leff@smu.UUCP (Laurence Leff) (04/20/88)
Hello again, I promised to send you this list a few days ago. I have been trying to find a way to send this to you in BIB format, but alas our programming staff is very busy at this time. I normally use Microsoft WORD on my Macintosh Plus for all desk publishing items such as this list. I can easily take my electronic UNIX data and telenet it into my Macintosh programs, however, it seems impossible to take the data off WORD and ship it back to UNIX. As I would like to send you our most updated version twice a year, it behooves me to find a systematic way to format this data into BIB style. For now, however, I am sending you the only UNIX file version of this data that I have. It is set in "vi" commands and can be "nroff"ed to visually eliminate the dot commands. Some of the equations in the abstracts will not come out right, but it's the best I can do for now. If you have any questions or suggestions, I'd like to hear them. Thanks, jennifer p.s. Am I automatically put on the user list for REFER/BIB? .op .nf .po 2cm .sz 8 .vs 12 .he''%'' .ll 7i .nr fi 0 .EQ delim $$ define prime '"\s10\aa\s0"' .gsize 10 .EN .ps 14 .ce 8 University of California, Santa Cruz Computer Research Laboratory Baskin Center for Computer Engineering & Information Sciences 225 Applied Science Building Santa Cruz, CA 95064 -PLEASE MAKE CHECK PAYABLE TO THE U.C.REGENTS- .ps 8 .nf \fBUCSC-CRL-86-2 OCCAM's RAZOR\fR Anselm Blumer, Andrzej Ehrenfeucht David Haussler, Manfred Warmuth February, 1986 5 pages ($1.00) .fi \fBABSTRACT:\fR We show that a polynomial learning algorithm, as defined in [5], is obtained whenever there exists a polynomial-time method of producing, for any sequence of observations, a nearly minimum hypothesis that is consistent with these observations. .nf \fBUCSC-CRL-86-3 FORMALIZATION OF REASONING IN JUDICIAL EXPERT SYSTEMS THROUGH DEONTIC LOGIC\fR Mohyeldin Said, K. February, 1986 13 pages ($2.00) .fi \fBABSTRACT:\fR Deontic logic is the logic of normative systems. It deals with the logical relationships between the principles governing the concepts of obligation and permission. Hence it can be used in juridistic and legal-advice expert systems as a formalization of the reasoning process. I consider various axiomatizations of deontic logics and their relational semantics as based on possible worlds, in addition to their use in expert systems. .nf \fBUCSC-CRL-86-4 VIRYA-A MOTION CONTROL EDITOR FOR KINEMATIC AND DYNAMIC ANIMATION\fR Jane Wilhelms April, 1986 13 pages ($2.00) .fi \fBABSTRACT:\fR \fIVirya\fR is an interactive graphical motion control editor for kinematic and dynamic animation. Most animation is controlled \fIkinematically\fR, by designating objects' positions taken over time without consideration for the causes of the motion. An alternative is \fIdynamic\fR motion control, where objects are seen as masses moving under the influence of forces and torques. Dynamic motion control has some advantages in that motion more naturally simulates real world conditions and many complex motions can be automatically calculated, though calculating motion is quite expensive and control is sometimes less intuitive. The editor \fIVirya\fR works both for kinematic and dynamic motion control. It has two main tasks: to specify \fIcontrol functions\fR representing positions (kinematic) or forces and torques (dynamic) controlling motion, and to specify \fIcontrol modes\fR which designate how control functions are interpreted or whether joints are frozen in place, relaxed, or balanced. Using these control modes, the user can designate motion using a convenient kinematic method and still use dynamic analysis as a final step to constrain and add realism. \fIKEYWORDS\fR: computer animation, human modeling, dynamics, simulation .bp .nf \fBUCSC-CRL-86-6 OPTIMAL ALGORITHMS FOR SOLVING A SYSTEM OF LINEAR EQUATIONS WITH THE CONSECUTIVE-ONES PROPERTY\fR Don Hatch, Manfred K. Warmuth April, 1986 12 pages ($2.00) .fi \fBABSTRACT:\fR A matrix has the \fIconsecutive ones\fP property \fIfor rows\fP (resp. \fIcolumns\fP) if all elements are either zero or one, and there is at most one sequence of consecutive ones in any row (resp. column). We show that a system of linear equations .ce 2 .ft B A x = b .ft $ ~~n times n~~n times 1~~~n x 1 $ can be solved in $ O~( n ) $ time, if .ft B A .ft is a consecutive-ones matrix of either type. The vector .ft B b .ft is allowed to contain arbitrary real numbers. .nf \fBUCSC-CRL-86-7 THE RENYI REDUNDANCY OF GENERALIZED HUFFMAN CODES\fP Anselm Blumer, Robert J. McEliece April, 1986 13 pages ($2.00) .fi \fBABSTRACT:\fR If optimality is measured by average codeword length, Huffman's algorithm gives optimal codes, and the redundancy can be measured as the difference between the average codeword length and Shannon's entropy. If the objective function is replaced by an exponentially weighted average, then a simple modification of Huffman's algorithm gives optimal codes. The redundancy can now be measured as the difference between this new average and Renyi's generalization of Shannon's entropy. This paper provides a new proof of Kricevski's results on the redundancy of Huffman codes, and generalizes these results to the Renyi case. These results are also related to Gallager's bounds on the redundancy of Huffman codes. .nf \fBUCSC-CRL-86-8 MINIMAX UNIVERSAL NOISELESS CODING FOR UNIFILAR AND MARKOV SOURCES\fR Anselm Blumer April, 1986 9 pages ($1.00) .fi \fBABSTRACT:\fR Constructive upper bounds are presented for minimax universal noiseless coding of unifilar sources without any ergodicity assumptions. These bounds are obtained by quantizing the estimated probability distribution of source letters with respect to the relative entropy. They apply both to fixed-length to variable-length (FV) and variable-length to fixed-length (VF) codes. Unifilar sources are a generalization of the usual definition of Markov sources, so these results apply to Markov sources as well. These upper bounds agree asymptotically with the lower bounds given by Davisson for FV coding of stationary ergodic Markov sources. .bp .nf \fBUCSC-CRL-86-9 A FAST ALGORITHM FOR MULTIPROCESSOR SCHEDULING OF UNIT-LENGTH JOBS\fR Barbara Simons, Manfred K. Warmuth April, 1986 35 pages ($4.00) .fi \fBABSTRACT:\fR We present an efficient polynomial time algorithm for the problem of scheduling n unit length jobs with rational release times and deadlines on m identical parallel machines. By doing preprocessing before the jobs are actually scheduled, we obtain a running time of $ roman O~( mn sup 2 ) $, which is an improvement over the previous best running time of $ roman O~( n sup 3~log~log~n ) $. We also present new NP-completeness