6,266 results
Search Results
2. A Kernel Based Multi-resolution Time Series Analysis for Screening Deficiencies in Paper Production.
- Author
-
Wang, Jun, Yi, Zhang, Zurada, Jacek M., Lu, Bao-Liang, Yin, Hujun, Ejnarsson, Marcus, Nilsson, Carl Magnus, and Verikas, Antanas
- Abstract
This paper is concerned with a multi-resolution tool for analysis of a time series aiming to detect abnormalities in various frequency regions. The task is treated as a kernel based novelty detection applied to a multi-level time series representation obtained from the discrete wavelet transform. Having a priori knowledge that the abnormalities manifest themselves in several frequency regions, a committee of detectors utilizing data dependent aggregation weights is build by combining outputs of detectors operating in those regions. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
3. Best Paper: Stabilizing Clock Synchronization for Wireless Sensor Networks.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Rangan, C. Pandu, Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Datta, Ajoy K., Gradinariu, Maria, Herman, Ted, and Zhang, Chen
- Abstract
One of the simplest protocols for clock synchronization in wireless ad hoc and sensor networks is the converge-to-max protocol, which has the simple logic of adjusting each node's clock to be at least as large as any neighbor's. This paper examines the converge-to-max protocol, showing it to be stabilizing even when node clocks have skew, bounded domains, and dynamic communication links. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
4. A Full Monte Carlo Approach to the Valuation of the Surrender Option Embedded in Life Insurance Contracts.
- Author
-
Perna, Cira, Sibillo, Marilena, and Bacinello, Anna Rita
- Abstract
In this paper we extend the Least Squares Monte Carlo approach proposed by Longstaff and Schwartz for the valuation of American-style contingent-claims to the case of life insurance contracts. These contracts, in fact, often embed an American-style option, called surrender option, that entitles its owner to terminate early the contract and receive a cash amount, called surrender value. The additional complication arising in life insurance policies with respect to purely financial American contracts is that there is not a fixed date within which the option can be exercised, since its "maturity" is driven by mortality factors. This complication has been handled by very few papers, often at the cost of excessively simplified valuation frameworks. The aim of this contribution, that is not a specific valuation model but a methodological approach, is to allow a full exploitation of the flexibility inborn in Monte Carlo and quasi-Monte Carlo methods in order to deal with more realistic valuation frameworks. [ABSTRACT FROM AUTHOR]
- Published
- 2008
- Full Text
- View/download PDF
5. Robust engineering design of electronic circuits with active components using genetic programming and bond Graphs.
- Author
-
Goldberg, David E., Koza, John R., Riolo, Rick, Soule, Terence, Worzel, Bill, Peng, Xiangdong, Goodman, Erik D., and Rosenberg, Ronald C.
- Abstract
Genetic programming has been used by Koza and many others to design electrical, mechanical, and mechatronic systems, including systems with both active and passive components. This work has often required large population sizes (on the order of ten thousand) and millions of design evaluations to allow evolution of both the topology and parameters of interesting systems. For several years, the authors have studied the evolution of multi-domain engineering systems represented as bond graphs, a form that provides a unified representation of mechanical, electrical, hydraulic, pneumatic, thermal, and other systems in a uni-fied representation. Using this approach, called the Genetic Programming/Bond Graph (GPBG) approach, they have tried to evolve systems with perhaps tens of components, but looking at only 100,000 or fewer design candidates. The GPBG system uses much smaller population sizes, but seeks to maintain diverse search by using "sustained" evolutionary search processes such as the Hierarchical Fair Competition principle and its derivatives. It uses stochastic setting of parameter values (resistances, capacitances, etc.) as a means of evolving more robust designs. However, in past work, the GPBG system was able to model and simulate only passive components and simple (voltage or current, in the case of electrical systems) sources, which severely restricted the domain of problems it could address. Thus, this paper reports the first steps in enhancing the system to include active components. To date, only three models of a transistor and one model of an operational amplifier (op amp) are analyzed and implemented as two-port bond graph components. The analysis method and design strategy can be easily extended to other models or other active components or even multi-port components. This chapter describes design of an active analog low-pass filter with fifth-order Bessel characteristics. A passive filter with the same characteristics is also evolved with GPBG. Then the best designs emerging from each of these two procedures are compared. [The runs reported here are intended only to document that the analysis tools are working, and to begin study of the effects of stochasticity, but not to determine the power of the design procedure. The initial runs did not use HFC or structure fitness sharing, which will be included as soon as possible. Suitable problems will be tackled, and results with suitable numbers of replicates to allow drawing of statistically valid conclusions will be reported in this paper, to determine whether interesting circuits can be evolved more efficiently in this framework than using other GP approaches.] [ABSTRACT FROM AUTHOR]
- Published
- 2008
- Full Text
- View/download PDF
6. Direct Anonymous Attestation (DAA): Ensuring Privacy with Corrupt Administrators.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Stajano, Frank, Meadows, Catherine, Capkun, Srdjan, Moore, Tyler, and Smyth, Ben
- Abstract
The Direct Anonymous Attestation (DAA) scheme provides a means for remotely authenticating a trusted platform whilst preserving the user's privacy. The protocol has been adopted by the Trusted Computing Group (TCG) in the latest version of its Trusted Platform Module (TPM) specification. In this paper we show DAA places an unnecessarily large burden on the TPM host. We demonstrate how corrupt administrators can exploit this weakness to violate privacy. The paper provides a fix for the vulnerability. Further privacy issues concerning linkability are identified and a framework for their resolution is developed. In addition an optimisation to reduce the number of messages exchanged is proposed. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
7. Deployment Support Network.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Rangan, C. Pandu, Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Langendoen, Koen, Voigt, Thiemo, Dyer, Matthias, Beutel, Jan, and Kalt, Thomas
- Abstract
In this paper, we present the Deployment Support Network (DSN), a new methodology for developing and testing wireless sensor networks (WSN) in a realistic environment. With an additional wireless backbone network a deployed WSN can be observed, controlled, and reprogrammed completely over the air. The DSN provides visibility and control in a similar way as existing emulation testbeds, but overcomes the limitations of wired infrastructures. As a result, development and experiments can be conducted with realistic in- and outdoor deployments. The paper describes the new concept and methodology. Additionally, an architecture-independent implementation of the toolkit is presented, which has been used in an industrial case-study. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
8. A Probabilistic Beam Search Approach to the Shortest Common Supersequence Problem.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Rangan, C. Pandu, Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Hemert, Jano, Blum, Christian, Cotta, Carlos, Fernández, Antonio J., and Gallardo, José E.
