http://git-wip-us.apache.org/repos/asf/asterixdb/blob/d906bd89/asterixdb/asterix-app/data/pub-small/csx-small-multi-id.txt
----------------------------------------------------------------------
diff --git a/asterixdb/asterix-app/data/pub-small/csx-small-multi-id.txt 
b/asterixdb/asterix-app/data/pub-small/csx-small-multi-id.txt
new file mode 100644
index 0000000..bead471
--- /dev/null
+++ b/asterixdb/asterix-app/data/pub-small/csx-small-multi-id.txt
@@ -0,0 +1,100 @@
+1:books/acm/kim95/BreitbartGS95:Transaction Management in Multidatabase 
Systems.:Yuri Breitbart Hector Garcia-Molina Abraham Silberschatz:2004-03-08 
573-591 Modern Database Systems books/acm/Kim95 
db/books/collections/kim95.html#BreitbartGS95 1995
+2:books/acm/kim95/AnnevelinkACFHK95:Object SQL - A Language for the Design and 
Implementation of Object Databases.:Jurgen Annevelink Rafiul Ahad Amelia 
Carlson Daniel H. Fishman Michael L. Heytens William Kent:2002-01-03 42-68 1995 
Modern Database Systems db/books/collections/kim95.html#AnnevelinkACFHK95
+3:books/acm/kim95/ChristodoulakisK95:Multimedia Information Systems  Issues 
and Approaches.:Stavros Christodoulakis Leonidas Koveos:2002-01-03 318-337 1995 
Modern Database Systems db/books/collections/kim95.html#ChristodoulakisK95
+4:books/acm/kim95/Blakeley95:OQL[C++]  Extending C++ with an Object Query 
Capability.:José A. Blakeley:2002-01-03 69-88 Modern Database Systems 
db/books/collections/kim95.html#Blakeley95 1995
+5:oai CiteSeerXPSU 10.1.1.1.1486:Dynamical networks in function dynamics:Naoto 
Kataoka Kunihiko Kaneko:2009-05-24 Function dynamics Iterated map 
Self-reference Dynamical network As a first step toward realizing a dynamical 
system that evolves while spontaneously determining its own rule for time 
evolution, function dynamics (FD) is analyzed. FD consists of a functional 
equation with a self-referential term, given as a dynamical system of a 
one-dimensional map. Through the time evolution of this system, a dynamical 
graph (a network) emerges. This graph has three interesting properties  (i) 
vertices appear as stable elements, (ii) the terminals of directed edges change 
in time, and (iii) some vertices determine the dynamics of edges, and edges 
determine the stability of the vertices, complementarily. Two aspects of FD are 
studied, the generation of a graph (network) structure and the dynamics of this 
graph (network) in the system. CiteSeerX  2009-05-24 2007-11-19 2003 
application/pdf 
 text http //citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1486 http 
//chaos.c.u-tokyo.ac.jp/others/kataoka03.pdf en Metadata may be used without 
restrictions as long as the oai identifier remains attached to it.
+6:oai CiteSeerXPSU 10.1.1.1.1487:Simulation  Prototyping:Ingolf 
Ståhl:2009-04-24 A simulation model is successful if it leads to policy 
action, i.e., if it is implemented. Studies show that for a model to be 
implemented, it must have good correspondence with the mental model of the 
system held by the user of the model. The user must feel confident that the 
simulation model corresponds to this mental model. An understanding of how the 
model works is required. Simulation models for implementation must be developed 
step by step, starting with a simple model, the simulation prototype. After 
this has been explained to the user, a more detailed model can be developed on 
the basis of feedback from the user. Software for simulation prototyping is 
discussed, e.g., with regard to the ease with which models and output can be 
explained and the speed with which small models can be written. CiteSeerX  
2009-04-24 2007-11-19 2002 application/pdf text http 
//citeseerx.ist.psu.edu/viewdoc/summary?do
 i=10.1.1.1.1487 http //www.informs-cs.org/wsc02papers/073.pdf en 
10.1.1.17.7647 10.1.1.134.3230 Metadata may be used without restrictions as 
long as the oai identifier remains attached to it.
+7:oai CiteSeerXPSU 10.1.1.1.1488:Hedging beyond duration and convexity:Jian 
Chen Michael C. Fu:2009-05-24 Hedging of fixed income securities remains one of 
the most challenging problems faced by financial institutions. The 
predominantly used measures of duration and convexity do not completely capture 
the interest rate risks borne by the holder of these securities. Using 
historical data for the entire yield curve, we perform a principal components 
analysis and find that the first four factors capture over 99.99% of the yield 
curve variation. Incorporating these factors into the pricing of arbitrary 
fixed income securities via Monte Carlo simulation, we derive perturbation 
analysis (PA) estimators for the price sensitivities with respect to the 
factors. Computational results for mortgage-backed securities (MBS) indicate 
that using these sensitivity measures in hedging provides far more protection 
against interest risk exposure than the conventional measures of duration and 
convexity.
  CiteSeerX  2009-05-24 2007-11-19 2002 application/pdf text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1488 http 
//www.informs-cs.org/wsc02papers/218.pdf en 10.1.1.113.9305 Metadata may be 
used without restrictions as long as the oai identifier remains attached to it.
+8:oai CiteSeerXPSU 10.1.1.1.1489:Designing for social friction  Exploring 
ubiquitous computing as means of cultural interventions in urban space:Rune 
Huvendick Jensen Tau Ulv Lenskjold:2009-05-24 everyday life urban space 
Situationism As ubiquitous computing emerges in our lives and cities new 
opportunities for artistic and otherwise cultural interventions in urban space 
follow, but so far not much work has been done in order to articulate the 
socio-cultural significance of these new opportunities. This paper is part of a 
general attempt to develop a coherent understanding of the implications and 
potentials of ubiquitous computing in the context of everyday city life. On a 
more specific level the paper examines how the notion of social friction can be 
helpful in the development and analysis of ubiquitous computing in relation to 
art and design. Social friction is articulated as a critical position, which 
could be applied as a strategy for design. Our approach consists of a theoretic
 al analysis and precedes concrete development and real-life experiments. As 
such the paper aims to establish a steppingstone from which to launch actual 
digital designs. We argue that by designing for the social friction, which is 
an intrinsic characteristic of everyday life, new forms of social and cultural 
potentials can be released. By means of discussing CityNova, a vision for a 
possible use of ubiquitous computing in urban space, we explore how this 
approach might lead to systems that create new ways of experiencing the city. 
CiteSeerX  2009-05-24 2007-11-19 2004 application/pdf text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1489 http 
//asp.cbs.dk/cade2004/proceedings/fullpapers/7_jensen_final_fullpaper.pdf en 
Metadata may be used without restrictions as long as the oai identifier remains 
attached to it.
+9:oai CiteSeerXPSU 10.1.1.1.1490:Optimal Combination of Number of Taps and 
Coefficient Bit-Width for Low Power FIR Filter Realization:João Portela 
Eduardo Costa José Monteiro:2009-05-24 This paper addresses the optimization 
of FIR filters for low power. We propose a search algorithm to find the 
combination of the number of taps and coe#cient bit-width that leads to the 
minimum number of total partial sums, and hence to the least power consumption. 
We show that the minimum number of taps does not necessarily lead to the least 
power consumption in fully parallel FIR filter architectures. This is 
particularly true if the reduction of the bit-width of the coe#cients is taken 
into account. We show that power is directly related to the total number of 
partial sums in the FIR filter, which in turn is determined by the number of 
bits set to 1 in the coe#cients. We have developed a search algorithm that 
achieves up to 36% less power consumption when compared to an implementation 
using the 
 minimum number of taps. CiteSeerX  2009-05-24 2007-11-19 2003 application/pdf 
text http //citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1490 http 
//tahoe.inesc-id.pt/pt/Ficheiros/1188.pdf en Metadata may be used without 
restrictions as long as the oai identifier remains attached to it.
+10:oai CiteSeerXPSU 10.1.1.1.1491:The Influence of a Course on Direct and 
Activating Instruction upon Student Teachers' Classroom Practice:Simon Veenman 
Eddie Denessen Ingrid Van Den Oord Ferdy Naafs:2009-05-24 Educational research 
has highlighted the importance of maintaining an orderly classroom environment 
and providing both clear and well-organized instruction tailored to the needs 
of individual students. Time spent on direct instruction and particularly the 
direct instruction of basic skills is associated with school learning (Wang, 
Haertel & Walberg, 1993). With the increased interest in constructivistic 
conceptions of learning and teaching today, educators with constructivistic 
orientations contend that various forms of knowledge and skills are applied 
more generally when constructed by the learners themselves as opposed to 
explicitly taught  "knowledge is made, not acquired" (Phillips, 2000, p. 7). 
Such a view nevertheless often leads to an inclination to reject direct instr
 uction by the teacher (see, for example, Brooks & Brooks, 1993). It should be 
noted, however, that many of the discussions of constructivistic orientations 
to learning and instruction are at the level of slogan and cliché (Duffy & 
Cunningham, 1996  Finn & Ravitch, 1996  Kozloff, 1998). In addition, the term 
constructivism has come to serve as an umbrella term for a diversity of views 
(Phillips, 1995  2000). CiteSeerX  2009-05-24 2007-11-19 2003 application/pdf 
text http //citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1491 http 
//www.socsci.kun.nl/ped/owk/onderwijs/cursussen/io242/papers/earli2003_direct_instruction.pdf
 en 10.1.1.29.1993 Metadata may be used without restrictions as long as the oai 
identifier remains attached to it.
+11:oai CiteSeerXPSU 10.1.1.1.1492:Multiplanar Applications and Multimodal 
Networks:S. Keshav:2009-05-24 Future applications network architecture We 
believe that a broad class of future applications will span both the Internet 
and the telephone network because such multiplanar applications have several 
economic and architectural advantages over conventional ones. We also envision 
the close interlinking of the telephone network and the Internet to form a 
multimodal network. In this paper, we describe these applications and networks, 
outline their architecture, and present our experiences in constructing a 
prototype multiplanar application. CiteSeerX  2009-05-24 2007-11-19 1999 
application/pdf text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1492 http 
//www.cs.cornell.edu/skeshav/papers/openarch99.pdf en 10.1.1.17.5614 Metadata 
may be used without restrictions as long as the oai identifier remains attached 
to it.
