Skip to main content

Showing 1–35 of 35 results for author: Augustine, J

.
  1. arXiv:2309.16359  [pdf, ps, other

    cs.DC

    Byzantine Resilient Computing with the Cloud

    Authors: John Augustine, Jeffin Biju, Shachar Meir, David Peleg, Srikkanth Ramachandran, Aishwarya Thiruvengadam

    Abstract: We study a framework for modeling distributed network systems assisted by a reliable and powerful cloud service. Our framework aims at capturing hybrid systems based on a point to point message passing network of machines, with the additional capability of being able to access the services of a trusted high-performance external entity (the cloud). We focus on one concrete aspect that was not studi… ▽ More

    Submitted 28 September, 2023; originally announced September 2023.

    Comments: 54 pages

  2. arXiv:2308.12836  [pdf, other

    math.SP

    Pseudospectra of the heat operator Pencil

    Authors: Krishna Kumar G., Judy Augustine

    Abstract: This article undertakes an analysis of the one-dimensional heat equation, wherein the Dirichlet condition is applied at the left end and Neumann condition at the right end. The heat equation is restructured as a non-self-adjoint $2\times 2$ unbounded block operator matrix pencil. The spectral, pseudospectral, and $(n,ε)$-pseudospectral enclosures of the $2\times 2$ unbounded block operator matrix… ▽ More

    Submitted 24 August, 2023; originally announced August 2023.

    MSC Class: Primary 35K05; 47A08; 47A10; Secondary 15A22; 47A30; 80M20

  3. arXiv:2305.18705  [pdf, other

    cs.DS

    Algorithmic Foundations of Inexact Computing

    Authors: John Augustine, Dror Fried, Krishna V. Palem, Duc-Hung Pham, Anshumali Shrivastava

    Abstract: Inexact computing also referred to as approximate computing is a style of designing algorithms and computing systems wherein the accuracy of correctness of algorithms executing on them is deliberately traded for significant resource savings. Significant progress has been reported in this regard both in terms of hardware as well as software or custom algorithms that exploited this approach resultin… ▽ More

    Submitted 29 May, 2023; originally announced May 2023.

  4. arXiv:2212.14542  [pdf, other

    cs.DC

    Recurrent Problems in the LOCAL model

    Authors: Akanksha Agrawal, John Augustine, David Peleg, Srikkanth Ramachandran

    Abstract: The paper considers the SUPPORTED model of distributed computing introduced by Schmid and Suomela [HotSDN'13], generalizing the LOCAL and CONGEST models. In this framework, multiple instances of the same problem, differing from each other by the subnetwork to which they apply, recur over time, and need to be solved efficiently online. To do that, one may rely on an initial preprocessing phase for… ▽ More

    Submitted 29 December, 2022; originally announced December 2022.

    Comments: 48 pages, 11 figures

    ACM Class: F.2.0

  5. arXiv:2211.07902  [pdf, other

    cs.LG

    Byzantine Spectral Ranking

    Authors: Arnhav Datar, Arun Rajkumar, John Augustine

    Abstract: We study the problem of rank aggregation where the goal is to obtain a global ranking by aggregating pair-wise comparisons of voters over a set of items. We consider an adversarial setting where the voters are partitioned into two sets. The first set votes in a stochastic manner according to the popular score-based Bradley-Terry-Luce (BTL) model for pairwise comparisons. The second set comprises m… ▽ More

    Submitted 15 November, 2022; originally announced November 2022.

    Comments: 24 pages, accepted at NeurIPS 22

  6. arXiv:2204.08385  [pdf, other

    cs.DC cs.DS cs.NI

    Awake Complexity of Distributed Minimum Spanning Tree

    Authors: John Augustine, William K. Moses Jr., Gopal Pandurangan

    Abstract: We study the distributed minimum spanning tree (MST) problem, a fundamental problem in distributed computing. It is well-known that distributed MST can be solved in $\tilde{O}(D+\sqrt{n})$ rounds in the standard CONGEST model (where $n$ is the network size and $D$ is the network diameter) and this is essentially the best possible round complexity (up to logarithmic factors). However, in resource-c… ▽ More

    Submitted 19 December, 2023; v1 submitted 18 April, 2022; originally announced April 2022.