- Abstract
The Shortest Common Supersequence Problem (SCSP) is a well-known hard combinatorial optimization problem that formalizes many real world problems. This paper presents a novel randomized search strategy, called probabilistic beam search (PBS), based on the hybridization between beam search and greedy constructive heuristics. PBS is competitive (and sometimes better than) previous state-of-the-art algorithms for solving the SCSP. The paper describes PBS and provides an experimental analysis (including comparisons with previous approaches) that demonstrate its usefulness. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
9. P System Models of Bistable, Enzyme Driven Chemical Reaction Networks.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Rangan, C. Pandu, Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Mira, José, Álvarez, José R., Dunn, Stanley, and Stivers, Peter
- Abstract
In certain classes of chemical reaction networks (CRN), there may be two stable states. The challenge is to find a model of the CRN such that the stability properties can be predicted. In this paper we consider the problem of building a P-system designed to simulate the CRN in an attempt to determine if the CRN is stable or bistable. We found that for the networks in [2] none of the bistable CRN would have a bistable P-system by stoichiometry alone. The reaction kinetics must be included in the P-system model; the implementation of which has been considered an open problem. In this paper we conclude that a P-system for a CRN in m reactants and n products has at most 2(m2 + mn) membranes and 6(m2 + mn) rules. This suggests that P-system models of a chemical reaction network, including both stoichiometry and reaction kinetics can be built. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
10. A Bio-inspired Architecture for Cognitive Audio.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Rangan, C. Pandu, Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Mira, José, Álvarez, José R., Gómez-Vilda, Pedro, Ferrández-Vicente, José Manuel, and Rodellar-Biarge, Victoria
- Abstract
A comprehensive view of speech and voice technologies is now demanding better and more complex tools amenable of extracting as much knowledge about sound and speech as possible. Many knowledge-extraction tasks from speech and voice share well-known procedures at the algorithmic level under the point of view of bio-inspiration. The same resources employed to decode speech phones may be used in the characterization of the speaker (gender, age, speaking group, etc.). Based on these facts the present paper examines a hierarchy of sound processing levels at the auditory and perceptual levels on the brain neural paths which can be translated into a bio-inspired audio-processing architecture. Through this paper its fundamental characteristics are analyzed in relation with current tendencies in cognitive audio processing. Examples extracted from speech processing applications in the domain of acoustic-phonetics are presented. These may find applicability in speaker's characterization, forensics, and biometry, among others. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
11. Architecture of Adaptive Spam Filtering Based on Machine Learning Algorithms.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Jin, Hai, Rana, Omer F., Pan, Yi, Prasanna, Viktor K., and Islam, Md Rafiqul
- Abstract
Spam is commonly defined as unsolicited email messages and the goal of spam filtering is to distinguish between spam and legitimate email messages. Much work has been done to filter spam from legitimate emails using machine learning algorithm and substantial performance has been achieved with some amount of false positive (FP) tradeoffs. In the case of spam detection FP problem is unacceptable sometimes. In this paper, an adaptive spam filtering model has been proposed based on Machine learning (ML) algorithms which will get better accuracy by reducing FP problems. This model consists of individual and combined filtering approach from existing well known ML algorithms. The proposed model considers both individual and collective output and analyzes them by an analyzer. A dynamic feature selection (DFS) technique also proposed in this paper for getting better accuracy. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
12. Design and Implementation of Computational Bioinformatics Grid Services on GT4 Platforms.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Jin, Hai, Rana, Omer F., Pan, Yi, Prasanna, Viktor K., and Yang, Chao-Tung
- Abstract
Availability of computer resources is key factor limiting use of bioinformatics analyses as a result of the growing computational demands. Grid computing provides a way to meet these requirements. But it is complicated to build a grid for users. This paper describes an approach to solve this problem using Grid Service technologies. Building the grid based on accepted standards and platforms makes the development and deployment of the grid much easier. A bioinformatics grid computing environment (BioGrid) which consists of the distributed computing application for bioinformatics is presented in this paper. Based on this environment, we propose the architecture of bioinformatics applications which is delivered using Grid Services constructed with the Globus Toolkit 4. We developed a simple program which is defined as the client-server application with grid services. It provides users an approach of grid services to impose grid resources and customize their own grid applications. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
13. Data Interoperation Between ChinaGrid and SRB.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Rana, Omer F., Pan, Yi, Prasanna, Viktor K., Xiong, Muzhou, and Jin, Hai
- Abstract
Separated grid systems are becoming the new information islands when more and more grid systems are deployed. Grid interoperation is a direction to solve that problem. This paper introduces the implementation of data interoperation between ChinaGrid and SRB. The data interoperation between them is divided into two parts: data access from SRB to ChinaGrid and from ChinaGrid to SRB. Also this paper considers the issues about performance optimization. We get a satisfied experiment result through the optimization measures. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
14. Combining Different Types of Scale Space Interest Points Using Canonical Sets.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Rangan, C. Pandu, Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Sgallari, Fiorella, Murli, Almerico, Paragios, Nikos, Kanters, Frans, and Denton, Trip
- Abstract
Scale space interest points capture important photometric and deep structure information of an image. The information content of such points can be made explicit using image reconstruction. In this paper we will consider the problem of combining multiple types of interest points used for image reconstruction. It is shown that ordering the complete set of points by differential (quadratic) TV-norm (which works for single feature types) does not yield optimal results for combined point sets. The paper presents a method to solve this problem using canonical sets of scale space features. Qualitative and quantitative analysis show improved performance over simple ordering of points using the TV-norm. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
15. Practical and Secure Solutions for Integer Comparison.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Rangan, C. Pandu, Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Okamoto, Tatsuaki, Wang, Xiaoyun, Garay, Juan, Schoenmakers, Berry, and Villegas, José
- Abstract
