title stringlengths 10 190 | abstract stringlengths 118 1.9k | related work sequencelengths 2 8 | references sequencelengths 0 0 |
|---|---|---|---|
Collaborative OLAP with Tag Clouds: Web 2.0 OLAP Formalism and
Experimental Evaluation | Increasingly, business projects are ephemeral. New Business Intelligencetools must support ad-lib data sources and quick perusal. Meanwhile, tag cloudsare a popular community-driven visualization technique. Hence, we investigatetag-cloud views with support for OLAP operations such as roll-ups, slices,dices, clustering, and drill-downs. As a case study, we implemented anapplication where users can upload data and immediately navigate through its adhoc dimensions. To support social networking, views can be easily shared andembedded in other Web sites. Algorithmically, our tag-cloud views areapproximate range top-k queries over spontaneous data cubes. We presentexperimental evidence that iceberg cuboids provide adequate onlineapproximations. We benchmark several browser-oblivious tag-cloud layoutoptimizations. | [
"There are decentralized models {{cite:6d30d451e9c3e38783de7e2329bba28a96c3373c}} and systems {{cite:9dc373a8f244f117e8d23c0e05b4394c813dd25f}}to support collaborative data sharingwithout a single schema.",
"According to Wu et al., it is difficult to navigate an OLAP schema without help; they have proposed a keyw... | [] |
Graph Sparsification by Effective Resistances | We present a nearly-linear time algorithm that produces high-qualitysparsifiers of weighted graphs. Given as input a weighted graph $G=(V,E,w)$ anda parameter $\epsilon>0$, we produce a weighted subgraph$H=(V,\tilde{E},\tilde{w})$ of $G$ such that $|\tilde{E}|=O(n\logn/\epsilon^2)$ and for all vectors $x\in\R^V$ $(1-\epsilon)\sum_{uv\inE}(x(u)-x(v))^2w_{uv}\le \sum_{uv\in\tilde{E}}(x(u)-x(v))^2\tilde{w}_{uv} \le(1+\epsilon)\sum_{uv\in E}(x(u)-x(v))^2w_{uv}. (*)$ This improves upon the sparsifiers constructed by Spielman and Teng, whichhad $O(n\log^c n)$ edges for some large constant $c$, and upon those ofBencz\'ur and Karger, which only satisfied (*) for $x\in\{0,1\}^V$. A key ingredient in our algorithm is a subroutine of independent interest: anearly-linear time algorithm that builds a data structure from which we canquery the approximate effective resistance between any two vertices in a graphin $O(\log n)$ time. | [
"Batson, Spielman, and Srivastava {{cite:31b0dfcfbda4f1fbcd31fa57bab15faab548a782}} have given a deterministicalgorithm that constructs sparsifiers of size {{formula:9f139acc-b091-4e11-a81c-6e33f0c52757}} in{{formula:69ee8f78-f3a0-45b6-a6f9-fbdbebb0faa0}} time.While this is too slow to be useful in applications, ... | [] |
On the Expressive Power of Multiple Heads in CHR | Constraint Handling Rules (CHR) is a committed-choice declarative languagewhich has been originally designed for writing constraint solvers and which isnowadays a general purpose language. CHR programs consist of multi-headedguarded rules which allow to rewrite constraints into simpler ones until asolved form is reached. Many empirical evidences suggest that multiple headsaugment the expressive power of the language, however no formal result in thisdirection has been proved, so far. In the first part of this paper we analyze the Turing completeness of CHRwith respect to the underneath constraint theory. We prove that if theconstraint theory is powerful enough then restricting to single head rules doesnot affect the Turing completeness of the language. On the other hand,differently from the case of the multi-headed language, the single head CHRlanguage is not Turing powerful when the underlying signature (for theconstraint theory) does not contain function symbols. In the second part we prove that, no matter which constraint theory isconsidered, under some reasonable assumptions it is not possible to encode theCHR language (with multi-headed rules) into a single headed language whilepreserving the semantics of the programs. We also show that, under somestronger assumptions, considering an increasing number of atoms in the head ofa rule augments the expressive power of the language. These results provide a formal proof for the claim that multiple headsaugment the expressive power of the CHR language. | [
"In this paper we have shown that multiple heads augment the expressive power of CHR. Indeed we have seen that the single head CHR language, denoted by CHR{{formula:a6774294-6c04-4e00-adb4-873a7a535500}} , is not Turing powerful when the underlying signature (for the constraint theory) does not contain function sym... | [] |
Rateless Coding for MIMO Block Fading Channels | In this paper the performance limits and design principles of rateless codesover fading channels are studied. The diversity-multiplexing tradeoff (DMT) isused to analyze the system performance for all possible transmission rates. Itis revealed from the analysis that the design of such rateless codes followsthe design principle of approximately universal codes for parallelmultiple-input multiple-output (MIMO) channels, in which each sub-channel is aMIMO channel. More specifically, it is shown that for a single-inputsingle-output (SISO) channel, the previously developed permutation codes ofunit length for parallel channels having rate LR can be transformed directlyinto rateless codes of length L having multiple rate levels (R, 2R, . . ., LR),to achieve the DMT performance limit. | [
"The performance of rateless coding over fading channels has alsobeen considered in {{cite:e1acb52bd30fc53945a7ac1952356c8ad27e38f4}}, in which the throughput and errorprobability are discussed. However, the tradeoff between these twowas not analyzed explicitly. For example, the results in{{cite:e1acb52bd30fc53945a... | [] |
On Emergence of Dominating Cliques in Random Graphs | Emergence of dominating cliques in Erd\"os-R\'enyi random graph model${\bbbg(n,p)}$ is investigated in this paper. It is shown this phenomenonpossesses a phase transition. Namely, we have argued that, given a constantprobability $p$, an $n$-node random graph $G$ from ${\bbbg(n,p)}$ and for $r= c\log_{1/p} n$ with $1 \leq c \leq 2$, it holds: (1) if $p > 1/2$ then an$r$-node clique is dominating in $G$ almost surely and, (2) if $p \leq (3 -\sqrt{5})/2$ then an $r$-node clique is not dominating in $G$ almost surely.The remaining range of probability $p$ is discussed with more attention. Adetailed study shows that this problem is answered by examination ofsub-logarithmic growth of $r$ upon $n$. | [
