CS-2004-01 | ||||
---|---|---|---|---|
Title | A Study on Skin Optics | |||
Authors | Aravind Krishnaswamy and Gladimir V. G. Baranoski | |||
Abstract | Despite the notable progress in physically-based rendering, there is still a long way to go before we can automatically generate predictable images of biological materials. In this report, we address an open problem in this area, namely the spectral simulation of light interaction with human skin. Initially, we present an overview of fundamental skin optics concepts which is followed by the description of a novel biophysically-based model that accounts for all components of light propagation in skin tissues, namely surface reflectance, subsurface reflectance and transmittance, and the biological mechanisms of light absorption by pigments in these tissues. The model is controlled by biologically meaningful parameters, and its formulation, based on standard Monte Carlo techniques, enables its straightforward incorporation into realistic image synthesis frameworks. Besides its iophysically-based nature,the key difference between the proposed model and the existing skin models is its comprehensiveness, i.e., it computes both spectral (reflectance and transmittance) and scattering (bidirectional surface-scattering distribution function) quantities for skin specimens. In order to assess the predictability of our simulations, we evaluate their accuracy by comparing results from the model with actual skin measured data. We also present computer generated images to illustrate the flexibility of the proposed model with respect to variations in the biological input data, and its applicability not only in the predictive image synthesis of different skin tones, but also in the spectral simulation of medical conditions. | |||
Date | January 2004 | |||
Report | A Study on Skin Optics (PDF) |
CS-2004-06 | ||||
---|---|---|---|---|
Title | Finding Frequent Items in Sliding Windows with Multinomially-Distributed Item Frequencies | |||
Authors | Lukasz Golab, David DeHaan, Alejandro Lopez-Ortiz, and Erik D. Demaine | |||
Abstract | This paper presents algorithms for identifying frequent items within a sliding window in the data stream computational model, assuming that item types conform to a multinomial distribution. We begin by introducing the drifting data distribution model, which assumes that item type frequencies approximately follow the same distribution in every instance of the sliding window, but gradual changes in the parameters of the distribution are allowed across the lifetime of the stream. Under this model and given the assumption of multinomially-distributed item frequencies, we show how to determine the true frequencies of items using space that is only a fraction of the sliding window size. We then use these approximate frequencies to identify items that exceed a given frequency threshold. Our algorithms are shown to outperform classical inference based on random sampling from the sliding window. | |||
Date | January 2004 | |||
Comments | *Note that this is updated from CS-2003-06 | |||
Report | Finding Frequent Items in Sliding Windows with Multinomially-Distributed Item Frequencies (PDF) |
CS-2004-08 | ||||
---|---|---|---|---|
Title | Mobility Impact on Data Service Performance in GPRS Systems | |||
Authors | Majid Ghaderi and Raouf Boutaba | |||
Abstract | In this paper we describe an analytical approach to derive the packet delay distribution in a cell of a wireless network operating based on the general packet radio service (GPRS) standard. Based on that, the average packet delay and packet loss probability are also computed. Our approach is based on a decomposition of system behaviour into short-term and long-term behaviours to simplify the analytical modeling thanks to the quasi-stationary behaviour of the data packet queueing process. In addition to the effect of voice call handoffs, the impact of packet forwarding and dedicated data channels on data service performance is also taken into consideration. The performance estimates produced by the analytical approach are compared with those generated by simulation experiments which confirms the relative accuracy of the analytical approach. | |||
Date | January 2004 | |||
Report | Mobility Impact on Data Service Performance in GPRS Systems (PS) | Mobility Impact on Data Service Performance in GPRS Systems (PDF) |
Compressed
PostScript: Mobility Impact on Data Service Performance in GPRS Systems (GZIP) |
CS-2004-25 | ||||
---|---|---|---|---|
Title |
A
Rewriting
Algorithm
for
Multi-Block
Aggregation Queries and Views using Prerequisites and Compensations | |||
Authors | David DeHaan | |||
Abstract | This paper presents an extension to previously proposed bottom-up compensation-based algorithms for calculating the usability of a view to answer a database query, where both query and view definition are multi-block SQL queries containing aggregation. The goal of our extension is to increase the recall of previous algorithms. The main idea of approach is to improve recall by deferring certain view pruning decisions through the introduction of pseudo-algebraic operators that we call prerequisites. We present a set of transformation rules for manipulating query expressions containing prerequisite operators, as well as a modified matching algorithm that utilizes the prerequisite operators and associated transforms. Finally, we discuss the effect that prerequisite operators have on efficiency of the algorithm, and propose a combination of heuristics and normal forms to limit the introduction of prerequisites to scenarios in which they are likely to be helpful. | |||
Date | May 2004 | |||
Report | A Rewriting Algorithm for Multi-Block Aggregation Queries and Views using Prerequisites and Compensations (PDF) |
CS-2004-30 | ||||
---|---|---|---|---|
Title | Theory of Deterministic Trace-Assertion Specifications | |||
Authors |
Janusz
Brzozowski
Helmut
Jurgensen | |||
Abstract |
A
software
module
is
an
abstraction
of
a
program:
it
has
a
well
defined
functionality,
operations
by
which
the
environment
accesses
the
program,
and
outputs.