Yao's classical millionaires' problem is about securely determining whether x > y, given two input values x,y, which are held as private inputs by two parties, respectively. The output x > y becomes known to both parties. In this paper, we consider a variant of Yao's problem in which the inputs x,y as well as the output bit x > y are encrypted. Referring to the framework of secure n-party computation based on threshold homomorphic cryptosystems as put forth by Cramer, Damgård, and Nielsen at Eurocrypt 2001, we develop solutions for integer comparison, which take as input two lists of encrypted bits representing x and y, respectively, and produce an encrypted bit indicating whether x > y as output. Secure integer comparison is an important building block for applications such as secure auctions. In this paper, our focus is on the two-party case, although most of our results extend to the multi-party case. We propose new logarithmic-round and constant-round protocols for this setting, which achieve simultaneously very low communication and computational complexities. We analyze the protocols in detail and show that our solutions compare favorably to other known solutions. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
16. Cryptanalysis of HFE with Internal Perturbation.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Rangan, C. Pandu, Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Okamoto, Tatsuaki, Wang, Xiaoyun, Dubois, Vivien, Granboulan, Louis, and Stern, Jacques
- Abstract
Multivariate Cryptography has been an active line of research for almost twenty years. While most multivariate cryptosystems have been under attack, variations of the basic schemes came up as potential repairs. In this paper, we study the Internal Perturbation variation of HFE recently proposed by Ding and Schmidt. Although several results indicate that HFE is vulnerable against algebraic attacks for moderate size parameters, Ding and Schmidt claim that the cryptosystem with internal perturbation should be immune against them. However in this paper, we apply the recently discovered method of differential analysis to the Internal Perturbation of HFE and we find a subtle property which allows to disclose the kernel of the perturbation. Once this has been achieved, the public key can be inverted by attacking the underlying HFE provided the parameters were taken low enough to make the perturbed scheme of competitive performance. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
17. Multi-Domain Observations Concerning the Use of Genetic Programming to Automatically Synthesize Human-Competitive Designs for Analog Circuits, Optical Lens Systems, Controllers, Antennas, Mechanical Systems, and Quantum Computing Circuits.
- Author
-
Goldberg, David E., Koza, John R., Riolo, Rick, Soule, Terence, Worzel, Bill, Al-Sakran, Sameer H., and Jones, Lee W.
- Abstract
This paper reviews the recent use of genetic programming to automatically synthesize human-competitive designs of complex structures in six engineering domains, namely analog electrical circuits, optical lens systems, controllers, antennas, mechanical systems, and quantum computing circuits. First, the paper identifies common features observed in the human-competitive results produced by genetic programming in the six domains and suggests possible explanations for the observed similarities. Second, the paper identifies the characteristics that make a particular domain amenable to the application of genetic programming for the automatic synthesis of designs. Third, the paper discusses certain domain-specific adjustments in technique that may increase the efficiency of the automated process in a particular domain. Fourth, the paper discusses several technique issues that have arisen in more than one domain. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
18. Quotients over Minimal Type Theory.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Rangan, C. Pandu, Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Cooper, S. Barry, Löwe, Benedikt, Sorbi, Andrea, and Maietti, Maria Emilia
- Abstract
We consider an extensional version, called qmTT, of the intensional Minimal Type Theory mTT, introduced in a previous paper with G. Sambin, enriched with proof-irrelevance of propositions and effective quotient sets. Then, by using the construction of total setoid à la Bishop we build a model of qmTT over mTT. The design of an extensional type theory with quotients and its interpretation in mTT is a key technical step in order to build a two level system to serve as a minimal foundation for constructive mathematics as advocated in the mentioned paper about mTT. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
19. Coding with Feedback and Searching with Lies.
- Author
-
Tóth, Gábor Fejes, Miklós, Dezső, Csiszár, Imre, Katona, Gyula O. H., Tardos, Gábor, Wiener, Gábor, and Deppe, Christian
- Abstract
This paper gives a broad overview of the area of searching with errors and the related field of error-correcting coding. In the vast literature regarding this problem, many papers simultaneously deal with various sorts of restrictions on the searching protocol. We partition this survey into sections, choosing the most appropriate section for each topic. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
20. Dynamic Compass Models and Gathering Algorithms for Autonomous Mobile Robots.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Rangan, C. Pandu, Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Prencipe, Giuseppe, Zaks, Shmuel, Katayama, Yoshiaki, Tomida, Yuichi, and Imazu, Hiroyuki
- Abstract
This paper studies a gathering problem for a system of asynchronous autonomous mobile robots that can move freely in a two-dimensional plane. We consider robots equipped with inaccurate (incorrect) compasses which may point a different direction from other robots' compasses. A gathering problem is that the robots are required to eventually gather at a single point which is not given in advance from any initial configuration. In this paper, we propose several inaccurate compass models and give two algorithms which solve the gathering problem on these models. One algorithm is the first result dealing with the compasses whose indicated direction may change in every beginning of execution cycles of robots. It solves the problem when compasses point different at most π/8 from the (absolute) north. The other one solves the problem when the compasses never change its pointed direction and their difference is at most π/3 among robots. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
21. Labeling Schemes with Queries.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Rangan, C. Pandu, Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Prencipe, Giuseppe, Zaks, Shmuel, Korman, Amos, and Kutten, Shay
- Abstract
Recently, quite a few papers studied methods for representing network properties by assigning informative labels to the vertices of a network. Consulting the labels given to any two vertices u and v for some function f (e.g. "distance(u,v)") one can compute the function (e.g. the graph distance between u and v). Some very involved lower bounds for the sizes of the labels were proven. In this paper, we demonstrate that such lower bounds are very sensitive to the number of vertices consulted. That is, we show several almost trivial constructions of such labeling schemes that beat the lower bounds by large margins. The catch is that one needs to consult the labels of three vertices instead of two. We term our generalized model labeling schemes with queries. Additional contributions are several extensions. In particular, we show that it is easy to extend our schemes for tree to work also in the dynamic scenario. We also demonstrate that the study of the queries model can help in designing a scheme for the traditional model too. Finally, we demonstrate extensions to the non-distributed environment. In particular, we show that one can preprocess a general weighted graph using almost linear space so that flow queries can be answered in almost constant time. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
22. From Renaming to Set Agreement.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Rangan, C. Pandu, Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Prencipe, Giuseppe, Zaks, Shmuel, Mostefaoui, Achour, Raynal, Michel, and Travers, Corentin
- Abstract