"Dominating sets and cliques are basic structures in graphs andthey have been investigated very intensively. To determine whetherthe domination number of a graph is at most {{formula:6e5858ab-0d81-4f97-b92f-a74229fa085e}} is an NP-completeproblem {{cite:9ba7966d812db19ef75bbf10ab2877b0bdeb5d66}}. The maximum-cliqu... | [] |
The Offset Tree for Learning with Partial Labels | We present an algorithm, called the Offset Tree, for learning to makedecisions in situations where the payoff of only one choice is observed, ratherthan all choices. The algorithm reduces this setting to binary classification,allowing one to reuse of any existing, fully supervised binary classificationalgorithm in this partial information setting. We show that the Offset Tree isan optimal reduction to binary classification. In particular, it has regret atmost $(k-1)$ times the regret of the binary classifier it uses (where $k$ isthe number of choices), and no reduction to binary classification can dobetter. This reduction is also computationally optimal, both at training andtest time, requiring just $O(\log_2 k)$ work to train on an example or make aprediction. Experiments with the Offset Tree show that it generally performs better thanseveral alternative approaches. | [
"The problem considered here isa non-interactive version of the contextual banditproblem (see {{cite:6eb28ad24a6fb344fcaba1fd90bee6cd52477ca0}}, {{cite:689104a179198faaa68c3d4a14c65fdf5bf9120a}}, {{cite:0c005a1e26e5e35f71c9585af774cddd8ce7a61c}}, {{cite:bcc4f3bf6fa97df09eac3364f08c847b0e66319e}}, {{cite:37aa6d30480... | [] |
Effective Dielectric Response of Metamaterials | We use a homogenization procedure for Maxwell's equations in order to obtainin the local limit the frequency ($\omega$) dependent macroscopic dielectricresponse $\epsilon^M(\omega)$ of metamaterials made of natural constituentswith any geometrical shape repeated periodically with any structure. Weillustrate the formalism calculating $\epsilon^M(\omega)$ for severalstructures. For dielectric rectangular inclusions within a conducting materialwe obtained a very anisotropic response which changes along one direction fromconductor-like at low $\omega$ to a resonant dielectric-like at large $\omega$,attaining a very small reflectance at intermediate frequencies unrelated tosurface plasmon excitation and which can be tuned through geometrycaltayloring. A similar behavior is obtained for other shapes close to thepercolation threshold. | [
"In this section we apply our results to light moving across a 2Dsquare array of infinite square dielectric prisms with diagonalsaligned with the sides of the square primitive cell, a systempreviously proposed byMilton etal.{{cite:52926aec4898d29c9bee9b02f7fa7ba5e50188b1}}We chose the parameters{{formula:8369d940-a... | [] |
Pricing strategies for viral marketing on Social Networks | We study the use of viral marketing strategies on social networks to maximizerevenue from the sale of a single product. We propose a model in which thedecision of a buyer to buy the product is influenced by friends that own theproduct and the price at which the product is offered. The influence model weanalyze is quite general, naturally extending both the Linear Threshold modeland the Independent Cascade model, while also incorporating price information.We consider sales proceeding in a cascading manner through the network, i.e. abuyer is offered the product via recommendations from its neighbors who own theproduct. In this setting, the seller influences events by offering a cashbackto recommenders and by setting prices (via coupons or discounts) for each buyerin the social network. Finding a seller strategy which maximizes the expected revenue in thissetting turns out to be NP-hard. However, we propose a seller strategy thatgenerates revenue guaranteed to be within a constant factor of the optimalstrategy in a wide variety of models. The strategy is based on aninfluence-and-exploit idea, and it consists of finding the right trade-off ateach time step between: generating revenue from the current user versusoffering the product for free and using the influence generated from this salelater in the process. We also show how local search can be used to improve theperformance of this technique in practice. | [
"The problem of social contagion or spread of influence was firstformulated by the sociological community, and introduced to the computerscience community by Domingos and Richardson {{cite:8d636642ad9affa5f2c58dc07f1c4f4f800e829d}}. An influentialpaper by Kempe, Kleinberg and Tardos {{cite:b653f32aa3d87a157a01e4bce... | [] |
Algorithms for Weighted Boolean Optimization | The Pseudo-Boolean Optimization (PBO) and Maximum Satisfiability (MaxSAT)problems are natural optimization extensions of Boolean Satisfiability (SAT). In the recent past, different algorithms have been proposed for PBO and forMaxSAT, despite the existence of straightforward mappings from PBO to MaxSATand vice-versa. This papers proposes Weighted Boolean Optimization (WBO), a newunified framework that aggregates and extends PBO and MaxSAT. In addition, thepaper proposes a new unsatisfiability-based algorithm for WBO, based on recentunsatisfiability-based algorithms for MaxSAT. Besides standard MaxSAT, the newalgorithm can also be used to solve weighted MaxSAT and PBO, handlingpseudo-Boolean constraints either natively or by translation to clausal form.Experimental results illustrate that unsatisfiability-based algorithms forMaxSAT can be orders of magnitude more efficient than existing dedicatedalgorithms. Finally, the paper illustrates how other algorithms for either PBOor MaxSAT can be extended to WBO. | [
"A brief account of MaxSAT and PBO solvers is provided inSection .The use of unsatisfiability for solving MaxSAT was first proposed in2006 {{cite:82e2f97aac12b1665eed2913be92883d27953f01}}. This work was laterextended {{cite:e53315d5f7bbf2526e648c846e2b5f6b1adf882d}}, {{cite:ccc28352aae05aa512346bf1edee35c57fdee544... | [] |
A 4/3-competitive randomized algorithm for online scheduling of packets
