title stringlengths 10 190 | abstract stringlengths 118 1.9k | related work sequencelengths 2 8 | references sequencelengths 0 0 |
|---|---|---|---|
Collaborative OLAP with Tag Clouds: Web 2.0 OLAP Formalism and
Experimental Evaluation | Increasingly, business projects are ephemeral. New Business Intelligencetools must support ad-lib data sources and quick perusal. Meanwhile, tag cloudsare a popular community-driven visualization technique. Hence, we investigatetag-cloud views with support for OLAP operations such as roll-ups, slices,dices, clusterin... | [
"There are decentralized models {{cite:6d30d451e9c3e38783de7e2329bba28a96c3373c}} and systems {{cite:9dc373a8f244f117e8d23c0e05b4394c813dd25f}}to support collaborative data sharingwithout a single schema.",
"According to Wu et al., it is difficult to navigate an OLAP schema without help; they have proposed a keyw... | [] |
Graph Sparsification by Effective Resistances | We present a nearly-linear time algorithm that produces high-qualitysparsifiers of weighted graphs. Given as input a weighted graph $G=(V,E,w)$ anda parameter $\epsilon>0$, we produce a weighted subgraph$H=(V,\tilde{E},\tilde{w})$ of $G$ such that $|\tilde{E}|=O(n\logn/\epsilon^2)$ and for all vectors $x\in\R^V$ $(1-... | [
"Batson, Spielman, and Srivastava {{cite:31b0dfcfbda4f1fbcd31fa57bab15faab548a782}} have given a deterministicalgorithm that constructs sparsifiers of size {{formula:9f139acc-b091-4e11-a81c-6e33f0c52757}} in{{formula:69ee8f78-f3a0-45b6-a6f9-fbdbebb0faa0}} time.While this is too slow to be useful in applications, ... | [] |
On the Expressive Power of Multiple Heads in CHR | Constraint Handling Rules (CHR) is a committed-choice declarative languagewhich has been originally designed for writing constraint solvers and which isnowadays a general purpose language. CHR programs consist of multi-headedguarded rules which allow to rewrite constraints into simpler ones until asolved form is reac... | [
"In this paper we have shown that multiple heads augment the expressive power of CHR. Indeed we have seen that the single head CHR language, denoted by CHR{{formula:a6774294-6c04-4e00-adb4-873a7a535500}} , is not Turing powerful when the underlying signature (for the constraint theory) does not contain function sym... | [] |
Rateless Coding for MIMO Block Fading Channels | In this paper the performance limits and design principles of rateless codesover fading channels are studied. The diversity-multiplexing tradeoff (DMT) isused to analyze the system performance for all possible transmission rates. Itis revealed from the analysis that the design of such rateless codes followsthe design... | [
"The performance of rateless coding over fading channels has alsobeen considered in {{cite:e1acb52bd30fc53945a7ac1952356c8ad27e38f4}}, in which the throughput and errorprobability are discussed. However, the tradeoff between these twowas not analyzed explicitly. For example, the results in{{cite:e1acb52bd30fc53945a... | [] |
On Emergence of Dominating Cliques in Random Graphs | Emergence of dominating cliques in Erd\"os-R\'enyi random graph model${\bbbg(n,p)}$ is investigated in this paper. It is shown this phenomenonpossesses a phase transition. Namely, we have argued that, given a constantprobability $p$, an $n$-node random graph $G$ from ${\bbbg(n,p)}$ and for $r= c\log_{1/p} n$ with $1 ... | [
"Dominating sets and cliques are basic structures in graphs andthey have been investigated very intensively. To determine whetherthe domination number of a graph is at most {{formula:6e5858ab-0d81-4f97-b92f-a74229fa085e}} is an NP-completeproblem {{cite:9ba7966d812db19ef75bbf10ab2877b0bdeb5d66}}. The maximum-cliqu... | [] |
The Offset Tree for Learning with Partial Labels | We present an algorithm, called the Offset Tree, for learning to makedecisions in situations where the payoff of only one choice is observed, ratherthan all choices. The algorithm reduces this setting to binary classification,allowing one to reuse of any existing, fully supervised binary classificationalgorithm in th... | [
"The problem considered here isa non-interactive version of the contextual banditproblem (see {{cite:6eb28ad24a6fb344fcaba1fd90bee6cd52477ca0}}, {{cite:689104a179198faaa68c3d4a14c65fdf5bf9120a}}, {{cite:0c005a1e26e5e35f71c9585af774cddd8ce7a61c}}, {{cite:bcc4f3bf6fa97df09eac3364f08c847b0e66319e}}, {{cite:37aa6d30480... | [] |