The M-renaming problem consists in providing the processes with a new name taken from a new name space of size M. A renaming algorithm is adaptive if the size M depends on the number of processes that want to acquire a new name (and not on the total number n of processes). Assuming each process proposes a value, the k-set agreement problem allows each process to decide a proposed value in such a way that at most k different values are decided. In an asynchronous system prone to up to t process crash failures, and where processes can cooperate by accessing atomic read/write registers only, the best that can be done is a renaming space of size M = p + t where p is the number of processes that participate in the renaming. In the same setting, the k-set agreement problem cannot be solved for t ≥ k. This paper focuses on the way a solution to the renaming problem can help solving the k-set agreement problem when k ≤ t. It has several contributions. The first is a t-resilient algorithm (1 ≤ t < n) that solves the k-set agreement problem from any adaptive (n + k − 1)-renaming algorithm, when k = t. The second contribution is a lower bound that shows that there is no wait-free k-set algorithm based on an (n + k − 1)-renaming algorithm that works for any value of n, when k < t. This bound shows that, while a solution to the (n + k − 1)-renaming problem allows solving the k-set agreement problem despite t = k failures, such an additional power is useless when k < t. In that sense, in an asynchronous system made up of atomic registers, (n + k − 1)-renaming allows progressing from k > t to k = t, but does not allow bypassing that frontier. The last contribution of the paper is a wait-free algorithm that constructs an adaptive (n + k − 1)-renaming algorithm, for any value of the pair (t,k), from a failure detector of the class $\Omega^k_*$ (this last algorithm is a simple adaptation of an existing renaming algorithm). [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
23. Fast Periodic Graph Exploration with Constant Memory.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Rangan, C. Pandu, Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Prencipe, Giuseppe, Zaks, Shmuel, Gąsieniec, Leszek, Klasing, Ralf, and Martin, Russell
- Abstract
We consider the problem of periodic exploration of all nodes in undirected graphs by using a finite state automaton called later a robot. The robot, using a constant number of states (memory bits), must be able to explore any unknown anonymous graph. The nodes in the graph are neither labelled nor colored. However, while visiting a node v the robot can distinguish between edges incident to it. The edges are ordered and labelled by consecutive integers 1,...,d(v) called port numbers, where d(v) is the degree of v. Periodic graph exploration requires that the automaton has to visit every node infinitely many times in a periodic manner. Note that the problem is unsolvable if the local port numbers are set arbitrarily, see [8]. In this context, we are looking for the minimum function π(n), such that, there exists an efficient deterministic algorithm for setting the local port numbers allowing the robot to explore all graphs of size n along a traversal route with the period π(n). Dobrev et al. proved in [13] that for oblivious robots π(n) ≤ 10n. Recently Ilcinkas proposed another port labelling algorithm for robots equipped with two extra memory bits, see [20], where the exploration period π(n) ≤ 4n − 2. In the same paper, it is conjectured that the bound 4n − O(1) is tight even if the use of larger memory is allowed. In this paper, we disprove this conjecture presenting an efficient deterministic algorithm arranging the port numbers, such that, the robot equipped with a constant number of bits is able to complete the traversal period in π(n) ≤ 3.75n − 2 steps hence decreasing the existing upper bound. This reduces the gap with the lower bound of π(n) ≥ 2n − 2 holding for any robot. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
24. The Holland Broadcast Language and the Modeling of Biochemical Networks.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Rangan, C. Pandu, Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Ebner, Marc, O'Neill, Michael, Ekárt, Anikó, Vanneschi, Leonardo, and Esparcia-Alcázar, Anna Isabel
- Abstract
The Broadcast Language is a programming formalism devised by Holland in 1975, which aims at improving the efficiency of Genetic Algorithms (GAs) during long-term evolution. The key mechanism of the Broadcast Language is to allow GAs to employ an adaptable problem representation. Fixed problem encoding is commonly used by GAs but may limit their performance in particular cases. This paper describes an implementation of the Broadcast Language and its application to modeling biochemical networks. Holland presented the Broadcast Language in his book "Adaptation in Natural and Artificial Systems" where only a description of the language was provided, without any implementation. Our primary motivation for this work was the fact that there is currently no published implementation of the Broadcast Language available. Secondly, no additional examination of the Broadcast Language and its applications can be found in the literature. Holland proposed that the Broadcast Language would be suitable for the modeling of biochemical models. However, he did not support this belief with any experimental work. In this paper, we propose an implementation of the Broadcast Language which is then applied to the modeling of a signal transduction network. We conclude the paper by proposing that with some refinements it will be possible to use the Broadcast Language to evolve biochemical networks in silico. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
25. Empirical Analysis of GP Tree-Fragments.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Rangan, C. Pandu, Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Ebner, Marc, O'Neill, Michael, Ekárt, Anikó, Vanneschi, Leonardo, and Esparcia-Alcázar, Anna Isabel
- Abstract
Researchers have attempted to explain the power of Genetic Programming (GP) search using various notions of schema. However empirical studies of schemas have been limited due to their vast numbers in typical populations. This paper addresses the problem of analyzing schemas represented by tree-fragments. It describes a new efficient way of representing the huge sets of fragments in a population of GP programs and presents an algorithm to find all fragments using this efficient representation. Using this algorithm, the paper presents an initial analysis of fragments in populations of up to 300 programs, each up to seven nodes deep. The analysis demonstrates a surprisingly large variation in the numbers of fragments through evolution and a non-monotonic rise in the most useful fragments. With his method, empirical investigation of the GP building block hypothesis and schema theory in realistic sized GP systems becomes possible. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
26. A Connectivity Based Partition Approach for Node Scheduling in Sensor Networks.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Rangan, C. Pandu, Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Aspnes, James, Scheideler, Christian, Arora, Anish, Madden, Samuel, and Ding, Yong
- Abstract
This paper presents a Connectivity based Partition Approach (CPA) to reduce the energy consumption of a sensor network by sleep scheduling among sensor nodes. CPA partitions sensors into groups such that a connected backbone network can be maintained by keeping only one arbitrary node from each group in active status while putting others to sleep. Nodes within each group swap between active and sleeping status occasionally to balance the energy consumption. Unlike previous approaches that partition nodes geographically, CPA is based on the measured connectivity between pairwise nodes and does not depend on nodes' locations. In this paper, we formulate node scheduling as a constrained optimal graph partition problem, and propose CPA as a distributed heuristic partition algorithm. CPA can ensure k-vertex connectivity of the backbone network for its partition so as to achieve the trade-off between saving energy and preserving network communication quality. Moreover, simulation results show that CPA outperforms other approaches in complex environments where the ideal radio propagation model does not hold. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