Traces
are
sequences
of
operations.
Trace
assertions
constitute
a
particular
formalism
for
abstract
speciation
of
software
modules.
Certain
traces
are
identified
as
canonical,
and
all
traces
are
grouped
in
equivalence
classes,
each
of
which
is
represented
by
a
unique
canonical
trace.
Trace
equivalence
captures
the
observational
indistinguishability
of
traces.
A
rewriting
system
transforms
any
trace
to
its
canonical
equivalent
A module can often be conveniently described by a (finite or infinite) automaton. In this paper we consider only deterministic connected automata. We show that any such automaton can be specified by canonical traces and trace equivalence; conversely, any set of canonical traces together with a trace equivalence uniquely defines an automaton. For each state of an automaton, we select an arbitrary trace leading to that state as its canonical trace. Constructing trace equivalence amounts to finding a set of generators for state-equivalence, where two traces are state-equivalent if they lead to the same state. We present a simple algorithm for finding such a set of generators. Directly from these generators, we derive a rewriting system which yields a deterministic algorithm for transforming any trace to its canonical representative. This system is always confluent, and it is Noetherian (has only finite derivations) if and only if the set of canonical traces is prefix-continuous (a set is prefix-continuous if whenever a word w and a prefix u of w are in the set, then all the prefixes of w longer than u are also in the set). Each prefix continuous set corresponds to a spanning forest of the automaton and vice versa. We apply our algorithms to specify several commonly used modules. | |||
Date | May 2004 | |||
Comments | This report was posted in May 2004, and revised in August 2004. Part of the material from the May version has appeared in [5]. | |||
Report | Theory of Deterministic Trace-Assertion Specifications (PS) | Theory of Deterministic Trace-Assertion Specifications (PDF) |
CS-2004-35 | ||||
---|---|---|---|---|
Title | Enabling Chaotic Ubiquitous Computing | |||
Authors | O. Andrei Dragoi and James P. Black | |||
Abstract |
Today,
ubiquitous
computing
is
possible
only
in
handcrafted
environments,
and
not
across
administrative
and
technological
domains.
For
this
to
happen,
a
middleware
"ecology"
will
need
to
emerge,
so
that
users
can
exploit
a
chaotic
environment
of
competing
communication
and
service
providers,
and
overlapping
administrative
authorities.
Although
key
elements
of
the
ecology
exist
today,
simple
exploitation
of
unfamiliar
(or
familiar)
ubiquitous
environments
remains
a
challenge
for
users.
They
need
simple
tools
that
open
the
way
to
this
increasingly
rich
ecology
of
devices,
services,
and
information.
This
paper
describes
how
such
tools
can
be
provided
through
a
software
abstraction
called
a
frame.
Keywords: ubiquitous computing, software abstractions, services, service access, middleware, web proxy | |||
Date | August 2004 | |||
Report | Enabling Chaotic Ubiquitous Computing (PDF) |
CS-2004-36 | ||||
---|---|---|---|---|
Title | Discovering Services is not Enough | |||
Authors | O. Andrei Dragoi and James P. Black | |||
Abstract |
In
the
future,
mobile
users
will
find
themselves
in
unfamiliar
and
"chaotic"
environments
with
multiple
providers
of
electronic
devices
or
services,
and
competing
internet-service
providers.
Users
need
to
discover
what
services
are
available,
how
to
apply
them
to
the
task
at
hand,
and
how
to
acquire
the
appropriate
rights
to
use
them
successfully.