result for two closely related problems. .nf \fBUCSC-CRL-86-10 THE CONSTRUCTION OF HEURISTIC FUNCTIONS\fR George Politowski April, 1986 14 pages ($2.00) .fi \fBABSTRACT:\fR It is well established in heuristic search theory that there is a strong connection between the accuracy of the heuristic used to guide a search and the resulting search efficiency [Pearl 84]. This suggests that the formulation of heuristics is one of the most crucial areas in the application of heuristic search. Despite this there has been little research to establish a methodology for discovering and refining heuristics. Our current work addresses this problem by developing a theory of parameter-based heuristic functions. In this theory the heuristic function is represented as an explicit table of feature vectors and their corresponding heuristic values. We show under what conditions the addition of parameters can never worsen the performance of such a heuristic. We also suggest a simple method whereby interaction with a search system can facilitate the discovery of useful parameters or features. With these methods we have constructed a heuristic for the 15-puzzle that is superior to anything reported in the literature. We have also constructed what we believe to be the first successful distance-estimating heuristic for the 2x2x2 Rubik's cube. The latter was accomplished despite the fact that we ourselves are not adept at solving the puzzle. .sp .nf \fBUCSC-CRL-86-11 ONLINE CONSTRUCTION OF A COMPLETE INVERTED FILE\fR J. Blume, A. Blumer April, 1986 21 pages ($3.00) .fi \fBABSTRACT:\fR The compact Directed Acyclic Word Graph (DAWG) can be used to implement a complete inverted file, and thus to find, in optimal time, the locations and number of occurrences of any string occurring in a set of texts. The compact DAWG can be built in linear time [Blu 86], but this requires a postprocessing phase, so that further texts cannot be added efficiently. This paper presents an algorithm which builds the compact DAWG on-line in $O(n~log~n)$ time, where $n$ denotes the total length of all the texts. This combination of features gives the compact DAWG an advantage over other data structures, such as PATRICIA trees, compact position trees, or suffix trees, which could be used to implement a complete inverted file. .bp .nf \fBUCSC-CRL-86-12 A TRANSFORM THEORY FOR A CLASS OF GROUP-INVARIANT CODES\fR R. Michael Tanner September, 1987 (Revised) 45 pages ($4.00) .fi \fBABSTRACT:\fR A binary cyclic code of length $n$ can be defined by a set of parity-check equations that is invariant under the cyclic additive group of permutations generated by $ A:i -> ~i+1 ~mod~n $. This group-invariance permits the parity-check equations to be transformed to a set of equivalent equations over an extension field. A general theorem shows that any set of equations that is invariant under the action of a group that can be represented by a linear permutation group on some extension field can be similarly transformed. The application of the theorem focuses on a class of codes that have parity-check equations invariant under the group generated by a subgroup of A and a subgroup of the multiplicative group $ M:i -> 2 sup k i $. Generally these codes are quasi-cylic rather than cyclic and are organized into multiple shorter cycles. The Fourier transform transforms the action of the additive group, and a $linearized ~ polynomial ~ transform $ transforms the action of the multiplicative group. The form of the transformed code equations permits a BCH-like bound on the minimum distance of the code. The techniques are illustrated by the construction of several codes that are decodable by the Berlekamp-Massey algorithm and that have parameters that approach or surpass those of the best codes listed in [13]. .nf \fBUCSC-CRL-86-13 TOWARDS AUTOMATIC MOTION CONTROL\fR Jane Wilhelms June, 1986 23 pages ($3.00) .fi \fBABSTRACT:\fR Motion control for computer animation is a rich area for new research. The trend toward greater complexity animation makes the development of more convenient and automatic methods of motion control important. Most commonly used motion control methods, such as keyframing and scripts, require a great deal of user effort to design acceptable animations. More automatic methods of motion control will allow the production of sophisticated animation with less user effort. Automatic methods worth investigating include dynamic analysis, path planning and collision avoidance, stimulus-response control, and learning algorithms. .nf \fBUCSC-CRL-86-14 USING DYNAMIC ANALYSIS FOR REALISTIC ANIMATION OF ARTICULATED BODIES\fR Jane Wilhelms June, 1986 46 pages ($4.00) .fi \fBABSTRACT:\fR A major problem in computer animation is creating motion that appears natural and realistic, particularly in the case of complex articulated bodies such as humans and other animals. At present, truly lifelike motion is produced mainly by copying recorded images, a tedious and lengthy process requiring considerable external equipment. An alternative that is explored here is the use of \fIdynamic analysis\fR to predict realistic motion. Using dynamic motion control, bodies are treated as masses acting under the influence of external and internal forces and torques. Dynamic control is advantageous because motion is more naturally restricted to physically-realizable patterns, and many types of motion can be automatically predicted. Use of dynamics suffers from problems of computational cost and the difficulty of specifying controlling forces and torques. However, evidence has accumulated that dynamics does offer hope for more realistic, natural, and automatic motion control. Because such motion simulates real world conditions, an animation system using dynamic analysis is also a useful tool in such related fields as robotics and biomechanics. .bp .nf \fBUCSC-CRL-86-15 Joint and LPA*: COMBINATION OF APPROXIMATION AND SEARCH\fR Daniel Ratner Ira Pohl June, 1986 14 pages ($2.00) .fi \fBABSTRACT:\fR This paper describes two new algorithms, Joint and LPA*, which can be used to solve difficult combinatorial problems heuristically. The algorithms find reasonably short solution paths and are very fast. The algorithms work in polynomial time in the length of the solution. The algorithms have been benchmarked on the 15-$ puzzle $, whose generalization has recently been shown to be NP hard, and outperform other known methods within this context. .nf \fBUCSC-CRL-86-16 $ N times N $ - PUZZLE and RELATED RELOCATION PROBLEM\fR Daniel Ratner, Manfred Warmuth ($4.00) .fi \fBABSTRACT:\fR The 8-puzzle and the 15-puzzle have been used for many years as a domain for testing heuristic search techniques. From experience it is known