with agreeable deadlines | In 2005 Li et al. gave a phi-competitive deterministic online algorithm forscheduling of packets with agreeable deadlines with a very interestinganalysis. This is known to be optimal due to a lower bound by Hajek. We claimthat the algorithm by Li et al. can be slightly simplified, while retaining itscompetitive ratio. Then we introduce randomness to the modified algorithm andargue that the competitive ratio against oblivious adversary is at most 4/3.Note that this still leaves a gap between the best known lower bound of 5/4 byChin et al. for randomised algorithms against oblivious adversary. | [
"The best known deterministic and randomized algorithms for generalinstances have competitive ratios at most{{formula:d4dc3297-f1ae-458b-9458-b8d8e4738269}} {{cite:0b4176c20a007af53f0b51f46439fe1fe4e46c8f}} and{{formula:e0a00853-b7a6-44b3-99b3-2a4b4df0b514}} {{cite:044891f32e11d937d3d57bc4c756a34913ccf7b3}},respe... | [] |
An Event Based Approach To Situational Representation | Many application domains require representing interrelated real-worldactivities and/or evolving physical phenomena. In the crisis response domain,for instance, one may be interested in representing the state of the unfoldingcrisis (e.g., forest fire), the progress of the response activities such asevacuation and traffic control, and the state of the crisis site(s). Such asituation representation can then be used to support a multitude ofapplications including situation monitoring, analysis, and planning. In thispaper, we make a case for an event based representation of situations whereevents are defined to be domain-specific significant occurrences in space andtime. We argue that events offer a unifying and powerful abstraction tobuilding situational awareness applications. We identify challenges in buildingan Event Management System (EMS) for which traditional data and knowledgemanagement systems prove to be limited and suggest possible directions andtechnologies to address the challenges. | [
"Formal methods for reasoning about events based on explicit representation of events date back at least to work on situation calculus {{cite:fbcf4e17033c4c16735702394a6a3b0cf80fef8a}}. Situation calculus treats situations as snapshots of the state of the world at some time instants. Actions change one situation to... | [] |
Incorporating Integrity Constraints in Uncertain Databases | We develop an approach to incorporate additional knowledge, in the form ofgeneral purpose integrity constraints (ICs), to reduce uncertainty inprobabilistic databases. While incorporating ICs improves data quality (andhence quality of answers to a query), it significantly complicates queryprocessing. To overcome the additional complexity, we develop an approach tomap an uncertain relation U with ICs to another uncertain relation U', thatapproximates the set of consistent worlds represented by U. Queries over U caninstead be evaluated over U' achieving higher quality (due to reduceduncertainty in U') without additional complexity in query processing due toICs. We demonstrate the effectiveness and scalability of our approach to largedata-sets with complex constraints. We also present experimental resultsdemonstrating the utility of incorporating integrity constraints in uncertainrelations, in the context of an information extraction application. | [
"Probabilistic databases have been an area of activity since the 1980s with foundational works such as {{cite:040bad85e9d0ad79104fd8092475e9305d15370b}}, {{cite:79d5898ad1fdddbc324cb5b15882a9a279078a56}}extending the relational model and algebra to represent and support uncertainty in databases.Current active proje... | [] |
Memento: Time Travel for the Web | The Web is ephemeral. Many resources have representations that change overtime, and many of those representations are lost forever. A lucky few manage toreappear as archived resources that carry their own URIs. For example, somecontent management systems maintain version pages that reflect a frozen priorstate of their changing resources. Archives recurrently crawl the web to obtainthe actual representation of resources, and subsequently make those availablevia special-purpose archived resources. In both cases, the archival copies haveURIs that are protocol-wise disconnected from the URI of the resource of whichthey represent a prior state. Indeed, the lack of temporal capabilities in themost common Web protocol, HTTP, prevents getting to an archived resource on thebasis of the URI of its original. This turns accessing archived resources intoa significant discovery challenge for both human and software agents, whichtypically involves following a multitude of links from the original to thearchival resource, or of searching archives for the original URI. This paperproposes the protocol-based Memento solution to address this problem, anddescribes a proof-of-concept experiment that includes major servers of archivalcontent, including Wikipedia and the Internet Archive. The Memento solution isbased on existing HTTP capabilities applied in a novel way to add the temporaldimension. The result is a framework in which archived resources can seamlesslybe reached via the URI of their original: protocol-based time travel for theWeb. | [
"The goal of adding a temporal aspect to web navigation has been explored in projects that focus on user interface enhancement. The Zoetrope project {{cite:4ae2df43555fbcd9f6f3843f4b6aee904e322e58}} provides a rich interface forquerying and interacting with a set of archived versions of selected seed pages. The int... | [] |
Estimating and Sampling Graphs with Multidimensional Random Walks | Estimating characteristics of large graphs via sampling is a vital part ofthe study of complex networks. Current sampling methods such as (independent)random vertex and random walks are useful but have drawbacks. Random vertexsampling may require too many resources (time, bandwidth, or money). Randomwalks, which normally require fewer resources per sample, can suffer from largeestimation errors in the presence of disconnected or loosely connected graphs.In this work we propose a new $m$-dimensional random walk that uses $m$dependent random walkers. We show that the proposed sampling method, which wecall Frontier sampling, exhibits all of the nice sampling properties of aregular random walk. At the same time, our simulations over large real worldgraphs show that, in the presence of disconnected or loosely connectedcomponents, Frontier sampling exhibits lower estimation errors than regularrandom walks. We also show that Frontier sampling is more suitable than randomvertex sampling to sample the tail of the degree distribution of the graph. | [
