knvns98.sty. Proceedings of the 4th Conference on
Natural Language Processing (KONVENS-98) | null | null | null | cs.CL cs.LG | null | We present a probabilistic model for constraint-based grammars and a method
for estimating the parameters of such models from incomplete, i.e., unparsed
data. Whereas methods exist to estimate the parameters of probabilistic
context-free grammars from incomplete data (Baum 1970), so far for
probabilistic grammars involving context-dependencies only parameter estimation
techniques from complete, i.e., fully parsed data have been presented (Abney
1997). However, complete-data estimation requires labor-intensive, error-prone,
and grammar-specific hand-annotating of large language corpora. We present a
log-linear probability model for constraint logic programming, and a general
algorithm to estimate the parameters of such models from incomplete data by
extending the estimation algorithm of Della-Pietra, Della-Pietra, and Lafferty
(1997) to incomplete data settings.
| [
{
"version": "v1",
"created": "Wed, 19 May 1999 16:03:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Riezler",
"Stefan",
"",
"IMS, University of Stuttgart"
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/9905011 | Kagan Tumer | Kagan Tumer, Nirmala Ramanujam, Joydeep Ghosh, and Rebecca
Richards-Kortum | Ensembles of Radial Basis Function Networks for Spectroscopic Detection
of Cervical Pre-Cancer | 23 pages | IEEE Transactions on Biomedical Engineering, vol 45, no. 8, pp
953-962, 1998 | null | null | cs.NE cs.LG q-bio | null | The mortality related to cervical cancer can be substantially reduced through
early detection and treatment. However, current detection techniques, such as
Pap smear and colposcopy, fail to achieve a concurrently high sensitivity and
specificity.
In vivo fluorescence spectroscopy is a technique which quickly,
non-invasively and quantitatively probes the biochemical and morphological
changes that occur in pre-cancerous tissue.
A multivariate statistical algorithm was used to extract clinically useful
information from tissue spectra acquired from 361 cervical sites from 95
patients at 337, 380 and 460 nm excitation wavelengths. The multivariate
statistical analysis was also employed to reduce the number of fluorescence
excitation-emission wavelength pairs required to discriminate healthy tissue
samples from pre-cancerous tissue samples. The use of connectionist methods
such as multi layered perceptrons, radial basis function networks, and
ensembles of such networks was investigated. RBF ensemble algorithms based on
fluorescence spectra potentially provide automated, and near real-time
implementation of pre-cancer detection in the hands of non-experts. The results
are more reliable, direct and accurate than those achieved by either human
experts or multivariate statistical algorithms.
| [
{
"version": "v1",
"created": "Thu, 20 May 1999 18:28:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Tumer",
"Kagan",
""
],
[
"Ramanujam",
"Nirmala",
""
],
[
"Ghosh",
"Joydeep",
""
],
[
"Richards-Kortum",
"Rebecca",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
null
] |
cs/9905012 | Kagan Tumer | Kagan Tumer and Joydeep Ghosh | Linear and Order Statistics Combiners for Pattern Classification | 31 pages | Combining Artificial Neural Networks,Ed. Amanda Sharkey, pp
127-162, Springer Verlag, 1999 | null | null | cs.NE cs.LG | null | Several researchers have experimentally shown that substantial improvements
can be obtained in difficult pattern recognition problems by combining or
integrating the outputs of multiple classifiers. This chapter provides an
analytical framework to quantify the improvements in classification results due
to combining. The results apply to both linear combiners and order statistics
combiners. We first show that to a first order approximation, the error rate
obtained over and above the Bayes error rate, is directly proportional to the
variance of the actual decision boundaries around the Bayes optimum boundary.
Combining classifiers in output space reduces this variance, and hence reduces
the "added" error. If N unbiased classifiers are combined by simple averaging,
the added error rate can be reduced by a factor of N if the individual errors
in approximating the decision boundaries are uncorrelated. Expressions are then
derived for linear combiners which are biased or correlated, and the effect of
output correlations on ensemble performance is quantified. For order statistics
based non-linear combiners, we derive expressions that indicate how much the
median, the maximum and in general the ith order statistic can improve
classifier performance. The analysis presented here facilitates the
understanding of the relationships among error rates, classifier boundary
distributions, and combining in output space. Experimental results on several
public domain data sets are provided to illustrate the benefits of combining
and to support the analytical results.
| [
{
"version": "v1",
"created": "Thu, 20 May 1999 20:15:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Tumer",
"Kagan",
""
],
[
"Ghosh",
"Joydeep",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/9905013 | Kagan Tumer | Kagan Tumer and Joydeep Ghosh | Robust Combining of Disparate Classifiers through Order Statistics | 22 pages | null | null | UT-CVIS-TR-99-001 (The University of Texas) | cs.LG cs.CV cs.NE | null | Integrating the outputs of multiple classifiers via combiners or
meta-learners has led to substantial improvements in several difficult pattern
recognition problems. In the typical setting investigated till now, each
classifier is trained on data taken or resampled from a common data set, or
(almost) randomly selected subsets thereof, and thus experiences similar
quality of training data. However, in certain situations where data is acquired
and analyzed on-line at several geographically distributed locations, the
quality of data may vary substantially, leading to large discrepancies in
performance of individual classifiers. In this article we introduce and
investigate a family of classifiers based on order statistics, for robust
handling of such cases. Based on a mathematical modeling of how the decision
boundaries are affected by order statistic combiners, we derive expressions for
the reductions in error expected when such combiners are used. We show
analytically that the selection of the median, the maximum and in general, the
$i^{th}$ order statistic improves classification performance. Furthermore, we
introduce the trim and spread combiners, both based on linear combinations of
the ordered classifier outputs, and show that they are quite beneficial in
presence of outliers or uneven classifier performance. Experimental results on
several public domain data sets corroborate these findings.
| [
{
"version": "v1",
"created": "Thu, 20 May 1999 20:37:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Tumer",
"Kagan",
""
],
[
"Ghosh",
"Joydeep",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
cs/9905014 | Dietterich | Thomas G. Dietterich | Hierarchical Reinforcement Learning with the MAXQ Value Function
Decomposition | 63 pages, 15 figures | null | null | null | cs.LG | null | This paper presents the MAXQ approach to hierarchical reinforcement learning
based on decomposing the target Markov decision process (MDP) into a hierarchy
of smaller MDPs and decomposing the value function of the target MDP into an
additive combination of the value functions of the smaller MDPs. The paper
defines the MAXQ hierarchy, proves formal results on its representational
power, and establishes five conditions for the safe use of state abstractions.
The paper presents an online model-free learning algorithm, MAXQ-Q, and proves
that it converges wih probability 1 to a kind of locally-optimal policy known
as a recursively optimal policy, even in the presence of the five kinds of
state abstraction. The paper evaluates the MAXQ representation and MAXQ-Q
through a series of experiments in three domains and shows experimentally that
MAXQ-Q (with state abstractions) converges to a recursively optimal policy much
faster than flat Q learning. The fact that MAXQ learns a representation of the
value function has an important benefit: it makes it possible to compute and
execute an improved, non-hierarchical policy via a procedure similar to the
policy improvement step of policy iteration. The paper demonstrates the
effectiveness of this non-hierarchical execution experimentally. Finally, the
paper concludes with a comparison to related work and a discussion of the
design tradeoffs in hierarchical reinforcement learning.
| [
{
"version": "v1",
"created": "Fri, 21 May 1999 14:26:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dietterich",
"Thomas G.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/9905015 | Dietterich | Thomas G. Dietterich | State Abstraction in MAXQ Hierarchical Reinforcement Learning | 7 pages, 2 figures | null | null | null | cs.LG | null | Many researchers have explored methods for hierarchical reinforcement
learning (RL) with temporal abstractions, in which abstract actions are defined
that can perform many primitive actions before terminating. However, little is
known about learning with state abstractions, in which aspects of the state
space are ignored. In previous work, we developed the MAXQ method for
hierarchical RL. In this paper, we define five conditions under which state
abstraction can be combined with the MAXQ value function decomposition. We
prove that the MAXQ-Q learning algorithm converges under these conditions and
show experimentally that state abstraction is important for the successful
application of MAXQ-Q learning.
| [
{
"version": "v1",
"created": "Fri, 21 May 1999 14:49:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Dietterich",
"Thomas G.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/9905016 | Max Chaves | M. Chaves | Programs with Stringent Performance Objectives Will Often Exhibit
Chaotic Behavior | 7 pages, no figures | null | null | null | cs.CE cs.CC | null | Software for the resolution of certain kind of problems, those that rate high
in the Stringent Performance Objectives adjustment factor (IFPUG scheme), can
be described using a combination of game theory and autonomous systems. From
this description it can be shown that some of those problems exhibit chaotic
behavior, an important fact in understanding the functioning of the related
software. As a relatively simple example, it is shown that chess exhibits
chaotic behavior in its configuration space. This implies that static
evaluators in chess programs have intrinsic limitations.
| [
{
"version": "v1",
"created": "Thu, 27 May 1999 23:58:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chaves",
"M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/9906001 | Lane A. Hemaspaandra | Russell Bent, Michael Schear, Lane A. Hemaspaandra, Gabriel Istrate | On Bounded-Weight Error-Correcting Codes | 10 pages, 3 tables | null | null | null | cs.IT math.IT | null | This paper computationally obtains optimal bounded-weight, binary,
error-correcting codes for a variety of distance bounds and dimensions. We
compare the sizes of our codes to the sizes of optimal constant-weight, binary,
error-correcting codes, and evaluate the differences.
| [
{
"version": "v1",
"created": "Tue, 1 Jun 1999 18:24:00 GMT"
}
] | 2007-10-15T00:00:00 | [
[
"Bent",
"Russell",
""
],
[
"Schear",
"Michael",
""
],
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Istrate",
"Gabriel",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/9906002 | Stevan Harnad | Stevan Harnad | The Symbol Grounding Problem | null | Physica D 42: 335-346 | 10.1016/0167-2789(90)90087-6 | null | cs.AI | null | How can the semantic interpretation of a formal symbol system be made
intrinsic to the system, rather than just parasitic on the meanings in our
heads? How can the meanings of the meaningless symbol tokens, manipulated
solely on the basis of their (arbitrary) shapes, be grounded in anything but
other meaningless symbols? The problem is analogous to trying to learn Chinese
from a Chinese/Chinese dictionary alone. A candidate solution is sketched:
Symbolic representations must be grounded bottom-up in nonsymbolic
representations of two kinds: (1) "iconic representations," which are analogs
of the proximal sensory projections of distal objects and events, and (2)
"categorical representations," which are learned and innate feature-detectors
that pick out the invariant features of object and event categories from their
sensory projections. Elementary symbols are the names of these object and event
categories, assigned on the basis of their (nonsymbolic) categorical
representations. Higher-order (3) "symbolic representations," grounded in these
elementary symbols, consist of symbol strings describing category membership
relations (e.g., "An X is a Y that is Z").
| [
{
"version": "v1",
"created": "Tue, 1 Jun 1999 19:57:24 GMT"
}
] | 2015-06-25T00:00:00 | [
[
"Harnad",
"Stevan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/9906003 | Melanie Siegel | Melanie Siegel | The syntactic processing of particles in Japanese spoken language | 8 pages | Proceedings of the 13th Pacific Asia Conference on Language,
Information and Computation. 1999 | null | null | cs.CL | null | Particles fullfill several distinct central roles in the Japanese language.