Effective Dielectric Response of Metamaterials | We use a homogenization procedure for Maxwell's equations in order to obtainin the local limit the frequency ($\omega$) dependent macroscopic dielectricresponse $\epsilon^M(\omega)$ of metamaterials made of natural constituentswith any geometrical shape repeated periodically with any structure. Weillustrate the forma... | [
"In this section we apply our results to light moving across a 2Dsquare array of infinite square dielectric prisms with diagonalsaligned with the sides of the square primitive cell, a systempreviously proposed byMilton etal.{{cite:52926aec4898d29c9bee9b02f7fa7ba5e50188b1}}We chose the parameters{{formula:8369d940-a... | [] |
Pricing strategies for viral marketing on Social Networks | We study the use of viral marketing strategies on social networks to maximizerevenue from the sale of a single product. We propose a model in which thedecision of a buyer to buy the product is influenced by friends that own theproduct and the price at which the product is offered. The influence model weanalyze is qui... | [
"The problem of social contagion or spread of influence was firstformulated by the sociological community, and introduced to the computerscience community by Domingos and Richardson {{cite:8d636642ad9affa5f2c58dc07f1c4f4f800e829d}}. An influentialpaper by Kempe, Kleinberg and Tardos {{cite:b653f32aa3d87a157a01e4bce... | [] |
Algorithms for Weighted Boolean Optimization | The Pseudo-Boolean Optimization (PBO) and Maximum Satisfiability (MaxSAT)problems are natural optimization extensions of Boolean Satisfiability (SAT). In the recent past, different algorithms have been proposed for PBO and forMaxSAT, despite the existence of straightforward mappings from PBO to MaxSATand vice-versa.... | [
"A brief account of MaxSAT and PBO solvers is provided inSection .The use of unsatisfiability for solving MaxSAT was first proposed in2006 {{cite:82e2f97aac12b1665eed2913be92883d27953f01}}. This work was laterextended {{cite:e53315d5f7bbf2526e648c846e2b5f6b1adf882d}}, {{cite:ccc28352aae05aa512346bf1edee35c57fdee544... | [] |
A 4/3-competitive randomized algorithm for online scheduling of packets
with agreeable deadlines | In 2005 Li et al. gave a phi-competitive deterministic online algorithm forscheduling of packets with agreeable deadlines with a very interestinganalysis. This is known to be optimal due to a lower bound by Hajek. We claimthat the algorithm by Li et al. can be slightly simplified, while retaining itscompetitive ratio... | [
"The best known deterministic and randomized algorithms for generalinstances have competitive ratios at most{{formula:d4dc3297-f1ae-458b-9458-b8d8e4738269}} {{cite:0b4176c20a007af53f0b51f46439fe1fe4e46c8f}} and{{formula:e0a00853-b7a6-44b3-99b3-2a4b4df0b514}} {{cite:044891f32e11d937d3d57bc4c756a34913ccf7b3}},respe... | [] |
An Event Based Approach To Situational Representation | Many application domains require representing interrelated real-worldactivities and/or evolving physical phenomena. In the crisis response domain,for instance, one may be interested in representing the state of the unfoldingcrisis (e.g., forest fire), the progress of the response activities such asevacuation and traf... | [
"Formal methods for reasoning about events based on explicit representation of events date back at least to work on situation calculus {{cite:fbcf4e17033c4c16735702394a6a3b0cf80fef8a}}. Situation calculus treats situations as snapshots of the state of the world at some time instants. Actions change one situation to... | [] |
Incorporating Integrity Constraints in Uncertain Databases | We develop an approach to incorporate additional knowledge, in the form ofgeneral purpose integrity constraints (ICs), to reduce uncertainty inprobabilistic databases. While incorporating ICs improves data quality (andhence quality of answers to a query), it significantly complicates queryprocessing. To overcome the ... | [
"Probabilistic databases have been an area of activity since the 1980s with foundational works such as {{cite:040bad85e9d0ad79104fd8092475e9305d15370b}}, {{cite:79d5898ad1fdddbc324cb5b15882a9a279078a56}}extending the relational model and algebra to represent and support uncertainty in databases.Current active proje... | [] |