that these puzzles are "difficult" and therefore useful for testing search techniques. In this paper we give strong evidence that these puzzles are indeed good test problems. We extend the 8-puzzle and the 15-puzzle to an $ n times n $ board and show that finding a shortest solution for the extended puzzle is NP-hard and thus computationally infeasible. We also present an approximation algorithm for transforming boards that is guaranteed to use no more than $ c~cdot~L~( SP ) $ moves, where $ L~( SP ) $ is the length of a shortest solution and $ c $ is a constant which is independent of the given boards and their size $ n $. The studied puzzles are instances of planar relocation problems where the reachability question is polynomial but efficient relocation is NP-hard. These problems are natural robotics problems: a robot needs to efficiently relocate packages in the plane. Our research opens the study of polynomial approximation algorithms for problems of this type. .nf \fBUCSC-CRL-86-17 REGISTER ALLOCATION VIA TWO COLORED PEBBLING\fR Ashfaq A. Munshi, Karl M. Schimpf July, 1986 13 pages ($2.00) .fi \fBABSTRACT:\fR We present a new polynomial time heuristic for register allocation that does more than just allocation. It performs optimizations, via code motion, along with generating the allocation. We partition the allocation problem into two subproblems -- local and global. The local allocation problem, that of allocating registers for basic blocks, is viewed as a pebble game played on graphs where one type of pebble registers while another type represents memory locations. Using this approach we are able to give a heuristic that is independent of the textual ordering of the code and is intelligent in its choice of spilling computations. The heuristic depends only on the data dependences present in the program. The global allocation problem, that of integrating the local allocations to yield a global allocation, is performed by examining the flow graph of the program and propagating local information appropriately. We provide a comparison of our heuristic against Chaitin's graph coloring scheme on a set of computation benchmarks known as the Lawrence Livermore Loops. It can be concluded from the data that our heuristic technique is superior to Chaitin's when the number of available registers is small. As the number of registers increases, the two approaches give virtually identical results. .bp .nf \fBUCSC-CRL-86-18 A UNIFYING MODEL FOR LOOK-AHEAD LR PARSING\fR Manuel E. Bermudez, Karl M. Schimpf August, 1986 10 pages ($1.00) .fi \fBABSTRACT\fR We present a construction method for look-ahead LR parsers, that unifies many of the construction algorithms available in the literature, and describes them with a single notation. The model allows single, multiple and arbitrary symbol look-ahead. The construction method is based on three user-supplied parameters; specific settings for these parameters yield well-known grammar classes such as $ LALR ( k )^,~SLR ( k ) $, and certain subsets of the $ LR - Regular $ class, among others. The three parameters also serve to illustrate trade-offs between parsing power and construction termination. The model captures the essence of the problem of computing look-ahead for LR parsers, and provides a better understanding of the relationships among these classes. .nf \fBUCSC-CRL-86-19 AN APPROXIMATION METHOD FOR TANDEM QUEUES WITH BLOCKING\fR Alexandre Brandwajn, Yung-Li Lily Jow September, 1986 37 pages ($4.00) .fi \fBABSTRACT:\fR In this paper, we propose an approximate analysis of open systems of tandem queues with blocking caused by finite buffers between servers. Our approach relies on the use of marginal probability distributions ("state equivalence") coupled with an approximate evaluation of the conditional probabilities introduced through the equivalence. The method iterates over consecutive parts of servers using the solution of a two queue system as a building block. It produces performance measures for individual servers as well as an approximation to joint queue length probability distributions for pairs of neighboring stations. Experience seems to indicate that the number of iterations required grows moderately with the number of nodes in the network. Examples are given to demonstrate the accuracy and the convergence properties of the proposed approximation. Subject Classification - #683 Approximate Solution - #703 Open Tandem Queues .nf \fBUCSC-CRL-86-20 A PROPOSED TOOL FOR PARALLEL PROGRAMMING MULTIPLE 3081/E's\fR Brian F. Hanks, Charles E. McDowell July, 1986 11 pages ($2.00) .fi \fBABSTRACT:\fR In an effort to make use of the parallelism available with the addition of one or more 3081/E's to the UCSC-CRL IBM 4381 system, it would be desirable to extend the FORTRAN language with constructs for task creation, synchronization, and communication. These extensions will make the 3081/E more accessible to the user community, as well as improve the portability of programs written using the system. This will make it possible for the user to write a program using only the parallel extensions, without having to worry about the low level details of the 3081/E. This report will describe how a small set of primitives can be translated using a preprocessor into standard FORTRAN with calls to existing routines for communication with the 3081/E. In addition some problems resulting from the star topology of the system and the inability of a 3081/E to interrupt the 4381 will be discussed. .bp .nf \fBUCSC-CRL-86-21 A PRACTICAL ARBITRARY LOOK-AHEAD LR PARSING TECHNIQUE\fR Manuel E. Bermudez, Karl M. Schimpf September, 1986 10 pages ($1.00) .fi \fBABSTRACT:\fR We present a practical technique that provides an $ LR $ (0) parser with either fixed or arbitrary look-ahead. The construction algorithm is based on certain paths in the $ LR $ (0) state diagram, which must be restricted to a maximum length $ m $. The technique determines the amount of look-ahead required, and the user is spared the task of guessing it. Instead, the user provides $ m $. In situations where single symbol look-ahead is sufficient, the corresponding grammar class (called $ LAR~( m ) $) is identical to the $ NQLALR $ (1) class. For practical grammars that require arbitrary look-ahead, the storage requirements typically do not exceed an amount linear in the size of the corresponding $ LR $ (0) parser. The technique is shown to work for a practical programming language grammar, and has been used to solve particular cases of the PL/1 keyword problem. .nf \fBUCSC-CRL-86-22 EPSILON-NETS AND SIMPLEX RANGE QUERIES\fR David Haussler, Emo Welzl July, 1986 34 pages ($4.00) .fi \fBABSTRACT:\fR We demonstrate the existence of data