    Comments: 29 pages, 1 table, 5 figures, abstract modified to fit arXiv constraints

    ACM Class: F.2.2; F.2.3; G.2.2; G.3

  7. arXiv:2202.13719  [pdf, ps, other

    cs.DC cs.CG

    Guarding Polygons with Holes

    Authors: John Augustine, Srikkanth Ramachandran

    Abstract: We study the Cooperative Guarding problem for polygons with holes in a mobile multi-agents setting. Given a set of agents, initially deployed at a point in a polygon with $n$ vertices and $h$ holes, we require the agents to collaboratively explore and position themselves in such a way that every point in the polygon is visible to at least one agent and that the set of agents are visibly connected.… ▽ More

    Submitted 28 February, 2022; originally announced February 2022.

  8. arXiv:2009.08872  [pdf, other

    physics.soc-ph cs.SI q-bio.PE

    Economy Versus Disease Spread: Reopening Mechanisms for COVID 19

    Authors: John Augustine, Khalid Hourani, Anisur Rahaman Molla, Gopal Pandurangan, Adi Pasic

    Abstract: We study mechanisms for reopening economic activities that explore the trade off between containing the spread of COVID-19 and maximizing economic impact. This is of current importance as many organizations, cities, and states are formulating reopening strategies. Our mechanisms, referred to as group scheduling, are based on partitioning the population into groups and scheduling each group on appr… ▽ More

    Submitted 22 April, 2021; v1 submitted 14 September, 2020; originally announced September 2020.

    Comments: 16 pages, 3 figures, 3 tables

  9. arXiv:2005.05601  [pdf, other

    cs.DC cs.CG

    Guarding a Polygon Without Losing Touch

    Authors: Barath Ashok, John Augustine, Aditya Mehekare, Sridhar Ragupathi, Srikkanth Ramachandran, Suman Sourav

    Abstract: We study the classical Art Gallery Problem first proposed by Klee in 1973 from a mobile multi-agents perspective. Specifically, we require an optimally small number of agents (also called guards) to navigate and position themselves in the interior of an unknown simple polygon with $n$ vertices such that the collective view of all the agents covers the polygon. We consider the visibly connected s… ▽ More

    Submitted 12 May, 2020; originally announced May 2020.

  10. arXiv:2002.05376  [pdf, other

    cs.DC cs.DS

    Distributed Graph Realizations

    Authors: John Augustine, Keerti Choudhary, Avi Cohen, David Peleg, Sumathi Sivasubramaniam, Suman Sourav

    Abstract: We study graph realization problems from a distributed perspective and we study it in the node capacitated clique (NCC) model of distributed computing, recently introduced for representing peer-to-peer networks. We focus on two central variants, degree-sequence realization and minimum threshold-connectivity realization both of which result in overlay network realizations. Overlay network realizati… ▽ More

    Submitted 18 February, 2021; v1 submitted 13 February, 2020; originally announced February 2020.

    Comments: 22 pages, 4 figures. Short version to appear in IPDPS 2020

  11. arXiv:1909.10004  [pdf, other

    cs.DC

    Randomized Gathering of Asynchronous Mobile Robots

    Authors: Debasish Pattanayak, John Augustine, Partha Sarathi Mandal

    Abstract: This paper revisits the widely researched \textit{gathering} problem for two robots in a scenario which allows randomization in the asynchronous scheduling model. The scheduler is considered to be the adversary which determines the activation schedule of the robots. The adversary comes in two flavors, namely, oblivious and adaptive, based on the knowledge of the outcome of random bits. The robots… ▽ More

    Submitted 22 September, 2019; originally announced September 2019.

  12. arXiv:1909.01597  [pdf, other

    cs.DC

    Shortest Paths in a Hybrid Network Model

    Authors: John Augustine, Kristian Hinnenthal, Fabian Kuhn, Christian Scheideler, Philipp Schneider

    Abstract: We introduce a communication model for hybrid networks, where nodes have access to two different communication modes: a local mode where communication is only possible between specific pairs of nodes, and a global mode where communication between any pair of nodes is possible. This can be motivated, for instance, by wireless networks in which we combine direct device-to-device communication (e.g.,… ▽ More

    Submitted 4 September, 2019; originally announced September 2019.

