4,921 research outputs found
Proof Nets and the Complexity of Processing Center-Embedded Constructions
This paper shows how proof nets can be used to formalize the notion of
``incomplete dependency'' used in psycholinguistic theories of the
unacceptability of center-embedded constructions. Such theories of human
language processing can usually be restated in terms of geometrical constraints
on proof nets. The paper ends with a discussion of the relationship between
these constraints and incremental semantic interpretation.Comment: To appear in Proceedings of LACL 95; uses epic.sty, eepic.sty,
rotate.st
On Geometric Alignment in Low Doubling Dimension
In real-world, many problems can be formulated as the alignment between two
geometric patterns. Previously, a great amount of research focus on the
alignment of 2D or 3D patterns, especially in the field of computer vision.
Recently, the alignment of geometric patterns in high dimension finds several
novel applications, and has attracted more and more attentions. However, the
research is still rather limited in terms of algorithms. To the best of our
knowledge, most existing approaches for high dimensional alignment are just
simple extensions of their counterparts for 2D and 3D cases, and often suffer
from the issues such as high complexities. In this paper, we propose an
effective framework to compress the high dimensional geometric patterns and
approximately preserve the alignment quality. As a consequence, existing
alignment approach can be applied to the compressed geometric patterns and thus
the time complexity is significantly reduced. Our idea is inspired by the
observation that high dimensional data often has a low intrinsic dimension. We
adopt the widely used notion "doubling dimension" to measure the extents of our
compression and the resulting approximation. Finally, we test our method on
both random and real datasets, the experimental results reveal that running the
alignment algorithm on compressed patterns can achieve similar qualities,
comparing with the results on the original patterns, but the running times
(including the times cost for compression) are substantially lower
Edge Routing with Ordered Bundles
Edge bundling reduces the visual clutter in a drawing of a graph by uniting
the edges into bundles. We propose a method of edge bundling drawing each edge
of a bundle separately as in metro-maps and call our method ordered bundles. To
produce aesthetically looking edge routes it minimizes a cost function on the
edges. The cost function depends on the ink, required to draw the edges, the
edge lengths, widths and separations. The cost also penalizes for too many
edges passing through narrow channels by using the constrained Delaunay
triangulation. The method avoids unnecessary edge-node and edge-edge crossings.
To draw edges with the minimal number of crossings and separately within the
same bundle we develop an efficient algorithm solving a variant of the
metro-line crossing minimization problem. In general, the method creates clear
and smooth edge routes giving an overview of the global graph structure, while
still drawing each edge separately and thus enabling local analysis
A Survey on Continuous Time Computations
We provide an overview of theories of continuous time computation. These
theories allow us to understand both the hardness of questions related to
continuous time dynamical systems and the computational power of continuous
time analog models. We survey the existing models, summarizing results, and
point to relevant references in the literature
Separation of Circulating Tokens
Self-stabilizing distributed control is often modeled by token abstractions.
A system with a single token may implement mutual exclusion; a system with
multiple tokens may ensure that immediate neighbors do not simultaneously enjoy
a privilege. For a cyber-physical system, tokens may represent physical objects
whose movement is controlled. The problem studied in this paper is to ensure
that a synchronous system with m circulating tokens has at least d distance
between tokens. This problem is first considered in a ring where d is given
whilst m and the ring size n are unknown. The protocol solving this problem can
be uniform, with all processes running the same program, or it can be
non-uniform, with some processes acting only as token relays. The protocol for
this first problem is simple, and can be expressed with Petri net formalism. A
second problem is to maximize d when m is given, and n is unknown. For the
second problem, the paper presents a non-uniform protocol with a single
corrective process.Comment: 22 pages, 7 figures, epsf and pstricks in LaTe
- …