Memento: Time Travel for the Web | The Web is ephemeral. Many resources have representations that change overtime, and many of those representations are lost forever. A lucky few manage toreappear as archived resources that carry their own URIs. For example, somecontent management systems maintain version pages that reflect a frozen priorstate of thei... | [
"The goal of adding a temporal aspect to web navigation has been explored in projects that focus on user interface enhancement. The Zoetrope project {{cite:4ae2df43555fbcd9f6f3843f4b6aee904e322e58}} provides a rich interface forquerying and interacting with a set of archived versions of selected seed pages. The int... | [] |
Estimating and Sampling Graphs with Multidimensional Random Walks | Estimating characteristics of large graphs via sampling is a vital part ofthe study of complex networks. Current sampling methods such as (independent)random vertex and random walks are useful but have drawbacks. Random vertexsampling may require too many resources (time, bandwidth, or money). Randomwalks, which norm... | [
"This section is devoted to review the related literature.FS can be classified as a Markov Chain Monte Carlo (MCMC) method.Other MCMC-based methods have been applied to characterize complex networks.Applications include, but are not limited to estimating characteristics of a population {{cite:2ec11f040a837d762296ce... | [] |
A Distributed Sequential Algorithm for Collaborative Intrusion Detection
Networks | Collaborative intrusion detection networks are often used to gain betterdetection accuracy and cost efficiency as compared to a single host-basedintrusion detection system (IDS). Through cooperation, it is possible for alocal IDS to detect new attacks that may be known to other experiencedacquaintances. In this paper... | [
"Many CIDNs were proposed in the literature, such as Indra {{cite:2a0becc7507bf7f23c613606499e1fe44e19e5fb}}, DOMINO {{cite:41f9955089ddb91f28303121b7a7b3dec4b9fbca}}, and NetShield {{cite:3506b9cef39920d91a4a6171b350453ed01cd494}}. However, these works did not address the problem that the system might be degraded ... | [] |
Parallel Generation of Massive Scale-Free Graphs | One of the biggest huddles faced by researchers studying algorithms formassive graphs is the lack of large input graphs that are essential for thedevelopment and test of the graph algorithms. This paper proposes two efficientand highly scalable parallel graph generation algorithms that can producemassive realistic gr... | [
"Erdös and Rényi have proposed a simple model that generates equilibrium random graphs, calledErdös-Rényi random graphs {{cite:514f35540db7c39d6416f724d53c8fc28e5fdd3d}}.In this model, given a fixed number of vertices, a graph is constructed by connectingrandomly chosen vertices with an edge repeatedly until the pr... | [] |
Self-Taught Hashing for Fast Similarity Search | The ability of fast similarity search at large scale is of great importanceto many Information Retrieval (IR) applications. A promising way to acceleratesimilarity search is semantic hashing which designs compact binary codes for alarge number of documents so that semantically similar documents are mapped tosimilar c... | [
"There has been extensive research on fast similarity search due to its central importance in many applications.For a low-dimensional feature space, similarity search can be carried out efficiently with pre-built space-partitioning index structures (such as KD-tree) or data-partitioning index structures (such as R-... | [] |
MIREX: MapReduce Information Retrieval Experiments | We propose to use MapReduce to quickly test new retrieval approaches on acluster of machines by sequentially scanning all documents. We present a smallcase study in which we use a cluster of 15 low cost ma- chines to search a webcrawl of 0.5 billion pages showing that sequential scanning is a viableapproach to runnin... | [
"The idea to use sequential scanning of documents to research new retrieval approaches is certainly not new: We know of at least one researcher who used sequential scanning over ten years ago for his thesis {{cite:3d7bcd8bb0346ac3ab2859d244ca4b50f3300547}}. Without high-level programming paradigms like MapReduce, h... | [] |