They can mark arguments as well as adjuncts, can be functional or have semantic
funtions. There is, however, no straightforward matching from particles to
functions, as, e.g., GA can mark the subject, the object or an adjunct of a
sentence. Particles can cooccur. Verbal arguments that could be identified by
particles can be eliminated in the Japanese sentence. And finally, in spoken
language particles are often omitted. A proper treatment of particles is thus
necessary to make an analysis of Japanese sentences possible. Our treatment is
based on an empirical investigation of 800 dialogues. We set up a type
hierarchy of particles motivated by their subcategorizational and
modificational behaviour. This type hierarchy is part of the Japanese syntax in
VERBMOBIL.
| [
{
"version": "v1",
"created": "Wed, 2 Jun 1999 12:03:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Siegel",
"Melanie",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/9906004 | Jorn Veenstra | Sabine Buchholz, Jorn Veenstra, Walter Daelemans | Cascaded Grammatical Relation Assignment | 8 pages, to appear in: proceedings of EMNLP/VLC-99, University of
Maryland, USA, June 21-22, 1999 | null | null | ILK-9908 | cs.CL cs.LG | null | In this paper we discuss cascaded Memory-Based grammatical relations
assignment. In the first stages of the cascade, we find chunks of several types
(NP,VP,ADJP,ADVP,PP) and label them with their adverbial function (e.g. local,
temporal). In the last stage, we assign grammatical relations to pairs of
chunks. We studied the effect of adding several levels to this cascaded
classifier and we found that even the less performing chunkers enhanced the
performance of the relation finder.
| [
{
"version": "v1",
"created": "Wed, 2 Jun 1999 13:41:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Buchholz",
"Sabine",
""
],
[
"Veenstra",
"Jorn",
""
],
[
"Daelemans",
"Walter",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/9906005 | Sabine Buchholz | Walter Daelemans, Sabine Buchholz, Jorn Veenstra | Memory-Based Shallow Parsing | 8 pages, to appear in: Proceedings of the EACL'99 workshop on
Computational Natural Language Learning (CoNLL-99), Bergen, Norway, June 1999 | null | null | ILK-9907 | cs.CL cs.LG | null | We present a memory-based learning (MBL) approach to shallow parsing in which
POS tagging, chunking, and identification of syntactic relations are formulated
as memory-based modules. The experiments reported in this paper show
competitive results, the F-value for the Wall Street Journal (WSJ) treebank is:
93.8% for NP chunking, 94.7% for VP chunking, 77.1% for subject detection and
79.0% for object detection.
| [
{
"version": "v1",
"created": "Wed, 2 Jun 1999 13:48:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Daelemans",
"Walter",
""
],
[
"Buchholz",
"Sabine",
""
],
[
"Veenstra",
"Jorn",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/9906006 | Khalil Sima'an | Khalil Sima'an | Learning Efficient Disambiguation | 222 pages | null | null | Ph.d. thesis, ILLC Dissertation Series number 1999-02, University of
Amsterdam | cs.CL cs.AI | null | This dissertation analyses the computational properties of current
performance-models of natural language parsing, in particular Data Oriented
Parsing (DOP), points out some of their major shortcomings and suggests
suitable solutions. It provides proofs that various problems of probabilistic
disambiguation are NP-Complete under instances of these performance-models, and
it argues that none of these models accounts for attractive efficiency
properties of human language processing in limited domains, e.g. that frequent
inputs are usually processed faster than infrequent ones. The central
hypothesis of this dissertation is that these shortcomings can be eliminated by
specializing the performance-models to the limited domains. The dissertation
addresses "grammar and model specialization" and presents a new framework, the
Ambiguity-Reduction Specialization (ARS) framework, that formulates the
necessary and sufficient conditions for successful specialization. The
framework is instantiated into specialization algorithms and applied to
specializing DOP. Novelties of these learning algorithms are 1) they limit the
hypotheses-space to include only "safe" models, 2) are expressed as constrained
optimization formulae that minimize the entropy of the training tree-bank given
the specialized grammar, under the constraint that the size of the specialized
model does not exceed a predefined maximum, and 3) they enable integrating the
specialized model with the original one in a complementary manner. The
dissertation provides experiments with initial implementations and compares the
resulting Specialized DOP (SDOP) models to the original DOP models with
encouraging results.
| [
{
"version": "v1",
"created": "Wed, 2 Jun 1999 15:50:26 GMT"
},
{
"version": "v2",
"created": "Thu, 3 Jun 1999 14:46:17 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sima'an",
"Khalil",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/9906007 | Hendrik Jan Hoogeboom | Joost Engelfriet, Hendrik Jan Hoogeboom | MSO definable string transductions and two-way finite state transducers | 63 pages, LaTeX2e. Extended abstract presented at 26-th ICALP, 1999 | null | null | TR 98-13, LIACS, Leiden University, The Netherlands | cs.LO cs.CC | null | String transductions that are definable in monadic second-order (mso) logic
(without the use of parameters) are exactly those realized by deterministic
two-way finite state transducers. Nondeterministic mso definable string
transductions (i.e., those definable with the use of parameters) correspond to
compositions of two nondeterministic two-way finite state transducers that have
the finite visit property. Both families of mso definable string transductions
are characterized in terms of Hennie machines, i.e., two-way finite state
transducers with the finite visit property that are allowed to rewrite their
input tape.
| [
{
"version": "v1",
"created": "Fri, 4 Jun 1999 13:21:01 GMT"
}
] | 2008-11-24T00:00:00 | [
[
"Engelfriet",
"Joost",
""
],
[
"Hoogeboom",
"Hendrik Jan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/9906008 | Paul Vitanyi | Tao Jiang (McMaster U.), Ming Li (U. Waterloo), Paul Vitanyi (CWI & U.
Amsterdam) | A Lower Bound on the Average-Case Complexity of Shellsort | Preliminary version 10 pages, 2 figures, Proc ICALP 99, Springer
LNCS; final version (given here) LaTeX 5 pages published in J. Assoc. Comp.
Mach. as below | T. Jiang, M. Li, and P. Vitanyi, A lower bound on the average-case
complexity of Shellsort, J. Assoc. Comp. Mach., 47:5(2000), 905--91 | null | null | cs.CC cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We prove a general lower bound on the average-case complexity of Shellsort:
the average number of data-movements (and comparisons) made by a $p$-pass
Shellsort for any incremental sequence is $\Omega (pn^{1 + 1/p})$ for every
$p$. The proof method is an incompressibility argument based on Kolmogorov
complexity. Using similar techniques, the average-case complexity of several
other sorting algorithms is analyzed.
| [
{
"version": "v1",
"created": "Fri, 4 Jun 1999 15:11:31 GMT"
},
{
"version": "v2",
"created": "Wed, 28 Jan 2015 15:25:40 GMT"
}
] | 2015-01-29T00:00:00 | [
[
"Jiang",
"Tao",
"",
"McMaster U."
],
[
"Li",
"Ming",
"",
"U. Waterloo"
],
[
"Vitanyi",
"Paul",
"",
"CWI & U.\n Amsterdam"
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/9906009 | Thorsten Brants | Thorsten Brants | Cascaded Markov Models | 8 pages | Proceedings of EACL-99, Bergen, Norway | null | null | cs.CL | null | This paper presents a new approach to partial parsing of context-free
structures. The approach is based on Markov Models. Each layer of the resulting
structure is represented by its own Markov Model, and output of a lower layer
is passed as input to the next higher layer. An empirical evaluation of the
method yields very good results for NP/PP chunking of German newspaper texts.
| [
{
"version": "v1",
"created": "Sun, 6 Jun 1999 17:36:34 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Brants",
"Thorsten",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/9906010 | Victor Makarov | Victor Makarov | Predicate Logic with Definitions | 15 pages | null | null | null | cs.LO cs.AI | null | Predicate Logic with Definitions (PLD or D-logic) is a modification of
first-order logic intended mostly for practical formalization of mathematics.
The main syntactic constructs of D-logic are terms, formulas and definitions. A
definition is a definition of variables, a definition of constants, or a
composite definition (D-logic has also abbreviation definitions called
abbreviations). Definitions can be used inside terms and formulas. This
possibility alleviates introducing new quantifier-like names. Composite
definitions allow constructing new definitions from existing ones.
| [
{
"version": "v1",
"created": "Mon, 7 Jun 1999 20:16:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Makarov",
"Victor",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/9906011 | Wen Chen | W. Chen | A Newton method without evaluation of nonlinear function values | Welcome any comments to [email protected] or
[email protected] | null | null | null | cs.CE cs.NA | null | The present author recently proposed and proved a relationship theorem
between nonlinear polynomial equations and the corresponding Jacobian matrix.
By using this theorem, this paper derives a Newton iterative formula without
requiring the evaluation of nonlinear function values in the solution of
nonlinear polynomial-only problems.
| [
{
"version": "v1",
"created": "Wed, 9 Jun 1999 12:27:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chen",
"W.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
cs/9906012 | Wen Chen | W. Chen, C. Shu, W. He | The application of special matrix product to differential quadrature
solution of geometrically nonlinear bending of orthotropic rectangular plates | Welcome any comments to [email protected] or
[email protected] | null | null | null | cs.CE cs.NA | null | The Hadamard and SJT product of matrices are two types of special matrix
product. The latter was first defined by Chen. In this study, they are applied
to the differential quadrature (DQ) solution of geometrically nonlinear bending
of isotropic and orthotropic rectangular plates. By using the Hadamard product,
the nonlinear formulations are greatly simplified, while the SJT product
approach minimizes the effort to evaluate the Jacobian derivative matrix in the
Newton-Raphson method for solving the resultant nonlinear formulations. In
addition, the coupled nonlinear formulations for the present problems can
easily be decoupled by means of the Hadamard and SJT product. Therefore, the
size of the simultaneous nonlinear algebraic equations is reduced by two-thirds
and the computing effort and storage requirements are alleviated greatly. Two
recent approaches applying the multiple boundary conditions are employed in the
present DQ nonlinear computations. The solution accuracies are improved
obviously in comparison to the previously given by Bert et al. The numerical
results and detailed solution procedures are provided to demonstrate the superb
efficiency, accuracy and simplicity of the new approaches in applying DQ method
for nonlinear computations.
| [
{
"version": "v1",
"created": "Wed, 9 Jun 1999 12:47:13 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chen",
"W.",
""
],
[
"Shu",
"C.",
""
],
[
"He",
"W.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
cs/9906013 | Karl Stroetmann | Sabine Glesner and Karl Stroetmann | Combining Inclusion Polymorphism and Parametric Polymorphism | 14 pages | null | null | null | cs.LO cs.PL | null | We show that the question whether a term is typable is decidable for type
systems combining inclusion polymorphism with parametric polymorphism provided
the type constructors are at most unary. To prove this result we first reduce
the typability problem to the problem of solving a system of type inequations.