  13. arXiv:1907.12028  [pdf, other

    cs.DC cs.DS

    Spartan: Sparse Robust Addressable Networks

    Authors: John Augustine, Sumathi Sivasubramaniam

    Abstract: A Peer-to-Peer (P2P) network is a dynamic collection of nodes that connect with each other via virtual overlay links built upon an underlying network (usually, the Internet). P2P networks are highly dynamic and can experience very heavy churn, i.e., a large number of nodes join/leave the network continuously. Thus, building and maintaining a stable overlay network is an important problem that has… ▽ More

    Submitted 18 December, 2020; v1 submitted 28 July, 2019; originally announced July 2019.

    Comments: 25 pages, 10 figures. A preliminary version of this paper appeared in the Proceedings of the IEEE International Parallel and Distributed Processing Symposium (IPDPS) 2018

  14. arXiv:1907.10308  [pdf, other

    cs.DC cs.DS

    Scalable and Secure Computation Among Strangers: Resource-Competitive Byzantine Protocols

    Authors: John Augustine, Valerie King, Anisur R. Molla, Gopal Pandurangan, Jared Saia

    Abstract: Motivated, in part, by the rise of permissionless systems such as Bitcoin where arbitrary nodes (whose identities are not known apriori) can join and leave at will, we extend established research in scalable Byzantine agreement to a more practical model where each node (initially) does not know the identity of other nodes. A node can send to new destinations only by sending to random (or arbitrary… ▽ More

    Submitted 25 July, 2019; v1 submitted 24 July, 2019; originally announced July 2019.

    Comments: 24 pages, one figure. The author list has been corrected in the metadata. There are no other changes from version 1

  15. arXiv:1903.09999  [pdf, other

    cs.DB cs.LG

    Multi-Attribute Selectivity Estimation Using Deep Learning

    Authors: Shohedul Hasan, Saravanan Thirumuruganathan, Jees Augustine, Nick Koudas, Gautam Das

    Abstract: Selectivity estimation - the problem of estimating the result size of queries - is a fundamental problem in databases. Accurate estimation of query selectivity involving multiple correlated attributes is especially challenging. Poor cardinality estimates could result in the selection of bad plans by the query optimizer. We investigate the feasibility of using deep learning based approaches for bot… ▽ More

    Submitted 17 June, 2019; v1 submitted 24 March, 2019; originally announced March 2019.

  16. arXiv:1902.08979  [pdf, other

    cs.DC

    Latency, Capacity, and Distributed MST

    Authors: John Augustine, Seth Gilbert, Fabian Kuhn, Peter Robinson, Suman Sourav

    Abstract: We study the cost of distributed MST construction in the setting where each edge has a latency and a capacity, along with the weight. Edge latencies capture the delay on the links of the communication network, while capacity captures their throughput (in this case, the rate at which messages can be sent). Depending on how the edge latencies relate to the edge weights, we provide several tight boun… ▽ More

    Submitted 14 January, 2020; v1 submitted 24 February, 2019; originally announced February 2019.

  17. arXiv:1805.07294  [pdf, ps, other

    cs.DC

    Distributed Computation in Node-Capacitated Networks

    Authors: John Augustine, Mohsen Ghaffari, Robert Gmyr, Kristian Hinnenthal, Fabian Kuhn, Jason Li, Christian Scheideler

    Abstract: In this paper, we study distributed graph algorithms in networks in which the nodes have a limited communication capacity. Many distributed systems are built on top of an underlying networking infrastructure, for example by using a virtual communication topology known as an overlay network. Although this underlying network might allow each node to directly communicate with a large number of other… ▽ More

    Submitted 25 April, 2019; v1 submitted 18 May, 2018; originally announced May 2018.

    Comments: This is the full version of a paper that appears at SPAA 2019

  18. arXiv:1707.06391  [pdf, other

    cs.DC cs.DS

    Deterministic Dispersion of Mobile Robots in Dynamic Rings

    Authors: Ankush Agarwalla, John Augustine, William K. Moses Jr., Madhav Sankar K., Arvind Krishna Sridhar

    Abstract: In this work, we study the problem of dispersion of mobile robots on dynamic rings. The problem of dispersion of $n$ robots on an $n$ node graph, introduced by Augustine and Moses Jr. [1], requires robots to coordinate with each other and reach a configuration where exactly one robot is present on each node. This problem has real world applications and applies whenever we want to minimize the tota… ▽ More

    Submitted 16 October, 2017; v1 submitted 20 July, 2017; originally announced July 2017.