structures for half-space and simplex range queries on finite point sets in $ d - $dimensional space, $ d~\(>=~2 $, with linear storage and $ O~( n sup alpha ) $ query time, $ alpha~=~{ d ( d - 1 ) } over { d ( d - 1 )~+~1 }~+~gamma $, for all $ gamma > 0 $. These bounds are better than those previously published for all $ d \(>= $ 2. Based on ideas due to Vapnik and Chervonenkis, we introduce the concept of an $ epsilon - roman net $ of a set of points for an abstract set of ranges and give sufficient conditions that a random sample is an $ epsilon - roman net $ with any desired probability. Using these results, we demonstrate how random samples can be used to build a partition-tree structure that achieves the above query time. \fB Keywords:\fR range search, Vapnik-Chervonenkis classes, random sampling .nf \fBUCSC-CRL-86-23 SCATTERED DATA APPROXIMATION BASED ON DELAUNAY TESSELLATION\fR Kyoya Tsutsui September, 1986 63 pages ($4.00) .fi \fBABSTRACT:\fR A solution for the problem of approximating a data distribution based on time varying data measured at scattered points in three-dimensional space is presented. The solution method tessellates the whole space with Delaunay tetrahedra using only recent data points. Reliability and efficiency of the solution method are analyzed. A stochastic, Poisson model is presented to describe the distribution of data points in space and time. An error bound analysis of the Delaunay tessellation approximation scheme is presented. Two algorithms, for incremental addition and incremental deletion of a data node, are described. Experimental results are illustrated by exhibits of contour surfaces computed upon a space that has been tessellated from pseudo-random data. .bp .nf \fBUCSC-CRL-86-24 ON THE (NON) RELATIONSHIP BETWEEN SLR(1) AND NQLALR(1) GRAMMARS\fR Manuel E. Bermudez, Karl M. Schimpf October, 1986 5 pages ($1.00) .fi \fBABSTRACT:\fR A popular but "not-quite" correct technique for computing LALR(1) look-ahead sets has been formalized by DeRemer and Pennello, and dubbed NQLALR(1). They also claim that the class of SLR(1) grammars is a subset of the class of NQLALR(1) grammars. We prove here that no such relationship exists between those two classes. We do so with a counterexample that, ironically, appeared in DeRemer and Pennello's own paper. .nf \fBUCSC-CRL-86-25 QUANTIFYING INDUCTIVE BIAS IN CONCEPT LEARNING\fR David Haussler November, 1986 37 pages ($4.00) .fi \fBABSTRACT:\fR We show that the notion of bias in inductive concept learning can be quantified in a way that directly relates to learning performance, and that this quantitative theory of bias can provide guidance in the design of effective learning algorithms. We apply this idea by measuring some common language biases, including restriction to conjunctive concepts, conjunctive concepts with internal disjunction and $k$-DNF concepts, and guided by these measurements, develop learning algorithms for these classes of concepts that have provably good convergence properties. .nf \fBUCSC-CRL-86-26 A MODEL OF CACHED I/O\FR \fRAlexandre Brandwajn October, 1986 19 pages ($2.00) .fi \fBABSTRACT:\fR This study deals with analytical modelling of path contention in a cached disk controller. To present cache hits and disk accesses, we propose a model of "wait and rejection" as an extension of the loss-system model applied in the literature to non-cached I/O. We present a simple solution of such a model using the technique of state aggregation (equivalence and decomposition). The model produces an estimate of the average path wait and of the probability of an RPS miss. A simple method is proposed for the estimation of device queueing whereby path waits are included as part of the I/O service time. The expected queueing time for device availability is obtained by viewing the device as an M/G/1 queue with a coefficient of variation estimated from the components of the device busy time. A comparison of model results with those of discrete-event simulations indicates that the accuracy is generally fair with a tendency, under higher loads, to underestimate the device queueing. Needed model improvements are proposed for high device utilizations with very high read hit ratios. .bp .nf \fBUCSC-CRL-86-27 A NEW DISTANCE METRIC ON STRINGS COMPUTABLE IN LINEAR TIME\fR Andrzej Ehrenfeucht, David Haussler October, 1986 11 pages ($2.00) .fi \fBABSTRACT:\fR We describe a new metric for sequence comparison that emphasizes global similarity over sequential matching at the local level. It has the advantage over the Levenshtein metric that strings of lengths $ n $ and $ m $ can be compared in time proportional to $ n~+~m $ instead of $ nm $. Various mathematical properties of the metric are established. \fBKeywords:\fR sequence comparison, string matching, partial match, distance metric, clustering, text processing, editing, spelling correction .nf \fBUCSC-CRL-86-28 QUASI-MONOTONIC SEQUENCES: Theory, Algorithms and Application\fR A. Ehrenfeucht, J. Haemer, David Haussler November, 1986 20 pages ($2.00) .fi \fBABSTRACT:\fR We present a simple algebraic theory which allows us to solve a variety of combinatorial problems, including the problem of finding convex hulls in two dimensions, the "Trip Around the Moon" problem, a version of the ballot problem, and the problem of enumerating and randomly generating ordered trees of a given size. Individual problems are solved by applying general algorithms and theorems developed within this algebraic theory. .nf \fBUCSC-CRL-87-1 LEARNING CONJUNCTIVE CONCEPTS IN STRUCTURAL DOMAINS\fR David Haussler February, 1987 27 pages ($3.00) .fi \fBABSTRACT:\fR We study the problem of learning conjunctive concepts from examples on structural domains like the blocks world. This class of concepts is formally defined and it is shown that even for samples in which each example (positive or negative) is a two-object scene it is NP-complete to determine if there is any concept in this class that is consistent with the sample. We demonstrate how this result affects the feasibility of Mitchell's version space approach and how it shows that it is unlikely that this class of concepts is polynomially learnable from random examples in the sense of Valiant. On the other hand, we show that this class is polynomially learnable in the sense of Valiant for scenes containing a constant number of objects if we allow a larger hypothesis space. We also calculate the Vapnik-Chervonenkis dimension of this class and thereby show that heuristic methods, when they succeed in finding a relatively simple conjunctive hypothesis consistent with a large enough random sample, are likely to give an accurate hypothesis. .bp .nf \fBUCSC-CRL-87-2 MANIKIN: DYNAMIC