"This section is devoted to review the related literature.FS can be classified as a Markov Chain Monte Carlo (MCMC) method.Other MCMC-based methods have been applied to characterize complex networks.Applications include, but are not limited to estimating characteristics of a population {{cite:2ec11f040a837d762296ce... | [] |
A Distributed Sequential Algorithm for Collaborative Intrusion Detection
Networks | Collaborative intrusion detection networks are often used to gain betterdetection accuracy and cost efficiency as compared to a single host-basedintrusion detection system (IDS). Through cooperation, it is possible for alocal IDS to detect new attacks that may be known to other experiencedacquaintances. In this paper, we present a sequential hypothesis testing methodfor feedback aggregation for each individual IDS in the net- work. Oursimulation results corroborate our theoretical results and demonstrate theproperties of cost efficiency and accuracy compared to other heuristic methods.The analytical result on the lower-bound of the average number of acquaintancesfor consultation is essential for the design and configuration of IDSs in acollaborative environment. | [
"Many CIDNs were proposed in the literature, such as Indra {{cite:2a0becc7507bf7f23c613606499e1fe44e19e5fb}}, DOMINO {{cite:41f9955089ddb91f28303121b7a7b3dec4b9fbca}}, and NetShield {{cite:3506b9cef39920d91a4a6171b350453ed01cd494}}. However, these works did not address the problem that the system might be degraded ... | [] |
Parallel Generation of Massive Scale-Free Graphs | One of the biggest huddles faced by researchers studying algorithms formassive graphs is the lack of large input graphs that are essential for thedevelopment and test of the graph algorithms. This paper proposes two efficientand highly scalable parallel graph generation algorithms that can producemassive realistic graphs to address this issue. The algorithms, designed toachieve high degree of parallelism by minimizing inter-processorcommunications, are two of the fastest graph generators which are capable ofgenerating scale-free graphs with billions of vertices and edges. The syntheticgraphs generated by the proposed methods possess the most common properties ofreal complex networks such as power-law degree distribution, small-worldness,and communities-within-communities. Scalability was tested on a large clusterat Lawrence Livermore National Laboratory. In the experiment, we were able togenerate a graph with 1 billion vertices and 5 billion edges in less than 13seconds. To the best of our knowledge, this is the largest synthetic scale-freegraph reported in the literature. | [
"Erdös and Rényi have proposed a simple model that generates equilibrium random graphs, calledErdös-Rényi random graphs {{cite:514f35540db7c39d6416f724d53c8fc28e5fdd3d}}.In this model, given a fixed number of vertices, a graph is constructed by connectingrandomly chosen vertices with an edge repeatedly until the pr... | [] |
Self-Taught Hashing for Fast Similarity Search | The ability of fast similarity search at large scale is of great importanceto many Information Retrieval (IR) applications. A promising way to acceleratesimilarity search is semantic hashing which designs compact binary codes for alarge number of documents so that semantically similar documents are mapped tosimilar codes (within a short Hamming distance). Although some recentlyproposed techniques are able to generate high-quality codes for documents knownin advance, obtaining the codes for previously unseen documents remains to be avery challenging problem. In this paper, we emphasise this issue and propose anovel Self-Taught Hashing (STH) approach to semantic hashing: we first find theoptimal $l$-bit binary codes for all documents in the given corpus viaunsupervised learning, and then train $l$ classifiers via supervised learningto predict the $l$-bit code for any query document unseen before. Ourexperiments on three real-world text datasets show that the proposed approachusing binarised Laplacian Eigenmap (LapEig) and linear Support Vector Machine(SVM) outperforms state-of-the-art techniques significantly. | [
"There has been extensive research on fast similarity search due to its central importance in many applications.For a low-dimensional feature space, similarity search can be carried out efficiently with pre-built space-partitioning index structures (such as KD-tree) or data-partitioning index structures (such as R-... | [] |
MIREX: MapReduce Information Retrieval Experiments | We propose to use MapReduce to quickly test new retrieval approaches on acluster of machines by sequentially scanning all documents. We present a smallcase study in which we use a cluster of 15 low cost ma- chines to search a webcrawl of 0.5 billion pages showing that sequential scanning is a viableapproach to running large-scale information retrieval experiments with littleeffort. The code is available to other researchers at:http://mirex.sourceforge.net | [
"The idea to use sequential scanning of documents to research new retrieval approaches is certainly not new: We know of at least one researcher who used sequential scanning over ten years ago for his thesis {{cite:3d7bcd8bb0346ac3ab2859d244ca4b50f3300547}}. Without high-level programming paradigms like MapReduce, h... | [] |
A New Benchmark For Evaluation Of Graph-Theoretic Algorithms | We propose a new graph-theoretic benchmark in this paper. The benchmark isdeveloped to address shortcomings of an existing widely-used graph benchmark.We thoroughly studied a large number of traditional and contemporary graphalgorithms reported in the literature to have clear understanding of theiralgorithmic and run-time characteristics. Based on this study, we designed asuite of kernels, each of which represents a specific class of graphalgorithms. The kernels are designed to capture the typical run-time behaviorof target algorithms accurately, while limiting computational and spatialoverhead to ensure its computation finishes in reasonable time. We expect thatthe developed benchmark will serve as a much needed tool for evaluatingdifferent architectures and programming models to run graph algorithms. | [
