To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
Negotiation is essential in settings where autonomous agents have conflicting interests and a desire to cooperate. For this reason, mechanisms in which agents exchange potential agreements according to various rules of interaction have become very popular in recent years as evident, for example, in the auction and mechanism design community. However, a growing body of research is now emerging which points out limitations in such mechanisms and advocates the idea that agents can increase the likelihood and quality of an agreement by exchanging arguments which influence each others' states. This community further argues that argument exchange is sometimes essential when various assumptions about agent rationality cannot be satisfied. To this end, in this article, we identify the main research motivations and ambitions behind work in the field. We then provide a conceptual framework through which we outline the core elements and features required by agents engaged in argumentation-based negotiation, as well as the environment that hosts these agents. For each of these elements, we survey and evaluate existing proposed techniques in the literature and highlight the major challenges that need to be addressed if argument-based negotiation research is to reach its full potential.
Matching algorithms automatically discover semantic relations between two autonomously developed conceptual representations of two overlapping domains. Typical examples of such conceptualisations are electronic market catalogues (e.g., unspsc and eCl@ss) and Web directories (e.g., google and yahoo). The objective of this paper is the description of a use case in which the matching algorithm CtxMatch, developed at ITC-IRST and the University of Trento, has been used to re-classify into the Universal Standard Products and Services Classification (unspsc) the catalogue of office equipment and accessories used by a worldwide telecommunication company to classify its suppliers. On the basis of this experience we are envisaging new applications of the algorithm in the area of demand aggregation. We conclude the paper by briefly describing a future application in this area.
We consider shot-noise and max-shot-noise processes driven by spatial stationary Cox (doubly stochastic Poisson) processes. We derive their upper and lower bounds in terms of the increasing convex order, which is known as the order relation to compare the variability of random variables. Furthermore, under some regularity assumption of the random intensity fields of Cox processes, we show the monotonicity result which implies that more variable shot patterns lead to more variable shot noises. These are direct applications of the results obtained for so-called Ross-type conjectures in queuing theory.
We consider the problem of routing incoming airplanes to two runways of an airport. Due to air turbulence, the necessary separation time between two successive landing operations depends on the type of airplane. When viewed as a queuing problem, this means that we have dependent service times. The aim is to minimize the waiting times of aircrafts. We consider here a model in which arrivals form a stochastic process and the decision-maker does not know anything about future arrivals. We formulate this as a problem of stochastic dynamic programming and investigate the monotonicity of optimal routing strategies with respect to the workload of the runways, for example. We show that an optimal strategy is monotone (i.e., of switching type) only in a restricted case where decisions depend on the state of the runways only and not on the type of the arriving aircraft. Surprisingly, in the more realistic case where this type is also known to the decision-maker, monotonicity need not hold.
In this article, some results on stochastic comparisons of the inspection paradox introduced by Ross [Probability in the Engineering and Informational Sciences 17: 47–51 (2003)] are established in the sense of the likelihood ratio order.
We obtain some techniques to study the shape of reliability functions (failure rate, mean residual life, etc.) by using the s-equilibrium distribution of a renewal process defined by Fagiuoli and Pellerey (Naval Res. Logist., 1993). We apply these techniques to study how to obtain distributions with bathtub shaped failure rate (BFR) from mixtures of two positive truncated normal distributions.
This paper proposes an operational semantics for value recursion inthe context of monadic metalanguages. Our technique for combiningvalue recursion with computational effects works uniformly forall monads.The operational nature of our approach is related to theimplementation of recursion in Scheme and its monadic version proposedby Friedman and Sabry, but it defines a different semantics and doesnot rely on assignments. When contrasted to the axiomatic approachproposed by Erkök and Launchbury, our semantics for the continuationmonad invalidates one of the axioms, adding to the evidence that thisaxiom is problematic in the presence of continuations.
It is well known that for a stochastically monotone Markov chain {Jn}n≥1 a function γ(n) = Cov[f (J1),g(Jn)] is decreasing if f and g are increasing. We prove this property for a special subclass of nonmonotone double stochastic Markov chains.
Recent advances from the theory of multivariate stochastic orderings can be used to formalize the “folk theorem” that positive correlations lead to larger buffer levels at a discrete-time infinite capacity multiplexer queue. In particular, it is known that if the input traffic is larger than its independent version in the supermodular (sm) ordering, then their corresponding buffer contents are similarly ordered in the increasing convex (icx) ordering.
A sufficient condition for the aforementioned sm comparison is the stochastic increasingness in sequence (SIS) property of the input traffic. In this article, we provide conditions for the stationary on–off source to be SIS. We then use this result to find conditions under which the superposition of independent on–off sources and the M|G|∞ input model are each sm greater than their respective independent version. Similar but weaker SIS conditions are also obtained for renewal on–off processes.
The paradigm of type-based termination is explored for functional programming with recursive data types. The article introduces $\boldsymbol{\Lambda_\mu^+}$, a lambda-calculus with recursion, inductive types, subtyping and bounded quantification. Decorated type variables representing approximations of inductive types are used to track the size of function arguments and return values.The system is shown to be type safe and strongly normalizing.The main novelty is a bidirectional type checking algorithm whose soundness is established formally.
The question of how to combine monads arises naturally in many areas with much recent interest focusing on the coproduct of two monads. In general, the coproduct of arbitrary monads does not always exist. Although a rather general construction was given by Kelly [Bull. Austral. Math. Soc.22 (1980) 1–83], its generality is reflected in its complexity which limits the applicability of this construction. Following our own research [C. Lüth and N. Ghani, Lect. Notes Artif. Intell.2309 (2002) 18–32], and that of Hyland, Plotkin and Power [IFIP Conf. Proc.223 (2002) 474–484], we are looking for specific situations when simpler constructions are available. This paper uses fixed points to give a simple construction of the coproduct of two ideal monads.