+12:oai CiteSeerXPSU 10.1.1.1.1493:Free-Riding and Whitewashing in Peer-to-Peer 
Systems:Michal Feldman Christos Papadimitriou John Chuang Ion Stoica:2009-05-24 
We devise a simple model to study the phenomenon of free-riding and the effect 
of free identities on user behavior in peer-to-peer systems. At the heart of 
our model is a strategic user of a certain type, an intrinsic and private 
parameter that reflects the user's generosity. The user decides whether to 
contribute or free-ride based on how the current burden of contributing in the 
system compares to her type. We derive the emerging cooperation level in 
equilibrium and  quantify the effect of providing free-riders with degraded 
service on the emerging cooperation. We find that this penalty  mechanism is 
beneficial mostly when the "generosity level" of the society (i.e., the average 
type) is low. To quantify the social cost of free identities, we extend the 
model to account for dynamic scenarios with turnover (users joining and 
 leaving) and with whitewashers  users who strategically leave the system and 
re-join with a new identity. We find that the imposition of penalty on all 
legitimate newcomers incurs a significant social loss only under high turnover 
rates in conjunction with intermediate societal generosity levels. CiteSeerX  
2009-05-24 2007-11-19 2004 application/pdf text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1493 http 
//www.dtc.umn.edu/weis2004/feldman.pdf en 10.1.1.18.6611 10.1.1.12.2253 
10.1.1.12.6173 10.1.1.11.4846 10.1.1.127.6039 10.1.1.130.2771 10.1.1.30.6376 
10.1.1.1.3415 10.1.1.42.1211 10.1.1.15.3743 10.1.1.11.6993 10.1.1.13.9315 
10.1.1.12.9564 10.1.1.6.1046 10.1.1.101.3865 10.1.1.112.397 10.1.1.77.6233 
10.1.1.76.9348 10.1.1.60.8693 10.1.1.1.3899 10.1.1.84.7582 10.1.1.116.3542 
10.1.1.59.9845 10.1.1.119.8132 10.1.1.132.4448 10.1.1.143.2268 10.1.1.60.4396 
10.1.1.87.4710 10.1.1.137.696 10.1.1.60.8756 10.1.1.97.1922 10.1.1.105.4069 
10.1.1.76.3341 10.1.1.80.5437 10.1.1.93.1336 
 10.1.1.131.1666 10.1.1.102.2386 10.1.1.108.4119 10.1.1.108.5840 
10.1.1.109.7946 10.1.1.66.8436 10.1.1.73.5608 10.1.1.73.5797 10.1.1.75.4852 
10.1.1.83.2020 10.1.1.85.8881 10.1.1.87.5160 10.1.1.92.3905 10.1.1.92.5572 
10.1.1.95.1197 10.1.1.95.6876 10.1.1.110.4873 10.1.1.111.8663 10.1.1.112.1051 
10.1.1.113.5715 10.1.1.113.7254 10.1.1.115.348 10.1.1.120.8054 10.1.1.123.6169 
10.1.1.128.7663 10.1.1.129.3166 10.1.1.134.3014 10.1.1.135.98 10.1.1.59.9602 
10.1.1.129.9940 10.1.1.141.1032 Metadata may be used without restrictions as 
long as the oai identifier remains attached to it.
+13:oai CiteSeerXPSU 10.1.1.1.1494:A Simple Algorithm for Complete Motion 
Planning of Translating Polyhedral Robots:Gokul Varadhan Shankar Krishnan T. V. 
N. Sriram Dinesh Manocha:2009-05-24 We present an algorithm for complete path 
planning for translating polyhedral robots in 3D. Instead of exactly computing 
an explicit representation of the free space, we compute a roadmap that 
captures its connectivity. This representation encodes the complete 
connectivity of free space and allows us to perform exact path planning. We 
construct the roadmap by computing deterministic samples in free space that lie 
on an adaptive volumetric grid. Our algorithm is simple to implement and uses 
two tests  a complex cell test and a star-shaped test. These tests can be 
efficiently performed on polyhedral objects using max-norm distance computation 
and linear programming. The complexity of our algorithm varies as a function of 
the size of narrow passages in the configuration space. We demonstrate the perf
 ormance of our algorithm on environments with very small narrow passages or no 
collision-free paths. CiteSeerX Sage Publications, Inc. 2009-05-24 2007-11-19 
2005 application/pdf text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1494 http 
//www.cs.unc.edu/~varadhan/papers/motion.pdf en 10.1.1.19.3462 10.1.1.20.8539 
10.1.1.52.7808 10.1.1.31.1678 10.1.1.34.1071 10.1.1.88.5053 10.1.1.1.3224 
10.1.1.66.385 10.1.1.58.2466 10.1.1.76.8798 10.1.1.88.305 Metadata may be used 
without restrictions as long as the oai identifier remains attached to it.
+14:oai CiteSeerXPSU 10.1.1.1.1495:Modeling Ship Arrivals in Ports:Eelco van 
Asperen Rommert Dekker Mark Polman Henk de Swaan Arons:2009-04-29 The model 
used in this report focuses on the analysis  of ship waiting statistics and 
stock fluctuations under different  arrival processes. However, the basic 
outline is the  same  central to both models are a jetty and accompanying  
tankfarm facilities belonging to a new chemical plant in the   Port of 
Rotterdam. Both the supply of raw materials and   the export of finished 
products occur through ships loading   and unloading at the jetty. Since 
disruptions in the plants  production process are very expensive, buffer stock 
is  needed to allow for variations in ship arrivals and overseas  exports 
through large ships.   Ports provide jetty facilities for ships to load and 
unload  their cargo. Since ship delays are costly, terminal operators  attempt 
to minimize their number and duration. Here, simulation  has proved to be a 
very suitable tool.
  However, in port  simulation models, the impact of the arrival process of 
ships  on the model outcomes tends to be underestimated. This article  
considers three arrival processes  stock-controlled,   equidistant per ship 
type, and Poisson. We assess how their  deployment in a port simulation model, 
based on data from a  real case study, affects the efficiency of the loading 
and  unloading process. Poisson, which is the chosen arrival  process in many 
client-oriented simulations, actually performs worst in terms of both ship 
delays and required storage capacity. Stock-controlled arrivals perform best 
with regard to ship delays and required storage capacity.   In the case study 
two types of arrival processes were  considered. The first type are the 
so-called stock-controlled  arrivals, i.e., ship arrivals are scheduled in such 
a way, that  a base stock level is maintained in the tanks. Given a base  stock 
level of a raw material or ... CiteSeerX  2009-04-29 2007-11-19 2003 applicatio
 n/pdf text http //citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1495 http 
//www.informs-cs.org/wsc03papers/222.pdf en 10.1.1.17.1837 10.1.1.120.9692 
Metadata may be used without restrictions as long as the oai identifier remains 
attached to it.
+15:oai CiteSeerXPSU 10.1.1.1.1496:In Proceedings of the16th IFAC Symposium on 
Automatic Control in Aerospace, Elsevier Science Ltd, Oxford,:Uk Cognitive 
Tools Donald Sofge Dennis Perzanowski Marjorie Skubic Magdalena Bugajska J. 
Gregory Trafton Nicholas Cassimatis Derek Brock William Adams Alan 
Schultz:2009-04-19 Cognitive Systems Co-operative Control Speech Recognition 
Natural Language Human-Machine Interface Autonomous Mobile Robots The effective 
use of humanoid robots in space will depend upon  the efficacy of interaction 
between humans and robots. The key to  achieving this interaction is to provide 
the robot with sufficient skills for  natural communication with humans so that 
humans can interact with the  robot almost as though it were another human. 
This requires that a number  of basic capabilities be incorporated into the 
robot, including voice  recognition, natural language, and cognitive tools 
on-board the robot to  facilitate interaction between humans and robots through
  use of common  representations and shared humanlike behaviors. CiteSeerX  
2009-04-19 2007-11-19 2004 application/pdf text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1496 http 
//www.aic.nrl.navy.mil/~dennisp/ifac.aca.2004.pdf en 10.1.1.13.8248 
10.1.1.101.9124 10.1.1.58.5211 10.1.1.99.4007 10.1.1.58.4797 Metadata may be 
used without restrictions as long as the oai identifier remains attached to it.
+16:oai CiteSeerXPSU 10.1.1.1.1497:Exploiting Computer Automation to Improve 
the Interview Process and Increase Survey Cooperation:Jeffrey C. Moore Jeffrey 
C. Moore:2009-04-19 burden conversational norms efficiency flow 
nonresponse/attrition questionnaire design respondent-friendly I. In Couper 
(2002) outlines the "challenges and opportunities" of recent and stillemerging 
technological developments on the conduct of survey research. This paper 
focuses on one such development -- the use of computer-assisted survey 
instruments in place of paper-andpencil questionnaires -- and it focuses on one 
particular opportunity which this development presents  the ability to improve 
efficiency, "flow," and naturalness, and in general make the interview 
experience a more pleasant one for all participants, while still controlling 
question wording and sequencing. Moral arguments can be raised in defense of 
such efforts  the potential for important practical benefits, including 
improved survey coopera
 tion, lends more mundane but perhaps more potent support. Although the 
research literature is surprisingly scant, there is some evidence that improved 
instrument design can reduce nonresponse. A recent effort by the U.S. Census 
Bureau to redesign the core instrument for the Survey of Income and Program 
Participation (SIPP) offers additional support. Motivated in large measure by 
evidence of increasing unit nonresponse and attrition, the primary goal of the 
SIPP redesign effort was to improve the interview process, and in particular to 
seek ways to avoid violations of conversational norms (e.g., Grice, 1975). A 
great many of the SIPP interview process improvements would not have been 
feasible without the computerization of the survey instrument. This paper 
briefly summarizes many of the technology-based changes implemented in the SIPP 
instrument, and briefly describes a set of field experiments used to develop 
and refine the new procedures and to evaluate their success in achieving S
 IPP's redesign goals. Keywords  burden, conversational norms, efficiency, 
flow, nonresponse/... CiteSeerX  2009-04-19 2007-11-19 2004 application/pdf 
text http //citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1497 http 
//www.census.gov/srd/papers/pdf/rsm2004-01.pdf en 10.1.1.131.9305 Metadata may 
be used without restrictions as long as the oai identifier remains attached to 
it.
+17:oai CiteSeerXPSU 10.1.1.1.1499:Performance and Design Evaluation:Of The 
Raid-Ii Peter M. Chen Edward K. Lee Ann L. Drapeau Ethan L. Miller Srinivasan 
Seshan Ken Shirriff David A. Patterson Y H. Katz:2009-04-19 RAID-II is a 
high-bandwidth, networkattached storage server designed and implemented at the 
University of California at Berkeley. In this paper, we measure the performance 
of RAID-II and evaluate various architectural decisions made during the design 
process. We first measure the end-to-end performance of the system to be 
approximately 20 MB/s for both disk array reads and writes. We then perform a 
bottleneck analysis by examining the performance of each individual subsystem 
and conclude that the disk subsystem limits performance. By adding a custom 
interconnect board with a high-speed memory and bus system and parity engine, 
we are able to achieve a performance speedup of 8 to 15 over a comparative 
system using only off-theshelf hardware. CiteSeerX  2009-04-19 2007-11-19 1
 994 application/pdf text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1499 http 
//ssrc.cse.ucsc.edu/~elm/Papers/ipps93.pdf en Metadata may be used without 
restrictions as long as the oai identifier remains attached to it.
+18:oai CiteSeerXPSU 10.1.1.1.1500:The Marinov Motor, Notional 
Induction:Without Magnetic Field J. P Wesley:2009-04-19 Introduction  The force 
of induction F on a charge q is given by  FA=-qtcdd,(1)  where A is the usual 
magnetic vector potential defined by  A r  rJr  rrc  -  s    ,(2)  where J is 
the current density. Slowly varying effects are assumed here, where the basic 
theory may be given as a true relativity theory, involving the separation 
distance between two charges and its time derivatives.  This force of 
induction, Eq. (1), yields Faraday's law of electromagnetic induction for the 
special case of an electromotive force (emf) around a fixed closed loop. In 
particular,  emf  d  d  d  d  d    '  &  (  0  ) =-  =-  =-    s s s  sF  q  s  
tc tc  an  tc  an  A  B    ,(3)  where F is the magnetic flux through the loop. 
 It is observed in the laboratory that an emf is also induced when =A tc 0 , 
and the magnetic flux through the loop is changed by moving the loop, so 
Faraday's law
  becomes  emf = -      .-(4)  Francisco Mller's (1987) experiments show that 
induction occurs locally and that the force CiteSeerX  2009-04-19 2007-11-19 
2001 application/pdf text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1500 http 
//redshift.vif.com/JournalFiles/Pre2001/V05NO3PDF/v05n3wes.pdf en Metadata may 
be used without restrictions as long as the oai identifier remains attached to 
it.