    Comments: 21 pages, 10 figures, concise version of paper to appear in ICDCN 2018

    ACM Class: F.2.2; G.2.2

  19. arXiv:1707.05629  [pdf, ps, other

    cs.DC cs.DS

    Dispersion of Mobile Robots: A Study of Memory-Time Trade-offs

    Authors: John Augustine, William K. Moses Jr

    Abstract: We introduce a new problem in the domain of mobile robots, which we term dispersion. In this problem, $n$ robots are placed in an $n$ node graph arbitrarily and must coordinate with each other to reach a final configuration such that exactly one robot is at each node. We study this problem through the lenses of minimizing the memory required by each robot and of minimizing the number of rounds req… ▽ More

    Submitted 17 July, 2018; v1 submitted 18 July, 2017; originally announced July 2017.

    Comments: 18 pages, conference version appeared in ICDCN 2018

    ACM Class: F.2.2; G.2.2

  20. arXiv:1705.01497  [pdf, other

    cs.CC cs.DS

    Sustaining Moore's Law Through Inexactness

    Authors: John Augustine, Krishna Palem, Parishkrati

    Abstract: Inexact computing aims to compute good solutions that require considerably less resource -- typically energy -- compared to computing exact solutions. While inexactness is motivated by concerns derived from technology scaling and Moore's law, there is no formal or foundational framework for reasoning about this novel approach to designing algorithms. In this work, we present a fundamental relation… ▽ More

    Submitted 22 May, 2017; v1 submitted 3 May, 2017; originally announced May 2017.

  21. arXiv:1607.05645  [pdf, other

    cs.DC

    Information Spreading in Dynamic Networks under Oblivious Adversaries

    Authors: John Augustine, Chen Avin, Mehraneh Liaee, Gopal Pandurangan, Rajmohan Rajaraman

    Abstract: We study the problem of gossip in dynamic networks controlled by an adversary that can modify the network arbitrarily from one round to another, provided that the network is always connected. In the gossip problem, $n$ tokens are arbitrarily distributed among the $n$ network nodes, and the goal is to disseminate all the $n$ tokens to every node. Our focus is on token-forwarding algorithms, which d… ▽ More

    Submitted 19 July, 2016; originally announced July 2016.

    Comments: 23 pages

  22. arXiv:1606.07208  [pdf, other

    cs.DS

    Optimal Evacuation Flows on Dynamic Paths with General Edge Capacities

    Authors: Guru Prakash Arumugam, John Augustine, Mordecai J. Golin, Yuya Higashikawa, Naoki Katoh, Prashanth Srikanthan

    Abstract: A Dynamic Graph Network is a graph in which each edge has an associated travel time and a capacity (width) that limits the number of items that can travel in parallel along that edge. Each vertex in this dynamic graph network begins with the number of items that must be evacuated into designated sink vertices. A $k$-sink evacuation protocol finds the location of $k$ sinks and associated evacuation… ▽ More

    Submitted 23 June, 2016; originally announced June 2016.

    Comments: 24 pages

    ACM Class: F.2.0

  23. Balanced Allocation: Patience is not a Virtue

    Authors: John Augustine, William K. Moses Jr., Amanda Redlich, Eli Upfal

    Abstract: Load balancing is a well-studied problem, with balls-in-bins being the primary framework. The greedy algorithm $\mathsf{Greedy}[d]$ of Azar et al. places each ball by probing $d > 1$ random bins and placing the ball in the least loaded of them. With high probability, the maximum load under $\mathsf{Greedy}[d]$ is exponentially lower than the result when balls are placed uniformly randomly. Vöcking… ▽ More

    Submitted 22 January, 2018; v1 submitted 26 February, 2016; originally announced February 2016.