ANALYSIS FOR ARTICULATED BODY MANIPULATION \fRJane Wilhelms, David Forsey, Pat Hanrahan April, 1987 29 pages ($3.00) .fi \fBABSTRACT:\fR Manipulating articulated bodies for animation is a laborious task because of the many degrees of freedom, the interaction between segments, and the complex relationship between local and world space. Dynamic analysis model articulated bodies as rigid masses acting under the influence of forces and torques and simulates their behavior. This method automatically accounts for interaction between segments and the relation between local and world space. It can provide inverse kinematics, goa-directed movement, and constraints. Because of complex control issues, dynamics is not yet reasonable for total motion control, but it is a convenient way to manipulate articulated bodies for keypositioning. While not realtime, it is fast enough for interactive use by a patient user. A system, \fIManikin,\fP for manipulating bodies dynamically, is described. \fBKeywords:\fR computer graphics, animation, character animation, interactive modeling, dynamics, simulation. .nf \fBUCSC-CRL-87-3 AN ENVIRONMENT MODEL FOR THE INTEGRATION OF LOGIC AND FUNCTIONAL PROGRAMMING\fR Pierre Bonzon January, 1987 37 pages ($4.00) .fi \fBABSTRACT:\fR We propose a unified environment model for the evaluation of both function and relation (or predicate) applications; as an illustration, simple extensions of a subset of Scheme (i.e. a Lisp dialect) are introduced, together with their interpreter. .nf \fBUCSC-CRL-87-4 SHOULD ROBOTS HAVE NUCLEAR ARMS?\fR Ira Pohl March, 1987 9 pages ($1.00) .fi \fBABSTRACT:\fR This paper analyzes the use of Artificial Intelligence (AI) in designing SDI software. Two major uses are foreseen: (1) as an aid to writing the ten million plus lines of trustworthy SDI software that will be needed; (2) as a component of the battle management software. This second use allows the software to be adequately responsive to SDI countermeasures and autonomous in a manner fitting overrall SDI requirements. This paper suggests that these uses of AI in SDI are infeasible and that rather than creating greater security, they would be more likely lead to a nuclear war. .bp .nf \fBUCSC-CRL-87-5 LANGUAGE PRIMITIVES FOR PARALLEL NUMERICAL ALGORITHMS\fR Charles McDowell, William Appelbe, Alan Finke May, 1987 18 pages ($2.00) .fi \fBABSTRACT:\fR This paper describes a set of high-level language extensions for designing and implementing parallel algorithms composed of tightly coupled tasks. The extensions have been implemented for Fortran using a preprocessor (written in m4 for UNIX $ \(dg $ ) to generate HEP Fortran, and used to implement a wide range of numerical Fortran programs. A static analyzer for programs written using the primitives is being developed to locate potential bugs in parallel programs such as concurrent variable updates. .PP The primitives provide a flexible set of high-level mechanisms, to simplify the task of developing reliable, portable, parallel numerical software. .nf \fBUCSC-CRL-87-6 DYNAMICS FOR EVERYONE\fR Jane Wilhelms May, 1987 26 pages ($3.00) .fi \fBABSTRACT:\fR There is a move in computer graphics toward more correctly simulating the world being modeled in hopes of achieving more realistic and interesting still images and animation. An important component of this move is use of dynamics, i.e. considering the world as masses acting under the influence of forces and torques. Dynamics an be useful in providing inverse kinematics, constraints, collisions, and, in general, help produce realistic positions and rates of motion. However, it is computationally expensive, involved to program, and complex to control. .nf \fBUCSC-CRL-87-7 ALGEBRAIC CONSTRUCTION OF LARGE EUCLIDEANDISTANCE COMBINED CODING/MODULATION SYSTEMS\fR R. Michael Tanner June, 1987 48 pages ($4.00) .fi \fBABSTRACT:\fR Ideas underlying Ungerboeck's trellis codes and Ginzburg's multidimensional signals are extended, providing new methods for constructing power and bandwidth efficient signal sets. Appropriately linking subspaces of an unequal error protection algebraic code with partitioned signals indexed by subspaces of digital vector spaces guarantees a large minimum separation between signals in the resulting signal set. Analogies are drawn with algebraic block error-correcting code constructions such as those of Blokh and Zyablov. For PSK modulations, the "layered" constructions shown have the additional advantage of making the effects of a phase ambiguity "transparent" to the decoding process, permitting efficient resolution of the ambiguity. Practical high-speed decoders can be implemented using low-complexity soft decision decoding algorithms of Tanner. Simulation studies of one such system show better than 6 dB. of gain over 8-PSK at an operating SNR of 13 dB. with a rate 0.83 code. .bp .nf \fBUCSC-CRL-87-8 GAP THEOREMS FOR DISTRIBUTED COMPUTATION\fR Shlomo Moran, Manfred Warmuth January, 1987 18 pages ($2.00) .fi Consider a ring of $ n $ anonymous processors, i.e. the processors have no id's. Each processor receives an input string and the ring is to compute a function of the circular input configuration in the asynchronous bidirectional model of computation. The complexity of an algorithm is the number of bits or the number of messages sent in the worst case. The complexity of a function is the lowest complexity of any algorithm that computes that function. If the function value is constant for all input configurations, the processors do not need to send any messages (complexity zero). On the other hand, we prove that any non-constant function has bit complexity $ OMEGA~( n log n ) $ for anonymous rings. There are non-constant functions that reach the upper end of the gap, i.e., we exhibit a non-constant function of bit complexity $ O~( n log n ) $. The same gap for the bit complexity of non-constant functions remains even if the processors have distinct id's, provided that the id's are taken from a large enough domain. For the case of using the number of messages sent rather than the number of bits as the complexity measure, we present a non-constant function that can be computed with $ O~( n^ log sup +~n ) $ messages on an anonymous ring. .nf \fBUCSC-CRL-87-9 c-util UTILITY PACKAGE FOR C\fR Kevin Karplus July, 1987 17 pages ($2.00) .fi \fBABSTRACT:\fR The c-util package is a collection of c procedures and macros for general-purpose programming. The package is intended to be used in addition to the standard c library, not in place of it. The package handles the following common tasks: .nf \(bu Memory allocation \(bu Error-handling and general-purpose printing \(bu Character input and output \(bu String manipulation \(bu Set manipulation \(bu Program argument handling .nf \fBUCSC-CRL-87-10 USING THE UCSC-REPORT LaTeX STYLE FILE FOR UCSC TECHNICAL REPORTS\fR Kevin Karplus August, 1987 17 pages ($2.00) .fi \fBABSTRACT:\fR This technical report describes how to use LaTeX to produce technical reports in the proper format for the UCSC Computer and Information Science series. The report itself is written using the ucsc-report style file, so that the .tex file can be used as an example file. The reader is expected to refer to Lamport's \fILaTeX, a Document Preparation System\fP [Lam86] for details on how to use LaTeX. .bp .nf \fBUCSC-CRL-87-11 APPLYING VALIANT's LEARNING FRAMEWORK TO AI CONCEPT LEARNING PROBLEMS\fR David Haussler September, 1987 22 pages ($3.00) .fi \fBABSTRACT:\fR We present an overview of some recent theoretical results in the learning framework introduced by Valiant in (Valiant, 1984) and further developed in (Valiant 1985; Blumer, et. al., 1986, 1987a,b; Pitt & Valiant, 1986; Haussler, 1986; Angluin & Laird, 1986; Angluin, 1986a; Rivest, in press; Haussler, 1987a; Kearns, et. al., 1987a,b). Our focus is on applications to AI problems of learning from examples as given in (Haussler, 1986, 1987a) and (Kearns, et. al., 1987a,b), along with a comparison to the work of Mitchell on version spaces (Mitchell, 1982). We discuss learning problems for both attribute-based and structural domains. This is a revised and expanded version of (Haussler, 1987b). .nf \fBUCSC-CRL-87-12 A DATABASE APPLICATION FOR THE SPECIFICATION OF COMPUTER GENERATED IMAGES \fRJames L. Murphy October, 1987 15 pages ($2.00) .fi \fBABSTRACT:\fR There are several renderers available which generate three-dimensional scenes according to some specification. A ray tracing system, rt, from the University of Waterloo uses a scene file prepared in an editor to specify lights, surface c haracteristics, and primitive objects placed in a directed acyclic graph to support hierarchical modeling. An interactive ray tracing system, Optik, from the University of Toronto, allows objects, lights and surfaces to be added to a scene and transforme d via commands given interactively or redirected from a text file. An interactive scan line system, 3d, also from the University of Toronto, allows instances of masters including spheres, cylinders, polygons, and parametric patches to be added to a scene and altered via commands given interactively or redirected from a text file. This paper presents an overview of scene specification as defined in these three renderers and then proposes a database and application programs to manage image files and their scene specifications independent of renderer. This database supports a graphi cs interface which allows a user to interactively specify a three dimensional scene using specifications of previously generated images. The user is allowed to find pictures by content and browse through qualifying images. .nf \fBUCSC-CRL-87-13 AN APPROXIMATION ALGORITHM AND AN OPTIMAL ALGORITHM FOR FINDING VERTEX COVERS\fR Robert A. Levinson October, 1987 11 pages ($2.00) .fi \fBABSTRACT:\fR An approximation algorithm for the vertex covering problem for cubic graphs is presented. The algorithm has worst case complexity n\u4\d where n is the number of vertices in the graph. The algorithm is based on finding vertex coverings based on breadth-first spanning trees starting from individual vertices and pairs of vertices. Despite the fact that this problem is NP-complete, this polynomial time algorithm has not yet failed to produce an optimal solution. An obvious, yet often eff icient branch-and-bound algorithm is also presented for finding vertex covers on arbitrary graphs. .bp .nf \fBUCSC-CRL-87-14 A SIMPLE MODEL OF AN AUTOMATED LIBRARY SYSTEM \fRAlexandre Brandwajn November, 1987 10 pages ($1.00) .fi \fBABSTRACT:\fR An Automated Library System for data storage in a computer installation can be viewed as a collection of items, such as magnetic cartridges or optical disks, stored in a shelf-like structure, with one or more pickers (robots) to pick the requested item and place it in a processing station (player). This note presents a simple analytical model which allows us to evaluate t he performance of such a library system for a given I/O workload as a function of the number and characteristics of robots and players. .nf \fBUCSC-CRL-87-15 LEARNING DECISION TREES FROM RANDOM EXAMPLES \fRAndrzej Ehrenfeucht, David Haussler October, 1987 9 pages ($1.00) .fi \fBABSTRACT:\fR We show that \fIs\fR-node decision trees on \fIn\fR Boolean variables are learnable from random examples in time proportional to \fIn\fR\(u0(logs)\(d. The procedure is linear in 1/\(*e and log 1/\(*d, where \(*e is the accuracy parameter and \(*d the confidence parameter. We also define the rank of a decision tree and show that for any fixed \fIr\fR, the class of all decision trees of rank at most \fIr\fR on \fIn\fR Boolean variables is learnable from random examples in time polynomial in \fIn\fR, 1/\(*e and log 1/\(*d. Using a suitable encoding of variables, Rivest's polynomial learnability result for decision lists can be interpreted as a special case of this result for rank 1. .nf \fBUCSC-CRL-87-16 ASPECTS OF PATH SHARING IN I/O \fRAlexandre Brandwajn November, 1987 20 pages ($2.00) .fi \fBABSTRACT:\fR We consider two problems abstracted from the sharing of I/O transfer paths by disks with Rotational Position Sensing. Both problems are related to the idea of partitioning a set of available resources into different numbers of servers of different speeds. First, we propose a simple model for the reconnection to a set of buffers ports in a control unit supporting asynchronous disk I/O. The model, based on a classical loss queueing system, allows us to investigate the relative performance merits of sequential versus overlapped organization of read transfers. The results obtained show that, as the I/O throughput increases, it is possible for the performance of overlapped I/O to become worse than that of sequential accesses. This is due to the fact that overlapped transfers experience a lower probability of finding a free buffer port, caused by the pattern of resource acquisition. In the second part of this paper, we consider a model of a bus bandwidth shared by transfers proceeding at different speeds. The problem is a generalization of a multiserver loss system with classes of requests in that the available bandwidth is partitioned into a varying number of "channels". We propose a simple solution for this model, and apply it to study the effects of different data transfer rates on the performance of two groups of disks sharing a bus. Comparisons with simulation results illustrate the generally