"Although there are numerous graph algorithms reported in the literature,little work has been done in graph-centric benchmark development.The most relevant work in this area is probably the recently developedbenchmark suite, called DARPA High Productivity Computer Systems (HPCS) Scalable Synthetic Compact Applicati... | [] |
Gaussian Z-Interference Channel with a Relay Link: Achievability Region
and Asymptotic Sum Capacity | This paper studies a Gaussian Z-interference channel with a rate-limiteddigital relay link from one receiver to another. Achievable rate regions arederived based on a combination of Han-Kobayashi common-private informationsplitting technique and several different relay strategies includingcompress-and-forward and a partial decode-and-forward strategy, in which theinterference is partially decoded then binned and forwarded through the digitallink for subtraction at the other end. For the Gaussian Z-interference channelwith a digital link from the interference-free receiver to the interferedreceiver, the capacity region is established in the strong interference regime;an achievable rate region is established in the weak interference regime. Inthe weak interference regime, the partial decode-and-forward strategy is shownto be asymptotically sum-capacity achieving in the high signal-to-noise ratioand high interference-to-noise ratio limit. In this case, each relay bitasymptotically improves the sum capacity by one bit. For the GaussianZ-interference channel with a digital link from the interfered receiver to theinterference-free receiver, the capacity region is established in the stronginterference regime; achievable rate regions are established in the moderatelystrong and weak interference regimes. In addition, the asymptotically sumcapacity is established in the limit of large relay link rate. In this case,the sum capacity improvement due to the digital link is bounded by half a bitwhen the interference link is weaker than certain threshold, but the sumcapacity improvement becomes unbounded as the interference link becomesstronger. | [
"The Gaussian Z-interference channel has been extensively studied inthe literature. It is one of the few examples of an interference channel(besides the strong interference case {{cite:af6b71c861c284a4417dc863a80cabccda778b2a}}, {{cite:2c5f741d381a568345276f9de50e39d2f76119e4}}, {{cite:a652a614f427661b802a21c5fc8d5... | [] |
Efficient L1/Lq Norm Regularization | Sparse learning has recently received increasing attention in many areasincluding machine learning, statistics, and applied mathematics. The mixed-normregularization based on the L1/Lq norm with q > 1 is attractive in manyapplications of regression and classification in that it facilitates groupsparsity in the model. The resulting optimization problem is, however,challenging to solve due to the structure of the L1/Lq -regularization.Existing work deals with special cases including q = 2,infinity, and theycannot be easily extended to the general case. In this paper, we propose anefficient algorithm based on the accelerated gradient method for solving theL1/Lq -regularized problem, which is applicable for all values of q larger than1, thus significantly extending existing work. One key building block of theproposed algorithm is the L1/Lq -regularized Euclidean projection (EP1q). Ourtheoretical analysis reveals the key properties of EP1q and illustrates whyEP1q for the general q is significantly more challenging to solve than thespecial cases. Based on our theoretical analysis, we develop an efficientalgorithm for EP1q by solving two zero finding problems. Experimental resultsdemonstrate the efficiency of the proposed algorithm. | [
"We briefly review recent studies on {{formula:6afc3de0-83a5-42d4-bc08-e0c43a3663ed}} -regularization,most of which focus on {{formula:39c290a7-aca4-4885-9260-5452d3fe5d10}} -regularization and/or{{formula:4e90eb7b-656d-4c16-99fd-a8206eaa8c4b}} -regularization.",
"{{formula:b67b1ad1-866c-4c52-9fa4-2e0fed57e15b}} ... | [] |
Higher-order derivatives of the QR and of the real symmetric eigenvalue
decomposition in forward and reverse mode algorithmic differentiation | We address the task of higher-order derivative evaluation of computerprograms that contain QR decompositions and real symmetric eigenvaluedecompositions. The approach is a combination of univariate Taylor polynomialarithmetic and matrix calculus in the (combined) forward/reverse mode ofAlgorithmic Differentiation (AD). Explicit algorithms are derived and presentedin an accessible form. The approach is illustrated via examples. | [
"This paper is concerned with the efficient evaluation of higher-order derivatives of functions {{formula:131b3eac-4f50-41a7-8922-6dd998fc578f}} which are implemented as computer programs that contain numerical linear algebra functions like the QR or the real symmetric eigenvalue decomposition.",
"Traditionally,... | [] |
Time Series Classification by Class-Specific Mahalanobis Distance
Measures | To classify time series by nearest neighbors, we need to specify or learn oneor several distance measures. We consider variations of the Mahalanobisdistance measures which rely on the inverse covariance matrix of the data.Unfortunately --- for time series data --- the covariance matrix has often lowrank. To alleviate this problem we can either use a pseudoinverse, covarianceshrinking or limit the matrix to its diagonal. We review these alternatives andbenchmark them against competitive methods such as the related Large MarginNearest Neighbor Classification (LMNN) and the Dynamic Time Warping (DTW)distance. As we expected, we find that the DTW is superior, but the Mahalanobisdistance measures are one to two orders of magnitude faster. To get bestresults with Mahalanobis distance measures, we recommend learning one distancemeasure per class using either covariance shrinking or the diagonal approach. | [
"Several distance functions are used for time series classification, such as",
"Dynamic Time Warping (DTW) {{cite:edafc5def43a4cec31407ee68c48578e5848a579}},DISSIM {{cite:c3304790974f2d54be2d7192f38a133a5d97b4dc}},ThresholdQueries {{cite:65d7ca02b17ddd7a384265a00d73f93be38ff3e1}},Edit distances {{cite:21b01bd0cff... | [] |