The result is then obtained by showing that the solvability of the resulting
system of type inequations is decidable.
| [
{
"version": "v1",
"created": "Mon, 14 Jun 1999 09:42:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Glesner",
"Sabine",
""
],
[
"Stroetmann",
"Karl",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/9906014 | Gertjan van Noord | Gert Veldhuijzen van Zanten and Gosse Bouma and Khalil Sima'an and
Gertjan van Noord and Remko Bonnema | Evaluation of the NLP Components of the OVIS2 Spoken Dialogue System | Proceedings of CLIN 99 | null | null | null | cs.CL | null | The NWO Priority Programme Language and Speech Technology is a 5-year
research programme aiming at the development of spoken language information
systems. In the Programme, two alternative natural language processing (NLP)
modules are developed in parallel: a grammar-based (conventional, rule-based)
module and a data-oriented (memory-based, stochastic, DOP) module. In order to
compare the NLP modules, a formal evaluation has been carried out three years
after the start of the Programme. This paper describes the evaluation procedure
and the evaluation results. The grammar-based component performs much better
than the data-oriented one in this comparison.
| [
{
"version": "v1",
"created": "Mon, 14 Jun 1999 10:06:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"van Zanten",
"Gert Veldhuijzen",
""
],
[
"Bouma",
"Gosse",
""
],
[
"Sima'an",
"Khalil",
""
],
[
"van Noord",
"Gertjan",
""
],
[
"Bonnema",
"Remko",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/9906015 | Alexander Yeh | Lisa Ferro, Marc Vilain and Alexander Yeh | Learning Transformation Rules to Find Grammatical Relations | 10 pages. Uses latex-acl.sty and named.sty | Computational Natural Language Learning (CoNLL-99), pages 43-52,
June, 1999. Bergen, Norway | null | null | cs.CL | null | Grammatical relationships are an important level of natural language
processing. We present a trainable approach to find these relationships through
transformation sequences and error-driven learning. Our approach finds
grammatical relationships between core syntax groups and bypasses much of the
parsing phase. On our training and test set, our procedure achieves 63.6%
recall and 77.3% precision (f-score = 69.8).
| [
{
"version": "v1",
"created": "Mon, 14 Jun 1999 22:06:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Ferro",
"Lisa",
""
],
[
"Vilain",
"Marc",
""
],
[
"Yeh",
"Alexander",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/9906016 | Ken Samuel | Ken Samuel, Sandra Carberry, and K. Vijay-Shanker | Automatically Selecting Useful Phrases for Dialogue Act Tagging | 14 pages, published in PACLING'99 | Samuel, Ken and Carberry, Sandra and Vijay-Shanker, K. 1999.
Automatically Selecting Useful Phrases for Dialogue Act Tagging. In
Proceedings of the Fourth Conference of the Pacific Association for
Computational Linguistics. Waterloo, Ontario, Canada | null | null | cs.AI cs.LG | null | We present an empirical investigation of various ways to automatically
identify phrases in a tagged corpus that are useful for dialogue act tagging.
We found that a new method (which measures a phrase's deviation from an
optimally-predictive phrase), enhanced with a lexical filtering mechanism,
produces significantly better cues than manually-selected cue phrases, the
exhaustive set of phrases in a training corpus, and phrases chosen by
traditional metrics, like mutual information and information gain.
| [
{
"version": "v1",
"created": "Fri, 18 Jun 1999 03:25:03 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Samuel",
"Ken",
""
],
[
"Carberry",
"Sandra",
""
],
[
"Vijay-Shanker",
"K.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/9906017 | Rigo Michel | Michel Rigo | Generalization of automatic sequences for numeration systems on a
regular language | 10 pages, 3 figures | Theoret. Comput. Sci. 244 (2000) 271--281 | null | null | cs.CC | null | Let L be an infinite regular language on a totally ordered alphabet (A,<).
Feeding a finite deterministic automaton (with output) with the words of L
enumerated lexicographically with respect to < leads to an infinite sequence
over the output alphabet of the automaton. This process generalizes the concept
of k-automatic sequence for abstract numeration systems on a regular language
(instead of systems in base k). Here, I study the first properties of these
sequences and their relations with numeration systems.
| [
{
"version": "v1",
"created": "Tue, 22 Jun 1999 10:01:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Rigo",
"Michel",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/9906018 | Christoph Durr | Christoph Durr and Marek Chrobak | Reconstructing Polyatomic Structures from Discrete X-Rays:
NP-Completeness Proof for Three Atoms | null | Proceedings of the 23rd International Symposium on Mathematical
Foundations of Computer Science, LNCS vol 1450, 185-193, 1998 | null | null | cs.DS cs.CC | null | We address a discrete tomography problem that arises in the study of the
atomic structure of crystal lattices. A polyatomic structure T can be defined
as an integer lattice in dimension D>=2, whose points may be occupied by $c$
distinct types of atoms. To ``analyze'' T, we conduct ell measurements that we
call_discrete X-rays_. A discrete X-ray in direction xi determines the number
of atoms of each type on each line parallel to xi. Given ell such non-parallel
X-rays, we wish to reconstruct T.
The complexity of the problem for c=1 (one atom type) has been completely
determined by Gardner, Gritzmann and Prangenberg, who proved that the problem
is NP-complete for any dimension D>=2 and ell>=3 non-parallel X-rays, and that
it can be solved in polynomial time otherwise.
The NP-completeness result above clearly extends to any c>=2, and therefore
when studying the polyatomic case we can assume that ell=2. As shown in another
article by the same authors, this problem is also NP-complete for c>=6 atoms,
even for dimension D=2 and axis-parallel X-rays. They conjecture that the
problem remains NP-complete for c=3,4,5, although, as they point out, the proof
idea does not seem to extend to c<=5.
We resolve the conjecture by proving that the problem is indeed NP-complete
for c>=3 in 2D, even for axis-parallel X-rays. Our construction relies heavily
on some structure results for the realizations of 0-1 matrices with given row
and column sums.
| [
{
"version": "v1",
"created": "Mon, 21 Jun 1999 15:33:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Durr",
"Christoph",
""
],
[
"Chrobak",
"Marek",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/9906019 | Ion Androutsopoulos | G. Petasis, G. Paliouras, V. Karkaletsis, C. D. Spyropoulos and I.
Androutsopoulos (Software & Knowledge Engineering Lab, Institute of
Informatics & Telecommunications, NCSR Demokritos, Greece) | Resolving Part-of-Speech Ambiguity in the Greek Language Using Learning
Techniques | 6 pages. To appear in the Proceedings of the ECCAI Advanced Course on
Artificial Intelligence(ACAI'99), Chania, Greece, July 1999 | In Fakotakis, N. et al. (Eds.), Machine Learning in Human Language
Technology (Proceedings of the ACAI Workshop), pp. 29-34, Chania, Greece,
1999. | null | null | cs.CL cs.AI | null | This article investigates the use of Transformation-Based Error-Driven
learning for resolving part-of-speech ambiguity in the Greek language. The aim
is not only to study the performance, but also to examine its dependence on
different thematic domains. Results are presented here for two different test
cases: a corpus on "management succession events" and a general-theme corpus.
The two experiments show that the performance of this method does not depend on
the thematic domain of the corpus, and its accuracy for the Greek language is
around 95%.
| [
{
"version": "v1",
"created": "Tue, 22 Jun 1999 07:41:24 GMT"
},
{
"version": "v2",
"created": "Wed, 30 Jun 1999 14:46:15 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Petasis",
"G.",
"",
"Software & Knowledge Engineering Lab, Institute of\n Informatics & Telecommunications, NCSR Demokritos, Greece"
],
[
"Paliouras",
"G.",
"",
"Software & Knowledge Engineering Lab, Institute of\n Informatics & Telecommunications, NCSR Demokritos, Greece"
],
[
"Karkaletsis",
"V.",
"",
"Software & Knowledge Engineering Lab, Institute of\n Informatics & Telecommunications, NCSR Demokritos, Greece"
],
[
"Spyropoulos",
"C. D.",
"",
"Software & Knowledge Engineering Lab, Institute of\n Informatics & Telecommunications, NCSR Demokritos, Greece"
],
[
"Androutsopoulos",
"I.",
"",
"Software & Knowledge Engineering Lab, Institute of\n Informatics & Telecommunications, NCSR Demokritos, Greece"
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/9906020 | Ion Androutsopoulos | I. Androutsopoulos (Software & Knowledge Engineering Lab, Institute of
Informatics & Telecommunications, NCSR Demokritos, Greece) | Temporal Meaning Representations in a Natural Language Front-End | 15 pages. To appear in the Proceedings of the 12th International
Symposium on Languages for Intensional Programming, Athens, Greece, 1999 | In Gergatsoulis, M. and Rondogiannis, P. (Eds.), Intensional
Programming II (Proceedings of the 12th International Symposium on Languages
for Intensional Programming, Athens, Greece, 1999), pp. 197-213, World
Scientific, 2000. | null | null | cs.CL | null | Previous work in the context of natural language querying of temporal
databases has established a method to map automatically from a large subset of
English time-related questions to suitable expressions of a temporal logic-like
language, called TOP. An algorithm to translate from TOP to the TSQL2 temporal
database language has also been defined. This paper shows how TOP expressions
could be translated into a simpler logic-like language, called BOT. BOT is very
close to traditional first-order predicate logic (FOPL), and hence existing
methods to manipulate FOPL expressions can be exploited to interface to
time-sensitive applications other than TSQL2 databases, maintaining the
existing English-to-TOP mapping.
| [
{
"version": "v1",
"created": "Tue, 22 Jun 1999 08:28:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Androutsopoulos",
"I.",
"",
"Software & Knowledge Engineering Lab, Institute of\n Informatics & Telecommunications, NCSR Demokritos, Greece"
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/9906021 | Christoph D\"urr | Christoph Durr and Marek Chrobak | Reconstructing hv-Convex Polyominoes from Orthogonal Projections | null | Information Processing Letters, 69, 1999, 283-289 | null | null | cs.DS | null | Tomography is the area of reconstructing objects from projections. Here we
wish to reconstruct a set of cells in a two dimensional grid, given the number
of cells in every row and column. The set is required to be an hv-convex
polyomino, that is all its cells must be connected and the cells in every row
and column must be consecutive. A simple, polynomial algorithm for
reconstructing hv-convex polyominoes is provided, which is several orders of
magnitudes faster than the best previously known algorithm from Barcucci et al.