+19:oai CiteSeerXPSU 10.1.1.1.1501:Biometric Verification Based on Grip-Pattern 
Recognition:Raymond Veldhuis Asker Bazen Joost Kauffman Pieter 
Hartel:2009-04-19 Biometric verification likelihood ratio smart gun 
grip-pattern recognition This paper describes the design, implementation and 
evaluation of a user-verification system for a smart gun, which is based on 
grip-pattern recognition. An existing pressure sensor consisting of an array of 
44    44 piezoresistive elements is used to measure the grip pattern. An 
interface has been developed to acquire pressure images from the sensor. The 
values of the pixels in the pressure-pattern images are used as inputs for a 
verification algorithm, which is currently implemented in software on a PC. The 
verification algorithm is based on a likelihoodratio classifier for Gaussian 
probability densities. First results indicate that it is feasible to use 
grip-pattern recognition for biometric verification. CiteSeerX  2009-04-19 
2007-11-19 2004 applic
 ation/pdf text http //citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1501 
http //www.ub.utwente.nl/webdocs/ctit/1/000000f5.pdf en 10.1.1.9.5838 
10.1.1.101.5555 Metadata may be used without restrictions as long as the oai 
identifier remains attached to it.
+20:oai CiteSeerXPSU 10.1.1.1.1502:Relativistic Doppler Effect and the 
Principle of Relativity:W. Engelhardt:2009-04-19 Relativity Doppler Effect 
Aberration a private address Fasaneriestrasse 8 D-80636 München The frequency 
shifts predicted by the `relativistic' Doppler  e#ect are derived in the photon 
picture of light. It turns  out that, in general, the results do not depend 
exclusively  on the relative velocity between observer and light source. 
CiteSeerX  2009-04-19 2007-11-19 2003 text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1502 http 
//redshift.vif.com/JournalFiles/V10NO4PDF/V10N4ENG.PDF en 10.1.1.58.3335 
10.1.1.140.9931 Metadata may be used without restrictions as long as the oai 
identifier remains attached to it.
+21:oai CiteSeerXPSU 10.1.1.1.1503:Differential Association Rule Mining for the 
Study of Protein-Protein Interaction Networks:Christopher Besemann Anne Denton 
Ajay Yekkirala Ron Hutchison Marc Anderson:2009-04-19 Protein-protein 
interactions are of great interest to biologists. A variety of high-throughput 
techniques have been devised, each of which leads to a separate definition of 
an interaction network. The concept of differential association rule mining is 
introduced to study the annotations of proteins in the context of one or more 
interaction networks. Differences among items across edges of a network are 
explicitly targeted. As a second step we identify differences between networks 
that are separately defined on the same set of nodes. The technique of 
differential association rule mining is applied to the comparison of protein 
annotations within an interaction network and between different interaction 
networks. In both cases we were able to find rules that explain known proper
 ties of protein interaction networks as well as rules that show promise for 
advanced study. CiteSeerX  2009-04-19 2007-11-19 2004 application/pdf text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1503 http 
//www.cs.ndsu.nodak.edu/%7Eadenton/publications/BIOKDD040712a.pdf en 
10.1.1.40.6984 10.1.1.40.9892 10.1.1.12.6495 10.1.1.13.6963 10.1.1.113.6042 
10.1.1.36.2485 10.1.1.10.7611 10.1.1.18.8344 10.1.1.12.7211 10.1.1.32.7066 
10.1.1.12.3538 10.1.1.56.7889 10.1.1.12.8995 10.1.1.11.2425 10.1.1.27.9671 
10.1.1.21.3747 10.1.1.1.5073 10.1.1.66.4476 10.1.1.67.617 Metadata may be used 
without restrictions as long as the oai identifier remains attached to it.
+22:oai CiteSeerXPSU 10.1.1.1.1504:Combining Adaptive and Deterministic Routing 
 Evaluation of a Hybrid Router:Dianne Kumar And Dianne Kumar Walid A. 
Najjar:2009-04-19 This paper reports on the implementation and evaluation 
ofahybrid routing scheme that combines the advantages of deterministic and 
adaptive routing. An expanded version of this paper can be found in #1#  In the 
deterministic, or dimension-ordered, routing algorithm a message is routed 
along decreasing dimensions with a dimension decrease occurring only when zero 
hops remain in all higher dimensions. Virtual channels #VCs# are included in 
the router to avoid deadlock #6#. Deterministic routing can su#er from 
congestion since only a single path between source and destination can be used 
CiteSeerX Springer 2009-04-19 2007-11-19 1999 application/pdf text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1504 http 
//www.cs.ucr.edu/%7Enajjar/papers/canpc99.pdf en 10.1.1.117.7403 10.1.1.80.5595 
10.1.1.44.6553 10.1.1.5
 3.4729 10.1.1.22.6577 10.1.1.24.4663 Metadata may be used without restrictions 
as long as the oai identifier remains attached to it.
+23:oai CiteSeerXPSU 10.1.1.1.1505:Towards a More Complete Model of Role:Adrian 
Baldwin Cheh Goh Cheh Goh:2009-04-19 In order to manage the use of roles for 
the purpose of access control, it is important to look at attributes beyond the 
consideration of capability assignment. Fundamentally, a generic attribute 
description using a constraint-based approach will allow many of the important 
aspects of role, such as scope, activation and deactivation, to be included. 
Furthermore, the commonly accepted concept of role hierarchy is challenged from 
the point of view of subsidiarity in real organisations, with the suggestion 
that role hierarchy has limited usefulness that does not seem to apply widely. 
CiteSeerX  2009-04-19 2007-11-19 1998 application/pdf text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1505 http 
//www.cs.kun.nl/is/Library/./Data/1998/Goh/Towards/1998-Goh-Towards.pdf en 
10.1.1.47.3914 10.1.1.26.2311 10.1.1.45.1616 10.1.1.18.5632 10.1.1.103.8527 
10.1.1.11.1495 1
 0.1.1.21.1056 10.1.1.18.6290 10.1.1.88.1656 10.1.1.130.4738 10.1.1.57.6574 
10.1.1.10.7333 10.1.1.21.3059 10.1.1.76.1573 10.1.1.85.2890 10.1.1.14.6686 
10.1.1.59.2363 10.1.1.93.2667 10.1.1.100.3563 10.1.1.105.1864 10.1.1.88.5400 
10.1.1.88.7033 10.1.1.90.1790 10.1.1.90.2382 10.1.1.90.3968 10.1.1.91.1743 
10.1.1.94.4357 10.1.1.124.6837 10.1.1.130.3601 10.1.1.18.2266 Metadata may be 
used without restrictions as long as the oai identifier remains attached to it.
+24:oai CiteSeerXPSU 10.1.1.1.1506:Target Tracking with Distributed Sensors  
The Focus of Attention Problem:V. Isler Sanjeev Khanna J. Spletzer C. J. Taylor 
Volkan Isler A Camillo J. Taylor A:2009-04-19 In this paper, we consider the 
problem of assigning sensors to track targets so as to minimize the expected 
error in the resulting estimation for target locations. Specifically, we are 
interested in how disjoint pairs of bearing or range sensors can be best 
assigned to targets in order to minimize the expected error in the estimates. 
We refer to this as the focus of attention (FOA) problem. CiteSeerX  2009-04-19 
2007-11-19 2004 application/pdf text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1506 http 
//www.cis.upenn.edu/%7Eisleri/research/papers/foaCVIU.pdf en 10.1.1.36.8357 
10.1.1.18.8488 10.1.1.19.8778 10.1.1.14.3443 10.1.1.58.6802 10.1.1.49.9816 
10.1.1.84.4195 10.1.1.144.2859 10.1.1.71.7438 10.1.1.78.7656 10.1.1.126.3811 
10.1.1.130.1224 10.1.1.132.8302 10.1.1.58.5357
  Metadata may be used without restrictions as long as the oai identifier 
remains attached to it.
+25:oai CiteSeerXPSU 10.1.1.1.1507:Creating an Integrated Computer Assisted 
Learning and Assessment Experience in the School of European Languages and 
Cultures at the University of Edinburgh:John Hobbs John Hobbs Marcus Duran 
Marcus Duran Eh Jx:2009-04-19 In the field of Computer-Aided anything, acronyms 
abound. They are, after all, useful tools. However, there is a risk that we 
become constrained by them and, as a result, fail to see beyond them. CiteSeerX 
 2009-04-19 2007-11-19 2002 application/pdf text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1507 http 
//www.lboro.ac.uk/service/ltd/flicaa/conf2002/pdfs/hobbs_jm.pdf en Metadata may 
be used without restrictions as long as the oai identifier remains attached to 
it.
+26:oai CiteSeerXPSU 10.1.1.1.1508:Web Structure Analysis for Information 
Mining:Lakshmi Vijjappu Ah-Hwee Ah-hwee Tan Chew-lim Tan:2009-04-19 Our 
approach to extracting information from the web analyzes the structural content 
of web pages through exploiting the latent information given by HTML tags. For 
each specific extraction task, an object model is created consisting of the 
salient fields to be extracted and the corresponding extraction rules based on 
a library of HTML parsing functions. We derive extraction rules for both 
single-slot and multiple-slot extraction tasks which we illustrate through two 
sample domains. CiteSeerX  2009-04-19 2007-11-19 2001 application/pdf text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1508 http 
//www.csc.liv.ac.uk/~wda2001/Papers/18_lakshmi_wda2001.pdf en 10.1.1.46.6008 
10.1.1.32.8501 10.1.1.51.8159 10.1.1.54.3298 10.1.1.20.8120 10.1.1.36.6286 
10.1.1.47.6312 Metadata may be used without restrictions as long as the oai 
identifier rema
 ins attached to it.
+27:oai CiteSeerXPSU 10.1.1.1.1509:Bayesian Inference for Transductive Learning 
of Kernel Matrix Using the Tanner-Wong Data Augmentation Algorithm:Zhihua Zhang 
Dit-Yan Yeung James T. Kwok:2009-04-19 In kernel methods, an interesting recent 
development  seeks to learn a good kernel from  empirical data automatically. 
In this paper,  by regarding the transductive learning  of the kernel matrix as 
a missing data  problem, we propose a Bayesian hierarchical  model for the 
problem and devise the  Tanner-Wong data augmentation algorithm  for making 
inference on the model. The  Tanner-Wong algorithm is closely related to  Gibbs 
sampling, and it also bears a strong resemblance  to the 
expectation-maximization  (EM) algorithm. For an e#cient implementation,  we 
propose a simplified Bayesian hierarchical  model and the corresponding 
TannerWong  algorithm. We express the relationship  between the kernel on the 
input space  and the kernel on the output space as a  symmetric-definite 
generalized 
 eigenproblem. CiteSeerX  2009-04-19 2007-11-19 2004 application/pdf text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1509 http 
//www.cs.ust.hk/~zhzhang/papers/icml04tw.pdf en 10.1.1.133.4884 10.1.1.16.1922 
10.1.1.23.6757 10.1.1.37.8662 10.1.1.72.509 10.1.1.71.5318 10.1.1.94.7695 
10.1.1.119.4637 10.1.1.102.9977 10.1.1.73.7176 10.1.1.77.7873 10.1.1.112.9663 
10.1.1.116.111 Metadata may be used without restrictions as long as the oai 
identifier remains attached to it.
+28:oai CiteSeerXPSU 10.1.1.1.1510:Genetic Improvisation Model - a framework 
for real-time performance environments:Paul Nemirovsky Richard 
Watson:2009-04-19 This paper presents the current state in an ongoing 
development of the Genetic  Improvisation Model (GIM)  a framework for the 
design of real-time improvisational  systems. The aesthetic rationale for the 
model is presented, followed by  a discussion of its general principles. A 
discussion of the Emonic Environment,  a networked system for audiovisual 
creation built on GIM's principles, follows CiteSeerX  2009-04-19 2007-11-19 
2003 application/pdf text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1510 http 
//www.media.mit.edu/~pauln/research/emonic/docs/evomusart2003.pdf en 
10.1.1.46.6615 10.1.1.58.3628 10.1.1.1.4031 10.1.1.57.9915 10.1.1.59.1804 
10.1.1.69.8249 10.1.1.90.5797 Metadata may be used without restrictions as long 
as the oai identifier remains attached to it.
