NOTE: This page is retained for archive purposes only. Actively updated page is here.
This page contains the index for the Technical Reports Series of the Computer Science Department of the University of Otago.
All documents are in pdf format.
The documents have not been subjected to peer review and the department is not responsible for the contents of the papers. Some papers may be removed completely later, replaced by more up-to-date versions in due time, or may be removed for copyright reasons after publication in journals, in which case they will keep their position in the technical reports series but only as a pointer to that journal.
Submissions page (for Computer Science Staff only)
The archive is maintained by Robert Pollock.
2017
Richard O'Keefe Complex Arithmetic is Complex
Abstract: |
Richard O'Keefe Logic Programming Modules as Possible Worlds
Abstract: |
Richard O'Keefe Child Modules for Erlang and Prolog
Abstract: |
Alistair Knott Sensorimotor cognition and natural language syntax Part II
Abstract: |
Alistair Knott, Lech Szymanski, Brendan McCane
Martin Takac A model of object property representations: visual object classification, working memory and the syntax of predication |
Alistair Knott An extended model of deictic routines, supporting a wider-coverage SM interpretation of syntax |
Alistair Knott Road map for an embodied model of language and cognition |
2016
Alistair Knott Martin Takac A simulationist model of episode representations in working memory: syntactic interpretation, nested episodes and storage requirements
Abstract: |
Richard O'Keefe How to compute a mean?
Abstract: |
Lahiru Ariyasinghe, Zhiyi Huang, David Eyers The Impact of IP Network Impairments on Optimal Playback Buffer Size in Video Streaming
Abstract: |
2014
Glenn Blanchette, Brendan McCane, Willem Labuschagne and Anthony Robins Representing Symbolic Logic in an Artifical Neural Network Abstract:
|
Lech Szymanski, David Eyers Practical use of SELinux for enhancing the security of web applications Note: If readers wish to run through examples, the report is also available here. This has links to Virtual Machine files so that people working through the tutorial can choose to start off at any chapter.
Abstract: |
Jeremy Lee-Hand and Alistair Knott A neural network model of causative actions Abstract: |
2013
Adeel Javed, Haibo Zhang, and Zhiyi Huang Jeremiah Deng BWS: Beacon-driven Wake-up Scheme for Train Localization using Wireless Sensor Networks Abstract: |
Supporting data files:
connectivity_analysis.tbz2 (3.8MB) If you want these data files, please email Robert Pollock - rpollock@cs.otago.ac.nz - for a download link.
|
Paul McCarthy, Lubica Benuskova
Elizabeth Franz Functional network analysis of aging and Alzheimer's Disease: Results Abstract: These data files may be used for research purposes. Please cite this report if you do so. |
Jeremy Lee-Hand and Alistair Knott Department of Computer Science, University of Otago Training and testing of a neural network model of motor control Abstract: |
Mira Guise, Alistair Knott, Lubica Benuskova Department of Computer Science, University of Otago Response Fingerprinting: a probabilistic method for evaluating the network response to stimuli Abstract: |
Note: updated 13.9.13
|
Hayden Walles, Anthony Robins and Alistair Knott Department of Computer Science, University of Otago A neural network model of visual attention and object classification: technical details Abstract: |
|
Mira Guise, Alistair Knott, Lubica Benuskova Department of Computer Science, University of Otago Consistency of polychronous neural group activation supports a role as an underlying mechanism for representation and memory: detailed methods and results Abstract: |
OUCS-2013-07 Not available: to be published
|
Yawen Chen, Jason Mair, Zhiyi Huang, David Eyers Department of Computer Science, University of Otago A State-based Energy/Performance Model for A Parallel Application on Multicore Computers Abstract: |
OUCS-2013-06 Not available: to be published
|
Yawen Chen, Haibo Zhang Department of Computer Science, University of Otago Ke Chen, Huaxi Gu State Key Laboratory of Integrated Service Networks, Xidian University, Xi'an, China TWC-based approach for Improving Communication Reliability in Optical Network-on-chip Abstract: |
OUCS-2013-05 Not available: to be published
|
Yawen Chen, Haibo Zhang Department of Computer Science, University of Otago Liu Bai, Huaxi Gu Xidian University, China A Hierarchical Hybrid Optical-Electronic Clos Architecture for Network-on-Chip Abstract: |
OUCS-2013-04 Not available: to be published
|
Yawen Chen, Haibo Zhang Department of Computer Science, University of Otago Zheng Chen, Huaxi Gu State Key Laboratory of Integrated Service Networks, Xidian University, Xi’an, China Source- and Destination-based Wavelength Assignment Approach in Optical Network-on-Chip: Design and Performance Abstract: |
|
Kai-Cheung Leung Department of Computer Science, University of Otago PhD Thesis: View-Oriented Parallel Programming and its Performance Evaluation on Multicore Architectures Abstract: |
Note: This report was updated 31.10.2014
|
Mira Guise, Alistair Knott, Lubica Benuskova Department of Computer Science, University of Otago Spinula: software for simulation and analysis of spiking network models Abstract: |
|
Mira Guise, Alistair Knott, Lubica Benuskova Department of Computer Science, University of Otago Experiments on the effect of synaptic disruption on polychronous group formation: detailed methods and results Abstract: Izhikevich et al. (2004) have previously shown that synaptic disruption produces a dramatic decrease in PNG counts, leading them to the conclusion that PNG formation depends on activity-dependent changes in synaptic plasticity. However, despite the disruption some polychronous groups remain in the network, suggesting that polychronous groups can sometimes be formed by chance arrangements of synaptic weights in the network. In the following report we reproduce and extend the work of Izhikevich et al. (2004) by delving further into the nature of PNG formation: firstly, we examine the effects of synaptic disruption on the groups that remain; we then examine the considerable inter-network variation in PNG counts over the time-course of network maturation and categorize the resulting pro.les into discrete classes of behavior. The first experiment found a highly signifcant decrease in PNG count following synaptic disruption (paired t(19) = 9:0; p < 0:001), reproducing the previous report (Izhikevich et al., 2004). However, we also found a highly significant decrease in both size (paired t(19) = 10:7; p < 0:001) and temporal length (paired t(19) = 10:8; p < 0:001) in the remaining polychronous groups. A further experiment employing sampling at multiple time-points found two previously unreported phenomena: firstly, there is a consistent small peak in the PNG counts immediately following initialization; secondly, comparison of the temporal profiles of multiple networks over the course of maturation shows two broad classes of network behavior: either cyclic, or an initial burst of productivity followed by a slow decline. These results are discussed in the context of a model of PNG formation involving an activity- dependent interaction between supported and adapted groups which is at the heart of PNG formation. |