We derive the distribution of the time-to-empty for an open tandem Jackson network assuming that while in equilibrium at time 0, the arrival stream is suddenly shut off. The analysis is based on analogous results regarding the distribution of the time-to-empty for the corresponding closed tandem Jackson network. The results obtained are used in the analysis of a two-class tandem Jackson network with FIFO discipline in which customers of the second class have negligible service times.
We consider a system of K parallel queues providing different grades of service through each of the queues and serving a multiclass customer population. Service differentiation is achieved by specifying different join prices to the queues. Customers of class j define a cost function ψij(ci,xi) for taking service from queue i when the join price for queue i is ci and congestion in queue i is xi and join the queue that minimizes ψij(·,·). Such a queuing system will be called the “join minimum cost queue” (JMCQ) and is a generalization of the join shortest queue (JSQ) system. Non-work-conserving (called Paris Metro pricing system) and work-conserving (called the Tirupati system) versions of the JMCQ are analyzed when the cost to an arrival of joining a queue is a convex combination of the join price for that queue and the expected waiting time in that queue at the arrival epoch. Our main results are for a two-queue system.
We obtain stability conditions and performance bounds. To obtain the lower and upper performance bounds, we propose two quasi-birth–death (QBD) processes that are derived from the original systems by suitably truncating the state space. The state space truncation in the non-work-conserving JMCQ follows the method of van Houtum and colleagues. We then show that this method is not applicable to the work-conserving JMCQ and provide sample-path-based proofs to show that the number in each queue is bounded by the number in the corresponding queues of these QBD processes. These sample-path proof techniques might also be of independent interest. We then show that the performance measures like mean queue length and revenue rate of the system are also bounded by the corresponding quantities of these QBD processes. Numerical examples show that these bounds are fairly tight. Finally, we generalize some of these results to systems with more queues.
We give a probabilistic proof of an identity concerning the expectation of an arbitrary function of a compound random variable and then use this identity to obtain recursive formulas for the probability mass function of compound random variables when the compounding distribution is Poisson, binomial, negative binomial random, hypergeometric, logarithmic, or negative hypergeometric. We then show how to use simulation to efficiently estimate both the probability that a positive compound random variable is greater than a specified constant and the expected amount by which it exceeds that constant.
We study the succinctness of monadic second-order logic and a varietyof monadic fixed point logics on trees. All these languages are known to havethe same expressive power on trees, but some can express the samequeries much more succinctly than others. For example, we show that, undersome complexity theoretic assumption, monadic second-order logic isnon-elementarily more succinct than monadic least fixed point logic,which in turn is non-elementarily more succinct than monadic datalog. Succinctness of the languages is closely related to the combined andparameterised complexity of query evaluation for these languages.
We analyse a class of randomized Least Recently Used (LRU) cache replacement algorithms under the independent reference model with generalized Zipf's law request probabilities. The randomization was recently proposed for Web caching as a mechanism that discriminates between different document sizes. In particular, the cache maintains an ordered list of documents in the following way. When a document of size $s$ is requested and found in the cache, then with probability $p_s$ it is moved to the front of the cache; otherwise the cache stays unchanged. Similarly, if the requested document of size $s$ is not found in the cache, the algorithm places it with probability $p_s$ to the front of the cache or leaves the cache unchanged with the complementary probability $(1-p_s)$. The successive randomized decisions are independent and the corresponding success probabilities $p_s$ are completely determined by the size of the currently requested document. In the case of a replacement, the necessary number of documents that are least recently moved to the front of the cache are removed in order to accommodate the newly placed document.
In this framework, we provide explicit asymptotic characterization of the cache fault probability. Using the derived result we prove that the asymptotic performance of this class of algorithms is optimized when the randomization probabilities are chosen to be inversely proportional to document sizes. In addition, for this optimized and easy-to-implement policy, we show that its performance is within a constant factor from the optimal static algorithm.
Let $F(\b{z})=\sum_\b{r} a_\b{r}\b{z^r}$ be a multivariate generating function that is meromorphic in some neighbourhood of the origin of $\mathbb{C}^d$, and let $\sing$ be its set of singularities. Effective asymptotic expansions for the coefficients can be obtained by complex contour integration near points of $\sing$.
In the first article in this series, we treated the case of smooth points of $\sing$. In this article we deal with multiple points of $\sing$. Our results show that the central limit (Ornstein–Zernike) behaviour typical of the smooth case does not hold in the multiple point case. For example, when $\sing$ has a multiple point singularity at $(1, \ldots, 1)$, rather than $a_\b{r}$ decaying as $|\b{r}|^{-1/2}$ as $|\b{r}| \to \infty$, $a_\b{r}$ is very nearly polynomial in a cone of directions.
This special issue is devoted to the Analysis of Algorithms (AofA). Most of the papers are from the Eighth Seminar on Analysis of Algorithms, held in Strobl, Austria, June 23–29, 2002.
Heap ordered trees are planted plane trees, labelled in such a way that the labels always increase from the root to a leaf. We study two parameters, assuming that $p$ of the $n$ nodes are selected at random: the size of the ancestor tree of these nodes and the smallest subtree generated by these nodes. We compute expectation, variance, and also the Gaussian limit distribution, the latter as an application of Hwang's quasi-power theorem.