    Comments: 26 pages, preliminary version accepted at SODA 2016

    ACM Class: F.2.2; G.2.0; G.3

    Journal ref: In Proceedings of the Twenty-Seventh Annual ACM-SIAM Symposium on Discrete Algorithms (SODA 2016), 655-671

  24. arXiv:1404.5448  [pdf, other

    cs.DS cs.CG

    A Polynomial Time Algorithm for Minimax-Regret Evacuation on a Dynamic Path

    Authors: Guru Prakash Arumugam, John Augustine, Mordecai J. Golin, Prashanth Srikanthan

    Abstract: A dynamic path network is an undirected path with evacuees situated at each vertex. To evacuate the path, evacuees travel towards a designated sink (doorway) to exit. Each edge has a capacity, the number of evacuees that can enter the edge in unit time. Congestion occurs if an evacuee has to wait at a vertex for other evacuees to leave first. The basic problem is to place k sinks on the line, with… ▽ More

    Submitted 22 April, 2014; originally announced April 2014.

  25. Robust Leader Election in a Fast-Changing World

    Authors: John Augustine, Tejas Kulkarni, Paresh Nakhe, Peter Robinson

    Abstract: We consider the problem of electing a leader among nodes in a highly dynamic network where the adversary has unbounded capacity to insert and remove nodes (including the leader) from the network and change connectivity at will. We present a randomized Las Vegas algorithm that (re)elects a leader in O(D\log n) rounds with high probability, where D is a bound on the dynamic diameter of the network… ▽ More

    Submitted 18 October, 2013; originally announced October 2013.

    Comments: In Proceedings FOMC 2013, arXiv:1310.4595

    ACM Class: C.2.4; F.2.2

    Journal ref: EPTCS 132, 2013, pp. 38-49

  26. arXiv:1305.1121  [pdf, ps, other

    cs.DC

    Storage and Search in Dynamic Peer-to-Peer Networks

    Authors: John Augustine, Anisur Rahaman Molla, Ehab Morsy, Gopal Pandurangan, Peter Robinson, Eli Upfal

    Abstract: We study robust and efficient distributed algorithms for searching, storing, and maintaining data in dynamic Peer-to-Peer (P2P) networks. P2P networks are highly dynamic networks that experience heavy node churn (i.e., nodes join and leave the network continuously over time). Our goal is to guarantee, despite high node churn rate, that a large number of nodes in the network can store, retrieve, an… ▽ More

    Submitted 6 May, 2013; originally announced May 2013.

    Comments: to appear at SPAA 2013

    ACM Class: F.2.2

  27. arXiv:1111.2918  [pdf, other

    cs.CG

    Localized Geometric Query Problems

    Authors: John Augustine, Sandip Das, Anil Maheshwari, Subhas C. Nandy, Sasanka Roy, Swami Sarvattomananda

    Abstract: A new class of geometric query problems are studied in this paper. We are required to preprocess a set of geometric objects $P$ in the plane, so that for any arbitrary query point $q$, the largest circle that contains $q$ but does not contain any member of $P$, can be reported efficiently. The geometric sets that we consider are point sets and boundaries of simple polygons.

    Submitted 12 September, 2012; v1 submitted 12 November, 2011; originally announced November 2011.

  28. arXiv:1108.0809  [pdf, ps, other

    cs.DS cs.DC

    Distributed Agreement in Dynamic Peer-to-Peer Networks

    Authors: John Augustine, Gopal Pandurangan, Peter Robinson, Eli Upfal

    Abstract: Motivated by the need for robust and fast distributed computation in highly dynamic Peer-to-Peer (P2P) networks, we study algorithms for the fundamental distributed agreement problem. P2P networks are highly dynamic networks that experience heavy node {\em churn}. Our goal is to design fast algorithms (running in a small number of rounds) that guarantee, despite high node churn rate, that almost a… ▽ More

    Submitted 10 September, 2014; v1 submitted 3 August, 2011; originally announced August 2011.

    Comments: to appear at the Journal of Computer and System Sciences; preliminary version appeared at SODA 2012

  29. arXiv:1104.4423  [pdf, ps, other

    cs.GT cs.CC

    Enforcing efficient equilibria in network design games via subsidies

    Authors: John Augustine, Ioannis Caragiannis, Angelo Fanelli, Christos Kalaitzis

    Abstract: The efficient design of networks has been an important engineering task that involves challenging combinatorial optimization problems. Typically, a network designer has to select among several alternatives which links to establish so that the resulting network satisfies a given set of connectivity requirements and the cost of establishing the network links is as low as possible. The Minimum Spanni… ▽ More

    Submitted 11 July, 2011; v1 submitted 22 April, 2011; originally announced April 2011.