|
Martin Takac Centre for Cognitive Science, Comenius University, Slovakia Alistair Knott Department of Computer Science, University of Otago A neural network model of working memory for episodes Abstract: |
2012
Now
|
Alistair Knott Department of Computer Science, University of Otago Sensorimotor Cognition and Natural Language Syntax Abstract: |
2011
|
Richard O'Keefe Department of Computer Science, University of Otago Specifying Exact Scaled Decimal Arithmetic Abstract: |
|
Martin Takac, Lubica Benuskova and Alistair Knott Department of Computer Science, University of Otago A connectionist model of language acquisition and sentence generation: Technical appendix Abstract: |
|
Hayden Walles, Anthony Robins and Alistair Knott Department of Computer Science, University of Otago Performance of a convolutional classifier network on the MNIST handwritten digit database Abstract: |
|
Martin Takac, Lubica Benuskova, Alistair Knott Department of Computer Science, University of Otago Mapping sensorimotor sequences to word sequences: A connectionist model of language acquisition and sentence generation Abstract: |
2010
|
K. Leung and Z. Huang Department of Computer Science, University of Otago View-Oriented Transactional Memory Abstract: |
|
Michael Albert Department of Computer Science, University of Otago Young classes of permutations Abstract: |
|
Martin Takac, Alistair Knott, Lubica Benuskova Department of Computer Science, University of Otago Generation of idioms in a simple recurrent
network architecture Abstract:
|
OUCS-2010-01 This report is now available here
|
Benuskova L (2012) Why is it hard to induce LTD? Proc. IEEE International Joint Conference on Neural Networks (IJCNN), pp. 3329-3335. Digital Object Identifier: 10.1109/IJCNN.2012.6252827
|
2009
|
Kai-Cheung Leung Zhiyi Huang Qihang Huang Paul Werstein University of Otago Data Race: Tame the Beast Abstract: |
2008 Theses
|
Philip McLeod Fast, Accurate Pitch Detection Tools for Music Analysis Abstract: Precise pitch is important to musicians. We created algorithms for real-time pitch detection that generalise well over a range of single ‘voiced’ musical instruments. A high pitch detection accuracy is achieved whilst maintaining a fast response using a special normalisation of the autocorrelation (SNAC) function and its windowed version, WSNAC. Incremental versions of these functions provide pitch values updated at every input sample. A robust octave detection is achieved through a modified cepstrum, utilising properties of human pitch perception and putting the pitch of the current frame within the context of its full note duration. The algorithms have been tested thoroughly both with synthetic waveforms and sounds from real instruments. A method for detecting note changes using only pitch is also presented. Furthermore, we describe a real-time method to determine vibrato parameters - higher level information of pitch variations, including the envelopes of vibrato speed, height, phase and centre offset. Some novel ways of visualising the pitch and vibrato information are presented. Our project ‘Tartini’ provides music students, teachers, performers and researchers with new visual tools to help them learn their art, refine their technique and advance their fields. |
2008 Reports
|
Hans van Ditmarsch Andreas Herzig Tiago de Lima An optimal method for reasoning about actions Abstract: |
|
J. Zhang, W. Chen, W. Zheng Z. Huang, Q. Huang View-Oriented Parallel Programming on CMT processors Abstract: |
2007 Theses
|
Nathan Rountree Initialising Neural Networks with Prior Knowledge A thesis submitted for the degree of Doctor of Philosophy at the University of Otago, Dunedin, New Zealand Abstract: Decision trees carve up databases into box-shaped regions, and make predictions based on the majority class in each box. They are quick to build and relatively easy to interpret. Multilayer perceptrons (MLPs) are often more accurate than decision trees, because they are able to use soft, curved, arbitrarily oriented decision boundaries. Unfortunately MLPs typically require a great deal of effort to determine a good number and arrangement of neural units, and then require many passes through the database to determine a good set of connection weights. The cost of creating and training an MLP is thus hundreds of times greater than the cost of creating a decision tree, for perhaps only a small gain in accuracy. The following scheme is proposed for reducing the computational cost of creating and training MLPs. First, build and prune a decision tree to generate prior knowledge of the database. Then, use that knowledge to determine the initial architecture and connection weights of an MLP. Finally, use a training algorithm to refine the knowledge now embedded in the MLP. This scheme has two potential advantages: a suitable neural network architecture is determined very quickly, and training should require far fewer passes through the data. In this thesis, new algorithms for initialising MLPs from decision trees are developed. The algorithms require just one traversal of a decision tree, and produce four-layer MLPs with the same number of hidden units as there are nodes in the tree. The resulting MLPs can be shown to reach a state more accurate than the decision trees that initialised them, in fewer training epochs than a standard MLP. Employing this approach typically results in MLPs that are just as accurate as standard MLPs, and an order of magnitude cheaper to train. |
|
Simon McCallum Catastrophic Forgetting and the Pseudorehearsal Solution in Hopfield Networks A thesis submitted for the degree of Doctor of Philosophy at the University of Otago, Dunedin, New Zealand - 29 June 2007 Abstract: |
2007 technical reports
|
K. Britz J. Heidema W. Labuschagne
Abstract: |
2006 Reports
|
Anthony Robins, Chris Gillum Rehearsal and stability profiles in Hopfield type networks Abstract: |
|
Hans van Ditmarsch Barteld Kooi The logic of ontic and epistemic change Abstract: |
NB: This report was updated 11-Oct-06
|
Simon McCallum Computer Science Graduate Shortage Abstract: |
|
M.H. Albert Micah Coleman, Ryan Flynn Imre Leader Permutations Containing Many Patterns Abstract: |
|
Zhiyi Huang View-Oriented Parallel Programming Abstract: |
|
Hans van Ditmarsch Ji Ruan What is my number? - A new epistemic riddle Abstract: |
|
Philippe Balbiani, Andreas Herzig,
and Tiago De Lima Hans van Ditmarsch What becomes true after arbitrary announcements Abstract: |