In addition, the problem of reconstructing a special class of centered
hv-convex polyominoes is addressed. (An object is centered if it contains a row
whose length equals the total width of the object). It is shown that in this
case the reconstruction problem can be solved in linear time.
| [
{
"version": "v1",
"created": "Tue, 22 Jun 1999 09:56:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Durr",
"Christoph",
""
],
[
"Chrobak",
"Marek",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/9906022 | Joseph O'Rourke | Joseph O'Rourke and Irena Pashchenko | Zero-Parity Stabbing Information | null | Proc. Japan Conf. Discrete Comput. Geom. '98, Dec. 1998, 93--97 | null | null | cs.CG cs.DM | null | Everett et al. introduced several varieties of stabbing information for the
lines determined by pairs of vertices of a simple polygon P, and established
their relationships to vertex visibility and other combinatorial data. In the
same spirit, we define the ``zero-parity (ZP) stabbing information'' to be a
natural weakening of their ``weak stabbing information,'' retaining only the
distinction among {zero, odd, even>0} in the number of polygon edges stabbed.
Whereas the weak stabbing information's relation to visibility remains an open
problem, we completely settle the analogous questions for zero-parity
information, with three results: (1) ZP information is insufficient to
distinguish internal from external visibility graph edges; (2) but it does
suffice for all polygons that avoid a certain complex substructure; and (3) the
natural generalization of ZP information to the continuous case of smooth
curves does distinguish internal from external visibility.
| [
{
"version": "v1",
"created": "Tue, 22 Jun 1999 20:32:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"O'Rourke",
"Joseph",
""
],
[
"Pashchenko",
"Irena",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/9906023 | Joseph O'Rourke | Joseph O'Rourke | Computational Geometry Column 35 | null | SIGACT News, 30(2) Issue #111 (1999) 31-32 | null | null | cs.CG | null | The subquadratic algorithm of Kapoor for finding shortest paths on a
polyhedron is described.
| [
{
"version": "v1",
"created": "Tue, 22 Jun 1999 20:40:51 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"O'Rourke",
"Joseph",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
cs/9906024 | Christoph D\"urr | Christoph Durr, Huong LeThanh and Miklos Santha | A decision procedure for well-formed linear quantum cellular automata | null | Random Structures and Algorithms 11, 381-394, 1997 | null | null | cs.DS cs.CC quant-ph | null | In this paper we introduce a new quantum computation model, the linear
quantum cellular automaton. Well-formedness is an essential property for any
quantum computing device since it enables us to define the probability of a
configuration in an observation as the squared magnitude of its amplitude. We
give an efficient algorithm which decides if a linear quantum cellular
automaton is well-formed. The complexity of the algorithm is $O(n^2)$ in the
algebraic model of computation if the input automaton has continuous
neighborhood.
| [
{
"version": "v1",
"created": "Wed, 23 Jun 1999 10:48:10 GMT"
},
{
"version": "v2",
"created": "Fri, 27 Oct 2000 16:00:55 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Durr",
"Christoph",
""
],
[
"LeThanh",
"Huong",
""
],
[
"Santha",
"Miklos",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
] |
cs/9906025 | Lluis Padro | J. Daude, L. Padro and G. Rigau (TALP Research Center. LSI Dept.
Universitat Politecnica de Catalunya. Barcelona) | Mapping Multilingual Hierarchies Using Relaxation Labeling | 8 pages. 1 eps figure | null | null | null | cs.CL | null | This paper explores the automatic construction of a multilingual Lexical
Knowledge Base from pre-existing lexical resources. We present a new and robust
approach for linking already existing lexical/semantic hierarchies. We used a
constraint satisfaction algorithm (relaxation labeling) to select --among all
the candidate translations proposed by a bilingual dictionary-- the right
English WordNet synset for each sense in a taxonomy automatically derived from
a Spanish monolingual dictionary. Although on average, there are 15 possible
WordNet connections for each sense in the taxonomy, the method achieves an
accuracy over 80%. Finally, we also propose several ways in which this
technique could be applied to enrich and improve existing lexical databases.
| [
{
"version": "v1",
"created": "Thu, 24 Jun 1999 16:56:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Daude",
"J.",
"",
"TALP Research Center. LSI Dept.\n Universitat Politecnica de Catalunya. Barcelona"
],
[
"Padro",
"L.",
"",
"TALP Research Center. LSI Dept.\n Universitat Politecnica de Catalunya. Barcelona"
],
[
"Rigau",
"G.",
"",
"TALP Research Center. LSI Dept.\n Universitat Politecnica de Catalunya. Barcelona"
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/9906026 | Gertjan van Noord | Gertjan van Noord and Gosse Bouma and Rob Koeling and Mark-Jan
Nederhof | Robust Grammatical Analysis for Spoken Dialogue Systems | Accepted for JNLE | null | null | null | cs.CL | null | We argue that grammatical analysis is a viable alternative to concept
spotting for processing spoken input in a practical spoken dialogue system. We
discuss the structure of the grammar, and a model for robust parsing which
combines linguistic sources of information and statistical sources of
information. We discuss test results suggesting that grammatical processing
allows fast and accurate processing of spoken input.
| [
{
"version": "v1",
"created": "Fri, 25 Jun 1999 08:16:23 GMT"
}
] | 2016-08-31T00:00:00 | [
[
"van Noord",
"Gertjan",
""
],
[
"Bouma",
"Gosse",
""
],
[
"Koeling",
"Rob",
""
],
[
"Nederhof",
"Mark-Jan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/9906027 | Gillian Callaghan | Yorick Wilks and Roberta Catizone | Human-Computer Conversation | 14 pages, 1 figure | null | null | CS-99-04 | cs.CL cs.HC | null | The article surveys a little of the history of the technology, sets out the
main current theoretical approaches in brief, and discusses the on-going
opposition between theoretical and empirical approaches. It illustrates the
situation with some discussion of CONVERSE, a system that won the Loebner prize
in 1997 and which displays features of both approaches.
| [
{
"version": "v1",
"created": "Fri, 25 Jun 1999 11:44:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wilks",
"Yorick",
""
],
[
"Catizone",
"Roberta",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
cs/9906028 | Edith Hemaspaandra | Edith Hemaspaandra | On the Power of Positive Turing Reductions | 7 pages | null | null | null | cs.CC | null | In the early 1980s, Selman's seminal work on positive Turing reductions
showed that positive Turing reduction to NP yields no greater computational
power than NP itself. Thus, positive Turing and Turing reducibility to NP
differ sharply unless the polynomial hierarchy collapses.
We show that the situation is quite different for DP, the next level of the
boolean hierarchy. In particular, positive Turing reduction to DP already
yields all (and only) sets Turing reducibility to NP. Thus, positive Turing and
Turing reducibility to DP yield the same class. Additionally, we show that an
even weaker class, P(NP[1]), can be substituted for DP in this context.
| [
{
"version": "v1",
"created": "Sat, 26 Jun 1999 23:31:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hemaspaandra",
"Edith",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/9906029 | Marsha Chechik | M.Chechik, D.Paun | Events in Property Patterns | 14 pages, 3 figures | Lecture notes in Computer Science (Proceedings of 6 Spin'99
Workshop) | null | null | cs.SE cs.AI cs.CL cs.SC | null | A pattern-based approach to the presentation, codification and reuse of
property specifications for finite-state verification was proposed by Dwyer and
his collegues. The patterns enable non-experts to read and write formal
specifications for realistic systems and facilitate easy conversion of
specifications between formalisms, such as LTL, CTL, QRE. In this paper, we
extend the pattern system with events - changes of values of variables in the
context of LTL.
| [
{
"version": "v1",
"created": "Mon, 28 Jun 1999 17:06:51 GMT"
},
{
"version": "v2",
"created": "Tue, 29 Jun 1999 16:28:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chechik",
"M.",
""
],
[
"Paun",
"D.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
cs/9906030 | Marsha Chechik | M. Chechik | SCR3: towards usability of formal methods | 15 pages, 10 figures | Proceedings of CASCON'98, December 1998, pp. 177-191 | null | null | cs.SE | null | This paper gives an overview of SCR3 -- a toolset designed to increase the
usability of formal methods for software development. Formal requirements are
specified in SCR3 in an easy to use and review format, and then used in
checking requirements for correctness and in verifying consistency between
annotated code and requirements.
In this paper we discuss motivations behind this work, describe several tools
which are part of SCR3, and illustrate their operation on an example of a
Cruise Control system.
| [
{
"version": "v1",
"created": "Mon, 28 Jun 1999 17:30:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chechik",
"M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/9906031 | Marsha Chechik | D. Paun, M. Chechik | Events in Linear-Time Properties | 10 pages, 4 figures | Proceedings of 4th IEEE International Symposium on Requirements
Engineering, June 1999, pp. 123-132 | 10.1109/ISRE.1999.777992 | null | cs.SE | null | For over a decade, researchers in formal methods tried to create formalisms
that permit natural specification of systems and allow mathematical reasoning
about their correctness. The availability of fully-automated reasoning tools
enables more non-specialists to use formal methods effectively --- their
responsibility reduces to just specifying the model and expressing the desired
properties. Thus, it is essential that these properties be represented in a
language that is easy to use and sufficiently expressive.
Linear-time temporal logic is a formalism that has been extensively used by
researchers for specifying properties of systems. When such properties are
closed under stuttering, i.e. their interpretation is not modified by
transitions that leave the system in the same state, verification tools can
utilize a partial-order reduction technique to reduce the size of the model and
thus analyze larger systems. If LTL formulas do not contain the ``next''
operator, the formulas are closed under stuttering, but the resulting language
is not expressive enough to capture many important properties, e.g., properties
involving events. Determining if an arbitrary LTL formula is closed under
stuttering is hard --- it has been proven to be PSPACE-complete.