A New Benchmark For Evaluation Of Graph-Theoretic Algorithms | We propose a new graph-theoretic benchmark in this paper. The benchmark isdeveloped to address shortcomings of an existing widely-used graph benchmark.We thoroughly studied a large number of traditional and contemporary graphalgorithms reported in the literature to have clear understanding of theiralgorithmic and run... | [
"Although there are numerous graph algorithms reported in the literature,little work has been done in graph-centric benchmark development.The most relevant work in this area is probably the recently developedbenchmark suite, called DARPA High Productivity Computer Systems (HPCS) Scalable Synthetic Compact Applicati... | [] |
Gaussian Z-Interference Channel with a Relay Link: Achievability Region
and Asymptotic Sum Capacity | This paper studies a Gaussian Z-interference channel with a rate-limiteddigital relay link from one receiver to another. Achievable rate regions arederived based on a combination of Han-Kobayashi common-private informationsplitting technique and several different relay strategies includingcompress-and-forward and a p... | [
"The Gaussian Z-interference channel has been extensively studied inthe literature. It is one of the few examples of an interference channel(besides the strong interference case {{cite:af6b71c861c284a4417dc863a80cabccda778b2a}}, {{cite:2c5f741d381a568345276f9de50e39d2f76119e4}}, {{cite:a652a614f427661b802a21c5fc8d5... | [] |
Efficient L1/Lq Norm Regularization | Sparse learning has recently received increasing attention in many areasincluding machine learning, statistics, and applied mathematics. The mixed-normregularization based on the L1/Lq norm with q > 1 is attractive in manyapplications of regression and classification in that it facilitates groupsparsity in the model.... | [
"We briefly review recent studies on {{formula:6afc3de0-83a5-42d4-bc08-e0c43a3663ed}} -regularization,most of which focus on {{formula:39c290a7-aca4-4885-9260-5452d3fe5d10}} -regularization and/or{{formula:4e90eb7b-656d-4c16-99fd-a8206eaa8c4b}} -regularization.",
"{{formula:b67b1ad1-866c-4c52-9fa4-2e0fed57e15b}} ... | [] |
Higher-order derivatives of the QR and of the real symmetric eigenvalue
decomposition in forward and reverse mode algorithmic differentiation | We address the task of higher-order derivative evaluation of computerprograms that contain QR decompositions and real symmetric eigenvaluedecompositions. The approach is a combination of univariate Taylor polynomialarithmetic and matrix calculus in the (combined) forward/reverse mode ofAlgorithmic Differentiation (AD... | [
"This paper is concerned with the efficient evaluation of higher-order derivatives of functions {{formula:131b3eac-4f50-41a7-8922-6dd998fc578f}} which are implemented as computer programs that contain numerical linear algebra functions like the QR or the real symmetric eigenvalue decomposition.",
"Traditionally,... | [] |
Time Series Classification by Class-Specific Mahalanobis Distance
Measures | To classify time series by nearest neighbors, we need to specify or learn oneor several distance measures. We consider variations of the Mahalanobisdistance measures which rely on the inverse covariance matrix of the data.Unfortunately --- for time series data --- the covariance matrix has often lowrank. To alleviate... | [
"Several distance functions are used for time series classification, such as",
"Dynamic Time Warping (DTW) {{cite:edafc5def43a4cec31407ee68c48578e5848a579}},DISSIM {{cite:c3304790974f2d54be2d7192f38a133a5d97b4dc}},ThresholdQueries {{cite:65d7ca02b17ddd7a384265a00d73f93be38ff3e1}},Edit distances {{cite:21b01bd0cff... | [] |
The use of machine learning with signal- and NLP processing of source
code to fingerprint, detect, and classify vulnerabilities and weaknesses with
MARFCAT | We present a machine learning approach to static code analysis andfingerprinting for weaknesses related to security, software engineering, andothers using the open-source MARF framework and the MARFCAT application basedon it for the NIST's SATE2010 static analysis tool exposition workshop found athttp://samate.nist.g... | [
"Related work (to various degree of relevance)can be found below (this list is not exhaustive):",
"Taxonomy of Linux kernel vulnerability solutions in terms ofpatches and source code as well as categories for both are found in{{cite:5c011da7e818d0328b95c2ac9b8340637310e4d3}}.The core ideas and principles behind t... | [] |