The
key
contribution
of
this
paper
is
linking
service
discovery
with
the
acquisition
of
role-based
credentials
for
services,
and
showing
how
the
combination
can
be
exploited
easily
and
effectively
by
users
of
ubiquitous-computing
environments.
Our
design
facilitates
flexible
authorisation
and
access
control,
requires
no
special-purpose
client
devices
or
software,
and
enables
an
open
market
where
all
participants
have
a
niche
that
they
perceive
as
bringing
value
to
them.
The
design
has
been
refined,
implemented,
and
validated
as
part
of
a
larger
prototype
implementation,
parts
of
which
are
described.
Middleware,
running
in
a
web
proxy,
transforms
web
objects
by
adding
specific
software
tools
for
the
user
to
discover
and
invoke
the
currently
relevant
services.
Keywords: ubiquitous computing, role-based access control, service discovery, middleware, web proxy | |||
Date | August 2004 | |||
Report | Discovering Services is not Enough (PDF) |
CS-2004-37 | ||||
---|---|---|---|---|
Title | A Graphical XQuery Language Using Nested Windows | |||
Authors |
Zheng Qin, Benjamin Bin Yao, Yingbin Liu, and Michael McCool | |||
Abstract | A graphical XQuery-based language using nested windows, GXQL, is presented. Definitions of both syntax and semantics are provided. Expressions in GXQL can be directly translated into corresponding XQuery expressions. GXQL supports for, let, where, order by and return clauses (FLWOR expressions) and also supports predicates and quantifiers. This graphical language provides a powerful and user-friendly environment for non-technical users to perform queries. | |||
Date | August 2004 | |||
Report | A Graphical XQuery Language Using Nested Windows (PDF) |
CS-2004-45 | ||||
---|---|---|---|---|
Title |
A
Data
Locating
Mechanism
for
Distributed
XML
Data
over
P2P
Networks Technical report CS-2004-45 | |||
Authors | Qiang Wang and M. Tamer Ozsu , University of Waterloo | |||
Abstract | Many emerging applications that use XML are distributed, usually over the Internet or over large Peer-to-Peer (P2P) networks. A fundamental problem for distributed XML query processing in these systems is how to locate the data relevant to the queries so that only useful data are involved in the query evaluation. In this paper, we address this problem within the context of structured P2P networks, and propose a novel data locating mechanism for query shipping systems. Our approach follows the multi-hop style of the structured P2P file sharing systems, but is quite different in that we encode the hierarchical information of the XML data into the overlay network, so that routing keys can be hierarchical XML path expressions. Furthermore, our data locating mechanism does not employ any centralized catalogs. To avoid flooding with XML queries, we use a technique that propagates queries within a limited sub-network to improve the performance. We report comprehensive experiments to demonstrate the scalability and effectiveness of the data locating mechanism. | |||
Date | September 2004 | |||
Report | A Data Locating Mechanism for Distributed XML Data over P2P Networks (PDF) |
CS-2004-47 | ||||
---|---|---|---|---|
Title | Similarity Search in Metric Spaces | |||
Authors | Yuhui Wen | |||
Abstract |
Similarity
search
refers
to
any
searching
problem
which
retrieves
objects
from
a
set
that
are
close
to
a
given
query
object
as
reflected
by
some
similarity
criterion.
It
has
a
vast
number
of
applications
in
many
branches
of
computer
science,
from
pattern
recognition
to
textual
and
multimedia
information
retrieval.