+29:oai CiteSeerXPSU 10.1.1.1.1511:Mean-Variance Hedging under 
Additional:Market Information Frank Frank Thierbach Frank Thierbach:2009-04-19 
JEL classification G11 G12 In this paper we analyse the mean-variance hedging 
approach in an incomplete market under the assumption of additional market 
information, which is represented by a given, finite set of observed prices of 
non-attainable contingent claims. Due to no-arbitrage arguments, our set of 
investment opportunities increases and the set of possible equivalent 
martingale measures shrinks. Therefore, we obtain a modified mean-variance 
hedging problem, which takes into account the observed additional market 
information. Solving this by means of the techniques developed by Gourieroux, 
Laurent and Pham (1998), we obtain an explicit description of the optimal 
hedging strategy and an admissible, constrained variance-optimal signed 
martingale measure, that generates both the approximation price and the 
observed option prices. CiteSeerX 
  2009-04-19 2007-11-19 application/pdf text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1511 http 
//www.finasto.uni-bonn.de/papers/mvhedging.pdf en Metadata may be used without 
restrictions as long as the oai identifier remains attached to it.
+30:oai CiteSeerXPSU 10.1.1.1.1512:Sis-Prueba:Tool For Rapid Pedro Concejero 
Cerezo Juan José Rodríguez Soler Daniel Tapias Merino Telefónica Móviles 
España:2009-04-19 SIS PRUEBA is a software tool to integrate usability and 
user-centred design principles in the development process of services within 
Telefnica Mviles Espaa (TME), the largest mobile telecommunications operator in 
Spain. CiteSeerX  2009-04-19 2007-11-19 application/pdf text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1512 http 
//sunsite.informatik.rwth-aachen.de/Publications/CEUR-WS//Vol-103/concejero-et-al.pdf
 en Metadata may be used without restrictions as long as the oai identifier 
remains attached to it.
+31:oai CiteSeerXPSU 10.1.1.1.1513:Reducing the Computational Load of Energy 
Evaluations for:Protein Folding Eunice Eunice E. Santos Eugene 
Santos:2009-04-19 protein folding triangular lattice HP energy model caching 
reuse evolutionary Predicting the native conformation using computational 
protein models requires a large number  of energy evaluations even with 
simplified models such as hydrophobic-hydrophilic (HP)  models. Clearly, energy 
evaluations constitute a significant portion of computational time. We  
hypothesize that given the structured nature of algorithms that search for 
candidate conformations  such as stochastic methods, energy evaluation 
computations can be cached and reused,  thus saving computational time and 
e#ort. In this paper, we present a caching approach and  apply it to 2D 
triangular HP lattice model. We provide theoretical analysis and prediction of  
the expected savings from caching as applied this model. We conduct experiments 
using a sophisticated  evoluti
 onary algorithm that contains elements of local search, memetic algorithms,  
diversity replacement, etc. in order to verify our hypothesis and demonstrate a 
significant level  1  of savings in computational e#ort and time that caching 
can provide. CiteSeerX  2009-04-19 2007-11-19 application/pdf text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1513 http 
//excalibur.brc.uconn.edu/Papers/Conference/bibe04-submit.pdf en 10.1.1.53.7409 
10.1.1.46.770 10.1.1.10.5827 10.1.1.54.8912 Metadata may be used without 
restrictions as long as the oai identifier remains attached to it.
+32:oai CiteSeerXPSU 10.1.1.1.1514:Human-Robot Interactions in Active Sensor 
Networks:Alexei Makarenko Tobias Kaupp Ben Grocholsky Hugh 
Durrant-whyte:2009-04-19 This paper considers the modes of interaction between 
one or several human operators and an active sensor network -- a fully 
decentralized network of sensors some or all of which have actuators and are in 
that sense active. The primary goal of this study is to investigate the 
conditions under which the human involvement will not jeopardize scalability of 
the overall system. Two aspects of human-robot interaction are considered  the 
ways in which the global view of the system may be conveyed to the operators, 
and how the operators may influence the behavior of the system during the 
course of its operation. The results of analysis favor peer-topeer 
information-based interactions between the operators and the network whereby 
the humans act as extended sensors and communication nodes of the network 
itself. Experiments on an indoo
 r active sensor network are described. CiteSeerX  2009-04-19 2007-11-19 
application/pdf text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1514 http 
//www.grasp.upenn.edu/~bpg/makarenko03_hum_rob_in_asn.pdf en 10.1.1.110.6935 
10.1.1.18.2772 10.1.1.70.4661 10.1.1.42.1968 10.1.1.14.7286 10.1.1.123.9637 
10.1.1.58.5090 10.1.1.11.6081 10.1.1.58.5988 10.1.1.4.8345 10.1.1.58.4968 
Metadata may be used without restrictions as long as the oai identifier remains 
attached to it.
+33:oai CiteSeerXPSU 10.1.1.1.1515:Disjoint Sum of Product Minimization by 
Evolutionary Algorithms:Nicole Drechsler Mario Hilgemeier Görschwin Fey Rolf 
Drechsler:2009-04-19 Recently, an approach has been presented to minimize 
Disjoint Sumof  -Products (DSOPs) based on Binary Decision Diagrams (BDDs). Due 
 to the symbolic representation of cubes for large problem instances, the  
method is orders of magnitude faster than previous enumerative techniques. 
CiteSeerX  2009-04-19 2007-11-19 application/pdf text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1515 http 
//www.informatik.uni-bremen.de/agra/doc/work/evohot04.pdf en 10.1.1.1.5124 
10.1.1.30.5588 10.1.1.29.2722 10.1.1.12.7617 10.1.1.125.1065 Metadata may be 
used without restrictions as long as the oai identifier remains attached to it.
+34:oai CiteSeerXPSU 10.1.1.1.1516:Acta Cryst. (2004). B60, 481489 DOI  
10.1107/S0108768104013564 481 Acta Crystallographica Section B:Structural 
Science Issn Valeria Ferretti A Paola Gilli A Pier Andrea Borea B A Centro 
Di:2009-04-19 this paper are available from the IUCr electronic archives 
(Reference  NA5019). Services for accessing these data are described at the 
back of the journal CiteSeerX  2009-04-19 2007-11-19 application/pdf text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1516 http 
//journals.iucr.org/b/issues/2004/04/00/na5019/na5019.pdf en Metadata may be 
used without restrictions as long as the oai identifier remains attached to it.
+35:oai CiteSeerXPSU 10.1.1.1.1517:The Lattice-Boltzmann Method for Simulating 
Gaseous Phenomena:Xiaoming Wei Student Member Wei Li Klaus Mueller Arie E. 
Kaufman:2009-04-19 We present a physically-based, yet fast and simple method to 
simulate gaseous phenomena. In our approach, the  incompressible Navier-Stokes 
(NS) equations governing fluid motion have been modeled in a novel way to 
achieve a realistic  animation. We introduce the Lattice Boltzmann Model (LBM), 
which simulates the microscopic movement of fluid particles by linear  and 
local rules on a grid of cells so that the macroscopic averaged properties obey 
the desired NS equations. The LBM is defined on a  2D or 3D discrete lattice, 
which is used to solve fluid animation based on different boundary conditions. 
The LBM simulation generates,  in real-time, an accurate velocity field and can 
incorporate an optional temperature field to account for the buoyancy force of 
hot gas. CiteSeerX  2009-04-19 2007-11-19 2004 application/p
 df text http //citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1517 http 
//www.cs.sunysb.edu/%7Emueller/papers/smokeTVCG04.pdf en 10.1.1.15.9203 
10.1.1.25.5737 10.1.1.17.1966 10.1.1.131.9652 10.1.1.38.7021 10.1.1.23.4545 
10.1.1.84.7193 10.1.1.23.5064 10.1.1.6.4632 10.1.1.15.6033 10.1.1.61.3740 
10.1.1.104.6696 10.1.1.136.5635 10.1.1.1.2520 10.1.1.72.4834 10.1.1.83.4851 
10.1.1.95.5556 10.1.1.110.7589 Metadata may be used without restrictions as 
long as the oai identifier remains attached to it.
+36:oai CiteSeerXPSU 10.1.1.1.1518:Peer-to-Peer Human-Robot Interaction for 
Space Exploration:Terrence Fong And Terrence Fong Illah Nourbakhsh:2009-04-19 
NASA has embarked on a long-term program to develop  human-robot systems for 
sustained, affordable space exploration. CiteSeerX  2009-04-19 2007-11-19 2004 
application/pdf text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1518 http 
//www.ri.cmu.edu/pub_files/pub4/fong_terrence_w_2004_1/fong_terrence_w_2004_1.pdf
 en 10.1.1.36.6789 10.1.1.2.8285 10.1.1.16.516 10.1.1.6.118 10.1.1.4.2304 
10.1.1.99.2775 10.1.1.61.1527 Metadata may be used without restrictions as long 
as the oai identifier remains attached to it.
+37:oai CiteSeerXPSU 10.1.1.1.1519:Survey Taxonomy of Packet Classification 
Techniques:David Taylor Sa Da Prot Dp Flowid Pt:2009-04-19 Packet 
classification is an enabling function for a variety of Internet applications 
including Quality of Service, security, monitoring, and multimedia 
communications. In order to classify a packet as belonging to a particular flow 
or set of flows, network nodes must perform a search over a set of filters 
using multiple fields of the packet as the search key. In general, there have 
been two major threads of research addressing packet classification  
algorithmic and architectural. A few pioneering groups of researchers posed the 
problem, provided complexity bounds, and offered a collection of algorithmic 
solutions. Subsequently, the design space has been vigorously explored by many 
offering new algorithms and improvements upon existing algorithms. Given the 
inability of early algorithms to meet performance constraints imposed by high 
speed links, resea
 rchers in industry and academia devised architectural solutions to the 
problem. This thread of research produced the most widely-used packet 
classification device technology, Ternary Content Addressable Memory (TCAM). 
New architectural research combines intelligent algorithms and novel 
architectures to eliminate many of the unfavorable characteristics of current 
TCAMs. We observe that the community appears to be converging on a combined 
algorithmic and architectural approach to the problem. Using a taxonomy based 
on the high-level approach to the problem and a minimal set of running 
examples, we provide a survey of the seminal and recent solutions to the 
problem. It is our hope to foster a deeper understanding of the various packet 
classification techniques while providing a useful framework for discerning 
relationships and distinctions. CiteSeerX  2009-04-19 2007-11-19 2004 
application/pdf text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1519 http 
//www.arl.wustl.edu/
 Publications/2000-04/wucse-2004-24.pdf en 10.1.1.137.3147 10.1.1.121.1309 
10.1.1.13.9939 10.1.1.39.697 10.1.1.24.3532 10.1.1.29.4777 10.1.1.12.3539 
10.1.1.112.1058 10.1.1.12.5688 10.1.1.41.4744 10.1.1.41.9413 10.1.1.3.5167 
10.1.1.32.9914 10.1.1.105.3710 10.1.1.58.2312 10.1.1.58.5079 10.1.1.13.3703 
10.1.1.28.9719 10.1.1.135.9578 10.1.1.6.107 10.1.1.121.8780 10.1.1.133.2753 
10.1.1.78.9584 10.1.1.97.442 10.1.1.86.5588 10.1.1.104.4868 10.1.1.108.4619 
10.1.1.65.3134 10.1.1.76.3971 10.1.1.77.8580 10.1.1.83.3090 10.1.1.85.8699 
10.1.1.89.6993 10.1.1.89.7016 10.1.1.91.9738 10.1.1.94.8479 10.1.1.97.6162 
10.1.1.72.6318 10.1.1.126.1241 10.1.1.61.5847 Metadata may be used without 
restrictions as long as the oai identifier remains attached to it.