|
M. H. Albert, M. D. Atkinson R. Brignall Permutation Classes of Polynomial Growth Abstract: |
|
M. H. Albert, M. D. Atkinson, C.
C. Handley R. E. L. Aldred, D. J. McCaughan B. E. Sagan Monotonic Sequence Games Abstract: |
30/8/2006: This paper was revised. Important Note: This .pdf may be unreadable on your monitor - please save it and print it to read it. |
Hans van Ditmarsch and Willem Labuschagne, Department of Computer Science, University of Otago My beliefs about your beliefs - a case study in theory of mind
and epistemic logic Abstract: |
|
Joost van Oijen, visiting student from the University of Twente A model of the relationship between language and sensorimotor cognition Abstract: |
|
Hans van Ditmarsch, Department
of Computer Science, University of Otago Sum and Product in Dynamic Epistemic Logic Abstract: We then model the Sum-and-Product riddle in a modal logic called public announcement logic. This logic contains operators for knowledge, but also operators for the informational consequences of public announcements. The logic is interpreted on multi-agent Kripke models. The information in the riddle can be represented in the traditional way by number pairs, so that Sum knows their sum and Product their product, but also as an interpreted system, so that Sum and Product at least know their local state. We show that the different representations are isomorphic. We also provide characteristic formulas of the initial epistemic state of the riddle. Finally we analyze one of the announcements towards the solution of the riddle as a so-called unsuccessful update: a formula that become false because it is announced. The riddle is then implemented and its solution verified in the epistemic model checker DEMO. This can be done, we think, surprisingly elegantly. The results are compared with other work in epistemic model checking. |
2005 reports
|
Hans van Ditmarsch & Ji Ruan, Department of Computer
Science, University of Otago Model Checking Sum and Product
Abstract: The information in the riddle can be represented in the traditional way by number pairs, so that Sum knows their sum and Product their product, but also as an interpreted system, so that Sum and Product at least know their local state. We show that the different representations are isomorphic. The riddle is then implemented and its solution verified in the epistemic model checker DEMO. This can be done, we think, surprisingly elegantly. It involves reformulations to facilitate the computation. |
Maarten van der Veen, Jeroen van
Dijk Implementation of a model of the relation between language
and sensorimotor cognition Abstract: |
Michael H. Albert On the length of the longest subsequence avoiding an arbitrary pattern in a random permutation Abstract: |
Hans van Ditmarsch Wiebe van der Hoek Ron van der Meyden Ji Ruan Model Checking Russian Cards Abstract: |
Edwin van der Ham Diagnosing and responding to student errors in a dialogue-based computer-aided language-learning system Abstract: |
Michael H. Albert Steve Linton Nik Ruškuc The Insertion Encoding of Permutations Abstract: |
M. H. Albert, M. D. Atkinson, H.
P. van Ditmarsch, C. C. Handley R. E. L. Aldred, D. A. Holton, D. J. McCaughan Sorting Classes Abstract: |
M.H. Albert M. Elder A. Rechnitzer P. Westcott M. Zabrocki On the Wilf-Stanley limit of 4231-avoiding permutations and a conjecture of Arratia. Abstract: |
Nanda Slabbers A system for generating teaching initiatives in a computer-aided language learning dialogue Abstract: The initiative module supports two different goals. The first one is the formal goal of generating an initiative which is appropriate in the context. Furthermore the dialogue system is used for second language learning and therefore the module also supports the substantive goal of teaching the student a number of syntactic constructions. |
OUCS-2005-01 Note: this report will be made available later. |
Alexis Angelidis Fabrice Neyret Simulation of Smoke based on Vortex Filament Primitives Abstract: |
2004 reports
OUCS-2004-21 | Stewart Fleming Biometric security: Concepts, Issues and Flaws Abstract: Biometric systems have grown in popularity as a way to provide personal identification. Personal identification is crucially important in many applications and the upsurge in credit-card fraud and identity theft in recent years indicates that this is an issue of major concern in wider society. Individual passwords, PIN identification, cued keyword personal questions or even token-based arrangements all have deficiencies that restrict their applicability in a widely-networked society. The advantage claimed by biometric systems is that they can establish an unbreakable one-to-one correspondence between an individual and a piece of data. The drawback with biometric systems is their perceived invasiveness and the general risks that can emerge when biometric data is not properly handled. There are good practices which, when followed, can provide the excellent match between data and identity that biometrics promise; if not followed, can lead to enormous risks to privacy for an individual. |
OUCS-2004-20 | Alexis Angelidis Hexanions: 6D Space for Twists Abstract: |
OUCS-2004-19 | Michael H. Albert Nik Ruškuc Steve Linton On the Permutational Power of Token Passing Networks Abstract: |
OUCS-2004-18 | Hans van Ditmarsch Wiebe van der Hoek Barteld Kooi Playing cards with Hintikka Abstract: |
OUCS-2004-17 | Stewart Fleming and Sonil Gohil Further Reflection on Homage Anonymous Group Authentication Protocol Abstract: |
OUCS-2004-16 | Sonil Gohil, Stewart Fleming Attacks on Homage Anonymous Group Authentication Protocol Abstract:
We propose slight modifications to the original protocol that take all of Handley’s assertions into account and eliminate the ability of the authority to cheat. We believe that this secures the basic protocol and we report on an implementation that demonstrates the protocol in action. As an extension to the original protocol, we propose a number of options to incorporate biometric authentication into Homage without compromising anonymity and preserving efficiency. We critique the various options, showing which are and are not compatible with the basic objectives of Homage. This report is an edited version of the original report submitted by Sonil Gohil (see separate Technical Report) to summarize the work done during summer bursary project in December 2003-January 2004. It incorporates the additional work that was done in refactoring the implementation and critiquing the biometric options that was done in preparation for publication in Financial Cryptography conference in 2005 (see Report oucs-2004-17 above). |
OUCS-2004-15 | Stewart T. Fleming Talking Past Each Other – Student And Staff Reflection In Undergraduate Software Projects Abstract: We explore the nature of self-, peer- and staff-reflection to identify and mediate issues within a class. We have used a protocol that encourages reflection to explore conflicts that arise from group work in a Software Engineering paper. We have found a way to explore and mediate student impressions and expectations and to identify conflicts with staff expectations and course objectives. We present a lightweight and flexible approach for such investigations.