In this paper we relax the restriction on LTL that guarantees closure under
stuttering, introduce the notion of edges in the context of LTL, and provide
theorems that enable syntactic reasoning about closure under stuttering of LTL
formulas.
| [
{
"version": "v1",
"created": "Mon, 28 Jun 1999 18:06:27 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Paun",
"D.",
""
],
[
"Chechik",
"M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/9906032 | Marsha Chechik | A. Wong and M. Chechik | Formal Modeling in a Commercial Setting: A Case Study | 18 pages, 5 figures, to appear in Proceedings of FM'99: World
Congress on Formal Methods, September 1999 | null | null | null | cs.SE | null | This paper describes a case study conducted in collaboration with Nortel to
demonstrate the feasibility of applying formal modeling techniques to
telecommunication systems. A formal description language, SDL, was chosen by
our qualitative CASE tool evaluation to model a multimedia-messaging system
described by an 80-page natural language specification. Our model was used to
identify errors in the software requirements document and to derive test
suites, shadowing the existing development process and keeping track of a
variety of productivity data.
| [
{
"version": "v1",
"created": "Tue, 29 Jun 1999 15:29:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Wong",
"A.",
""
],
[
"Chechik",
"M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/9906033 | Lane A. Hemaspaandra | Jin-Yi Cai, Lane A. Hemaspaandra, Gerd Wechsung | Robust Reductions | 26 pages; 1 figure; will appear in Theory of Computing Systems;
earlier versions appear as UR-CS-TR-666 and in COCOON 98 | null | null | null | cs.CC | null | We continue the study of robust reductions initiated by Gavalda and Balcazar.
In particular, a 1991 paper of Gavalda and Balcazar claimed an optimal
separation between the power of robust and nondeterministic strong reductions.
Unfortunately, their proof is invalid. We re-establish their theorem.
Generalizing robust reductions, we note that robustly strong reductions are
built from two restrictions, robust underproductivity and robust
overproductivity, both of which have been separately studied before in other
contexts. By systematically analyzing the power of these reductions, we explore
the extent to which each restriction weakens the power of reductions. We show
that one of these reductions yields a new, strong form of the Karp-Lipton
Theorem.
| [
{
"version": "v1",
"created": "Tue, 29 Jun 1999 18:26:12 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Cai",
"Jin-Yi",
""
],
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Wechsung",
"Gerd",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/9906034 | Davide Turcato | Davide Turcato, Paul McFetridge, Fred Popowich, Janine Toole | A Unified Example-Based and Lexicalist Approach to Machine Translation | 11 pages, to be presented at the 8th International Conference on
Theoretical and Methodological Issues in Machine Translation (TMI-99) | null | null | null | cs.CL | null | We present an approach to Machine Translation that combines the ideas and
methodologies of the Example-Based and Lexicalist theoretical frameworks. The
approach has been implemented in a multilingual Machine Translation system.
| [
{
"version": "v1",
"created": "Wed, 30 Jun 1999 23:06:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Turcato",
"Davide",
""
],
[
"McFetridge",
"Paul",
""
],
[
"Popowich",
"Fred",
""
],
[
"Toole",
"Janine",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/9907001 | David Eppstein | David Eppstein | Setting Parameters by Example | 13 pages, 3 figures. To be presented at 40th IEEE Symp. Foundations
of Computer Science (FOCS '99) | SIAM J. Computing 32(3):643-653, 2003 | 10.1137/S0097539700370084 | null | cs.DS cs.CG | null | We introduce a class of "inverse parametric optimization" problems, in which
one is given both a parametric optimization problem and a desired optimal
solution; the task is to determine parameter values that lead to the given
solution. We describe algorithms for solving such problems for minimum spanning
trees, shortest paths, and other "optimal subgraph" problems, and discuss
applications in multicast routing, vehicle path planning, resource allocation,
and board game programming.
| [
{
"version": "v1",
"created": "Fri, 2 Jul 1999 21:09:55 GMT"
}
] | 2010-01-21T00:00:00 | [
[
"Eppstein",
"David",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
cs/9907002 | David Eppstein | Xian-ping Ge, David Eppstein, Padhraic Smyth | The Distribution of Cycle Lengths in Graphical Models for Iterative
Decoding | 23 pages, 11 figures | IEEE Trans. Information Theory 47(6):2549-2553, 2001 | 10.1109/18.945266 | null | cs.DM | null | This paper analyzes the distribution of cycle lengths in turbo decoding and
low-density parity check (LDPC) graphs. The properties of such cycles are of
significant interest in the context of iterative decoding algorithms which are
based on belief propagation or message passing. We estimate the probability
that there exist no simple cycles of length less than or equal to k at a
randomly chosen node in a turbo decoding graph using a combination of counting
arguments and independence assumptions. For large block lengths n, this
probability is approximately e^{-{2^{k-1}-4}/n}, k>=4. Simulation results
validate the accuracy of the various approximations. For example, for turbo
codes with a block length of 64000, a randomly chosen node has a less than 1%
chance of being on a cycle of length less than or equal to 10, but has a
greater than 99.9% chance of being on a cycle of length less than or equal to
20. The effect of the "S-random" permutation is also analyzed and it is shown
that while it eliminates short cycles of length k<8, it does not significantly
affect the overall distribution of cycle lengths. Similar analyses and
simulations are also presented for graphs for LDPC codes. The paper concludes
by commenting briefly on how these results may provide insight into the
practical success of iterative decoding methods.
| [
{
"version": "v1",
"created": "Fri, 2 Jul 1999 23:37:54 GMT"
}
] | 2010-01-21T00:00:00 | [
[
"Ge",
"Xian-ping",
""
],
[
"Eppstein",
"David",
""
],
[
"Smyth",
"Padhraic",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/9907003 | Steven Bird | Steven Bird and Mark Liberman | Annotation graphs as a framework for multidimensional linguistic data
analysis | 10 pages, 10 figures, Towards Standards and Tools for Discourse
Tagging, Proceedings of the Workshop. pp. 1-10. Association for Computational
Linguistics | null | null | null | cs.CL | null | In recent work we have presented a formal framework for linguistic annotation
based on labeled acyclic digraphs. These `annotation graphs' offer a simple yet
powerful method for representing complex annotation structures incorporating
hierarchy and overlap. Here, we motivate and illustrate our approach using
discourse-level annotations of text and speech data drawn from the CALLHOME,
COCONUT, MUC-7, DAMSL and TRAINS annotation schemes. With the help of domain
specialists, we have constructed a hybrid multi-level annotation for a fragment
of the Boston University Radio Speech Corpus which includes the following
levels: segment, word, breath, ToBI, Tilt, Treebank, coreference and named
entity. We show how annotation graphs can represent hybrid multi-level
structures which derive from a diverse set of file formats. We also show how
the approach facilitates substantive comparison of multiple annotations of a
single signal based on different theoretical models. The discussion shows how
annotation graphs open the door to wide-ranging integration of tools, formats
and corpora.
| [
{
"version": "v1",
"created": "Mon, 5 Jul 1999 14:51:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bird",
"Steven",
""
],
[
"Liberman",
"Mark",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/9907004 | Anand Venkataraman | Anand Venkataraman | MAP Lexicon is useful for segmentation and word discovery in
child-directed speech | Because of rather fundamental changes to the underlying model
proposed in the paper, it has been withdrawn from the archive. | null | null | null | cs.CL cs.LG | null | Because of rather fundamental changes to the underlying model proposed in the
paper, it has been withdrawn from the archive.
| [
{
"version": "v1",
"created": "Tue, 6 Jul 1999 01:44:00 GMT"
},
{
"version": "v2",
"created": "Thu, 14 Oct 1999 00:31:39 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Venkataraman",
"Anand",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/9907005 | Eirik Fossgaard | Eirik Fossgaard | Alternative Local Discriminant Bases Using Empirical Expectation and
Variance Estimation | 11 pages | null | null | null | cs.NA | null | We propose alternative discriminant measures for selecting the best basis
among a large collection of orthonormal bases for classification purposes. A
generalization of the Local Discriminant Basis Algorithm of Saito and Coifman
is constructed. The success of these new methods is evaluated and compared to
earlier methods in experiments.
| [
{
"version": "v1",
"created": "Tue, 6 Jul 1999 11:48:33 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fossgaard",
"Eirik",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
cs/9907006 | Erik Tjong Kim Sang | Erik F. Tjong Kim Sang and Jorn Veenstra | Representing Text Chunks | 7 pages | EACL'99, Bergen | null | null | cs.CL | null | Dividing sentences in chunks of words is a useful preprocessing step for
parsing, information extraction and information retrieval. (Ramshaw and Marcus,
1995) have introduced a "convenient" data representation for chunking by
converting it to a tagging task. In this paper we will examine seven different
data representations for the problem of recognizing noun phrase chunks. We will
show that the the data representation choice has a minor influence on chunking
performance. However, equipped with the most suitable data representation, our
memory-based learning chunker was able to improve the best published chunking
results for a standard data set.
| [
{
"version": "v1",
"created": "Tue, 6 Jul 1999 12:44:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Sang",
"Erik F. Tjong Kim",
""
],
[
"Veenstra",
"Jorn",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/9907007 | Atsushi Fujii | Atsushi Fujii and Tetsuya Ishikawa | Cross-Language Information Retrieval for Technical Documents | 9 pages, 5 Postscript figures, uses colacl.sty and psfig.tex | Proceedings of the Joint ACL SIGDAT Conference on Empirical
Methods in Natural Language Processing and Very Large Corpora, pp.29-37, 1999 | null | null | cs.CL | null | This paper proposes a Japanese/English cross-language information retrieval
(CLIR) system targeting technical documents. Our system first translates a
given query containing technical terms into the target language, and then
retrieves documents relevant to the translated query. The translation of
technical terms is still problematic in that technical terms are often compound
words, and thus new terms can be progressively created simply by combining
existing base words. In addition, Japanese often represents loanwords based on
its phonogram. Consequently, existing dictionaries find it difficult to achieve
sufficient coverage. To counter the first problem, we use a compound word
translation method, which uses a bilingual dictionary for base words and
collocational statistics to resolve translation ambiguity. For the second
problem, we propose a transliteration method, which identifies phonetic
equivalents in the target language. We also show the effectiveness of our
system using a test collection for CLIR.
| [
{
"version": "v1",
"created": "Tue, 6 Jul 1999 16:25:46 GMT"
},
{
"version": "v2",
"created": "Wed, 7 Jul 1999 09:12:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fujii",
"Atsushi",
""
],
[
"Ishikawa",
"Tetsuya",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/9907008 | Janine Toole | Janine Toole, Fred Popowich, Devlan Nicholson, Davide Turcato, Paul
McFetridge | Explanation-based Learning for Machine Translation | 12 pages, 3 figures, To appear in Proceedings of the 8th
International Conference on Theoretical and Methodological Issues in Machine
Translation | null | null | null | cs.CL | null | In this paper we present an application of explanation-based learning (EBL)
in the parsing module of a real-time English-Spanish machine translation system
designed to translate closed captions. We discuss the efficiency/coverage
trade-offs available in EBL and introduce the techniques we use to increase
coverage while maintaining a high level of space and time efficiency. Our
performance results indicate that this approach is effective.