The use of machine learning with signal- and NLP processing of source
code to fingerprint, detect, and classify vulnerabilities and weaknesses with
MARFCAT | We present a machine learning approach to static code analysis andfingerprinting for weaknesses related to security, software engineering, andothers using the open-source MARF framework and the MARFCAT application basedon it for the NIST's SATE2010 static analysis tool exposition workshop found athttp://samate.nist.gov/SATE2010Workshop.html | [
"Related work (to various degree of relevance)can be found below (this list is not exhaustive):",
"Taxonomy of Linux kernel vulnerability solutions in terms ofpatches and source code as well as categories for both are found in{{cite:5c011da7e818d0328b95c2ac9b8340637310e4d3}}.The core ideas and principles behind t... | [] |
Towards Unbiased BFS Sampling | Breadth First Search (BFS) is a widely used approach for sampling largeunknown Internet topologies. Its main advantage over random walks and otherexploration techniques is that a BFS sample is a plausible graph on its own,and therefore we can study its topological characteristics. However, it hasbeen empirically observed that incomplete BFS is biased toward high-degreenodes, which may strongly affect the measurements. In this paper, we firstanalytically quantify the degree bias of BFS sampling. In particular, wecalculate the node degree distribution expected to be observed by BFS as afunction of the fraction f of covered nodes, in a random graph RG(pk) with anarbitrary degree distribution pk. We also show that, for RG(pk), all commonlyused graph traversal techniques (BFS, DFS, Forest Fire, Snowball Sampling, RDS)suffer from exactly the same bias. Next, based on our theoretical analysis, wepropose a practical BFS-bias correction procedure. It takes as input acollected BFS sample together with its fraction f. Even though RG(pk) does notcapture many graph properties common in real-life graphs (such asassortativity), our RG(pk)-based correction technique performs well on a broadrange of Internet topologies and on two large BFS samples of Facebook and Orkutnetworks. Finally, we consider and evaluate a family of alternative correctionprocedures, and demonstrate that, although they are unbiased for an arbitrarytopology, their large variance makes them far less effective than theRG(pk)-based technique. | [
"BFS used in practice. BFS is widely used today for exploring large networks, such as OSNs.In {{cite:d16d04a4221fa95a7d2e9affc225382e955c529a}}, Ahn et al. used BFS to sample Orkut and MySpace. In {{cite:9b9a8002cb9355adb598c6be7c55ea7cb93a74e7}} and {{cite:b4a549cc4efb49ecba4c9c445635ea89d5739056}}, Mislove et al.... | [] |
Logical, Metric, and Algorithmic Characterisations of Probabilistic
Bisimulation | Many behavioural equivalences or preorders for probabilistic processesinvolve a lifting operation that turns a relation on states into a relation ondistributions of states. We show that several existing proposals for liftingrelations can be reconciled to be different presentations of essentially thesame lifting operation. More interestingly, this lifting operation nicelycorresponds to the Kantorovich metric, a fundamental concept used inmathematics to lift a metric on states to a metric on distributions of states,besides the fact the lifting operation is related to the maximum flow problemin optimisation theory. The lifting operation yields a neat notion of probabilistic bisimulation, forwhich we provide logical, metric, and algorithmic characterisations.Specifically, we extend the Hennessy-Milner logic and the modal mu-calculuswith a new modality, resulting in an adequate and an expressive logic forprobabilistic bisimilarity, respectively. The correspondence of the liftingoperation and the Kantorovich metric leads to a natural characterisation ofbisimulations as pseudometrics which are post-fixed points of a monotonefunction. We also present an "on the fly" algorithm to check if two states in afinitary system are related by probabilistic bisimilarity, exploiting the closerelationship between the lifting operation and the maximum flow problem. | [
"Probabilistic bisimulation was first introduced by Larsen and Skou{{cite:666836408f9092d5ffaa2ad5e1c3361f1318ca47}}. Later on, it was investigated in a great manyprobabilistic models.An adequate logic for probabilistic bisimulation in a setting similar to our pLTSs hasbeen studied in {{cite:7658097f60c258c81bc760d... | [] |
Network Estimation and Packet Delivery Prediction for Control over
Wireless Mesh Networks | Much of the current theory of networked control systems uses simplepoint-to-point communication models as an abstraction of the underlyingnetwork. As a result, the controller has very limited information on thenetwork conditions and performs suboptimally. This work models the underlyingwireless multihop mesh network as a graph of links with transmission successprobabilities, and uses a recursive Bayesian estimator to provide packetdelivery predictions to the controller. The predictions are a joint probabilitydistribution on future packet delivery sequences, and thus capture correlationsbetween successive packet deliveries. We look at finite horizon LQG controlover a lossy actuation channel and a perfect sensing channel, both withoutdelay, to study how the controller can compensate for predicted networkoutages. | [
"Schenato et al. {{cite:c469e9eb7344a215148fcae715c1288e4745de86}} and Ishii {{cite:90fc5a47a4b748394240972defc4881ea8ddcd5e}} study stabilityand controller synthesis for different control system architectures,but they both model networks as i.i.d. Bernoulli processes that droppackets on a single link. The informat... | [] |