Towards Unbiased BFS Sampling | Breadth First Search (BFS) is a widely used approach for sampling largeunknown Internet topologies. Its main advantage over random walks and otherexploration techniques is that a BFS sample is a plausible graph on its own,and therefore we can study its topological characteristics. However, it hasbeen empirically obse... | [
"BFS used in practice. BFS is widely used today for exploring large networks, such as OSNs.In {{cite:d16d04a4221fa95a7d2e9affc225382e955c529a}}, Ahn et al. used BFS to sample Orkut and MySpace. In {{cite:9b9a8002cb9355adb598c6be7c55ea7cb93a74e7}} and {{cite:b4a549cc4efb49ecba4c9c445635ea89d5739056}}, Mislove et al.... | [] |
Logical, Metric, and Algorithmic Characterisations of Probabilistic
Bisimulation | Many behavioural equivalences or preorders for probabilistic processesinvolve a lifting operation that turns a relation on states into a relation ondistributions of states. We show that several existing proposals for liftingrelations can be reconciled to be different presentations of essentially thesame lifting opera... | [
"Probabilistic bisimulation was first introduced by Larsen and Skou{{cite:666836408f9092d5ffaa2ad5e1c3361f1318ca47}}. Later on, it was investigated in a great manyprobabilistic models.An adequate logic for probabilistic bisimulation in a setting similar to our pLTSs hasbeen studied in {{cite:7658097f60c258c81bc760d... | [] |
Network Estimation and Packet Delivery Prediction for Control over
Wireless Mesh Networks | Much of the current theory of networked control systems uses simplepoint-to-point communication models as an abstraction of the underlyingnetwork. As a result, the controller has very limited information on thenetwork conditions and performs suboptimally. This work models the underlyingwireless multihop mesh network ... | [
"Schenato et al. {{cite:c469e9eb7344a215148fcae715c1288e4745de86}} and Ishii {{cite:90fc5a47a4b748394240972defc4881ea8ddcd5e}} study stabilityand controller synthesis for different control system architectures,but they both model networks as i.i.d. Bernoulli processes that droppackets on a single link. The informat... | [] |
Multi-path Routing Metrics for Reliable Wireless Mesh Routing Topologies | Several emerging classes of applications that run over wireless networks havea need for mathematical models and tools to systematically characterize thereliability of the network. We propose two metrics for measuring thereliability of wireless mesh routing topologies, one for flooding and one forunicast routing. The ... | [
"In single-path routing, the path metric is often defined as the sum ofthe link metrics along the path. Examples of link metrics include thenegative logarithm of the link probability (for path probability){{cite:d83e7d46fa3d65f560f51178dfcfcf330bbaed58}}, ETX (Expected Transmission Count), ETT(Expected Transmission... | [] |
Lower Bounds for Sparse Recovery | We consider the following k-sparse recovery problem: design an m x n matrixA, such that for any signal x, given Ax we can efficiently recover x'satisfying ||x-x'||_1 <= C min_{k-sparse} x"} ||x-x"||_1. It is known that there exist matrices A with this property that have only O(klog (n/k)) rows. In this paper we sh... | [
"There have been a number of earlier works that have, directly or indirectly,shown lower bounds for various models of sparse recovery and certain classesof matrices and algorithms. Specifically, one of the most well-known recoveryalgorithms used in compressed sensing is {{formula:3f30f8c2-157e-4672-ae72-0a6f40c81b4... | [] |
Type classes for efficient exact real arithmetic in Coq | Floating point operations are fast, but require continuous effort on the partof the user in order to ensure that the results are correct. This burden can beshifted away from the user by providing a library of exact analysis in whichthe computer handles the error estimates. Previously, we [Krebbers/Spitters2011] provi... | [
"We have greatly improved the performance of real number computation in using 's new machine integers. We produced highly structured and abstract code using type classes with no apparent performance penalty. Moreover, 's notation mechanism combined with unicode characters gives nicely readable statements and proof... | [] |