| [
{
"version": "v1",
"created": "Tue, 6 Jul 1999 18:35:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Toole",
"Janine",
""
],
[
"Popowich",
"Fred",
""
],
[
"Nicholson",
"Devlan",
""
],
[
"Turcato",
"Davide",
""
],
[
"McFetridge",
"Paul",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/9907009 | Jim Gray | Alexander S. Szalay, Peter Kunszt, Ani Thakar, Jim Gray | Designing and Mining Multi-Terabyte Astronomy Archives: The Sloan
Digital Sky Survey | 9 pages, original at
research.microsoft.com/~gray/papers/MS_TR_99_30_Sloan_Digital_Sky_Survey.doc | null | null | MS_TR_99_30 | cs.DB cs.DL | null | The next-generation astronomy digital archives will cover most of the
universe at fine resolution in many wave-lengths, from X-rays to ultraviolet,
optical, and infrared. The archives will be stored at diverse geographical
locations. One of the first of these projects, the Sloan Digital Sky Survey
(SDSS) will create a 5-wavelength catalog over 10,000 square degrees of the sky
(see http://www.sdss.org/). The 200 million objects in the multi-terabyte
database will have mostly numerical attributes, defining a space of 100+
dimensions. Points in this space have highly correlated distributions.
The archive will enable astronomers to explore the data interactively. Data
access will be aided by a multidimensional spatial index and other indices. The
data will be partitioned in many ways. Small tag objects consisting of the most
popular attributes speed up frequent searches. Splitting the data among
multiple servers enables parallel, scalable I/O and applies parallel processing
to the data. Hashing techniques allow efficient clustering and pair-wise
comparison algorithms that parallelize nicely. Randomly sampled subsets allow
debugging otherwise large queries at the desktop. Central servers will operate
a data pump that supports sweeping searches that touch most of the data. The
anticipated queries require special operators related to angular distances and
complex similarity tests of object properties, like shapes, colors, velocity
vectors, or temporal behaviors. These issues pose interesting data management
challenges.
| [
{
"version": "v1",
"created": "Tue, 6 Jul 1999 22:56:47 GMT"
}
] | 2016-08-31T00:00:00 | [
[
"Szalay",
"Alexander S.",
""
],
[
"Kunszt",
"Peter",
""
],
[
"Thakar",
"Ani",
""
],
[
"Gray",
"Jim",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
cs/9907010 | David Elworthy | David Elworthy | Language Identification With Confidence Limits | 8 pages; needs colacl.sty. Appeared in Proceedings of the Sixth
Workshop on Very Large Corpora (COLING-ACL 98) | null | null | null | cs.CL | null | A statistical classification algorithm and its application to language
identification from noisy input are described. The main innovation is to
compute confidence limits on the classification, so that the algorithm
terminates when enough evidence to make a clear decision has been made, and so
avoiding problems with categories that have similar characteristics. A second
application, to genre identification, is briefly examined. The results show
that some of the problems of other language identification techniques can be
avoided, and illustrate a more important point: that a statistical language
process can be used to provide feedback about its own success rate.
| [
{
"version": "v1",
"created": "Wed, 7 Jul 1999 09:28:40 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Elworthy",
"David",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/9907011 | Ming-Yang Kao | Zhi-Zhong Chen and Ming-Yang Kao | Reducing Randomness via Irrational Numbers | null | SIAM Journal on Computing, 29(4):1247--1256, 2000 | null | null | cs.DS cs.DM | null | We propose a general methodology for testing whether a given polynomial with
integer coefficients is identically zero. The methodology evaluates the
polynomial at efficiently computable approximations of suitable irrational
points. In contrast to the classical technique of DeMillo, Lipton, Schwartz,
and Zippel, this methodology can decrease the error probability by increasing
the precision of the approximations instead of using more random bits.
Consequently, randomized algorithms that use the classical technique can
generally be improved using the new methodology. To demonstrate the
methodology, we discuss two nontrivial applications. The first is to decide
whether a graph has a perfect matching in parallel. Our new NC algorithm uses
fewer random bits while doing less work than the previously best NC algorithm
by Chari, Rohatgi, and Srinivasan. The second application is to test the
equality of two multisets of integers. Our new algorithm improves upon the
previously best algorithms by Blum and Kannan and can speed up their checking
algorithm for sorting programs on a large range of inputs.
| [
{
"version": "v1",
"created": "Wed, 7 Jul 1999 23:39:27 GMT"
},
{
"version": "v2",
"created": "Wed, 15 Nov 2000 14:39:19 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chen",
"Zhi-Zhong",
""
],
[
"Kao",
"Ming-Yang",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/9907012 | Guido Minnen | Guido Minnen (University of Sussex) | Selective Magic HPSG Parsing | 9 pages, LaTeX with 4 postscript figures (uses avm.sty, eaclap.sty
and psfig-scale.sty) | Proceedings of EACL99, Bergen, Norway, June 8-11 | null | null | cs.CL | null | We propose a parser for constraint-logic grammars implementing HPSG that
combines the advantages of dynamic bottom-up and advanced top-down control. The
parser allows the user to apply magic compilation to specific constraints in a
grammar which as a result can be processed dynamically in a bottom-up and
goal-directed fashion. State of the art top-down processing techniques are used
to deal with the remaining constraints. We discuss various aspects concerning
the implementation of the parser as part of a grammar development system.
| [
{
"version": "v1",
"created": "Thu, 8 Jul 1999 09:46:37 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Minnen",
"Guido",
"",
"University of Sussex"
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/9907013 | Guido Minnen | John Carroll, Guido Minnen (University of Sussex), Ted Briscoe
(Cambridge University) | Corpus Annotation for Parser Evaluation | 7 pages, LaTeX (uses eaclap.sty) | Proceedings of the EACL99 workshop on Linguistically Interpreted
Corpora (LINC), Bergen, Norway, June 12 | null | null | cs.CL | null | We describe a recently developed corpus annotation scheme for evaluating
parsers that avoids shortcomings of current methods. The scheme encodes
grammatical relations between heads and dependents, and has been used to mark
up a new public-domain corpus of naturally occurring English text. We show how
the corpus can be used to evaluate the accuracy of a robust parser, and relate
the corpus to extant resources.
| [
{
"version": "v1",
"created": "Thu, 8 Jul 1999 10:08:59 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Carroll",
"John",
"",
"University of Sussex"
],
[
"Minnen",
"Guido",
"",
"University of Sussex"
],
[
"Briscoe",
"Ted",
"",
"Cambridge University"
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/9907014 | Anand Venkataraman | Anand Venkataraman and Ray Kemp | No information can be conveyed by certain events: The case of the clever
widows of Fornicalia and the Stobon Oracle | 17 pgs; dbl spc | null | null | null | cs.LO cs.GL | null | In this short article, we look at an old logical puzzle, its solution and
proof and discuss some interesting aspects concerning its representation in a
logic programming language like Prolog. We also discuss an intriguing
information theoretic aspect of the puzzle.
| [
{
"version": "v1",
"created": "Thu, 8 Jul 1999 23:16:17 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Venkataraman",
"Anand",
""
],
[
"Kemp",
"Ray",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.GL",
"description": "Covers introductory material, survey material, predictions of future trends, biographies, and miscellaneous computer-science related material. Roughly includes all of ACM Subject Class A, except it does not include conference proceedings (which will be listed in the appropriate subject area).",
"span": "(General Literature)"
}
] |
cs/9907015 | Ming-Yang Kao | Ming-Yang Kao and Jie Wang | Linear-Time Approximation Algorithms for Computing Numerical Summation
with Provably Small Errors | null | SIAM Journal on Computing, 29(5):1568--1576, 2000 | null | null | cs.DS cs.NA | null | Given a multiset $X=\{x_1,..., x_n\}$ of real numbers, the {\it
floating-point set summation} problem asks for $S_n=x_1+...+x_n$. Let $E^*_n$
denote the minimum worst-case error over all possible orderings of evaluating
$S_n$. We prove that if $X$ has both positive and negative numbers, it is
NP-hard to compute $S_n$ with the worst-case error equal to $E^*_n$. We then
give the first known polynomial-time approximation algorithm that has a
provably small error for arbitrary $X$. Our algorithm incurs a worst-case error
at most $2(\mix)E^*_n$.\footnote{All logarithms $\log$ in this paper are base
2.} After $X$ is sorted, it runs in O(n) time. For the case where $X$ is either
all positive or all negative, we give another approximation algorithm with a
worst-case error at most $\lceil\log\log n\rceil E^*_n$. Even for unsorted $X$,
this algorithm runs in O(n) time. Previously, the best linear-time
approximation algorithm had a worst-case error at most $\lceil\log n\rceil
E^*_n$, while $E^*_n$ was known to be attainable in $O(n \log n)$ time using
Huffman coding.
| [
{
"version": "v1",
"created": "Fri, 9 Jul 1999 18:23:17 GMT"
},
{
"version": "v2",
"created": "Tue, 14 Nov 2000 16:27:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kao",
"Ming-Yang",
""
],
[
"Wang",
"Jie",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
cs/9907016 | Jim Gray | Tom Barclay Jim Gray Don Slutz | Microsoft TerraServer: A Spatial Data Warehouse | Original MSword format at
http://research.microsoft.com/~gray/papers/MS_TR_99_30_TerraServer.doc | null | null | Microsoft Research Technical Report MSR-TR-99-29 | cs.DB cs.DL | null | The TerraServer stores aerial, satellite, and topographic images of the earth
in a SQL database available via the Internet. It is the world's largest online
atlas, combining five terabytes of image data from the United States Geological
Survey (USGS) and SPIN-2. This report describes the system-redesign based on
our experience over the last year. It also reports usage and operations results
over the last year -- over 2 billion web hits and over 20 Terabytes of imagry
served over the Internet. Internet browsers provide intuitive spatial and text
interfaces to the data. Users need no special hardware, software, or knowledge
to locate and browse imagery. This paper describes how terabytes of "Internet
unfriendly" geo-spatial images were scrubbed and edited into hundreds of
millions of "Internet friendly" image tiles and loaded into a SQL data
warehouse. Microsoft TerraServer demonstrates that general-purpose relational
database technology can manage large scale image repositories, and shows that
web browsers can be a good geospatial image presentation system.