+38:oai CiteSeerXPSU 10.1.1.1.1520:Friscof Risco:Framework Of Information 
Eckhard D. Falkenberg Wolfgang Hesse Paul Lindgreen Björn E. Nilsson J. L. Han 
Oei Colette Rolland Ronald K. Stamper Frans J. M. Van Assche Alexander A. 
Verrijn-stuart Klaus Voss:2009-04-19 this report, Paul Lindgreen as secretary 
and as editor of the interim report [Lin90a] CiteSeerX  2009-04-19 2007-11-19 
1998 application/pdf text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1520 http 
//www.cs.kun.nl/is/Library/./Data/1998/Lindgreen/FRISCO/1998-Lindgreen-FRISCO.pdf
 en Metadata may be used without restrictions as long as the oai identifier 
remains attached to it.
+39:oai CiteSeerXPSU 10.1.1.1.1521:Average performance of quasi Monte Carlo 
methods for global optimization:Hisham A. Al-Mharmah:2009-04-24 In this paper 
we compare the average performance of one class of low-discrepancy quasi-Monte 
Carlo sequences for global optimization. Weiner measure is assumed as the 
probability prior on all optimized functions. We show how to construct van der 
Corput sequences and we prove their consistency. Numerical experimentation 
shows that the van der Corput sequence in base 2 has a better average 
performance. CiteSeerX  2009-04-24 2007-11-19 1998 text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1521 http 
//www.informs-cs.org/wsc98papers/083.PDF en 10.1.1.22.679 Metadata may be used 
without restrictions as long as the oai identifier remains attached to it.
+40:oai CiteSeerXPSU 10.1.1.1.1522:The Virtual Ms Lyceum  A Consortium For 
Modeling And Simulation Technology:D. J. Medeiros E. F. Watson J. S. Carson M. 
S. Manivannan Steven D. Farr Alex F. Sisti:2009-04-19 This paper addresses the 
opportunity to put into place a virtual consortium for modeling and simulation. 
While periodic conferences such as the Winter Simulation Conference are 
tremendously vital to the continued growth of modeling and simulation research, 
they do not offer the day-to-day technical exchange that can now be made 
possible with matured collaborative technologies. CiteSeerX  2009-04-19 
2007-11-19 1998 text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1522 http 
//www.informs-cs.org/wsc98papers/228.PDF en Metadata may be used without 
restrictions as long as the oai identifier remains attached to it.
+41:oai CiteSeerXPSU 10.1.1.1.1523:Classification And Regression Trees, Cart - 
A User Manual For Identifying Indicators Of Vulnerability To Famine And Chronic 
Food Insecurity:Auser Manualfor Yisehac Yohannes Patrick Webb:2009-04-19 FAMINE 
AND CHRONIC FOOD INSECURITY YISE HAC YO HAN NES ue, the Netherlands, Norway, 
the Philippines, the Rockefeller Foundation, the Rural Industries Research and 
Development Corporation (Australia), South Africa, the Southern African 
Development Bank, Spain, Sweden, Switzerland, the United Kingdom, the United 
Nations Children's Fund, the United States, and the World Bank. CLASSIFIC ATION 
AND REGRESSION TREES, CART^TM  A USER MANUAL FOR IDENTIFYING INDIC A TORS OF 
VULNERABILITY TO FAMINE AND CHRONIC FOOD INSECURITY YISEHAC YOHANNES PATRICK 
WEBB MICROCOMPUTERS IN POLICY RESEARCH   INTERNATIONAL FOOD POLICY RESEARCH 
INSTITUTE  CART is a registered trademark of California Statistical Software, 
Inc. Copyright 1999 by the International Food Policy Research Inst
 itute 2033 K Street, N.W. Washington, D.C. 20006-1002 U.S.A. Library of 
Congress Cataloging-in-Publication Data available Yohannes, Yisehac 
Classification and Regression Trees, Cart^TM   A User Manual for Identifying 
Indicators of Vulnerability to Famine and Chronic Food Insecurity / Yise 
CiteSeerX  2009-04-19 2007-11-19 application/pdf text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1523 http 
//www.ifpri.org/pubs/microcom/micro3.pdf en Metadata may be used without 
restrictions as long as the oai identifier remains attached to it.
+42:oai CiteSeerXPSU 10.1.1.1.1524:An Approach for Locating Segmentation Points 
of Handwritten Digit Strings:Using Neural Network:2009-04-19 An approach for 
segmentation of handwritten touching numeral strings is presented in this 
paper. A neural network has been designed to deal with various types of 
touching observed frequently in numeral strings. A numeral string image is 
split into a number of line segments while stroke extraction is being performed 
and the segments are represented with straight lines. Four types of primitive 
are defined based on the lines and used for representing the numeral string in 
more abstractive way and extracting clues on touching information from the 
string. Potential segmentation points are located using the neural network by 
active interpretation of the features collected from the primitives. Also, the 
run-length coding scheme is employed for efficient representation and 
manipulation of images. On a test set collected from real mail pieces, the 
segmen
 tation accuracy of 89.1% was achieved, in image level, in a preliminary 
experiment. 1. CiteSeerX  2009-04-19 2007-11-19 application/pdf text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1524 http 
//www.csc.liv.ac.uk/%7Eprima/ICDAR2003/Papers/0025_697_kim_g.pdf en 
10.1.1.35.2218 10.1.1.44.7527 Metadata may be used without restrictions as long 
as the oai identifier remains attached to it.
+43:oai CiteSeerXPSU 10.1.1.1.1525:An Overview of JML Tools and 
Applications:Lilian Burdy Yoonsik Cheon David Cok Michael D. Ernst Joe Kiniry 
Gary T. Leavens K. Rustan M. Leino Erik Poll:2009-04-19 formal specification 
Java runtime assertion checking static checking The Java Modeling Language 
(JML) can be used to specify  the detailed design of Java classes and 
interfaces by adding annotations  to Java source files. The aim of JML is to 
provide a specification language  that is easy to use for Java programmers and 
that is supported by a wide  range of tools for specification type-checking, 
runtime debugging, static  analysis, and verification. CiteSeerX  2009-04-19 
2007-11-19 2003 application/pdf text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1525 http 
//www.gemplus.com/smart/r_d/publications/pdf/BCC_03jm.pdf en 10.1.1.137.4260 
10.1.1.39.1223 10.1.1.36.9943 10.1.1.29.6183 10.1.1.70.1745 10.1.1.11.2133 
10.1.1.17.3839 10.1.1.24.2555 10.1.1.34.8403 10.1.1.52.3873 10.1.1.
 10.4654 10.1.1.1.6063 10.1.1.16.1895 10.1.1.117.5270 10.1.1.132.7016 
10.1.1.1.6522 10.1.1.2.5030 10.1.1.16.800 10.1.1.10.547 10.1.1.13.5473 
10.1.1.15.9976 10.1.1.120.795 10.1.1.26.1982 10.1.1.17.1067 10.1.1.2.1207 
10.1.1.25.9636 10.1.1.5.8315 10.1.1.1.9075 10.1.1.39.2890 10.1.1.128.9986 
10.1.1.1.3304 10.1.1.10.8374 10.1.1.12.442 10.1.1.57.6725 10.1.1.29.9417 
10.1.1.5.9229 10.1.1.26.3231 10.1.1.20.6902 10.1.1.17.9620 10.1.1.72.3429 
10.1.1.11.8032 10.1.1.11.1854 10.1.1.19.7736 10.1.1.59.4118 10.1.1.11.2494 
10.1.1.13.4051 10.1.1.16.1105 10.1.1.19.2169 10.1.1.91.8343 10.1.1.85.6366 
10.1.1.103.1977 10.1.1.19.6416 10.1.1.81.714 10.1.1.4.6241 10.1.1.11.2133 
10.1.1.10.4654 10.1.1.115.5693 10.1.1.7.4458 10.1.1.5.8315 10.1.1.61.5186 
10.1.1.73.5717 10.1.1.57.6725 10.1.1.11.1838 10.1.1.142.2782 10.1.1.137.316 
10.1.1.129.1678 10.1.1.126.8052 10.1.1.131.2147 10.1.1.94.1164 10.1.1.83.3189 
10.1.1.11.2494 10.1.1.1.6054 10.1.1.142.6301 10.1.1.86.6061 10.1.1.94.7598 
10.1.1.122.2974 10.1.1.10.187 10.1.
 1.126.4427 10.1.1.128.5240 10.1.1.67.8455 10.1.1.131.6019 10.1.1.10.3303 
10.1.1.102.4611 10.1.1.59.4566 10.1.1.94.5189 10.1.1.7.2188 10.1.1.143.5200 
10.1.1.100.3930 10.1.1.111.4391 10.1.1.68.2636 10.1.1.79.7758 10.1.1.98.2224 
10.1.1.101.9229 10.1.1.59.4403 10.1.1.66.8607 10.1.1.71.6156 10.1.1.71.8962 
10.1.1.84.1342 10.1.1.89.8541 10.1.1.118.8269 10.1.1.107.6026 10.1.1.4.6869 
10.1.1.63.4449 10.1.1.64.1790 10.1.1.80.5390 10.1.1.90.757 10.1.1.98.8827 
10.1.1.127.2428 10.1.1.127.6051 10.1.1.138.5310 10.1.1.2.5369 10.1.1.4.3348 
10.1.1.61.7073 10.1.1.74.7926 10.1.1.76.6474 10.1.1.91.9916 10.1.1.97.8034 
10.1.1.98.2120 10.1.1.110.687 10.1.1.124.6567 10.1.1.142.3205 10.1.1.100.4344 
10.1.1.100.8097 10.1.1.100.9852 10.1.1.101.6814 10.1.1.102.5622 10.1.1.104.861 
10.1.1.105.5824 10.1.1.107.5138 10.1.1.59.6327 10.1.1.63.562 10.1.1.63.5758 
10.1.1.63.7483 10.1.1.64.6885 10.1.1.64.9362 10.1.1.62.3908 10.1.1.119.5350 
10.1.1.67.1499 10.1.1.67.5887 10.1.1.67.8572 10.1.1.69.2171 10.1.1.70.1165 
10.1.1.70.
 6538 10.1.1.71.1298 10.1.1.71.698 10.1.1.71.769 10.1.1.71.962 10.1.1.73.1567 
10.1.1.74.4934 10.1.1.74.7928 10.1.1.122.2332 10.1.1.76.3519 10.1.1.77.1867 
10.1.1.77.2580 10.1.1.77.4182 10.1.1.125.1768 10.1.1.78.7630 10.1.1.62.2614 
10.1.1.81.8303 10.1.1.84.3469 10.1.1.84.3675 10.1.1.84.6502 10.1.1.85.2476 
10.1.1.85.4887 10.1.1.87.5805 10.1.1.87.9527 10.1.1.89.2433 10.1.1.89.3328 
10.1.1.90.1517 10.1.1.90.2534 10.1.1.91.1298 10.1.1.92.1775 10.1.1.93.3743 
10.1.1.94.2013 10.1.1.94.7198 10.1.1.95.1658 10.1.1.95.2688 10.1.1.95.3548 
10.1.1.97.5430 10.1.1.98.6399 10.1.1.99.8561 10.1.1.111.4564 10.1.1.112.7809 
10.1.1.113.6155 10.1.1.113.7814 10.1.1.115.3770 10.1.1.116.5172 10.1.1.117.7484 
10.1.1.118.3171 10.1.1.118.3882 10.1.1.124.2718 10.1.1.124.8466 10.1.1.124.8516 
10.1.1.126.2574 10.1.1.126.3474 10.1.1.128.5756 10.1.1.130.5902 10.1.1.130.7155 
10.1.1.132.319 10.1.1.133.4597 10.1.1.135.7996 10.1.1.138.529 10.1.1.139.275 
10.1.1.139.4030 10.1.1.5.4720 10.1.1.58.8470 10.1.1.59.3381 10.1.1.61.4532
  10.1.1.140.1484 10.1.1.141.3512 10.1.1.142.4289 10.1.1.142.6329 
10.1.1.108.5722 10.1.1.144.1222 Metadata may be used without restrictions as 
long as the oai identifier remains attached to it.