Multi-path Routing Metrics for Reliable Wireless Mesh Routing Topologies | Several emerging classes of applications that run over wireless networks havea need for mathematical models and tools to systematically characterize thereliability of the network. We propose two metrics for measuring thereliability of wireless mesh routing topologies, one for flooding and one forunicast routing. The Flooding Path Probability (FPP) metric measures theend-to-end packet delivery probability when each node broadcasts a packet afterhearing from all its upstream neighbors. The Unicast Retransmission Flow (URF)metric measures the end-to-end packet delivery probability when a relay noderetransmits a unicast packet on its outgoing links until it receives anacknowledgement or it tries all the links. Both metrics rely on specific packetforwarding models, rather than heuristics, to derive explicit expressions ofthe end-to-end packet delivery probability from individual link probabilitiesand the underlying connectivity graph. We also propose a distributed, greedy algorithm that uses the URF metric toconstruct a reliable routing topology. This algorithm constructs a DirectedAcyclic Graph (DAG) from a weighted, undirected connectivity graph, where eachlink is weighted by its success probability. The algorithm uses a vector ofdecreasing reliability thresholds to coordinate when nodes can join the routingtopology. Simulations demonstrate that, on average, this algorithm constructs amore reliable topology than the usual minimum hop DAG. | [
"In single-path routing, the path metric is often defined as the sum ofthe link metrics along the path. Examples of link metrics include thenegative logarithm of the link probability (for path probability){{cite:d83e7d46fa3d65f560f51178dfcfcf330bbaed58}}, ETX (Expected Transmission Count), ETT(Expected Transmission... | [] |
Lower Bounds for Sparse Recovery | We consider the following k-sparse recovery problem: design an m x n matrixA, such that for any signal x, given Ax we can efficiently recover x'satisfying ||x-x'||_1 <= C min_{k-sparse} x"} ||x-x"||_1. It is known that there exist matrices A with this property that have only O(klog (n/k)) rows. In this paper we show that this bound is tight. Our bound holds even for themore general /randomized/ version of the problem, where A is a random variableand the recovery algorithm is required to work for any fixed x with constantprobability (over A). | [
"There have been a number of earlier works that have, directly or indirectly,shown lower bounds for various models of sparse recovery and certain classesof matrices and algorithms. Specifically, one of the most well-known recoveryalgorithms used in compressed sensing is {{formula:3f30f8c2-157e-4672-ae72-0a6f40c81b4... | [] |
Type classes for efficient exact real arithmetic in Coq | Floating point operations are fast, but require continuous effort on the partof the user in order to ensure that the results are correct. This burden can beshifted away from the user by providing a library of exact analysis in whichthe computer handles the error estimates. Previously, we [Krebbers/Spitters2011] provided a fast implementation of the exact real numbers in the Coq proofassistant. Our implementation improved on an earlier implementation by O'Connorby using type classes to describe an abstract specification of the underlyingdense set from which the real numbers are built. In particular, we used dyadicrationals built from Coq's machine integers to obtain a 100 times speed up ofthe basic operations already. This article is a substantially expanded versionof [Krebbers/Spitters 2011] in which the implementation is extended in thevarious ways. First, we implement and verify the sine and cosine function.Secondly, we create an additional implementation of the dense set based onCoq's fast rational numbers. Thirdly, we extend the hierarchy to capture orderon undecidable structures, while it was limited to decidable structures before.This hierarchy, based on type classes, allows us to share theory on thenaturals, integers, rationals, dyadics, and reals in a convenient way. Finally,we obtain another dramatic speed-up by avoiding evaluation of terminationproofs at runtime. | [
"We have greatly improved the performance of real number computation in using 's new machine integers. We produced highly structured and abstract code using type classes with no apparent performance penalty. Moreover, 's notation mechanism combined with unicode characters gives nicely readable statements and proof... | [] |
The Open Annotation Collaboration (OAC) Model | Annotations allow users to associate additional information with existingresources. Using proprietary and closed systems on the Web, users are alreadyable to annotate multimedia resources such as images, audio and video. So far,however, this information is almost always kept locked up and inaccessible tothe Web of Data. We believe that an important step to take is the integrationof multimedia annotations and the Linked Data principles. This should allowclients to easily publish and consume, thus exchange annotations aboutresources via common Web standards. We first present the current status of theOpen Annotation Collaboration, an international initiative that is currentlyworking on annotation interoperability specifications based on best practicesfrom the Linked Data effort. Then we present two use cases and early prototypesthat make use of the proposed annotation model and present lessons learned anddiscuss yet open technical issues. | [
"Annotations have a long research history, and unsurprisingly the research perspectives and interpretations of what an annotation is supposed to be vary widely. Agosti et al. {{cite:367218acd61c94b2acb4eef452e766d57ac13149}} provide a comprehensive study on the contours and complexity of annotations. A representati... | [] |
AGN Unification at z ~ 1: u - R Colors and Gradients in X-ray AGN Hosts | We present uncontaminated rest-frame u - R colors of 78 X-ray-selected AGNhosts at 0.5 < z < 1.5 in the Chandra Deep Fields measured with HST/ACS/NICMOSand VLT/ISAAC imaging. We also present spatially-resolved NUV - R colorgradients for a subsample of AGN hosts imaged by HST/WFC3. Integrated,uncorrected photometry is not reliable for comparing the mean properties ofsoft and hard AGN host galaxies at z ~ 1 due to color contamination frompoint-source AGN emission. We use a cloning simulation to develop a calibrationbetween concentration and this color contamination and use this to correct hostgalaxy colors. The mean u - R color of the unobscured/soft hosts beyond ~6 kpc isstatistically equivalent to that of the obscured/hard hosts (the soft sourcesare 0.09 +/- 0.16 magnitudes bluer). Furthermore, the rest-frame V - J colorsof the obscured and unobscured hosts beyond ~6 kpc are statisticallyequivalent, suggesting that the two populations have similar distributions ofdust extinction. For the WFC3/IR sample, the mean NUV - R color gradients ofunobscured and obscured sources differ by less than ~0.5 magnitudes for r > 1.1kpc. These three observations imply that AGN obscuration is uncorrelated withthe star formation rate beyond ~1 kpc. These observations favor a unification scenario for intermediate-luminosityAGNs in which obscuration is determined geometrically. Scenarios in which themajority of intermediate-luminosity AGN at z ~ 1 are undergoing rapid,galaxy-wide quenching due to AGN-driven feedback processes are disfavored. | [