27. Mobile Anchor-Free Localization for Wireless Sensor Networks.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Rangan, C. Pandu, Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Aspnes, James, Scheideler, Christian, Arora, Anish, Madden, Samuel, and Xu, Yurong
- Abstract
In this paper, we consider how to localize individual nodes in a wireless sensor network when some subset of the network nodes can be in motion at any given time. For situations in which it is not practical or cost-efficient to use GPS or anchor nodes, this paper proposes an Anchor-Free Mobile Geographic Distributed Localization (MGDL) algorithm for wireless sensor networks. Taking advantage of the accelerometers that are present in standard motes, MGDL estimates the distance moved by each node. If this distance is beyond a threshold, then this node will trigger a series of mobile localization procedures to recalculate and update its location in the node itself. Such procedures will be stopped when the node stops moving. Data collected using Tmote Invent nodes (Moteiv Inc.) and simulations show that the proposed detection method can efficiently detect the movement, and that the localization is accurate and the communication is efficient in different static and mobile contexts. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
28. Efficient and Distributed Access Control for Sensor Networks.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Rangan, C. Pandu, Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Aspnes, James, Scheideler, Christian, Arora, Anish, Madden, Samuel, and Liu, Donggang
- Abstract
Sensor networks are often used to sense the physical world and provide observations for various uses. In hostile environments, it is critical to control the network access to ensure the integrity, availability, and at times confidentiality of the sensor data. This paper develops efficient methods for distributed access control in sensor networks. The paper starts with a baseline approach, which provides a more flexible and efficient way to enforce access control when compared with previous solutions. This paper then extends the baseline approach to enable privilege delegation, which allows a user to delegate its privilege to other users without using a trusted server, and broadcast query, which allows a user to access the network at a large scale efficiently. The privilege delegation and broadcast query are very useful in practice; none of the current solutions can achieve these two properties. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
29. How to Play the Majority Game with Liars.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Rangan, C. Pandu, Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Ming-Yang Kao, Xiang-Yang Li, Butler, Steve, Jia Mao, and Graham, Ron
- Abstract
The Majority game is a two player game with a questioner Q and an answerer A. The answerer holds n elements, each of which can be labeled as 0 or 1. The questioner can ask questions comparing whether two elements have the same or different label. The goal for the questioner is to ask as few questions as possible to be able to identify a single element which has a majority label, or in the case of a tie claim there is none. We denote the minimum number of questions Q needs to make, regardless of A's answers, as q*. In this paper we consider a variation of the Majority game where A is allowed to lie up to t times, i.e., Q needs to find an error-tolerant strategy. In this paper we will give upper and lower bounds for q* for an adaptive game (where questions are processed one at a time), and will find q* for an oblivious game (where questions are asked in one batch). [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
30. An Efficient Algorithm for the Evacuation Problem in a Certain Class of a Network with Uniform Path-Lengths.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Rangan, C. Pandu, Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Ming-Yang Kao, Xiang-Yang Li, Kamiyama, Naoyuki, Katoh, Naoki, and Takizawa, Atsushi
- Abstract
In this paper, we consider the evacuation problem for a network which consists of a directed graph with capacities and transit times on its arcs. This problem can be solved by the algorithm of Hoppe and Tardos [1] in polynomial time. However their running time is high-order polynomial, and hence is not practical in general. Thus it is necessary to devise a faster algorithm for a tractable and practically useful subclass of this problem. In this paper, we consider a dynamic network with a single sink s such that () for each vertex v the sum of transit times of arcs on any path from v to s takes the same value, and () for each vertex v the minimum v-s cut is determined by the arcs incident to s whose tails are reachable from v. We propose an efficient algorithm for this network problem. This class of networks is a generalization of the grid network studied in the paper [2]. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
31. Parallel Edge Detection on a Virtual Hexagonal Structure.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Rangan, C. Pandu, Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Cérin, Christophe, Kuan-Ching Li, Xiangjian He, Wenjing Jia, and Qiang Wu
- Abstract
This paper presents an edge detection method based on bilateral filtering taking into account both spatial closeness and intensity similarity of pixels in order to preserve important visual cues provided by edges and reduce the sharpness of transitions in intensity values as well. In addition, the edge detection method proposed in this paper is achieved on sampled images represented on a newly developed virtual hexagonal structure. Due to the compact and circular nature of the hexagonal lattice, a better quality edge map is obtained. We also present a parallel implementation for edge detection on the virtual hexagonal structure that significantly increases the computation speed. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
32. LDFSA: A Learning-Based Dynamic Framed Slotted ALOHA for Collision Arbitration in Active RFID Systems.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Rangan, C. Pandu, Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Cérin, Christophe, Kuan-Ching Li, Hyuntae Cho, Woonghyun Lee, and Yunju Baek
- Abstract
In recent large scale deployment of active RFID systems has been introduced by many applications, but a variety of critical issues remain unresolved. Especially, the impact of collision is the most essential problem. In this paper, we propose a Learning-based Dynamic Framed Slotted ALOHA algorithm (LDFSA) which mitigates collision from the active RFID tags and complies with international standard, ISO/IEC 18000-7. In addition, this paper includes the performance evaluations of the proposed LDFSA algorithm with the conventional algorithms. According to the result, the proposed LDFSA algorithm shows better performance than other conventional algorithms. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
33. Self Managing Middleware for Dynamic Grids.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Rangan, C. Pandu, Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Cérin, Christophe, Kuan-Ching Li, Wasnik, Sachin, Harmer, Terence, and Donachy, Paul
- Abstract
As grid infrastructures become more dynamic in order to cope with the uncertainty of demand, they are becoming extremely difficult to manage. At the Belfast e-Science Centre, we are attempting to address this issue by developing Self Managing Grid Middleware. This paper gives an overview of the middleware and focuses on the design, implementation and evaluation of a Resource Manager. Also in this paper we will see how our approach, which is based on federated UDDI registries, has enabled us to implement some of the desired features of next generation grid software. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