good accuracy of the proposed models. .nf .bp \fBUCSC-CRL-87-17 DASD DYNAMIC RECONNECTION \fRAlexandre Brandwajn November, 1987 20 pages ($2.00) .fi \fBABSTRACT:\fR With Dynamic Path Reconnection (DPR), a disk can reconnect to any available I/O path leading to the proper host system. Herein, we focus our attention on systems with Dynamic Reconnection because we believe that they represent a majority of new installations. Measurements of actual DASD subsystems show that there is often a considerable imbalance in the load, i.e., rates of I/Os and, possibly, other I/O characteristics, among strings of disks, as well as among devices of a single string. This can be the case when a small subset of drives accounts for much of the string activity ("dominant devices"), and could also be expected in strings mixing single and multiple capacity DASDs. Therefore, it is important to be able to accurately represent multipath DPR configurations with imbalanced load. The approach we propose is based on modeling reconnection attempts as requests in a loss system. Extensive comparisons with simulation show that our approach produces consistently more accurate results than existing methods. It is also easily applicable to configurations with more than two paths (such as the four-ported IBM 3990 controller). .nf \fBUCSC-CRL-87-18 A GENERAL MODEL FOR FIXED LOOK-AHEAD LR PARSERS \fRManuel Bermudez, Karl Schimpf November, 1987 32 pages ($4.00) .fi \fBABSTRACT:\fR A single construction method for SLR, LALR, NQLALR and NQSLR parsers is presented. The latter two are generalizations of NQLALR(1) grammars, defined for the first time here. The construction method is based on two relations that capture the essential structure of the problem of computing fixed look-ahead for LR parsers. These relations capture both the similarities and the differences among the various techniques, which have been misunderstood in the past. Three parameters are used to specify the type of parser to be constructed and the amount of look-ahead to be used. .nf \fBUCSC-CRL-87-19 A FLEXIBLE OBJECT ANIMATION SYSTEM \fRMatthew P. Moore November, 1987 75 pages ($4.00) .fi \fBABSTRACT:\fR A software system is developed for animating the motion of flexible objects. Objects are described as collections of point masses, acted upon by forces from springs, pressurized volumes, hard surfaces, gravity, and other aspects of the e xternal environment. The dynamic equations of motion for the point masses are described as a system of ordinary differential equations, which is solved numerically for the objects' positions in each animation frame. Provisions are made for real-time pre view of the resulting motion, and for full rendering of the resulting movie onto video tape. .bp .nf \fBUCSC-CRL-87-20 LEARNABILIBY AND THE VAPNIK-CHERVONENKIS DIMENSION \fRAnselm Blumer, Andrzej Ehrenfeucht, David Haussler, Manfred K. Warmuth November, 1987 34 pages ($4.00) .fi \fBABSTRACT:\fR We extend Valiant's learnability model to learning classes of concepts defined by regions in Euclidean space E\un\d. Our methods lead to a unified treatment of some of Valiant's results, along with previous results on distribution-free c onvergence of certain pattern recognition algorithms. We show that the essential condition for distribution-free learnability is finiteness of the Vapnik-Chervonenkis dimension, a simple combinatorial parameter of the class of concepts to be learned. Us ing this parameter, we analyze the complexity and closure properties of learnable classes, and provide necessary and sufficient conditions for feasible learnability. .nf \fBUCSC-CRL-87-21 CONVOLUTIONAL CODES FROM QUASI-CYCLIC CODES: A LINK BETWEEN THE THEORIES OF BLOCK AND CONVOLUTIONAL CODES \fRR. Michael Tanner November, 1987 34 pages ($4.00) .fi \fBABSTRACT:\fR This paper extends the work of Massey, Costello, and Justesen by giving a method of constructing convolutional code with large free distances algebraically. A convolutional code can be defined by a syndrome former transfer matrix \fBH\fR \uT\d (D) whose entries are polynomials in the indeterminate delay operator D. A quasi-cyclic block code with cycles of length \fIm\fR can be defined by a parity-check matrix that consists of blocks of \fIm\fR X \fIm\fR circulant matrices; such a matrix is characterized by a polynomial matrix \fBH\fR \uT\d\dm\u (X) with entries in the ring of polynomials modulo (X\um\d -1). A quasi-cyclic code is associated with a convolutional code by setting \fBH\fR\uT\d\dm\u (X) = \fBH\fR\uT\d(D)\(br\dD=X\umod (X\um\d -1). The main theorem shows that the minimum distance of the quasi-cyclic code is lower bound on the free distance of the associated convolutional code. The relation between the rates of the two codes is analyzed, and examples of construction of convolutional cod es from cyclic codes in quasi-cyclic form are given. .nf \fBUCSC-CRL-87-22 A SURVEY OF DEBUGGING TOOLS FOR CONCURRENT PROGRAMS \fRCharles McDowell, David Helmbold, Anil Sahai December, 1987 65 pages ($4.00) .fi \fBABSTRACT:\fR This report presents a survey of tools used to aid in debugging concurrent programs. Three types of systems are surveyed: traditional or breakpoint style debuggers, event monitoring systems, and static analysis systems. It does not discuss formal proofs of correctness or functional testing and verification. Three problems associated with debugging concurrent programs are discussed. They are the "probe-effect", non-repeatability and the lack of a synchronized global clock. In addition, techniques for filtering, organizing and displaying the large amount of data produced by monitoring are discussed. A table summarizing the characteristics of 28 different debugging tools, and an annotated bibliography of papers are included in the appendices. .bp .nf \fBUCSC-CRL-87-23 A PRACTICAL ALGORITHM FOR STATIC ANALYSIS OF PARALLEL PROGRAMS \fRCharles E. McDowell December, 1987 24 pages ($3.00) .nf \fBUCSC-CRL-87-24 MANAGING DIGITAL IMAGES IN A NETWORK ENVIRONMENT \fRJames Murphy, Daniel Helman, Lewis Hitchner December, 1987 10 pages ($1.00) .fi \fBABSTRACT:\fR We present a method for displaying reduced resolution versions of images in order to quickly browse through a large archive of digital images. The browse image requires only one kilobyte and, thus, can be stored in the header of the image file and can be quickly retrieved from that disk file and transferred over a network for viewing on a high resolution image display. This method differs from past research on progressive transmission of reduced resolution images. Our browse image, the displayed image, and the original image are all of different spatial and color resolutions. Typical values would be a 32x32 by 8 