The Open Annotation Collaboration (OAC) Model | Annotations allow users to associate additional information with existingresources. Using proprietary and closed systems on the Web, users are alreadyable to annotate multimedia resources such as images, audio and video. So far,however, this information is almost always kept locked up and inaccessible tothe Web of Da... | [
"Annotations have a long research history, and unsurprisingly the research perspectives and interpretations of what an annotation is supposed to be vary widely. Agosti et al. {{cite:367218acd61c94b2acb4eef452e766d57ac13149}} provide a comprehensive study on the contours and complexity of annotations. A representati... | [] |
AGN Unification at z ~ 1: u - R Colors and Gradients in X-ray AGN Hosts | We present uncontaminated rest-frame u - R colors of 78 X-ray-selected AGNhosts at 0.5 < z < 1.5 in the Chandra Deep Fields measured with HST/ACS/NICMOSand VLT/ISAAC imaging. We also present spatially-resolved NUV - R colorgradients for a subsample of AGN hosts imaged by HST/WFC3. Integrated,uncorrected photometry is... | [
"This work is the first to measure the UV/optical colors of a large sample of AGN host galaxies at {{formula:254a978d-cc49-4d3e-b6c5-7d8baf3cf0c8}} while quantitatively, reliably correcting for point source contamination in individual galaxies. Ignoring or insufficiently correcting for point source contamination r... | [] |
MediaWiki Grammar Recovery | The paper describes in detail the recovery effort of one of the officialMediaWiki grammars. Over two hundred grammar transformation steps are reportedand annotated, leading to delivery of a level 2 grammar, semi-automaticallyextracted from a community created semi-formal text using at least fivedifferent syntactic no... | [
"Most of operational grammars for mainstream software languages are handcrafted, many are not publicly disclosed, few are documented. The firstcase reported in detail in 1998 was PLEX (Programming Language for EXchanges), a proprietary DSL for real time embedded software systems byEricsson {{cite:c2a4fe46414b555391... | [] |
Reachability in Biochemical Dynamical Systems by Quantitative Discrete
Approximation | In this paper a novel computational technique for finite discreteapproximation of continuous dynamical systems suitable for a significant classof biochemical dynamical systems is introduced. The method is parameterized inorder to affect the imposed level of approximation provided that withincreasing parameter value t... | [
"Discrete approximation methods are commonly used in continuous and hybrid systems analysis (see {{cite:298531a47fd30f2557f18e439094f4ee33d0f2ce}} for an overview regarding reachability) to handle the uncountability of the state space. Direct methods work on the original system and rely on a successor operation ite... | [] |
City on the Sky: Flexible, Secure Data Sharing on the Cloud | Sharing data from various sources and of diverse kinds, and fusing themtogether for sophisticated analytics and mash-up applications are emergingtrends, and are prerequisites for grand visions such as that of cyber-physicalsystems enabled smart cities. Cloud infrastructure can enable such data sharingboth because it ... | [
"There exists cloud-based systems that enable data sharing frommultiple sources. SenseWeb {{cite:4c0b8a8384e0d0ac13987680d7cdf94b361985c6}},SensorBase {{cite:0747ce2048ea7ea547f58b8fa11281b082104016}} are examples of cloud services that letusers upload and share their sensor data. They support coarse-grainedaccess ... | [] |
A Classification Framework for Web Browser Cross-Context Communication | Demand for more advanced Web applications is the driving force behind Webbrowser evolution. Recent requirements for Rich Internet Applications, such asmashing-up data and background processing, are emphasizing the need forbuilding and executing Web applications as a coordination of browser executioncontexts. Since de... | [
"In this section we give an overview of research that contributed to the analysis and systematization of cross-context communication systems. Most previous research activities were focused on evaluating and comparing security properties of cross-context communication systems based on browser primitives not intended... | [] |
End of preview. Expand in Data Studio
README.md exists but content is empty.
- Downloads last month
- 4