|
Note: this report was updated 29/9/2004 |
Stewart T. Fleming Open Source Intellectual Property Rights - Issues and Trends Abstract:
The Free Software movement takes open source one step further, asserting that, in addition to freedom of availability through publication, there should be legally-enforceable rights to ensure that it stays freely available and that such protections should extend to derived works. The impetus of both movements has resulted in the widespread distribution of a significant amount of free software, particularly GNU/Linux and Apache Web server. The nature of this software and the scale of installation appears to be an emerging concern for “closed” software vendors. At this time, we are seeing the emergence of legal challenges to the open source movement and a clash with the changing landscape of intellectual property and copyright protection. There is spirited debate within and between both movements regarding the nature of open source software and the concerns over the extent to which software should remain free or become proprietary. This article concentrates on the issues directly relating to open source licenses and their impact on copyright and intellectual property rights and the legal risks that may arise. For more general reference, the reader is directed to the Web sites of the Free Software Foundation (http://www.fsf.org), Open Source Initiative (http://www.opensource.org) and the excellent bibliography maintained by Stefan Koch (http://wwwai.wu-wien.ac.at/~koch/forschung/sw-eng/oss_list.html) |
Note: this report was updated 29/9/2004 |
Stewart T. Fleming Virtual Learning Communities - Supporting Learning through Interaction Abstract:
Virtual learning communities are defined as groups of individuals that come together to study some area of common interest. They are virtual communities in the sense that they depend on a variety of Information and Communication Technologies (ICT) to coordinate their activities. They share many characteristics with virtual communities of practice. The nature of the relationships between these three constructs is explored below. The role of ICT and multimedia in supporting VLCs is reviewed. This article concludes with a summary of the challenges facing both organizations in stimulating the presence and growth of VLCs and the individuals who participate in such communities. |
OUCS-2004-12 | M. H. Albert, M. D. Atkinson, H.
P. van Ditmarsch, C. C. Handley R. E. L. Aldred, D. A. Holton, D. J. McCaughan Compositions of pattern restricted sets of permutations Abstract: |
OUCS-2004-11 | M. H. Albert S. Linton A Practical Algorithm for Reducing Non-deterministic Finite
Ilie and Yu have described a construction of a right-invariant equivalence relation on the states of a non-deterministic finite-state automaton. Such a relation can be used to reduce the number of states in a non-deterministic finite-state automaton as a preliminary step before determinization. We give a more efficient algorithm for constructing the same equivalence, together with results from a computer implementation. |
OUCS-2004-10 | Hans van Ditmarsch Barteld Kooi The Secret of My Success Abstract:In an information state where various agents have both factual knowledge and knowledge about each other, announcements can be made that change the state of information. Such informative announcements can have the curious property that they become false because they are announced. The most typical example of that is 'fact p is true and you don't know that', after which you know that p, which entails the negation of the announcement formula. The announcement of such a formula in a given information state is called an unsuccessful update. A successful formula is a formula that always becomes common knowledge after being announced. Analysis of information systems and 'philosophical puzzles' reveals a growing number of dynamic phenomena that can be described or explained by unsuccessful updates. This increases our understanding of such philosophical problems. We also investigate the syntactic characterization of the successful formulas. |
OUCS-2004-09 | Z. Huang, P. Werstein M. Purvis View-Oriented Parallel Programming and View-based Consistency Abstract:This paper proposes a novel View-Oriented Parallel Programming style for parallel programming on cluster computers. View-Oriented Parallel Programming is based on Distributed Shared Memory. It requires the programmer to divide the shared memory into views according to the nature of the parallel algorithm and its memory access pattern. The advantage of this programming style is that it can help the Distributed Shared Memory system optimise consistency maintenance. Also it allows the programmer to participate in performance optimization of a program through wise partitioning of the shared memory into views. The View-based Consistency model and its implementation, which supports View-Oriented Parallel Programming, is discussed as well in this paper. Finally some preliminary experimental results are shown to demonstrate the performance gain of View-Oriented Parallel Programming. |
OUCS-2004-08 | M. H. Albert M.S. Paterson Bounds For The Growth Rate Of Meander Numbers Abstract:We provide improvements on the best currently known upper and lower bounds for the exponential growth rate of meanders. The method of proof for the upper bounds is to extend the Goulden-Jackson cluster method. |
OUCS-2004-07 | Hans van Ditmarsch The case of the hidden handAbstract:This short contribution answers a remaining question concerning the Russian Cards problem. The Russian Cards problem is a case study in information-based security protocols. Two out of more card players are able to communicate their hand of cards to each other (i.e., solve the problem) under conditions of public communication, by various ways. Here, we show that no effective protocol for card deal 245.013.6 (Anne holds 245, Bill holds 013, Cath holds 6) starts with Anne saying that her hand is one of 012, 034, 056, 135, 245, 246. This involves investigating protocols up to length four. |
OUCS-2004-06 | Maarten van Schagen Tauira: A bilingual dialogue-based lexical acquisition systemAbstract:A lexical authoring tool (Tauira) placed within a bilingual bidirectional dialogue context is described. The tool's dialogue is initiated when one or more unknown words are uttered by the user in the surrounding dialogue system. Based on the context of the sentence the word was uttered in a set of hypotheses are created for possible word types and stems of the unknown word. These hypotheses are reduced using a set of multiple choice questions until only one remains: the new word entry. Hypothesis reduction is done by asking closed questions about the syntactic validity of the unknown word in example sentences. These example sentences are generated based on sentences from the test suite which accompanies the system's grammar. Because the tool operates in a bilingual (English-Maori) context, both the unknown word and its translation are added. The translation for an unknown word is deduced from a translation of the original sentence containing the source word. This tool provides an interesting addition to the field of lexical authoring; in addition, the machinery developed can be used to formally evaluate the coverage of a test suite on a grammar concerning word types. |