bit encoded color browse image from a 512x512 by 24 bit full color original to be displayed at 128x128 full color. We analyze and compare several methods of compression and decompression of digital images reporting their performance on both isolated workstations and over the network. .nf \fBUCSC-CRL-87-25 INTELLIGENT SIGNAL ANALYSIS AND RECOGNITION USING A SELF ORGANIZING DATABASE \fRRobert Levinson, Daniel Helman, Edward Oswalt December, 1987 23 pages ($3.00) .fi \fBABSTRACT:\fR In this report, we describe our progress in the research and development of a self-organizing database system that can support the identification and characterization of signals in an RF environment. This report is for the first-year of a three-year plan to develop such a system. As the radio frequency spectrum becomes more crowded, there are a growing number of situations that require a characterization of the RF environment. This dat abase system is designed to be practical in applications where communications and other instrumentation encounter a time varying and complex RF environment. The primary application of this system is the guidance and control of NASA's SETI (Search for Extra-Terrestial Intelligence) Microwave Observing Project. Other possible applications include selection of telemetry bands for communication with spacecraft, and the scheduling of antenna for radio astronomy are two examples where characterization of the RF environment is required. In these applications, the RF environment is constantly changing, and even experienced operators cannot quickly identify the multitude of signals that can be encountered. Some of these signals are repetitive, others appear to occur sporadically. .nf \fBUCSC-CRL-87-26 A GENERAL LOWER BOUND ON THE NUMBER OF EXAMPLES NEEDED FOR LEARNING \fRAndrzej Ehrenfeucht, David Haussler Michael Kearns, Leslie Valiant December, 1987 12 pages ($2.00) .nf \fBUCSC-CRL-87-27 LEARNING IN THE PRESENCE OF BACKGROUND KNOWLEDGE \fRAleksandar Milosavljevic December, 1987 32 pages ($4.00) .fi \fBABSTRACT:\fR We discuss the efficiency of learning algorithms for conjunctive concepts in the presence of background knowledge. In contrast to the standard learning setting in which instances are points in {0,1}\fI \un\d \fR (e.g. [VAL 84], [H2 87]), we use a \fIuniform learning setting\fR in which both instances, background knowledge, and hypotheses are represented as conjunctions of clauses. Consequently, instances in our setting are subsets of {0,1}\fI\un\d\fR. Efficient learning algorithms exist if instances and background knowledge are represented by Horn-sentences with no more than \fIk\fR literals per clause for any fixed \fIk\fR, or arbitrary k-CNF formulae with \fIk\fR 2 literals per clause. However, if examples or background knowledge are represented by k-CNF formulae for \fIk\fR 3, even classifying a new instance based on the current hypothesis becomes NP-hard. We carry out our analysis in a variety of models of learning. Probabilistic off-line [VAL 84], mistake-bounded on-line [LI 87], and query [ANG 87] models of supervised learning are used. Unsupervised learning is analysed using the model of conceptual cl ustering from [PR 87]. Our learning algorithms involve both deduction and induction. The "tree-climbing heuristic" [MICH 83] [MS 83] turns out to be a special case of the deductive phase. No need arises for the "internal disjuction" restriction [H1 87] in our setting. .nf \fBUCSC-CRL-87-28 LEARNING QUICKLY WHEN IRRELEVANT ATTRIBUTES ABOUND: A NEW LINEAR-THRESHOLD ALGORITHM \fRNick Littlestone December, 1987 30 pages ($4.00) .fi \fBABSTRACT:\fR Valiant and others have studied the problem of learning various classes of Boolean functions from examples. Here we discuss incremental learning of these functions. We consider a setting in which the learner responds to each example according to a current hypothesis. Then the learner updates the hypothesis, if necessary, based on the correct classification of the example. One natural measure of the quality of learning in this setting is the number of mistakes the learner makes. For suitable classes of functions, learning algorithms are available that make a bounded number of mistakes, with the bound independent of the number of examples seen by the learner. We present one such algorithm, which learns disjunctive Boolean functions, and variants of the algorithm for learning other classes of Boolean functions. The algorithm can be expressed as a linear-threshold algorithm. A primary advantage of this algorithm is that the number of mistakes that it makes is relatively little affected by the presence of large numbers of irrelevant attributes in the examples; we show that the number of mistakes grows only logarithmically wit h the number of irrelevant attributes. At the same time, the algorithm is computationally time and space efficient. .nf \fBUCSC-CRL-87-29 THE MEANING OF TSL -- AN ABSTRACT IMPLEMENTATION OF TSL-1 \fRDavid Helmbold December, 1987 30 pages ($3.00) .fi \fBABSTRACT:\fR TSL is a language for specifying the inter-task communication which takes place in an Ada* program. TSL statements are embedded in the program as formal comments, therefore they do not interfere with other Ada tools. The Ada program containing TSL comments is transformed into a valid Ada program which is functionally equivalent to the original with the exception that its behavior is communicated to a monitor. At runtime, the monitor can check the specifications against the transformed program's behavior. This paper first presents the TSL language constructs and then introduces an abstract implementat ion which defines the meaning of TSL statements. * Ada is a registered trademark of the U.S. Government (Ada Joint Program Office). .bp .nf \fBUCSC-CRL-87-30 SIZING cMOS GATES ALONG A CRITICAL PATH -- A TUTORIAL \fRKevin Karplus December, 1987 21 pages ($3.00) .fi \fBABSTRACT:\fR This technical report describes a simple method for sizing the gates on a single critical path of an MOS circuit, with particular attention to static cMOS circuits. The method is not a new research result -- rather, it is a simplified presentation of known methods for pedagogic purposes. The material should be suitable for a first course in VLSI design, and exercises are provided at the end. .nf \fBUCSC-CRL-87-31 A TO Z: C LANGUAGE SHORTCOMINGS \fRIra Pohl Daniel Edelson November, 1987 18 pages ($2.00) .fi \fBABSTRACT:\fR C is one of the most popular generally used languages of the 1980's. Its advantages are well known. In writing three books on the language, one of the authors has espoused many of its virtues without adequately commenting on its vices. This paper will attempt to redress that balance. .(f 1-4-87 .)f