In this thesis, we examine algorithms designed for similarity search over arbitrary metric spaces rather than restricting ourselves to vector spaces. The contributions in this paper include the following: First, after defining pivot sharing and pivot localization, we prove probabilistically that pivot sharing level should be increased for scattered data while pivot localization level should be increased for clustered data. This conclusion is supported by extensive experiments. Moreover, we proposed two new algorithms, RLAESA and NGH-tree. RLAESA, using high pivot sharing level and low pivot localization level, outperforms the fastest algorithm in the same category, MVP-tree. NGH-tree is used as a framework to show the effect of increasing pivot sharing level on search efficiency. It provides a way to improve the search efficiency in almost all algorithms. The experiments with RLAESA and NGH-tree not only show their performance, but also support the first conclusion we mentioned above. Second, we analyzed the issue of disk I/O on similarity search and proposed a new algorithm SLAESA to improve the search efficiency by switching random I/O access to sequential I/O access. | |||
Date | September 2004 | |||
Report | Similarity Search in Metric Spaces (PDF) |
CS-2004-58 | ||||
---|---|---|---|---|
Title | BlossomTree: Evaluating XPaths in FLWOR Expressions | |||
Authors | Ning Zhang (Waterloo), Shishir K. Agrawal (IIT, Bombay), and M. Tamer Ozsu (Waterloo) | |||
Abstract | Efficient evaluation of path expressions has been studied extensively. However, evaluating more complex FLWOR expressions that contain multiple path expressions has not been well studied. In this paper, we propose a novel pattern matching approach, called Blossom Tree, to evaluate a FLWOR expression that contains correlated path expressions. \BlossomTree is a formalism to capture the semantics of the path expressions and their correlations. These correlations include variable referencing, structural relationship, value-based relationship, or a mixture of structural and value-based relationship. We propose a general algebraic framework (abstract data types and logical operators) to evaluate BlossomTree pattern matching that facilitates efficient evaluation and experimentation. We design efficient data structures and algorithms to implement the abstract data types and logical operators. Our experimental studies demonstrate that the BlossomTree pattern matching approach can generate highly efficient query plans | |||
Date | December 2004 | |||
Report | BlossomTree: Evaluating XPaths in FLWOR Expressions (PDF) |
CS-2004-60 | ||||
---|---|---|---|---|
Title | Stochastic Admission Control for Quality of Service in Wireless Packet Networks | |||
Authors | Majid Ghadei and Raouf Boutaba (University of Waterloo), Gary W. Kenward (Nortel Networks) | |||
Abstract | Call admission control is a key element for providing quality of service (QoS) in mobile wireless networks. Traditional admission control schemes only address call-level QoS guarantee because of the underlying circuit-based network architecture. In contrast, emerging wireless technologies such as 3G and 4G tend to be packet-switched rather than circuit-switched because the packet-based architecture allows better sharing of the scarce wireless resources. This paper introduces a novel distributed call admission control scheme called PFG, which maximizes the wireless channel utilization subject to a redetermined bound on the call dropping and packet loss probabilities for variable-bit-rate traffic in a packet-switched wireless cellular network. In particular, we show that in wireless packet networks, the undesired event of dropping an ongoing call can be completely eliminated without sacrificing the bandwidth utilization. The proposed control algorithm is stochastic and dynamic, hence it is able to adapt to a wide range of traffic fluctuations and mobility patterns. Extensive simulation results show that our scheme satisfies the hard constraint on call dropping and packet loss probabilities while maintaining a high bandwidth utilization. | |||
Date | November 2004 | |||
Report | Stochastic Admission Control for Quality of Service in Wireless Packet Networks (PS) | Stochastic Admission Control for Quality of Service in Wireless Packet Networks (PDF) |
Compressed
PostScript: Stochastic Admission Control for Quality of Service in Wireless Packet Networks (GZIP) |
CS-2004-61 | ||||
---|---|---|---|---|
Title | Mobile Effective Bandwidth and Its Application to Admission Control in Cellular Packet Networks | |||
Authors | Majid Ghaderi and Raouf Boutaba | |||
Abstract | Admission control is a key element for providing quality of service in a mobile cellular network. The problem of admission control in packet-switched cellular networks is more challenging compared to their circuit-switched counterparts due to packet-level network interactions. Although packet-based architectures allow for more efficient sharing of scarce radio resources, admission of new connections into the network is more complicated. The concept known as effective bandwidth is a simple yet efficient approach for admission control and resource allocation in wireline networks. This paper introduces the notion of mobile effective bandwidth which extends the classical effective bandwidth concept introduced for wireline networks to cellular packet networks. The main idea is to consider the spacial multiplexing due to user mobility in computing an effective bandwidth for variable-bit-rate connections. Based on this concept, an admission control algorithm is proposed which guarantees a prespecified packet loss probability while achieving zero connection dropping probability. This is a sharp diversion from the existing admission control schemes which can not completely eliminate connection dropping because of the underlying circuit-based architecture. | |||
Date | December 2004 | |||
Report | Mobile Effective Bandwidth and Its Application to Admission Control in Cellular Packet Networks (PS) | Mobile Effective Bandwidth and Its Application to Admission Control in Cellular Packet Networks (PDF) |
Compressed
PostScript: Mobile Effective Bandwidth and Its Application to Admission Control in Cellular Packet Networks (GZIP) |