OUCS-2004-05 | A Knott, I Bayard and P Vlugter Multi-agent human-machine dialogue: issues in dialogue management and referring expression semanticsAbstract:This paper describes a human-machine dialogue system which is configured to support dialogue between multiple speakers. The user is one speaker, and the system 'plays' a number of other speakers. We present a number of principles governing dialogue management in such cases, which relate to turn-taking and the identification of the addressees of utterances. We also describe how the syntactic and semantic treatment of first- and second-person personal pronouns, and of addressee terms, need to be extended to deal with the multi-speaker scenario. We conclude by giving some examples. |
Note: this paper was updated 29/9/04 |
Lorene Earnshaw, Stewart Fleming, Alistair Knott
Analysis Of Errors Made By Learners Of Maori In An Introductory University CourseAbstract:This report presents a survey of the range of grammatical and lexical errors made in written Maori by University students taking an introductory course in Maori language. We begin by introducing and motivating an error classification of different classes of error. We then provide an analysis of three different types of student writing: homework assignments, impromptu tests and exam transcripts. We conclude with some remarks about the patterns of errors which we found. |
OUCS-2004-03 | Z. Huang A View-based Consistency Model based on Transparent Data Selection in Distributed Shared MemoryAbstract:This paper proposes a novel View-based Consistency model for Distributed Shared Memory, in which a new concept, view, is coined. A view is a set of data objects that a processor has the right to access in the shared memory.The View-based Consistency model only requires that the data objects of a processor's view are updated before a processor accesses them. In this way, it can achieve the maximum relaxation of constraints on modification propagation and execution in data-race-free programs. This paper first briefly reviews a number of related consistency models in terms of their use of three techniques -- time, processor and data selection -- which each eliminate some unnecessary propagation of memory modifications while guaranteeing sequential consistency for data-race-free programs. Then, we present the View-based Consistency model and its implementation. In contrast with other models, the View-based Consistency model can achieve transparent data selection without programmer annotation and can offer the maximum performance advantage. Differences among related work are discussed through illustrative examples. Performance evaluation has shown that our implementation of the View-based Consistency model outperforms the Lazy Release Consistency model, and that the View-based Consistency model has advantages over optimal consistency protocols such as the Affinity Entry Consistency protocol. Finally we summarise our contributions and point out our future direction of implementation effort for distributed shared memory systems. |
OUCS-2004-02 | Hans van Ditmarsch Department of Computer Science, University of Otago Logic and game theory of PitAbstract:Pit is a multi-player card game that simulates the commodities trading market, and where actions consist of bidding and of swapping cards. We define a simplification of that game for which we present a detailed description of all dynamical game features. The description is in a standard language for dynamic epistemics. This formalization is then used to outline the game theory for a simplification of the Pit game. This uncovers some interesting equilibria. |
OUCS-2004-01 | Alexis Angelidis Department of Computer Science, University of Otago Spherical SpringsAbstract:The unit sphere is a space where geodesic distances can be defined easily. Dynamic elements can therefore be efficiently animated in it, provided that they are represented adequately. We present basic elements for dynamic simulation in the unit sphere. The presented formulas which apply to quaternions parallel euclidean physics. |
OUCS-2003-08 | Mike Atkinson and Michael Albert Department of Computer Science, University of Otago Simple permutations and pattern restricted permutationsAbstract:A simple permutation is one that does not map any non-trivial intervalonto an interval. It is shown that, if the number of simple permutations in a pattern restricted class of permutations is finite, the class has an algebraic generating function and is defined by a finite set of restrictions. Some partial results on classes with an infinite number of simple permutations are given. Examples of results obtainable by the same techniques are given; in particular it is shown that every pattern restricted class properly contained in the 132-avoiding permutations has a rational generating function. |
Note: Report updated 15/3/04 |
Hans van Ditmarsch (editor) Department of Computer Science, University of Otago Proceedings of the 2004 annual conference of the Australasian Association for LogicAbstract:This report contains abstracts of talks contributed to the 2004 annual conference of the Australasian Association for Logic, to be held in Dunedin on January 17 and 18 2004. These abstracts will later be published in the journal 'Bulletin of Symbolic Logic'. |
Note: Report and Status updated 15/3/04 |
M.H. Albert, M.D. Atkinson, H.P. van Ditmarsch,
C.C. Handley Department of Computer Science, University of Otago R.E.L. Aldred Safe communication for card players by combinatorial designs for two-step protocolsAbstract:Two parties A and B select a cards and b cards from a known deck and
a third party C receives the remaining c cards. We consider methods
whereby A can, in a single message, publicly inform B of her hand without
C learning any card held by A or by B. Conditions on a; b; c are given
for the existence of an appropriate message. |
Note: Status updated 15/3/04 |
M.H.Albert, M.D.Atkinson Department of Computer Science, University of Otago M.Klazar The enumeration of simple permutationsAbstract:A simple permutation is one which maps no proper non-singleton interval
onto an interval. We consider the enumeration of simple permutations
from several aspects. Our results include a straightforward relationship