"This work is the first to measure the UV/optical colors of a large sample of AGN host galaxies at {{formula:254a978d-cc49-4d3e-b6c5-7d8baf3cf0c8}} while quantitatively, reliably correcting for point source contamination in individual galaxies. Ignoring or insufficiently correcting for point source contamination r... | [] |
MediaWiki Grammar Recovery | The paper describes in detail the recovery effort of one of the officialMediaWiki grammars. Over two hundred grammar transformation steps are reportedand annotated, leading to delivery of a level 2 grammar, semi-automaticallyextracted from a community created semi-formal text using at least fivedifferent syntactic notations, several non-enforced naming conventions,multiple misspellings, obsolete parsing technology idiosyncrasies and otherproblems commonly encountered in grammars that were not engineered properly.Having a quality grammar will allow to test and validate it further, withoutalienating the community with a separately developed grammar. | [
"Most of operational grammars for mainstream software languages are handcrafted, many are not publicly disclosed, few are documented. The firstcase reported in detail in 1998 was PLEX (Programming Language for EXchanges), a proprietary DSL for real time embedded software systems byEricsson {{cite:c2a4fe46414b555391... | [] |
Reachability in Biochemical Dynamical Systems by Quantitative Discrete
Approximation | In this paper a novel computational technique for finite discreteapproximation of continuous dynamical systems suitable for a significant classof biochemical dynamical systems is introduced. The method is parameterized inorder to affect the imposed level of approximation provided that withincreasing parameter value the approximation converges to the originalcontinuous system. By employing this approximation technique, we presentalgorithms solving the reachability problem for biochemical dynamical systems.The presented method and algorithms are evaluated on several exemplarybiological models and on a real case study. This is a full version of the paperpublished in the proceedings of CompMod 2011. | [
"Discrete approximation methods are commonly used in continuous and hybrid systems analysis (see {{cite:298531a47fd30f2557f18e439094f4ee33d0f2ce}} for an overview regarding reachability) to handle the uncountability of the state space. Direct methods work on the original system and rely on a successor operation ite... | [] |
City on the Sky: Flexible, Secure Data Sharing on the Cloud | Sharing data from various sources and of diverse kinds, and fusing themtogether for sophisticated analytics and mash-up applications are emergingtrends, and are prerequisites for grand visions such as that of cyber-physicalsystems enabled smart cities. Cloud infrastructure can enable such data sharingboth because it can scale easily to an arbitrary volume of data and computationneeds on demand, as well as because of natural collocation of diverse such datasets within the infrastructure. However, in order to convince data owners thattheir data are well protected while being shared among cloud users, the cloudplatform needs to provide flexible mechanisms for the users to express theconstraints (access rules) subject to which the data should be shared, andlikewise, enforce them effectively. We study a comprehensive set of practicalscenarios where data sharing needs to be enforced by methods such asaggregation, windowed frame, value constrains, etc., and observe that existingbasic access control mechanisms do not provide adequate flexibility to enableeffective data sharing in a secure and controlled manner. In this paper, wethus propose a framework for cloud that extends popular XACML modelsignificantly by integrating flexible access control decisions and data accessin a seamless fashion. We have prototyped the framework and deployed it oncommercial cloud environment for experimental runs to test the efficacy of ourapproach and evaluate the performance of the implemented prototype. | [
"There exists cloud-based systems that enable data sharing frommultiple sources. SenseWeb {{cite:4c0b8a8384e0d0ac13987680d7cdf94b361985c6}},SensorBase {{cite:0747ce2048ea7ea547f58b8fa11281b082104016}} are examples of cloud services that letusers upload and share their sensor data. They support coarse-grainedaccess ... | [] |
A Classification Framework for Web Browser Cross-Context Communication | Demand for more advanced Web applications is the driving force behind Webbrowser evolution. Recent requirements for Rich Internet Applications, such asmashing-up data and background processing, are emphasizing the need forbuilding and executing Web applications as a coordination of browser executioncontexts. Since development of such Web applications depends on cross-contextcommunication, many browser primitives and client-side frameworks have beendeveloped to support this communication. In this paper we present asystematization of cross-context communication systems for Web browsers. Basedon an analysis of previous research, requirements for modern Web applicationsand existing systems, we extract a framework for classifying cross-contextcommunica-tion systems. Using the framework, we evaluate the current ecosystemof cross-context communication and outline directions for future Web researchand engineering. | [
"In this section we give an overview of research that contributed to the analysis and systematization of cross-context communication systems. Most previous research activities were focused on evaluating and comparing security properties of cross-context communication systems based on browser primitives not intended... | [] |
End of preview. Expand in Data Studio
README.md exists but content is empty.
- Downloads last month
- 10