+44:oai CiteSeerXPSU 10.1.1.1.1526:Triage  Performance Isolation and 
Differentiation for Storage Systems:Magnus Karlsson Christos Karamanolis 
Xiaoyun Zhu:2009-04-19 Ensuring performance isolation and differentiation among 
workloads that share a storage infrastructure is a basic requirement in 
consolidated data centers. Existing management tools rely on resource 
provisioning to meet performance goals  they require detailed knowledge of the 
system characteristics and the workloads. Provisioning is inherently slow to 
react to system and workload dynamics, and in the general case, it is 
impossible to provision for the worst case. CiteSeerX  2009-04-19 2007-11-19 
2004 application/pdf text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1526 http 
//www.hpl.hp.com/research/ssp/papers/2004-06-iwqos-triage.pdf en 10.1.1.16.8551 
10.1.1.114.7135 10.1.1.141.1 10.1.1.17.502 10.1.1.28.2128 10.1.1.26.662 
10.1.1.13.8238 10.1.1.23.3111 10.1.1.16.7583 10.1.1.17.2232 10.1.1.64.986 
10.1.1.65.8
 781 10.1.1.4.6982 10.1.1.19.1470 10.1.1.1.1904 10.1.1.14.8619 10.1.1.4.4818 
10.1.1.75.84 10.1.1.65.3456 10.1.1.129.3204 10.1.1.109.630 10.1.1.113.223 
10.1.1.72.2528 10.1.1.59.317 10.1.1.121.3572 10.1.1.119.1641 10.1.1.72.3158 
10.1.1.74.8799 10.1.1.79.9021 10.1.1.85.8116 10.1.1.135.7692 10.1.1.104.267 
10.1.1.107.2911 10.1.1.62.6629 10.1.1.64.5770 10.1.1.64.9860 10.1.1.65.1125 
10.1.1.67.1517 10.1.1.67.2395 10.1.1.72.374 10.1.1.79.5247 10.1.1.79.748 
10.1.1.81.5717 10.1.1.83.4762 10.1.1.84.3590 10.1.1.85.6390 10.1.1.89.1736 
10.1.1.89.2790 10.1.1.93.7577 10.1.1.94.3072 10.1.1.94.5062 10.1.1.111.7201 
10.1.1.113.4918 10.1.1.118.881 10.1.1.123.8174 10.1.1.133.38 10.1.1.134.9068 
10.1.1.136.8533 10.1.1.130.7318 Metadata may be used without restrictions as 
long as the oai identifier remains attached to it.
+45:oai CiteSeerXPSU 10.1.1.1.1527:On-line Handwritten Japanese Text 
Recognition free from Constrains on Line:Direction And Character Masaki 
Nakagawa Motoki Onuma:2009-04-19 This paper describes an on-line handwritten 
Japanese text recognition method that is liberated from constraints on writing 
direction (line direction) and character orientation. This method estimates the 
line direction and character orientation using the time sequence information of 
pen-tip coordinates and employs writingbox -free recognition with context 
processing combined. The method can cope with a mixture of vertical, horizontal 
and skewed lines with arbitrary character orientations. It is expected useful 
for tablet PC's, interactive electronic whiteboards and so on. CiteSeerX  
2009-04-19 2007-11-19 application/pdf text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1527 http 
//www.csc.liv.ac.uk/%7Eprima/ICDAR2003/Papers/0095_627_masaki_n.pdf en 
10.1.1.103.5812 Metadata may be used without restrict
 ions as long as the oai identifier remains attached to it.
+46:oai CiteSeerXPSU 10.1.1.1.1528:Data Transformation for Warehousing Web 
Data:Yan Zhu Christof Yan Zhu Christof Bornhövd Alejandro P. 
Buchmann:2009-04-19 In order to analyze market trends and make reasonable 
business plans, a company's local data is not sufficient. Decision making must 
also be based on information from suppliers, partners and competitors. This 
external data can be obtained from the Web in many cases, but must be 
integrated with the company's own data, for example, in a data warehouse. To 
this end, Web data has to be mapped to the star schema of the warehouse. In 
this paper we propose a semi-automatic approach to support this transformation 
process. Our approach is based on the use a rooted labeled tree representation 
of Web data and the existing warehouse schema. Based on this common view we can 
compare source and target schemata to identify correspondences. We show how the 
correspondences guide the transformation to be accomplished automatically. We 
also explain 
 the meaning of recursion and restructuring in mapping rules, which are the 
core of the transformation algorithm. CiteSeerX  2009-04-19 2007-11-19 2001 
application/pdf text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1528 http 
//www.cs.kun.nl/is/Library/./Data/2001/Zhu/Data/2001-Zhu-Data.pdf en 
10.1.1.122.4181 10.1.1.33.3465 10.1.1.25.1724 10.1.1.24.9229 Metadata may be 
used without restrictions as long as the oai identifier remains attached to it.
+47:oai CiteSeerXPSU 10.1.1.1.1529:Discriminant Projections Embedding for 
Nearest Neighbor Classification.:Petia Radeva And Petia Radeva Jordi Vitrià
:2009-04-19 In this paper we introduce a new embedding technique to  linearly 
project labeled data samples into a new space where the performance  of a 
Nearest Neighbor classifier is improved. The approach is  based on considering 
a large set of simple discriminant projections and  finding the subset with 
higher classification performance. In order to implement  the feature selection 
process we propose the use of the adaboost  algorithm. The performance of this 
technique is tested in a multiclass  classification problem related to the 
production of cork stoppers for wine  bottles. CiteSeerX Springer Verlag 
2009-04-19 2007-11-19 2004 application/pdf text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1529 http 
//www.cvc.uab.es/~jordi/ciarp2004.pdf en 10.1.1.99.3419 Metadata may be used 
without restrictions as long as the oai i
 dentifier remains attached to it.
+48:oai CiteSeerXPSU 10.1.1.1.1530:Vowel - Zero Alternations in Czech 
Prefixes:Tobias Scheer Tobias Scheer Clite E -e:2009-04-19 e inchoative, "up"   
 p#ed    16    48    "before, in front of"    roz    80    295    inch., 
"disperse/ break into pieces"    nad    5    33    "over"    pod    26    74    
"under"    od    41    253    distantiational movement    sum    195    762     
   TOTAL        957        (6) the secret must be found in the different status 
of stem-initial CC-clusters.    (7) stem-initial CCs observed with  a. 
prefixal-V only +e  b. prefixal - only -e  c. both mix     +e only  17 CCs -e 
only  38 CCs ct, dn, d#, jm, lstn, mk, pn, ps, rv, #v, sch, sr, v, tn, v#, z#, 
#r  bl, b#, cl, cv, #l, f#, fr, hl, hm, hv, chl, chrchl, km, kr, k#, kv, m#, 
mr, pl, pt, sh, sv, k, n, p, r, tl, tr, tv, vd, vr, zbr, zp, zt, #h, #m, ##, #v 
 mix  35 CCs br, #t, dm, dr, dv, hn, hr, h#, chv, jd, kd, kl, ml, mn, pj, pr, 
p#, sk, sl, sm, sn, sp, st, l, t, t#, v#, vl, v#, v, vz, zd, zl, zn, zv 
 TOTAL nb CC  90 (8) A given root belongs to one and only one of these three 
groups. (9)    CC mix represented by how many it CiteSeerX  2009-04-19 
2007-11-19 1998 application/pdf text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1530 http 
//www.unice.fr/dsl/tobweb/papers/ScheerHdtSzeged98.pdf en Metadata may be used 
without restrictions as long as the oai identifier remains attached to it.
+49:oai CiteSeerXPSU 10.1.1.1.1531:Automatic Construction of Navigable Concept 
Networks Characterizing Text Databases:Claudio Carpineto Giovanni Romano 
Fondazione Ugo Bordoni:2009-04-19 In this paper we present a comprehensive 
approach to conceptual structuring and intelligent navigation of text 
databases. Given any collection of texts, we first automatically extract a set 
of index terms describing each text. Next, we use a particular lattice 
conceptual clustering method to build a network of clustered texts whose nodes 
are described using the index terms. We argue that the resulting network 
supports an hybrid navigational approach to text retrieval - implemented into 
an actual user interface - that combines browsing potentials with good 
retrieval performance. We present the results of an experiment on subject 
searching where this approach outperformed a conventional Boolean retrieval 
system. CiteSeerX Springer-Verlag 2009-04-19 2007-11-19 1995 application/pdf 
text http //citeseerx.i
 st.psu.edu/viewdoc/summary?doi=10.1.1.1.1531 http 
//search.fub.it/claudio/pdf/AIIA1995.pdf en 10.1.1.21.1806 10.1.1.64.7424 
10.1.1.14.7549 10.1.1.26.1391 10.1.1.122.5391 10.1.1.1.4542 10.1.1.50.9283 
10.1.1.140.4388 10.1.1.70.980 10.1.1.72.9991 10.1.1.60.2145 Metadata may be 
used without restrictions as long as the oai identifier remains attached to it.
+50:oai CiteSeerXPSU 10.1.1.1.1532:Lawrence S. Brakmo, Deborah A. Wallach, Marc 
A. Viredaz:Mobile And Media Lawrence S. Brakmo Lawrence S. Brakmo Deborah A. 
Wallach Deborah A. Wallach Marc A. Viredaz Marc A. Viredaz:2009-04-19 Energy 
management has become one of the great challenges in portable computing. This 
is the result of the increasing energy requirements of modern portable devices 
without a corresponding increase in battery technology.  Sleep is a new energy 
reduction technique for handheld devices that is most effective when the 
handheld's processor is lightly loaded, such as when the user is reading a 
document or looking at a web page. When possible, rather than using the 
processor's idle mode, Sleep tries to put the processor in sleep mode for short 
periods (less than one second) without affecting the user's experience. To 
enhance the perception that the system is on, an image is maintained on the 
display and activity is resumed as a result of external events such as touch-
 screen and button activity. We have implemented Sleep on a prototype pocket 
computer, where it has reduced energy consumption by up to 60%. CiteSeerX  
2009-04-19 2007-11-19 2004 application/pdf text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1532 http 
//www.hpl.hp.com/techreports/2004/HPL-2004-11.pdf en 10.1.1.143.7417 
10.1.1.39.3266 10.1.1.121.5295 10.1.1.29.6746 10.1.1.31.4277 10.1.1.4.1582 
10.1.1.108.8205 10.1.1.36.2109 10.1.1.111.4810 10.1.1.134.8329 Metadata may be 
used without restrictions as long as the oai identifier remains attached to it.