between the ordinary generating function for simple permutations and
that for all permutations, that the coefficients of this series are
not P-recursive, an asymptotic expansion for these coefficients, and
a number of congruence results. |
OUCS-2003-04 | Alistair Knott Department of Computer Science, University of Otago Grounding syntactic representations in an architecture for sensorimotor controlAbstract:The aim of this paper is to suggest a way of characterising the syntactic
structure of a sentence as a description or trace of a sensorimotor
process. My starting point is the idea (see also Hurford, 2003; Jackendoff,
2002) that the logical form of a sentence should be thought of not as
a direct representation of the world, but rather as an evocation of
a cognitive process which interfaces with the world via various perceptual
and motor mechanisms. I will argue, departing from Hurford and Jackendoff,
that the structure of this evoked cognitive process has extensive reflexes
in the syntax of sentences as well as in their semantics. |
OUCS-2003-03 | Alexis Angelidis, Geoff Wyvill Department of Computer Science, University of Otago Marie-Paule Cani Modeling by Deformation Using Swept User-Defined ToolsAbstract:We present a new class of space deformations suitable for interactive
virtual sculpture. The artist describes a basic deformation as a path
through which a tool is moved. Our tools are simply shapes, subsets
of 3D space. So we can use shapes already created as customized tools
to make more complex shapes or to simplify the modeling process. When
a tool is moved it causes a deformation of the working shape along the
path of the tool. This is in accordance with a clay modeling metaphor
and easy to understand and predict. More complicated deformations are
achieved by using several tools simultaneously in the same region. It
is desirable that deformations for modeling are 'foldover-free', that
is parts of deformed space cannot overlap so that the deformations are
reversible. There are good intuitive reasons to believe that our deformations
are foldover-free but we have not yet completed a proof. We have an
efficient formulation for a single tool following a simple path (translation,
scaling or rotation) and we can demonstrate the effects of multiple
tools used simultaneously. The prototype implementation described has
been used to create a variety of models quickly and conveniently. |
OUCS-2003-02 | Michael H. Albert Department of Computer Science, University of Otago Proceedings, Permutation Patterns 2003Abstract:PP2003 was the first conference devoted exclusively to the study of permutation patterns and related results. These proceedings are intended as a set of abstracts and extended abstracts. The formatting of some of the submissions has been changed slightly to provide a (somewhat) uniform style. Many of the papers (and others) will appear as full versions in the special issue of the Electronic Journal of Combinatorics on Permutation Patterns. |
OUCS-2003-01 | H.P. van Ditmarsch Department of Computer Science, University of Otago W. van der Hoek B.P. Kooi Concurrent dynamic epistemic logicAbstract:For an abstract, see the abstract for OUCS-2002-09. The underlying
report is a (40 pages) book chapter, the results of which are condensed
into the (8 pages) conference proceedings article that will be presented
at AAMAS 2003 Melbourne and that is listed as OUCS-2002-09. The last
is focussed on multiagent system applications and the underlying on
the logical foundations of the proposed formalism. |
Lindsay I Smith A tutorial on Principal Components Analysis
Abstract: Before getting to a description of PCA, this tutorial first introduces mathematical concepts that will be used in PCA. It covers standard deviation, covariance, eigenvectors and eigenvalues. This background knowledge is meant to make the PCA section very straightforward, but can be skipped if the concepts are already familiar. There are examples all the way through this tutorial that are meant to illustrate the concepts being discussed. If further information is required, the mathematics textbook 'Elementary Linear Algebra 5e' by Howard Anton, Publisher John Wiley & Sons Inc, ISBN 0-471-85223-6 is a good source of information regarding the mathematical background. |
OUCS-2002-11 | M.H. Albert Department of Computer Science, University of Otago The fine structure of 321 avoiding permutationsAbstract:Bivariate generating functions for various subsets of the class of
permutations containing no descending sequence of length three or more
are determined. The notion of absolute indecomposability of a permutation
is introduced, and used in enumerating permutations which have a block
structure avoiding 321, and whose blocks also have such structure (recursively).
Generalizations of these results are discussed. |
OUCS-2002-10 | M.H. Albert, M.D. Atkinson, H. van Ditmarsch, C.C. Handley
Department of Computer Science, University of Otago R.E.L. Aldred, D.A. Holton Restricted permutations and queue jumpingAbstract:A connection between permutations that avoid 4231 and a certain queueing
discipline is established. It is proved that a more restrictive queueing
discipline corresponds to avoiding both 4231 and 42513, and enumeration
results for such permutations are given. |
OUCS-2002-09 | H.P. van Ditmarsch Department of Computer Science, University of Otago W. van der Hoek B.P. Kooi Concurrent dynamic epistemic logic for MASAbstract:When giving an analysis of knowledge in multiagent systems, one needs
a framework in which higher-order information and its dynamics can both
be represented. A recent tradition starting in original work by Plaza
treats all of knowledge, higher-order knowledge, and its dynamics on
the same foot. Our work is in that tradition. It also fits in approaches
that not only dynamize the epistemics, but also epistemize the dynamics:
the actions that (groups of) agents perform are epistemic actions. Different
agents may have different information about which action is taking place,
including higher-order information. We demonstrate that such information
changes require subtle descriptions. The contribution of our paper is
that it provides a complete axiomatization for an action language of
van Ditmarsch, where an action is interpreted as a relation between
states and sets of states. The applicability of the framework is found
in every context where multiagent strategic decision making is at stake,
and already demonstrated in game-like scenarios such as Cluedo and card
games. |
OUCS-2002-08 | H.P. van Ditmarsch Department of Computer Science, University of Otago The Russian cards problem: a case study in cryptography with public announcementsAbstract:Suppose we have a stack of cards that is divided over some players.