34. Small-World Network Inspired Trustworthy Web Service Evaluation and Management Model.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Rangan, C. Pandu, Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Cérin, Christophe, Kuan-Ching Li, Qinghua Meng, and Yongsheng Ding
- Abstract
The trustworthiness between anonymous web service client and provider influences service stability and collaboration. Trustworthiness includes some aspects such as service's security, controllability and survivability. So, a definition of trustworthiness for web service is given in the paper, and then a web service trustworthiness evaluation and management model is brought forth inspired by human small-world network. The model consists of three web service federations: WSRRC, APAEAS and AWSORT. WSRRC is a Web Service Resource Register Center, which is established by UDDI protocol. APAEAS is an Area Proxy Authentication Evaluating Autonomy System, which collects some authentication information of web service clients, accepts clients' special requirement and feedbacks service's trustworthiness values to AWSORT. AWSORT is an Area WS Resource Organizing Tree, which organizes and manages web service resources; records web service trustworthiness values, keeps web service state, assigning web service. The model establishes a trustworthy environment for anonymous web service clients and providers. Furthermore, some detailed evaluating parameters about service trustworthiness and quality is discussed and some service management algorithms are proposed in the paper. The simulation results show that model is feasible for semantic grid integration and establishment for virtual organization. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
35. Fault Management in P2P-MPI.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Rangan, C. Pandu, Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Cérin, Christophe, Kuan-Ching Li, Genaud, Stéphane, and Rattanapoka, Choopan
- Abstract
We present in this paper the recent developments done in P2P-MPI, a grid middleware, concerning the fault management, which covers fault-tolerance for applications and fault detection. P2P-MPI provides a transparent fault tolerance facility based on replication of computations. Applications are monitored by a distributed set of external modules called failure detectors. The contribution of this paper is the analysis of the advantages and drawbacks of such detectors for a real implementation, and its integration in P2P-MPI. We pay especially attention to the reliability of the failure detection service and to the failure detection speed. We propose a variant of the binary round-robin protocol, which is more reliable than the application execution in any case. Experiments on applications of up to 256 processes, carried out on Grid'5000 show that the real detection times closely match the predictions. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
36. Interoperable Grid PKIs Among Untrusted Domains: An Architectural Proposal.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Rangan, C. Pandu, Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Cérin, Christophe, Kuan-Ching Li, Casola, Valentina, Luna, Jesus, and Manso, Oscar
- Abstract
In the last years several Grid Virtual Organizations -VOs- have been proliferating, each one usually installing its own Certification Authority and thus giving birth to a large set of different and possibly untrusted security domains. Nevertheless, despite the fact that the adoption of Grid Certification Authorities (CAs) has partially solved the problem of identification and authentication between the involved parties, and that Public Key Infrastructure (PKI) technologies are mature enough, we cannot make the same assumptions when untrusted domains are involved. In this paper we propose an architecture to face the problem of secure interoperability among untrusted Grid-domains. Our approach is based on building a dynamic federation of CAs, formed thorough the quantitative and automatic evaluation of their Certificate Policies. In this paper we describe the proposed architecture and its integration into Globus Toolkit 4. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
37. Accuracy Improvement of Lung Cancer Detection Based on Spatial Statistical Analysis of Thoracic CT Scans.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Rangan, C. Pandu, Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Gagalowicz, André, Philips, Wilfried, Takizawa, Hotaka, Yamamoto, Shinji, and Shiina, Tsuyoshi
- Abstract
This paper describes a novel discrimination method of lung cancers based on statistical analysis of thoracic computed tomography (CT) scans. Our previous Computer-Aided Diagnosis (CAD) system can detect lung cancers from CT scans, but, at the same time, yields many false positives. In order to reduce the false positives, the method proposed in the present paper uses a relationship between lung cancers, false positives and image information on CT scans. The trend of variation of the relationships is acquired through statistical analysis of a set of CT scans prepared for training. In testing, by use of the trend, the method predicts the appearance of lung cancers and false positives in a CT scan, and improves the accuracy of the previous CAD system by modifying the system's output based on the prediction. The method is applied to 218 actual thoracic CT scans with 386 actual lung cancers. Receiver operating characteristic (ROC) analysis is used to evaluate the results. The area under the ROC curve (Az) is statistically significantly improved from 0.918 to 0.931. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
38. Generation of Expression Space for Realtime Facial Expression Control of 3D Avatar.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Rangan, C. Pandu, Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Gagalowicz, André, Philips, Wilfried, and Sung-Ho Kim
- Abstract
This paper describes expression space generation technology that enables animators to control the expressions of 3-dimensional avatars in real-time by selecting a series of expressions from facial expression space. In this system, approximately 2400 facial expression frames are used to generate facial expression space. In this paper, distance matrixes that present distances between facial characteristic points are used to show the state of an expression. The set of these distance matrixes is defined as facial expression space. However, this facial expression space is not space that can be transferred to one space or another in a straight line, when one expression changes to another. In this technology, the route for moving from one expression to another is approximately inferred from captured facial expression data. First, it is assumed that two expressions are close to each other when the distance between distance matrixes that show facial expression states is below a certain value. When two random facial expression states are connected with the set of a series of adjacent expressions, it is assumed that there is a route between the two expressions. It is further assumed that the shortest path between two facial expressions is the path when one expression moves to the other expression. Dynamic programming is used to find the shortest path between two facial expressions. The facial expression space, which is the set of these distance matrixes, is multidimensional space. The facial expression control of 3-dimensional avatars is carried out in real-time when animators navigate through facial expression space. In order to assist this task, multidimensional scaling is used for visualization in 2-dimensional space, and animators are told to control facial expressions when using this system. This paper evaluates the results of the experiment. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