| [
{
"version": "v1",
"created": "Fri, 9 Jul 1999 21:30:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Slutz",
"Tom Barclay Jim Gray Don",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
cs/9907017 | Davide Turcato | Davide Turcato, Paul McFetridge, Fred Popowich and Janine Toole | A Bootstrap Approach to Automatically Generating Lexical Transfer Rules | 8 pages, 1 figure, to be presented at Machine Translation Summit VII,
September 13-17, 1999, Singapore | null | null | null | cs.CL | null | We describe a method for automatically generating Lexical Transfer Rules
(LTRs) from word equivalences using transfer rule templates. Templates are
skeletal LTRs, unspecified for words. New LTRs are created by instantiating a
template with words, provided that the words belong to the appropriate lexical
categories required by the template. We define two methods for creating an
inventory of templates and using them to generate new LTRs. A simpler method
consists of extracting a finite set of templates from a sample of hand coded
LTRs and directly using them in the generation process. A further method
consists of abstracting over the initial finite set of templates to define
higher level templates, where bilingual equivalences are defined in terms of
correspondences involving phrasal categories. Phrasal templates are then mapped
onto sets of lexical templates with the aid of grammars. In this way an
infinite set of lexical templates is recursively defined. New LTRs are created
by parsing input words, matching a template at the phrasal level and using the
corresponding lexical categories to instantiate the lexical template. The
definition of an infinite set of templates enables the automatic creation of
LTRs for multi-word, non-compositional word equivalences of any cardinality.
| [
{
"version": "v1",
"created": "Fri, 9 Jul 1999 22:39:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Turcato",
"Davide",
""
],
[
"McFetridge",
"Paul",
""
],
[
"Popowich",
"Fred",
""
],
[
"Toole",
"Janine",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/9907018 | Erik Demaine | Erik D. Demaine, Martin L. Demaine, David Eppstein, Greg N.
Frederickson, Erich Friedman | Hinged Dissection of Polyominoes and Polyforms | 27 pages, 39 figures. Accepted to Computational Geometry: Theory and
Applications. v3 incorporates several comments by referees. v2 added many new
results and a new coauthor (Frederickson) | null | null | null | cs.CG cs.DM | null | A hinged dissection of a set of polygons S is a collection of polygonal
pieces hinged together at vertices that can be folded into any member of S. We
present a hinged dissection of all edge-to-edge gluings of n congruent copies
of a polygon P that join corresponding edges of P. This construction uses kn
pieces, where k is the number of vertices of P. When P is a regular polygon, we
show how to reduce the number of pieces to ceiling(k/2)*(n-1). In particular,
we consider polyominoes (made up of unit squares), polyiamonds (made up of
equilateral triangles), and polyhexes (made up of regular hexagons). We also
give a hinged dissection of all polyabolos (made up of right isosceles
triangles), which do not fall under the general result mentioned above.
Finally, we show that if P can be hinged into Q, then any edge-to-edge gluing
of n congruent copies of P can be hinged into any edge-to-edge gluing of n
congruent copies of Q.
| [
{
"version": "v1",
"created": "Sat, 10 Jul 1999 21:29:56 GMT"
},
{
"version": "v2",
"created": "Wed, 13 Oct 1999 01:54:07 GMT"
},
{
"version": "v3",
"created": "Sun, 23 Mar 2003 13:29:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Demaine",
"Erik D.",
""
],
[
"Demaine",
"Martin L.",
""
],
[
"Eppstein",
"David",
""
],
[
"Frederickson",
"Greg N.",
""
],
[
"Friedman",
"Erich",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/9907019 | Craig Bordelon | Craig Bordelon | A Reasonable C++ Wrappered Java Native Interface | 27 pages, 18 figures; Submitted to Software Practice & Experience;
Withdrawn after 3 month negotiation failed to reach compromise on copyright
(Wiley Publisher vs. Telcordia Technologies); jH software inquiries to
http://www.telcordia.com | null | null | null | cs.SE | null | A reasonable C++ Java Native Interface (JNI) technique termed C++ Wrappered
JNI (C++WJ) is presented. The technique simplifies current error-prone JNI
development by wrappering JNI calls. Provided development is done with the aid
of a C++ compiler, C++WJ offers type checking and behind the scenes caching. A
tool (jH) patterned on javah automates the creation of C++WJ classes.
The paper presents the rationale behind the choices that led to C++WJ.
Handling of Java class and interface hierarchy including Java type downcasts is
discussed. Efficiency considerations in the C++WJ lead to two flavors of C++
classes: jtypes and Jtypes. A jtype is a lightweight less than full wrapper of
a JNI object reference. A Jtype is a heavyweight full wrapper of a JNI object
reference.
| [
{
"version": "v1",
"created": "Mon, 12 Jul 1999 13:34:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bordelon",
"Craig",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/9907020 | Wen Chen | W. Chen | Generalized linearization in nonlinear modeling of data | This modified version of the original paper corrected two crucial
errors in Eqs. (1) and (3). The interested readers may contact the author in
[email protected] or [email protected] | null | null | null | cs.CE cs.NA | null | The principal innovative idea in this paper is to transform the original
complex nonlinear modeling problem into a combination of linear problem and
very simple nonlinear problems. The key step is the generalized linearization
of nonlinear terms. This paper only presents the introductory strategy of this
methodology. The practical numerical experiments will be provided subsequently.
| [
{
"version": "v1",
"created": "Mon, 12 Jul 1999 11:34:56 GMT"
},
{
"version": "v2",
"created": "Wed, 14 Jul 1999 11:52:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chen",
"W.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
cs/9907021 | Jorg Spilker | Guenther Goerz, Joerg Spilker, Volker Strom, Hans Weber | Architectural Considerations for Conversational Systems -- The
Verbmobil/INTARC Experience | 10 pages, to appear in proceedings of First International Workshop on
Human Computer Conversation, Bellagio, Italy | null | null | null | cs.CL | null | The paper describes the speech to speech translation system INTARC, developed
during the first phase of the Verbmobil project. The general design goals of
the INTARC system architecture were time synchronous processing as well as
incrementality and interactivity as a means to achieve a higher degree of
robustness and scalability. Interactivity means that in addition to the
bottom-up (in terms of processing levels) data flow the ability to process
top-down restrictions considering the same signal segment for all processing
levels. The construction of INTARC 2.0, which has been operational since fall
1996, followed an engineering approach focussing on the integration of symbolic
(linguistic) and stochastic (recognition) techniques which led to a
generalization of the concept of a ``one pass'' beam search.
| [
{
"version": "v1",
"created": "Wed, 14 Jul 1999 09:21:16 GMT"
}
] | 2019-08-17T00:00:00 | [
[
"Goerz",
"Guenther",
""
],
[
"Spilker",
"Joerg",
""
],
[
"Strom",
"Volker",
""
],
[
"Weber",
"Hans",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/9907022 | Satoru Kuroda | Satoru Kuroda | Weak length induction and slow growing depth boolean circuits | null | null | null | null | cs.LO | null | We define a hierarchy of circuit complexity classes LD^i, whose depth are the
inverse of a function in Ackermann hierarchy. Then we introduce extremely weak
versions of length induction and construct a bounded arithmetic theory L^i_2
whose provably total functions exactly correspond to functions computable by
LD^i circuits. Finally, we prove a non-conservation result between L^i_2 and a
weaker theory AC^0CA which corresponds to the class AC^0. Our proof utilizes
KPT witnessing theorem.
| [
{
"version": "v1",
"created": "Fri, 16 Jul 1999 08:41:25 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kuroda",
"Satoru",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/9907023 | Devillers | Olivier Devillers | On Deletion in Delaunay Triangulation | 15 pages 5 figures. in Proc. 15th Annu. ACM Sympos. Comput. Geom.,
181--188, 1999 | null | null | INRIA Research report 3451 | cs.CG | null | This paper presents how the space of spheres and shelling may be used to
delete a point from a $d$-dimensional triangulation efficiently. In dimension
two, if k is the degree of the deleted vertex, the complexity is O(k log k),
but we notice that this number only applies to low cost operations, while time
consuming computations are only done a linear number of times.
This algorithm may be viewed as a variation of Heller's algorithm, which is
popular in the geographic information system community. Unfortunately, Heller
algorithm is false, as explained in this paper.
| [
{
"version": "v1",
"created": "Fri, 16 Jul 1999 13:25:04 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Devillers",
"Olivier",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
cs/9907024 | Devillers | Olivier Devillers | Improved Incremental Randomized Delaunay Triangulation | 19 pages, 7 figures Proc. 14th Annu. ACM Sympos. Comput. Geom.,
106--115, 1998 | null | null | INRIA Research Report 3298 | cs.CG | null | We propose a new data structure to compute the Delaunay triangulation of a
set of points in the plane. It combines good worst case complexity, fast
behavior on real data, and small memory occupation.
The location structure is organized into several levels. The lowest level
just consists of the triangulation, then each level contains the triangulation
of a small sample of the levels below. Point location is done by marching in a
triangulation to determine the nearest neighbor of the query at that level,
then the march restarts from that neighbor at the level below. Using a small
sample (3%) allows a small memory occupation; the march and the use of the
nearest neighbor to change levels quickly locate the query.
| [
{
"version": "v1",
"created": "Fri, 16 Jul 1999 12:44:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Devillers",
"Olivier",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
cs/9907025 | Devillers | Herve Bronnimann, Olivier Devillers | The union of unit balls has quadratic complexity, even if they all
contain the origin | 5 pages, 5 figures | null | null | null | cs.CG | null | We provide a lower bound construction showing that the union of unit balls in
three-dimensional space has quadratic complexity, even if they all contain the
origin. This settles a conjecture of Sharir.
| [
{
"version": "v1",
"created": "Fri, 16 Jul 1999 15:20:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bronnimann",
"Herve",
""
],
[
"Devillers",
"Olivier",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
cs/9907026 | Tovena | Emanuele Pianta, Lucia M. Tovena | Mixing representation levels: The hybrid approach to automatic text
generation | 6 pages | Proceedings of the AISB'99 Workshop on ``Reference Architectures
and Data Standards for NLP'', Edinburgh Scotland, April 1999, 8-13 | null | null | cs.CL cs.AI | null | Natural language generation systems (NLG) map non-linguistic representations
into strings of words through a number of steps using intermediate
representations of various levels of abstraction. Template based systems, by
contrast, tend to use only one representation level, i.e. fixed strings, which
are combined, possibly in a sophisticated way, to generate the final text.