It may be possible to communicate your hand of cards to another player
by public announcements, without yet another player learning any of
your cards. A solution to this problem consists of some sequence of
announcements and is called an exchange. It is called a direct exchange
if it consists of (the minimum of) two announcements only. The announcements
in an exchange have a special form: they are safe communications, an
interesting new form of update. Certain unsafe communications turn out
to be unsuccessful updates. A communication is a public announcement
that is sknown to be true. Each communication may be about a set of
alternative card deals only, and even about a set of alternatives to
the communicating player's own hand only. There are 102 direct exchanges
for a deal of seven cards where the two players holding three cards
communicate their hands to each other. Our work can be used to design
cryptographic protocols for 'perfect logicians' where secrets are not
just computationally unfeasible to uncover but cannot be uncovered at
all. |
OUCS-2002-07 | H.P. van Ditmarsch Department of Computer Science, University of Otago Het zeven-kaartenprobleem: kennislogica en multi-agentsystemen (The seven cards problem: epistemic logic and multiagent systems)Abstract:This is a Dutch-language publication on the 'seven cards problem',
meaning: "Given seven all different cards, two players each draw three
cards and a third player gets the remaining card. How can the players
with three cards communicate to each other their hands, without the
third player learning any of their cards?" |
OUCS-2002-06 | M.H. Albert and M.D. Atkinson Department of Computer Science, University of Otago Sorting with a forkliftAbstract:A fork stack is a generalised stack which allows pushes and pops of
several items at a time. We consider the problem of determining which
input streams can be sorted using a single forkstack, or dually, which
permutations of a fixed input stream can be produced using a single
forkstack. An algorithm is given to solve the sorting problem and the
minimal unsortable sequences are found. The results are extended to
fork stacks where there are bounds on how many items can be pushed and
popped at one time. In this context we also establish how to enumerate
the collection of sortable sequences. Note: Now published in the Electronic
Journal of Combinatoricshttp://www.combinatorics.org/Volume_9/v9i2toc.html |
OUCS-2002-05 | B. McCane Department of Computer Science, University of Otago T. Caelli Diagnostic Tools for Evaluating HMM ComponentsAbstract:Although there are known algorithms for predicting observation and
state sequences from HMM models there is little discussion on how to
determine the contributions of the different types of HMM parameters
to such predictions and consequently, temporal pattern recognition.
In this note we discuss and compare a number of objective measures that
provide insight into HMM performance in these terms. |
OUCS-2002-04 | M. H. Albert, M. D. Atkinson Department of Computer Science, University of Otago N. Ruskuc Regular closed sets of permutationsAbstract:Machines whose main purpose is to permute and sort data are studied.
The sets of permutations that can arise are analysed by means of finite
automata and avoided pattern techniques. Conditions are given for these
sets being enumerated by rational generating functions. |
OUCS-2002-03 | G.R. Renardel de Lavalette Computing Science, University of Groningen H.P. van Ditmarsch Epistemic actions and minimal modelsAbstract:This paper is about the dynamics of epistemic models, i.e. multimodal
S5 models. We investigate the effect of certain epistemic actions on
such models, with special interest for minimality of the resulting models
and the stream of information between groups of agents. Our choice of
models and actions is inspired by epistemic states and moves that occur
in knowledge games like Cluedo. We focus on intrinsic models M = <W,R,V>,
where worlds w,v in W are structured objects, carrying enough information
to define pairs (w,v) in accessibility relation R, and valuation Vw,
in terms of w and v. Our main result is the reduction of epistemic models,
resulting from epistemic actions, to minimal models (with respect to
bisimulation). This proceeds in three steps: the first step corresponds
with abstraction from the order of actions, the second step with downward
transfer between groups of agents, and the third step with upward knowledge
transfer between groups of agents. |
OUCS-2002-02 | Michael H. Albert Department of Computer Science, University of Otago Integer root finding, a functional perspectiveAbstract:We consider the problem of finding integer parts of roots to equations
in a functional context. Standard techniques from numerical methods
are extended to this case, providing both good performance, and guarantees
of correctness. From an educational standpoint, the clear connection
between the methods for finding roots and the functional code makes
it easier to understand how different methods work, and to compare their
relative effectiveness. |
OUCS-2002-01 | Hans van Ditmarsch Department of Computer Science, University of Otago Keeping secrets with public communicationAbstract:Is it possible to communicate your hand of cards to another player
without yet another player learning any of your cards? Detailed description
of the updates needed to solve this problem reveals an interesting form
of update named a 'safe communication'. This in itself may be considered
of interest to the research community. We solve a specific cards problem
by giving sequences of such safe communications. For arbitrary deals
we have few results yet, also this is more of combinatorial than of
logical interest. References and background have been largely deleted
from this extended abstract. Note that we assume faultless communication:
this contribution is not in the area of transmission protocols, but
in the area of communication protocols, as used in cryptography. |
OUCS-2001-10 | Hans van Ditmarsch Department of Computer Science, University of Otago Reflections on 'The Importance of Being Formal'Abstract:In a 2001 issue of the Mathematical Intelligencer the following problem
was discussed by Yuri and Konstantin Makarychev: 'From a pack of seven
different cards, two players each draw three cards and the third player
gets the remaining card. How can the players with three cards openly
communicate each other all their cards without the third player learning
from any of their cards who holds it?' The authors present a good and
a bad solution for the problem and give a procedural requirement for
a good solution. I had been working on the same problem. I was startled
to discover that my wording of it was similarly prone to bad solutions.