39. A Study on Eye Gaze Estimation Method Based on Cornea Model of Human Eye.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Rangan, C. Pandu, Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Gagalowicz, André, Philips, Wilfried, Eui Chul Lee, and Kang Ryoung Park
- Abstract
In this paper, we propose a new gaze estimation method by analyzing the cornea surface model which is estimated through three dimensional analysis of human eye in HMD (Head Mounted Display) environments. This paper has four advantages over previous works. First, in order to obtain accurate gaze position, we use a cornea sphere model based on Gullstrand eye scheme. Second, we calculate the 3D position of the cornea sphere and a gaze vector by using a camera, three collimated IR-LEDs and one illuminated IR-LED. Third, three coordinates such as camera, monitor and eye coordinates are unified, which can simplify the complex 3D converting calculation and allow for calculation of the 3D eye position and gaze position on a HMD monitor. Fourth, a simple user dependent calibration method is proposed by gazing at one position of HMD monitor based on Kappa compensation. Experimental results showed that the average gaze estimation error of the proposed method was 0.89 degrees. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
40. Interactive System for Efficient Video Cartooning.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Rangan, C. Pandu, Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Gagalowicz, André, Philips, Wilfried, Sung-Soo Hong, Jong-Chul Yoon, and In-Kwon Lee
- Abstract
Non-Photorealistic Rendering (NPR) can offer increased concentration and familiarity to the watcher. For this reason, many media such as movies, games, and commercials currently use the NPR method to deliver information. In this paper, we suggest an interactive system for video cartooning based on the mean-shift segmentation of image and video. In order to solve the problems of time complexity and memory allocation, the conventional problems of video mean-shift segmentation, this paper proposes several techniques such as foreground object based segmentation and sequential segmentation. We also propose the interactive correction technique to get enhanced results. For more cartoonic representation, we used spline curve approximation of segment boundaries in the final rendering results. With our method, we can easily create cartoon rendering output using the video streams such like home video, which can be obtained easily in our daily life. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
41. Fast Virtual Cloth Energy Minimization.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Rangan, C. Pandu, Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Gagalowicz, André, Philips, Wilfried, and Le Thanh, Tung
- Abstract
In this paper we present a method for fast energy minimization of virtual garments. Our method is based upon the idea of multi-resolution particle system. When garments are approximately positioned around a virtual character, their spring energy may be high, which will cause instability or at least long execution time of the simulation. An energy minimization algorithm is needed; if a fixed resolution is used, it will require many iterations to reduce its energy. Even though the complexity of each iteration is O(n), with a high resolution mass-spring system, this minimization process can take a whole day. The hierarchical method presented in this paper is used to reduce significantly the execution time of the minimization process. The garments are firstly discretized in several resolutions. Once the lowest resolution particles system is minimized (in a short time), a higher resolution model is derived, then minimized. The procedure is iterated up to the highest resolution. But at this stage, the energy to minimize is already much lower so that minimization takes a reasonable time. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
42. Some Topics on Edge-Coloring.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Rangan, C. Pandu, Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Akiyama, Jin, Chen, William Y. C., Kano, Mikio, Xueliang Li, and Qinglin Yu
- Abstract
In this paper some new results on edge coloring of graphs are introduced. This paper deals mainly with edge cover coloring, g-edge cover coloring, (g, f)-coloring and equitable edge coloring. Some new problems and conjectures are presented. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
43. On Convex Quadrangulations of Point Sets on the Plane.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Rangan, C. Pandu, Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Akiyama, Jin, Chen, William Y. C., Kano, Mikio, Xueliang Li, and Qinglin Yu
- Abstract
Let Pn be a set of n points on the plane in general position, n ≥ 4. A convex quadrangulation of Pn is a partitioning of the convex hull $\mathit{Conv}(P_n)$ of Pn into a set of quadrilaterals such that their vertices are elements of Pn, and no element of Pn lies in the interior of any quadrilateral. It is straightforward to see that if P admits a quadrilaterization, its convex hull must have an even number of vertices. In [6] it was proved that if the convex hull of Pn has an even number of points, then by adding at most $\frac{3n}{2}$ Steiner points in the interior of its convex hull, we can always obtain a point set that admits a convex quadrangulation. The authors also show that $\frac{n}{4}$ Steiner points are sometimes necessary. In this paper we show how to improve the upper and lower bounds of [6] to $\frac{4n}{5}+2$ and to $\frac{n}{3}$ respectively. In fact, in this paper we prove an upper bound of n, and with a long and unenlightening case analysis (over fifty cases!) we can improve the upper bound to $\frac{4n}{5}+2$, for details see [9]. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
44. Using Radio Device Fingerprinting for the Detection of Impersonation and Sybil Attacks in Wireless Networks.
- Author
-
Buttyán, Levente, Gligor, Virgil, Westhoff, Dirk, and Sieka, Bartlomiej
- Abstract
This paper describes an intrusion detection system to identify impersonation attacks and Sybil attacks in wireless networks. The detection system uses radio device fingerprinting and has experimental performance comparable with existing intrusion detection methods. The detection systems for Sybil attacks have not been widely investigated to date, and this contribution of the paper is novel. The paper also derives analytical formulae relating metrics of the fingerprinting classification procedure with the metrics of the intrusion detection system. The formulae can be used to guide the selection of the fingerprinting classification method, knowing the desired performance of the detection system. The use of radio device fingerprinting simplifies the task of securing a wireless ad-hoc network. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
45. Impact of Pseudonym Changes on Geographic Routing in VANETs.
- Author
-
Buttyán, Levente, Gligor, Virgil, Westhoff, Dirk, Schoch, Elmar, Kargl, Frank, Leinmüller, Tim, Schlott, Stefan, and Papadimitratos, Panos
- Abstract
Inter-vehicle communication is regarded as one of the major applications of mobile ad hoc networks (MANETs). In these so called vehicular ad hoc networks (VANETs) security and privacy are crucial factors for successful deployment. In a scenario, where each vehicle would have a unique identifier, eavesdroppers could easily accumulate location profiles. As a solution approach, several authors suggest using changeable pseudonyms as temporary vehicle identifiers. If a vehicle changes its pseudonym from time to time, long-term tracking can be avoided. However, as we show in this paper, changing identifiers has detrimental effects on routing efficiency and increases packet loss. So, designers of VANET systems need to aim for a balance between privacy protection on the one and performance on the other hand. The results of this paper provide advise on how to achieve this balance. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