In some circumstances, it may be profitable to combine NLG and template based
techniques. The issue of combining generation techniques can be seen in more
abstract terms as the issue of mixing levels of representation of different
degrees of linguistic abstraction. This paper aims at defining a reference
architecture for systems using mixed representations. We argue that mixed
representations can be used without abandoning a linguistically grounded
approach to language generation.
| [
{
"version": "v1",
"created": "Fri, 16 Jul 1999 15:43:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Pianta",
"Emanuele",
""
],
[
"Tovena",
"Lucia M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/9907027 | Andrea Schaerf | Krzysztof R. Apt and Andrea Schaerf | The Alma Project, or How First-Order Logic Can Help Us in Imperative
Programming | 25 pages | null | null | null | cs.LO cs.PL | null | The aim of the Alma project is the design of a strongly typed constraint
programming language that combines the advantages of logic and imperative
programming. The first stage of the project was the design and implementation
of Alma-0, a small programming language that provides a support for declarative
programming within the imperative programming framework. It is obtained by
extending a subset of Modula-2 by a small number of features inspired by the
logic programming paradigm. In this paper we discuss the rationale for the
design of Alma-0, the benefits of the resulting hybrid programming framework,
and the current work on adding constraint processing capabilities to the
language. In particular, we discuss the role of the logical and customary
variables, the interaction between the constraint store and the program, and
the need for lists.
| [
{
"version": "v1",
"created": "Mon, 19 Jul 1999 09:36:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Apt",
"Krzysztof R.",
""
],
[
"Schaerf",
"Andrea",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/9907028 | Devillers | Olivier Devillers and Franco P. Preparata | Further Results on Arithmetic Filters for Geometric Predicates | 7 pages 2 figures presented at the 15th European Workshop Comput.
Geom., 113--116, 1999 improve previous results (in other paper) | Comput. Geom. Theory Appl. 1999 13:141-148 | null | INRIA Research report 3528 | cs.CG | null | An efficient technique to solve precision problems consists in using exact
computations. For geometric predicates, using systematically expensive exact
computations can be avoided by the use of filters. The predicate is first
evaluated using rounding computations, and an error estimation gives a
certificate of the validity of the result. In this note, we studies the
statistical efficiency of filters for cosphericity predicate with an assumption
of regular distribution of the points. We prove that the expected value of the
polynomial corresponding to the in sphere test is greater than epsilon with
probability O(epsilon log 1/epsilon) improving the results of a previous paper
by the same authors.
| [
{
"version": "v1",
"created": "Mon, 19 Jul 1999 15:09:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Devillers",
"Olivier",
""
],
[
"Preparata",
"Franco P.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
cs/9907029 | Devillers | Olivier Devillers and Franco P. Preparata | A Probabilistic Analysis of the Power of Arithmetic Filters | 22 pages 7 figures Results for in sphere test inproved in
cs.CG/9907028 | Discrete and Computational Geometry, 20:523--547, 1998 | null | INRIA Research report 2971 | cs.CG | null | The assumption of real-number arithmetic, which is at the basis of
conventional geometric algorithms, has been seriously challenged in recent
years, since digital computers do not exhibit such capability.
A geometric predicate usually consists of evaluating the sign of some
algebraic expression. In most cases, rounded computations yield a reliable
result, but sometimes rounded arithmetic introduces errors which may invalidate
the algorithms. The rounded arithmetic may produce an incorrect result only if
the exact absolute value of the algebraic expression is smaller than some
(small) varepsilon, which represents the largest error that may arise in the
evaluation of the expression. The threshold varepsilon depends on the structure
of the expression and on the adopted computer arithmetic, assuming that the
input operands are error-free.
A pair (arithmetic engine,threshold) is an "arithmetic filter". In this paper
we develop a general technique for assessing the efficacy of an arithmetic
filter. The analysis consists of evaluating both the threshold and the
probability of failure of the filter.
To exemplify the approach, under the assumption that the input points be
chosen randomly in a unit ball or unit cube with uniform density, we analyze
the two important predicates "which-side" and "insphere". We show that the
probability that the absolute values of the corresponding determinants be no
larger than some positive value V, with emphasis on small V, is Theta(V) for
the which-side predicate, while for the insphere predicate it is Theta(V^(2/3))
in dimension 1, O(sqrt(V)) in dimension 2, and O(sqrt(V) ln(1/V)) in higher
dimensions. Constants are small, and are given in the paper.
| [
{
"version": "v1",
"created": "Mon, 19 Jul 1999 15:22:19 GMT"
},
{
"version": "v2",
"created": "Wed, 21 Jul 1999 07:27:42 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Devillers",
"Olivier",
""
],
[
"Preparata",
"Franco P.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
cs/9907030 | David Eppstein | David Eppstein, Marshall W. Bern, Brad Hutchings | Algorithms for Coloring Quadtrees | 7 pages, 9 figures | Algorithmica 32(1):87-94, 2002 | 10.1007/s00453-001-0054-2 | null | cs.CG | null | We describe simple linear time algorithms for coloring the squares of
balanced and unbalanced quadtrees so that no two adjacent squares are given the
same color. If squares sharing sides are defined as adjacent, we color balanced
quadtrees with three colors, and unbalanced quadtrees with four colors; these
results are both tight, as some quadtrees require this many colors. If squares
sharing corners are defined as adjacent, we color balanced or unbalanced
quadtrees with six colors; for some quadtrees, at least five colors are
required.
| [
{
"version": "v1",
"created": "Mon, 19 Jul 1999 20:55:39 GMT"
}
] | 2010-01-21T00:00:00 | [
[
"Eppstein",
"David",
""
],
[
"Bern",
"Marshall W.",
""
],
[
"Hutchings",
"Brad",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
cs/9907031 | David Eppstein | David Eppstein | Beta-Skeletons have Unbounded Dilation | 8 pages, 9 figures | Computational Geometry Theory & Appl. 23:43-52, 2002 | 10.1016/S0925-7721(01)00055-4 | null | cs.CG math.MG | null | A fractal construction shows that, for any beta>0, the beta-skeleton of a
point set can have arbitrarily large dilation. In particular this applies to
the Gabriel graph.
| [
{
"version": "v1",
"created": "Tue, 20 Jul 1999 20:21:22 GMT"
}
] | 2010-01-21T00:00:00 | [
[
"Eppstein",
"David",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Mathematics",
"code": "math.MG",
"description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces",
"span": "(Metric Geometry)"
}
] |
cs/9907032 | Clare Dixon | Michael Fisher (1), Clare Dixon (1), Martin Peim (2) ((1) Department
of Computing and Mathematics, Manchester Metropolitan University, Manchester,
UK, (2) Department of Computer Science, Victoria University of Manchester,
Manchester, UK) | Clausal Temporal Resolution | 35 pages, 0 figures Expanded related work, corrected typos, expanded
proofs | null | null | null | cs.LO cs.AI | null | In this article, we examine how clausal resolution can be applied to a
specific, but widely used, non-classical logic, namely discrete linear temporal
logic. Thus, we first define a normal form for temporal formulae and show how
arbitrary temporal formulae can be translated into the normal form, while
preserving satisfiability. We then introduce novel resolution rules that can be
applied to formulae in this normal form, provide a range of examples and
examine the correctness and complexity of this approach is examined and. This
clausal resolution approach. Finally, we describe related work and future
developments concerning this work.
| [
{
"version": "v1",
"created": "Wed, 21 Jul 1999 15:48:06 GMT"
},
{
"version": "v2",
"created": "Fri, 14 Apr 2000 10:13:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Fisher",
"Michael",
""
],
[
"Dixon",
"Clare",
""
],
[
"Peim",
"Martin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/9907033 | Joerg Rothe | Lane A. Hemaspaandra and Joerg Rothe | Unambiguous Computation: Boolean Hierarchies and Sparse Turing-Complete
Sets | 27 pages | SIAM Journal on Computing vol. 26, no. 3, pp. 634--653, 1997 | null | earlier version appeared as University of Rochester TR-94-483 | cs.CC | null | It is known that for any class C closed under union and intersection, the
Boolean closure of C, the Boolean hierarchy over C, and the symmetric
difference hierarchy over C all are equal. We prove that these equalities hold
for any complexity class closed under intersection; in particular, they thus
hold for unambiguous polynomial time (UP). In contrast to the NP case, we prove
that the Hausdorff hierarchy and the nested difference hierarchy over UP both
fail to capture the Boolean closure of UP in some relativized worlds.
Karp and Lipton proved that if nondeterministic polynomial time has sparse
Turing-complete sets, then the polynomial hierarchy collapses. We establish the
first consequences from the assumption that unambiguous polynomial time has
sparse Turing-complete sets: (a) UP is in Low_2, where Low_2 is the second
level of the low hierarchy, and (b) each level of the unambiguous polynomial
hierarchy is contained one level lower in the promise unambiguous polynomial
hierarchy than is otherwise known to be the case.
| [
{
"version": "v1",
"created": "Mon, 26 Jul 1999 10:09:58 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Rothe",
"Joerg",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/9907034 | Joerg Rothe | Lane A. Hemaspaandra, Zhigen Jiang, Joerg Rothe and Osamu Watanabe | Polynomial-Time Multi-Selectivity | 40 pages | Journal of Universal Computer Science vol. 3, no. 3, pp. 197--229,
1997 | null | earlier version appeared as FSU Jena TR Math/Inf/96/11 | cs.CC | null | We introduce a generalization of Selman's P-selectivity that yields a more
flexible notion of selectivity, called (polynomial-time) multi-selectivity, in
which the selector is allowed to operate on multiple input strings. Since our
introduction of this class, it has been used to prove the first known (and
optimal) lower bounds for generalized selectivity-like classes in terms of
EL_2, the second level of the extended low hierarchy. We study the resulting
selectivity hierarchy, denoted by SH, which we prove does not collapse. In
particular, we study the internal structure and the properties of SH and
completely establish, in terms of incomparability and strict inclusion, the
relations between our generalized selectivity classes and Ogihara's P-mc
(polynomial-time membership-comparable) classes. Although SH is a strictly
increasing infinite hierarchy, we show that the core results that hold for the
P-selective sets and that prove them structurally simple also hold for SH. In
particular, all sets in SH have small circuits; the NP sets in SH are in Low_2,
the second level of the low hierarchy within NP; and SAT cannot be in SH unless
P = NP. Finally, it is known that P-Sel, the class of P-selective sets, is not
closed under union or intersection. We provide an extended selectivity
hierarchy that is based on SH and that is large enough to capture those
closures of the P-selective sets, and yet, in contrast with the P-mc classes,
is refined enough to distinguish them.
| [
{
"version": "v1",
"created": "Sun, 25 Jul 1999 20:55:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Jiang",
"Zhigen",
""
],
[
"Rothe",
"Joerg",
""
],
[
"Watanabe",
"Osamu",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.