+51:oai CiteSeerXPSU 10.1.1.1.1533:Answers to the Top Ten Input Modeling 
Questions:Bahar Biller Barry L. Nelson:2009-08-25 In this tutorial we provide 
answers to the top ten inputmodeling questions that new simulation users ask, 
point out common mistakes that occur and give relevant references. We assume 
that commercial input-modeling software will be used when possible, and only 
suggest non-commercial options when there is little else available. Detailed 
examples will be provided in the tutorial presentation. CiteSeerX  2009-08-25 
2007-11-19 2002 application/pdf text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1533 http 
//www.informs-cs.org/wsc02papers/005.pdf en 10.1.1.58.5325 10.1.1.105.5693 
10.1.1.107.780 Metadata may be used without restrictions as long as the oai 
identifier remains attached to it.
+52:oai CiteSeerXPSU 10.1.1.100.8780:Jaguar  Java in Next-Generation Database 
Systems:Johannes Gehrke Www Page:2008-07-01 •        Title Jaguar Java 
in Next-Generation Database Systems Keywords Extensibility query optimization 
heterogeneous environments database compression. Project Summary This project 
explores fundamental systems issues in query processing performance. We 
investigate this problem from three different directions  client-server 
processing, heterogeneous environments, and database compression. First, we 
devised new query processing strategies than push processing capabilities into 
the client, and we devised query execution plans that can span server and 
clients. This allows us to trade resource usage between client, server and the 
interconnection network. We then extended this work to parallel query 
processing in heterogeneous environments  we are currently implementing a 
parallel dataflow engine that adapts naturally to resource imbalances at the 
hardware co
 mponents. Last, we are investigating the use of compression in database 
systems. We devised a new framework for database compression and new query 
processing and query optimization strategies to integrate compression into a 
modern query processor. All our techniques have been implemented in the 
NSF-funded Cornell Predator object-relational database system. We extended the 
system with several ways to store compressed relations, and we implemented a 
fully compression-aware query optimizer. To best of our knowledge, our work is 
the first result on compression-aware query optimization. Publications and 
Products � Project homepage  CiteSeerX  2008-07-01 2008-04-02 application/pdf 
text http //citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.100.8780 http 
//itlab.uta.edu/idm01/FinalReports/reports/IDM01R048.pdf en 10.1.1.20.9548 
10.1.1.26.9191 Metadata may be used without restrictions as long as the oai 
identifier remains attached to it.
+53:oai CiteSeerXPSU 10.1.1.106.4689:Patterns for Next-Generation Database 
Systems IST-2001-33058 Recent Advances on Pattern Representation and 
Management:I. Ntoutsi (cti/piraeus A. Pikrakis G. Tsatsaronis (aueb E. Vrachnos 
Michalis Vazirgiannis Maria Halkidi Daniel A. Keim Irene Ntoutsi Aggelos 
Pikrakis Sergios Theodoridis Yannis Theodoridis George Tsatsaronis Euripides 
Vrachnos:2008-07-01 patterns data mining pattern modeling pattern-bases 
information retrieval Pattern Base Management Systems Research supported by the 
Commission of the European Communities under the Information CiteSeerX  
2008-07-01 2008-04-03 2003 application/pdf text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.106.4689 http 
//www.db-net.aueb.gr/gbt/publications/PANDA_TR-2003-04.pdf en 10.1.1.40.6757 
10.1.1.108.8490 10.1.1.33.3138 10.1.1.144.4956 10.1.1.42.3240 10.1.1.56.8772 
10.1.1.32.9565 10.1.1.50.5717 10.1.1.41.4883 10.1.1.105.8622 10.1.1.102.5562 
10.1.1.16.976 10.1.1.34.2745 10.1.1.7.6588 10.1.1.4
 4.8451 10.1.1.5.6904 Metadata may be used without restrictions as long as the 
oai identifier remains attached to it.
+54:oai CiteSeerXPSU 10.1.1.122.192:Query by Templates  Using the Shape of 
Information to Search Next-Generation Databases:Arijit Sengupta Andrew 
Dillon:2008-12-04 Abstract—We present a user-centered database query language 
called QBT (Query By Templates) for user communication with databases 
containing complex structured data, such as data stored in the Extensible 
Markup Language (XML). XML has revolutionized data storage as well as 
representation and transfer methods in today’s internet applications. The 
growing popularity of XML as a language for the representation of data has 
enabled its use for several applications involving storage, interchange, and 
retrieval of data. Several textual query languages have been proposed for XML 
retrieval, including the World Wide Web Consortium’s (W3C) recommendation of 
XQuery. Native XML database systems have been implemented, all of which provide 
methods for user communication with the database, although most communication 
methods use tex
 t-based query languages or form-based interfaces. QBT, the language presented 
here, is one of the first attempts toward a generalized alternative language 
that is based on human factors of familiarity. It is ideal for documents with a 
simple yet highly recognizable layout (e.g., poems, dictionaries, journals, 
etc.). We present the QBT language and report results from an initial usability 
test that shows promise for this type of an interface as a generalized 
user–database communication method. Index Terms—Complex structured data, 
Extensible Markup Language (XML), information shape, query evaluation, query 
languages, query processing, visual languages, XQuery. CiteSeerX  2008-12-04 
2008-12-03 application/pdf text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.122.192 http 
//www.ischool.utexas.edu/~adillon/Journals/IEEEJit.pdf en 10.1.1.109.4049 
10.1.1.11.6264 10.1.1.22.7172 10.1.1.33.1762 10.1.1.102.1564 10.1.1.35.4300 
10.1.1.20.7529 10.1.1.17.933 10.1.1.57.2983 10.1.1.17
 .4528 10.1.1.92.5486 10.1.1.110.6779 10.1.1.28.2863 10.1.1.105.3351 
10.1.1.2.8978 10.1.1.104.2288 Metadata may be used without restrictions as long 
as the oai identifier remains attached to it.
+55:oai CiteSeerXPSU 10.1.1.52.456:Security in Next-Generation Databases:Chris 
Strahorn:2009-04-12 this paper, a summary of the various models presented for 
securing next-generation databases will be given. Additionally, an overview of 
the security features in commercial next-generation databases is also given in 
order to show the need for further work in this field. 1 Introduction CiteSeerX 
 2009-04-12 2007-11-22 1998 application/postscript text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.52.456 http 
//www.db.cs.ucdavis.edu/teaching/289F/papers/chris.ps en Metadata may be used 
without restrictions as long as the oai identifier remains attached to it.
+56:oai CiteSeerXPSU 10.1.1.66.4692:Security in Next-Generation Databases:Chris 
Strahorn:2008-07-01 In the past several years, several new types of databases 
have moved out of the academic world and have been released as commercial 
products. These new types of databases are commonly referred to as 
next-generation databases and include object-oriented, object-relational, 
active, and deductive databases. Each of these types of database offer an 
extended set of features when compared to a traditional relational database. In 
turn, these new features require new methods in order to secure the data held 
within. In this paper, a summary of the various models presented for securing 
next-generation databases will be given. Additionally, an overview of the 
security features in commercial next-generation databases is also given in 
order to show the need for further work in this field. 1 CiteSeerX  2008-07-01 
2008-02-06 1998 application/pdf text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=1
 0.1.1.66.4692 http //www.db.cs.ucdavis.edu/teaching/289F/papers/chris.pdf en 
Metadata may be used without restrictions as long as the oai identifier remains 
attached to it.
+57:oai CiteSeerXPSU 10.1.1.78.1427:Java in Next-Generation Database 
Systems::2008-07-01 applications,  including database applications. CiteSeerX  
2008-07-01 2008-02-07 application/postscript text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.78.1427 http 
//www.cs.wisc.edu/~cao/WISP98/final-versions/praveen.ps en Metadata may be used 
without restrictions as long as the oai identifier remains attached to it.
+58:oai CiteSeerXPSU 10.1.1.1.1534:Proceedings of the 2002 Winter Simulation 
Conference:Ycesan Chen Snowdon E. Yücesan C. -h. Chen J. L. Snowdon J. M. 
Charnes Sang D. Choi Anil R. Kumar:2009-04-19 This paper discusses the initial 
efforts to implement simulation modeling as a visual management and analysis 
tool at an automotive foundry plant manufacturing engine blocks. The foundry 
process was modeled using Pro Model to identify bottlenecks and evaluate 
machine performance, cycle times and production data (total parts, rejects, 
throughput, products/hr) essential for efficient production control. Results 
from the current system identified assembly machine work area as the bottleneck 
(although utilization was greater than 95% for two assembly machines) resulting 
in high work-in-process (WIP) inventory level, low resource and machine 
utilization. Based on these results, optimum numbers were identified through 
use of scenarios by varying the number of assembly machines and processing tim
 e of each machine. In addition to these scenarios, strategies for production 
control involving buffer sizes were also made. CiteSeerX  2009-04-19 2007-11-19 
application/pdf text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1534 http 
//www.informs-cs.org/wsc02papers/138.pdf en Metadata may be used without 
restrictions as long as the oai identifier remains attached to it.
+59:oai CiteSeerXPSU 10.1.1.1.1535:A Sub-Quadratic Algorithm for Conjunctive 
and Disjunctive BESs:Jan Friso Groote Misa Keinänen:2009-04-19 We present an 
algorithm for conjunctive and disjunctive Boolean equation systems (BESs), 
which arise frequently in the verification and analysis of finite state 
concurrent systems. In contrast to the previously best known O(e ) time 
solutions, our algorithm computes the solution of such a fixpoint equation 
system with size e and alternation depth d in O(e log d) time. CiteSeerX  
2009-04-19 2007-11-19 2004 application/pdf text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1535 http 
//www.win.tue.nl/~jfg/articles/CSR-04-13.pdf en 10.1.1.58.4882 10.1.1.81.9591 
10.1.1.108.4288 10.1.1.140.2376 Metadata may be used without restrictions as 
long as the oai identifier remains attached to it.
+60:oai CiteSeerXPSU 10.1.1.1.1536:Innovations of the NetSolve Grid Computing 
System:Dorian C. Arnold Henri Casanova Jack Dongarra:2009-04-19 KEY WORDS Grid 
computing distributed computing heterogeneous network computing client--server 
This article is meant to provide the reader with details regarding the present 
state of the project, describing the current architecture of the system, its 
latest innovations and other systems 10  that make use of the NetSolve 
infrastructure. Copyright # 2002 John Wiley & Sons, Ltd CiteSeerX  2009-04-19 
2007-11-19 2002 application/pdf text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1536 http 
//icl.cs.utk.edu/news_pub/submissions/cpe678.pdf en 10.1.1.25.8254 
10.1.1.49.8881 10.1.1.32.6963 10.1.1.46.3287 10.1.1.15.9060 10.1.1.43.1259 
10.1.1.30.5246 10.1.1.27.3632 10.1.1.115.1390 10.1.1.107.4174 10.1.1.65.4741 
10.1.1.3.4994 Metadata may be used without restrictions as long as the oai 
identifier remains attached to it.
+61:oai CiteSeerXPSU 10.1.1.1.1537:The InfoVis Toolkist:Jean-daniel Fekete 
Jean-daniel Fekete Projet In-situ:2009-04-19 This report presents the InfoVis 
Toolkit, designed to support the creation,  extension and integration of 
advanced 2D Information Visualization components into interactive  Java Swing 
applications. The InfoVis Toolkit provides specific data structures to  achieve 
a fast action/feedback loop required by dynamic queries. It comes with a large  
set of components such as range sliders and tailored control panels required to 
control and  configure the visualizations. These components are integrated into 
a coherent framework  that simplifies the management of rich data structures 
and the design and extension of  visualizations. Supported data structures 
currently include tables, trees and graphs. Supported  visualizations include 
scatter plots, time series, Treemaps, node-link diagrams for  trees and graphs 
and adjacency matrix for graphs. All visualizations can use fishe
 ye lenses  and dynamic labeling. The InfoVis Toolkit supports hardware 
acceleration when available  through Agile2D, an implementation of the Java 
Graphics API based on OpenGL, achieving  speedups of 10 to 60 times. CiteSeerX  
2009-04-19 2007-11-19 2003 application/pdf text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1537 ftp 
//ftp.inria.fr/INRIA/publication/publi-pdf/RR/RR-4818.pdf en 10.1.1.123.805 
10.1.1.43.631 10.1.1.41.1810 10.1.1.56.8772 10.1.1.13.6859 10.1.1.20.9570 
10.1.1.58.2019 10.1.1.25.5975 10.1.1.111.2892 10.1.1.18.1023 Metadata may be 
used without restrictions as long as the oai identifier remains attached to it.