46. Bio-inspired Organization for Multi-agents on Distributed Systems.
- Author
-
Ijspeert, Auke Jan, Masuzawa, Toshimitsu, Kusumoto, Shinji, and Satoh, Ichiro
- Abstract
This paper presents a middleware system for multi-agents on a distributed system as a general test-bed for bio-inspired approaches. The middleware is unique to other approaches, including distributed object systems, because it can maintain and migrate a dynamic federation of multiple agents on different computers. It enables each agent to explicitly define its own deployment policy as a relocation between the agent and another agent. This paper describes a prototype implementation of the middleware built on a Java-based mobile agent system and its practical applications that illustrates the utility and effectiveness of the approach in real distributed systems. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
47. Bio-inspired Replica Density Control in Dynamic Networks.
- Author
-
Ijspeert, Auke Jan, Kusumoto, Shinji, Suzuki, Tomoko, Izumi, Taisuke, Ooshita, Fukuhito, Kakugawa, Hirotsugu, and Masuzawa, Toshimitsu
- Abstract
Resource replication is a crucial technique for improving system performance of distributed applications with shared resources. A larger number of replicas require shorter time to reach a replica of the requested resource, but consume more storage of hosts. Therefore, it is indispensable to adjust the number of replicas appropriately for its application. This paper considers the problem for controlling the density of replicas adaptively in dynamic networks. The goal of the problem is to adjust the number of replicas to a constant fraction of the current network size. This paper proposes algorithm inspired by the single species population model, which is a well-known population ecology model. The simulation results show that the proposed algorithm realize self-adaptation of the replica density in dynamic networks. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
48. Evolving the Walking Behaviour of a 12 DOF Quadruped Using a Distributed Neural Architecture.
- Author
-
Ijspeert, Auke Jan, Masuzawa, Toshimitsu, Kusumoto, Shinji, Téllez, Ricardo A., Angulo, Cecilio, and Pardo, Diego E.
- Abstract
This paper describes how a distributed neural architecture for the general control of robots has been applied for the generation of a walking behaviour in the Aibo robotic dog. The architecture described has been already demonstrated useful for the generation of more simple behaviours like standing or standing up. This paper describes specifically how it has been applied to the generation of a walking pattern in a quadruped with twelve degrees of freedom, in both simulator and real robot. The main target of this paper is to show that our distributed architecture can be applied to complex dynamic tasks like walking. Nevertheless, by showing this, we also show how a completely neural and distributed controller can be obtained for a robot as complex as Aibo on a task as complex as walking. This second result is by itself a new and interesting one since, to our extent, there are no other completely neural controllers for quadruped with so many DOF that allow the robot to walk. Bio-inspiration is used in three ways: first we use the concept of central pattern generators in animals to obtain the desired walking robot. Second we apply evolutionary processes to obtain the neural controllers. Third, we seek limitations in how real dogs do walk in order to apply them to our controller and limit the search space. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
49. Large-Scale Computations with the Unified Danish Eulerian Model.
- Author
-
Dongarra, Jack, Madsen, Kaj, Wasniewski, Jerzy, and Zlatev, Zahari
- Abstract
The Unified Danish Eulerian Model (UNI-DEM) is an mathematical model for performing different comprehensive studies related to damaging effects from high pollution levels in Denmark and Europe. The model is described with a system of partial differential equations (PDEs). The number of equations is equal to the number of chemical species that are studied by the model. Three chemical schemes (with 35, 56 and 168 chemical species) are available at present. The model can be run either as 1-layer model (a 2-D model) or as 10 layer model (a 3-D model). Three grids can be specified in the horizontal planes: (i) a coarse 96 × 96 grid (corresponding to 50 km × 50 km grid-squares), (ii) a medium 288 × 288 grid (corresponding to 16.67 km × 16.67 km grid-squares), (iii) a fine 480 × 480 grid (corresponding to 10 km × 10 km grid-squares). The application of some splitting procedure followed by a discretization of the spatial derivatives leads to the solution of several systems of ordinary differential equations (ODEs) at each time-step. The number of equations in each system of ODEs is equal to the product of the number of grid-points and the number of chemical species. If the 480 × 480 horizontal grid is used in the 3-D model with 168 chemical species, then the number of equations in each system of ODEs is equal to N = 480 × 480 × 10 × 168 = 387 072 000. The number of time-steps for a run covering meteorological data for one year is 213 120 (corresponding to a time-stepsize of 150 s). Such huge computational tasks can be treated only if (i) fast numerical methods are selected, (ii) the code is optimized for running on computers with multi-hierarchical memories (i.e. if the caches are properly exploited) and (iii) parallel computers are efficiently used. The success achieved in the efforts to satisfy these three conditions and to carry out long-term computations with UNI-DEM will be reported in this paper. Studies that are related to different important topics have been performed by using the model. The most important of these studies are listed in the end of the paper. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
50. Step-Down FDR Procedures for Large Numbers of Hypotheses.
- Author
-
Dongarra, Jack, Madsen, Kaj, Wasniewski, Jerzy, and Somerville, Paul N.
- Abstract
Somerville (2004b) developed FDR step-down procedures which were particularly appropriate for cases where the number of false hypotheses was small. The test statistics were assumed to have a multivariate-t distribution with common correlation. MCV's (minimum critical values) were chosen so that 8 unique critical values resulted. Tables were given for numbers of hypotheses m, ranging from 50 to 10,000, for ρ = 0., 0.5, and ν = 15, ∞. In this paper we extend the results, using MCV's resulting in 31 critical values. Tables are given for the same values of m, for ρ = 0, 0.1, 0.5 and ν = 15, ∞. Interpolation rules are given for m, ρ and ν. Use of larger numbers of critical values increase both the power and the number of hypotheses falsely rejected. When the expected number of false hypotheses is small, use of the procedures of this paper results in a reduced number of false rejections with a negligible reduction in power. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.