After consideration of the Mathematical Intelligencer article, and more
in accordance with an epistemic logical approach, I suggest a different
perspective: what a good solution is, can also be defined using 'common
knowledge'. All relevant notions have a precise interpretation in relational
structures. Further, I suggest a more interesting example of a 'bad
solution'. Finally, I present some rather different good solutions. |
OUCS-2001-09 | D. Ferguson, W. Labuschagne Department of Computer Science, University of Otago A Preferential Semantics for Epistemic LogicAbstract:The development of agent communication languages casts a spotlight on epistemic logic and the enrichment of epistemic languages by additional operators, e.g. deontic operators or operators representing speech acts. In this paper we focus on two limitations of classical epistemic logic. The standard possible worlds semantics allows one to model either the knowledge or the beliefs of an agent, but it is not so easy to model both in a manner compatible with the intuition that knowledge shares the same 'dimension' as belief. Furthermore, the distinction between knowledge and belief is intimately tied up with defeasibility and non-monotonicity, which in turn (via total preorders) is connected with epistemic entrenchment. We therefore introduce a generalisation of the possible worlds semantics which not only accommodates knowledge and belief simultaneously but admits a hierarchy of belief operators reflecting different levels of entrenchment. |
OUCS-2001-08 | M. H. Albert, M. D. Atkinson, C. C. Handley Department of Computer Science, University of Otago D. A. Holton W. Stromquist On packing densities of permutationsAbstract:The density of a permutation pattern p in a permutation s is the proportion
of subsequences of s of length |p| that are isomorphic to p . The maximal
value of the density is found for several patterns p, and asymptotic
upper and lower bounds for the maximal density are found in several
other cases. The results are generalised to sets of patterns and the
maximum density is found for all sets of length 3 patterns. |
OUCS-2001-07 | Nathan Rountree, Janet Rountree and Anthony Robins
Department of Computer Science, University of Otago Identifying the Danger Zones: Predictors of Success and Failure in a CS1 CourseAbstract:We present the results of a survey which focuses on the backgrounds
and expectations of a group of CS1 students in the first weeks of semester.
When comparing their survey answers to their final grades on the course,
we saw some surprising things: the group which indicated an intention
to continue in computer science did no better than any other, and the
strongest single indicator of success seems to be "expecting to get
an A from the course." In order to see if there were any particular
combinations of answers that indicated success or failure, we ran a
decision-tree classifier over the survey data. This resulted in the
identification of differing "danger zones" for each year of study, in
which we observed about twice the expected proportion of failing students.
|
OUCS-2001-06 | Anthony Robins, Janet Rountree and Nathan Rountree
Department of Computer Science, University of Otago My program is correct but it doesn't run: A review of novice programming and a study of an introductory programming paperAbstract:In this paper we review the literature relating to the psychological
/ educational study of programming. We identify general trends comparing
novice and expert programmers, programming knowledge and strategies,
program generation and comprehension, and objectoriented vs. procedural
programming. Our main focus is on novice programming, characteristic
novice behaviour, and topics relating to novice teaching and learning.
In the context of this review we briefly describe our own introductory
programming paper, COMP103, and note ways in which it addresses key
issues relating to programming strategies and mental models of programs.
We present data regarding the kinds of problems that students meet while
writing their own programs in laboratory sessions. These confirm and
extend results noted in the literature. Most novice problems relate
to algorithmic complexity in certain language features and in basic
program design. A key issue which emerges, but has not previously been
well addressed, is the distinction between effective and ineffective
novices. What characterizes effective novices? Is it possible to turn
ineffective novices into effective ones? We explore these topics and
suggest a framework for organizing the knowledge, strategies and models
that are involved in programming so as to help diagnose and assist novices.
|
OUCS-2001-05 | M. D. Atkinson Department of Computer Science, University of Otago M. M. Murphy, N. Ruskuc Partially well-ordered closed sets of permutationsAbstract:It is known that the "pattern containment" order on permutations is
not a partial well-order. Nevertheless, many naturally defned sub-sets
of permutations are partially well-ordered, in which case they have
a strong finite basis property. Several classes are proved to be partially
well-ordered under pattern containment. Conversely, a number of new
antichains are exhibited that give some insight as to where the boundary
between partially well-ordered and not partially well-ordered classes
lies. |
OUCS-2001-04 | M.H. Albert, M.D. Atkinson Department of Computer Science, University of Otago R.E.L. Aldred, D.A. Holton Algorithms for pattern involvement in permutationsAbstract:We consider the problem of developing algorithms for the recognition
of a fixed pattern within a permutation. These methods are based upon
using a carefully chosen chain or tree of subpatterns to build up the
entire pattern. Generally, large improvements over brute force search
can be obtained. Even using on-line versions of these methods provides
such improvements, though these are often not as great as for the full
method. Furthermore, by using carefully chosen data structures to fine
tune the methods, we establish that any pattern of length 4 can be detected
in O(n log n) time. We also improve the complexity bound for detection
of a separable pattern from O(n6) to O(n5log n). |
OUCS-2001-03 | H.P. van Ditmarsch Department of Computer Science, University of Otago Descriptions of game actionsAbstract:To describe simultaneous knowledge updates for different subgroups
we propose an epistemic language with dynamic operators for actions.
The language is interpreted on equivalence states (S5 states). The actions
are interpreted as state transformers. Two crucial action constructors
are learningand local choice. Learning is the dynamic equivalent of
common knowledge. Local choice aids in constraining the interpretation
of an action to a functional interpretation (state transformer). Bisimilarity
is preserved under execution of actions. The language is applied to
describe various actions in card games. |
|
H.P. van Ditmarsch Department of Computer Science, University of Otago The description of game actions in CluedoAbstract:Game actions in the well-known murder game Cluedo involve interactions
of different subgroups of players, that result in complex knowledge
changes. We introduce a dynamic epistemic language to describe actions
in Cluedo in formal detail. This provides us with a precise description
of Cluedo strategies. Optimal strategies are not yet known. |
OUCS-2001-01 Note: published and no longer available here. |
Cameron Kerr, Zhiyi Huang and Paul Werstein Department of Computer Science, University of Otago A Job Brokering Shell for Interactive Single System Image SupportAbstract:When users interact with computers, programs are run locally on the
machine, and display on the local machine. Single System Image (SSI)
is about taking a cluster of computers, and making them appear and behave
as one system. SSI systems are typically non--interactive, batch systems.
The Job Brokering Shell is a SSI model for running interactive processes
on worker nodes, and having them appear to be running on the clusters
gateway. The assumed environment is one of a gateway into a computer
science student laboratory, where students can log in remotely to the
gateway, and their programs run on the interior laboratory workstations.
|