+62:oai CiteSeerXPSU 10.1.1.1.1538:Complex Systems Modeling:Christophe Lecerf 
Thi:2009-04-19 This paper addresses the simulation of the dynamics of complex 
systems by using hierarchical graph and multi-agent system. A complex system is 
composed of numerous interacting parts that can be described recursively. First 
we summarize the hierarchical aspect of the complex system. We then present a 
description of hierarchical graph as a data structure for structural modeling 
in parallel with dynamics simulation by agents. This method can be used by 
physiological modelers, ecological modelers, etc as well as in other domains 
that are considered as complex systems. An example issued from physiology will 
illustrate this approach. CiteSeerX  2009-04-19 2007-11-19 2003 application/pdf 
text http //citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1538 http 
//e-ifi.org/rivf/2003/proceedings/p93-98.pdf en 10.1.1.28.9248 10.1.1.4.6467 
Metadata may be used without restrictions as long as the oai iden
 tifier remains attached to it.
+63:oai CiteSeerXPSU 10.1.1.1.1539:Proceedings of the 2003 Winter Simulation 
Conference:Chick Snchez Ferrin S. Chick P. J. Sánchez D. Ferrin D. J. Morrice 
Gary Tan Na Zhao:2009-04-19 uses to deliver value to its customers. In today's 
competitive environment, the globalization of markets has rapidly substituted 
the traditional integrated business. The competitive success of an organization 
no longer depends only on its own efforts, but relies on the efficiency of the 
entire supply chain. Therefore, building an effective supply chain is fast 
becoming paramount in today's marketplace. Distributed Supply Chain (DSC) 
Simulation has been identified as one of the best means to test and analyze the 
performance of supply chains. The Generic Runtime Infrastructure for 
Distributed Simulation (GRIDS) is a middleware that supports the reuse and 
interoperation of DSC simulations. This paper reports the experience on 
employing the GRIDS to support the distributed collaboration of an automobile 
man
 ufacture supply chain simulation. Several advantages of GRIDS are also 
discussed here which make it an ideal middleware for DSC simulations. CiteSeerX 
 2009-04-19 2007-11-19 application/pdf text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1539 http 
//www.informs-cs.org/wsc03papers/142.pdf en Metadata may be used without 
restrictions as long as the oai identifier remains attached to it.
+64:oai CiteSeerXPSU 10.1.1.1.1540:Multi-dimensional Visual Representations for 
Underwater Environmental Uncertainty:Greg S. Schmidt Sue-Ling Chen Greg S. 
Schmidt Sue-ling Chen Aaron N. Bryden Mark A. Livingston Bryan R. Osborn 
Lawrence J. Rosenblum:2009-04-19 this paper) and (2) develop a visual method 
for each characterization. The mariner community needs enhanced 
characterizations of environmental uncertainty now, but the accuracy of the 
characterizations is still not sufficient enough and therefore formal user 
evaluations cannot take place at this point in development. We received 
feedback on the applicability of our techniques from domain experts. We used 
this in conjunction with previous results to compile a set of development 
guidelines (some obvious, others not) CiteSeerX  2009-04-19 2007-11-19 2004 
application/pdf text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1540 http 
//www.ait.nrl.navy.mil/vrlab/pages/../papers/j_IEEECGA04.pdf en 10.1.1.109.7470 
10.1.1.60.
 7349 10.1.1.125.6248 10.1.1.144.7725 Metadata may be used without restrictions 
as long as the oai identifier remains attached to it.
+65:oai CiteSeerXPSU 10.1.1.1.1541:InstantGrid  A Framework for On-Demand 
Grid:Point Construction Roy Roy S. C. Ho K. K. Yin David C. M. Lee Daniel H. F. 
Hung Cho-li Wang Francis C. M. Lau:2009-04-19 This paper proposes the 
InstantGrid framework for on-demand  construction of grid points. In contrast 
to traditional approaches, InstantGrid  is designed to substantially simplify 
software management in grid  systems, and is able to instantly turn any 
computer into a grid-ready  platform with the desired execution environment. 
Experimental results  demonstrate that a 256-node grid point with commodity 
grid middleware  can be constructed in five minutes from scratch. CiteSeerX  
2009-04-19 2007-11-19 2004 application/pdf text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1541 http 
//www.cs.hku.hk/~clwang/papers/InstantGrid-gcc2004-camera.pdf en 
10.1.1.114.2815 10.1.1.118.9332 Metadata may be used without restrictions as 
long as the oai identifier remains attached to it.
+66:oai CiteSeerXPSU 10.1.1.1.1542:Prototyping Proof Carrying Code:Martin 
Wildmoser Tobias Nipkow Gerwin Klein Sebastian Nanz:2009-04-19 We introduce a 
generic framework for proof carrying code, developed and mechanically verified 
in Isabelle/HOL. The framework defines and proves sound a verification 
condition generator with minimal assumptions on the underlying programming 
language, safety policy, and safety logic. We demonstrate its usability for 
prototyping proof carrying code systems by instantiating it to a simple 
assembly language with procedures and a safety policy for arithmetic overflow. 
CiteSeerX Kluwer 2009-04-19 2007-11-19 2004 application/pdf text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1542 http 
//www.doc.ic.ac.uk/~nanz/publications/./ppcc_tcs04.pdf en 10.1.1.40.2507 
10.1.1.24.6526 10.1.1.29.2076 10.1.1.40.7179 10.1.1.42.4453 10.1.1.43.6143 
10.1.1.103.6797 10.1.1.113.4649 10.1.1.11.9523 10.1.1.10.8649 10.1.1.84.1258 
10.1.1.35.532 10.1.1.129.5517 10.1.1
 .86.3296 10.1.1.7.139 10.1.1.83.9822 10.1.1.103.4133 10.1.1.106.1397 
10.1.1.65.5537 10.1.1.71.2795 10.1.1.123.3289 10.1.1.113.9340 10.1.1.132.1879 
Metadata may be used without restrictions as long as the oai identifier remains 
attached to it.
+67:oai CiteSeerXPSU 10.1.1.1.1543:Proceedings of the Block Island Workshop on 
Cooperative Control,:Springer-Verlag Series Lecture Wei Ren Al W. Beard Timothy 
W. Mclain:2009-04-19 this paper. Ref [15] addresses the knowledge consensus 
problem when teams of agents only have local communication between nearest 
neighbors. Since the set of nearest neighbors is constantly changing, the 
overall system becomes a hybrid system. The paper shows that if the union over 
all bidirectional communication graphs is connected for finite periods of time, 
then consensus is achieved. While the results in this paper are not as strong, 
only unidirectional communication links are assumed CiteSeerX Springer-Verlag 
2009-04-19 2007-11-19 2004 application/pdf text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1543 http 
//www.et.byu.edu/~wr25/./papers/preprints/bookchapters/RenBeardMcLain03.pdf en 
10.1.1.28.2247 10.1.1.10.4292 10.1.1.1.3664 10.1.1.72.7624 10.1.1.2.7148 
10.1.1.32.8694 10.1.1.4.8605 1
 0.1.1.15.1267 Metadata may be used without restrictions as long as the oai 
identifier remains attached to it.
+68:oai CiteSeerXPSU 10.1.1.1.1544:Hidden-Action in Multi-Hop Routing:Michal 
Feldman John Chuang:2009-04-19 In any multi-hop routing scheme, cooperation by 
the intermediate nodes are essential for the succesful delivery of traffic. 
However, the effort exerted by the intermediate nodes are often unobservable by 
the source and/or destination nodes. We show it is possible to overcome this 
problem of hidden action by designing contracts, in the form of payments, to 
induce cooperation from the intermediate nodes. Interestingly, the ability to 
monitor per-hop or per-path outcomes, even if costless to implement, may not 
improve the welfare of the participants or the performance of the network. 
CiteSeerX  2009-04-19 2007-11-19 2004 application/pdf text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1544 http 
//www.eecs.harvard.edu/p2pecon/confman/papers/s3p1.pdf en 10.1.1.105.3673 
10.1.1.19.8434 10.1.1.28.5987 10.1.1.21.4823 10.1.1.42.559 10.1.1.132.4609 
10.1.1.10.8652 10.1.1.11.4
 819 10.1.1.11.9831 10.1.1.19.1750 10.1.1.34.2032 10.1.1.113.7948 
10.1.1.11.8397 10.1.1.60.1810 10.1.1.4.1706 10.1.1.13.9006 10.1.1.119.7102 
10.1.1.14.1149 10.1.1.14.6620 10.1.1.10.7859 10.1.1.107.3061 10.1.1.119.8132 
10.1.1.106.6176 10.1.1.122.7182 10.1.1.123.5145 10.1.1.131.5662 10.1.1.135.2383 
Metadata may be used without restrictions as long as the oai identifier remains 
attached to it.
+69:oai CiteSeerXPSU 10.1.1.1.1545:EPTD DISCUSSION PAPER NO. 83 HOW 
AGRICULTURAL RESEARCH AFFECTS URBAN POVERTY IN DEVELOPING COUNTRIES  THE CASE 
OF CHINA:Shenggen Fan Cheng Fang Xiaobo Zhang:2009-04-19 developing countries 
China agricultural research urban poverty i ACKNOWLEDGMENTS This paper develops 
a framework to measure the impact of agricultural research on urban poverty. 
Increased investments in agricultural R&D can lower food prices by increasing 
food production, and lower food prices benefit the urban poor because they 
often spend more than 60% of their income on food. Application of the framework 
to China shows that these food price effects are large and that the benefits 
for the urban poor have been about as large as the benefits for the rural poor. 
KEYWORDS  developing countries, China, agricultural research, urban, poverty ii 
 ACKNOWLEDGMENTS The authors are grateful for helpful comments received from 
Peter Hazell, Robert Evanson and participants in a session at the Amer
 ican Agricultural Economics Association annual meeting in Chicago, August 5-8, 
2001. iii  TABLE OF CONTENTS 1. CiteSeerX  2009-04-19 2007-11-19 
application/pdf text http 
//citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1545 http 
//www.ifpri.org/divs/eptd/dp/papers/eptdp83.pdf en 10.1.1.144.9394 
10.1.1.1.3288 10.1.1.58.6199 10.1.1.58.3593 10.1.1.31.1619 10.1.1.58.2714 
10.1.1.58.2531 Metadata may be used without restrictions as long as the oai 
identifier remains attached to it.
+70:oai CiteSeerXPSU 10.1.1.1.1546:Ontology-Based Query Refinement:For 
Multimedia Meta Sonja Zillner Werner Winiwarter:2009-04-19 To enable e#cient 
access to multimedia content, the media data has to be augmented by semantic 
metadata and functionality. The semantic representation has to be integrated 
with domain ontologies to fully exploit domain-specific knowledge. This 
knowledge can be used for refining ambiguous user queries by closing the 
conceptual gap between the user and the information to be retrieved. In our 
previous research, we have introduced Enhanced Multimedia Meta Objects (EMMOs) 
as a new approach for semantic multimedia meta modeling, as well as the query 
algebra EMMA, which is 

<TRUNCATED>

Reply via email to