作者:
Kraaijevanger, J.F.B.M.Univ of Leiden
Inst of Applied Mathematics & Computer Science Leiden Neth Univ of Leiden Inst of Applied Mathematics & Computer Science Leiden Neth
We present upper bounds for the global discretization error of the implicit midpoint rule and the trapezoidal rule for the case of arbitrary variable stepsizes. Specializing our results for the case of constant stepsi...
详细信息
We present upper bounds for the global discretization error of the implicit midpoint rule and the trapezoidal rule for the case of arbitrary variable stepsizes. Specializing our results for the case of constant stepsizes they easily prove second order optimal B-convergence for both methods.
We approach cross-lingual question answering by using a mono-lingual QA system for the source language and by translating resulting answers into the target language. As far as we are aware, this is the first cross-lin...
详细信息
We approach cross-lingual question answering by using a mono-lingual QA system for the source language and by translating resulting answers into the target language. As far as we are aware, this is the first cross-lingual QA system in the history of CLEF that uses this method-all other cross-lingual QA systems known to us use translation of the question or query inst.ad. We demonstrate the feasibility of this approach by using a mono-lingual QA system for English, and translating answers and finding appropriate documents in Italian and Dutch. For factoid and definition questions, we achieve overall accuracy scores ranging from 13% (EN→NL) to 17% (EN→IT) and lenient accuracy figures from 19% (EN→NL) to 25% (EN→IT). The advantage of this strategy to cross-lingual QA is that translation of answers is easier than translating questions-the disadvantage is that answers might be missing from the source corpus and additional effort is required for finding supporting documents of the target language.
This paper contains a novel approach to observational equivalence for coalgebras. We describe how to define weak homomorphisms, weak bisimulation, and investigate the connection between them as well as the relation to...
详细信息
Divide-and-conquer recurrences are one of the most studied equations in computerscience. Yet, discrete versions of these recurrences, namely m T(n) = an + ∑j=1m bjT([pjn + δj]) for some known sequence an and given ...
详细信息
ISBN:
(纸本)9780898719932
Divide-and-conquer recurrences are one of the most studied equations in computerscience. Yet, discrete versions of these recurrences, namely m T(n) = an + ∑j=1m bjT([pjn + δj]) for some known sequence an and given b j, pj and δj, present some challenges. The discrete nature of this recurrence (represented by the floor function) introduces certain oscillations not captured by the traditional Master Theorem, for example due to Akra and Beizzi who primary studied the con-tinuous version of the recurrence. We apply powerful techniques such as Dirichlet series, Mellin-Perron formula, and (extended) Tauberian theorems of Wiener-Ikehara to provide a complete and precise solution to this basic computerscience recurrence. We illustrate applicability of our results on several examples including a popular and fast arithmetic coding algorithm due to Boncelet for which we estimate its average redundancy. To the best of our knowledge, discrete divide and conquer recurrences were not studied in this generality and such detail;in particular, this allows us to compare the redinidancy of Boncelet's algorithm to the (asymptotically) optimal Tunstall scheme.
In our paper [RM02a] we describe an approach to weak bisimulation for coalgebras and show that parts of the theory of universal coalgebra (with strong bisimulation) can be obtained when considering coalgebras with wea...
详细信息
A geometric graph is a simple graph G = (V, E) with an embedding of the set V in the plane such that the points that represent V are in general position. A geometric graph is said to be k-locally Delaunay (or a D k-gr...
详细信息
A geometric graph is a simple graph G = (V, E) with an embedding of the set V in the plane such that the points that represent V are in general position. A geometric graph is said to be k-locally Delaunay (or a D k-graph) if for each edge (u, v) ∈ E there is a (Euclidean) disc d that contains u and v but no other vertex of G that is within k hops from u or v. The study of these graphs was recently motivated by topology control for wireless networks. We obtain the following results: (i) We prove that if G is a Di-graph on n vertices, then it has O(n3/2) edges. (ii) We show that for any n there exist D1-graphs with n vertices and Ω(n4/3) edges. (iii) We prove that if G is a D 2-graph on n vertices, then it has O(n) edges. This bound is worst-case asymptotically tight. As an application of the first result, we show that: (iv) The maximum size of a family of pairwise non-overlapping lenses in an arrangement of n unit circles in the plane is O(n3/2). The first two results improve the best previously known upper and lower bounds of O(n 5/3) and Ω(n) respectively (see [6]). The third result improves the best previously known upper bound of O(n log n). Finally, our last result improves the best previously known upper bound (for the more general case of not necessarily unit circles) of O(n3/2k(n)) (see [1]), where k(n) = (log n)O(α2(n)) and where α(n) is the extremely slowly growing inverse Ackermann's function.
SQL injection attacks, a class of injection flaw in which specially crafted input strings leads to illegal queries to databases, are one of the topmost threats to web applications. A number of research prototypes and ...
详细信息
We revisit the DOUBLE DIGEST problem, which occurs in sequencing of large DNA strings and consists of reconstructing the relative positions of cut sites from two different enzymes. We first show that DOUBLE DIGEST is ...
详细信息
Littlestone developed a simple deterministic on-line learning algorithm for learning k-literal disjunctions. This algorithm (called WINNOW) keeps one weight for each of the n variables and does multiplicative updates ...
详细信息
In a secure group communication system, messages must be encrypted before being transmitted to group members to prevent unauthorized access. In many secure group communication schemes, whenever a member leaves or join...
详细信息
In a secure group communication system, messages must be encrypted before being transmitted to group members to prevent unauthorized access. In many secure group communication schemes, whenever a member leaves or joins the group, group center (GC) immediately changes the common encryption key and sends the new key to all valid members for forward and backward secrecy. If valid members are not on-line, they will miss the re-keying messages and will not be able to decrypt any ciphertext. Therefore, group members must be able to store the state of the system. In some applications, like global positioning systems (GPS) or pay-per-view systems, it is not reasonable to ask group members to stay on-line all the time and save the changes to the system. A hierarchical binary tree-based key management scheme are proposed for a secure group communication. This scheme reduces the key storage requirement of GC to a constant size and the group members are not required to be on-line constantly (stateless).
暂无评论