    Comments: 30 pages, 7 figures

  30. arXiv:1010.5081  [pdf, other

    cs.GT

    Dynamics of Profit-Sharing Games

    Authors: John Augustine, Ning Chen, Edith Elkind, Angelo Fanelli, Nick Gravin, Dmitry Shiryaev

    Abstract: An important task in the analysis of multiagent systems is to understand how groups of selfish players can form coalitions, i.e., work together in teams. In this paper, we study the dynamics of coalition formation under bounded rationality. We consider settings where each team's profit is given by a convex function, and propose three profit-sharing schemes, each of which is based on the concept of… ▽ More

    Submitted 1 March, 2011; v1 submitted 25 October, 2010; originally announced October 2010.

  31. On the Continuous CNN Problem

    Authors: John Augustine, Nick Gravin

    Abstract: In the (discrete) CNN problem, online requests appear as points in $\mathbb{R}^2$. Each request must be served before the next one is revealed. We have a server that can serve a request simply by aligning either its $x$ or $y$ coordinate with the request. The goal of the online algorithm is to minimize the total $L_1$ distance traveled by the server to serve all the requests. The best known compet… ▽ More

    Submitted 16 September, 2010; v1 submitted 14 April, 2010; originally announced April 2010.

    Report number: MR2781393

    Journal ref: Algorithms and computation. Part II. 2010 LNCS 6507, pp. 254-265

  32. arXiv:1004.0558  [pdf, other

    cs.CG cs.DS

    Querying for the Largest Empty Geometric Object in a Desired Location

    Authors: John Augustine, Sandip Das, Anil Maheshwari, Subhas Nandy, Sasanka Roy, Swami Sarvattomananda

    Abstract: We study new types of geometric query problems defined as follows: given a geometric set $P$, preprocess it such that given a query point $q$, the location of the largest circle that does not contain any member of $P$, but contains $q$ can be reported efficiently. The geometric sets we consider for $P$ are boundaries of convex and simple polygons, and point sets. While we primarily focus on circle… ▽ More

    Submitted 15 December, 2010; v1 submitted 4 April, 2010; originally announced April 2010.

    Comments: This version is a significant update of our earlier submission arXiv:1004.0558v1. Apart from new variants studied in Sections 3 and 4, the results have been improved in Section 5.Please note that the change in title and abstract indicate that we have expanded the scope of the problems we study

  33. arXiv:0902.3517  [pdf, other

    cs.DS cs.DC cs.DM

    Energy-Efficient Shortest Path Algorithms for Convergecast in Sensor Networks

    Authors: John Augustine, Qi Han, Philip Loden, Sachin Lodha, Sasanka Roy

    Abstract: We introduce a variant of the capacitated vehicle routing problem that is encountered in sensor networks for scientific data collection. Consider an undirected graph $G=(V \cup \{\mathbf{sink}\},E)$. Each vertex $v \in V$ holds a constant-sized reading normalized to 1 byte that needs to be communicated to the $\mathbf{sink}$. The communication protocol is defined such that readings travel in pac… ▽ More

    Submitted 20 February, 2009; originally announced February 2009.

    Comments: 15 pages, 7 figures

    ACM Class: F.2.2

  34. Largest Empty Circle Centered on a Query Line

    Authors: John Augustine, Brian Putnam, Sasanka Roy

    Abstract: The Largest Empty Circle problem seeks the largest circle centered within the convex hull of a set $P$ of $n$ points in $\mathbb{R}^2$ and devoid of points from $P$. In this paper, we introduce a query version of this well-studied problem. In our query version, we are required to preprocess $P$ so that when given a query line $Q$, we can quickly compute the largest empty circle centered at some… ▽ More

    Submitted 16 September, 2008; originally announced September 2008.

    Comments: 18 pages, 13 figures

  35. arXiv:cs/0602029  [pdf, ps, other

    cs.CG cs.DS

    Approximate Weighted Farthest Neighbors and Minimum Dilation Stars

    Authors: John Augustine, David Eppstein, Kevin A. Wortman

    Abstract: We provide an efficient reduction from the problem of querying approximate multiplicatively weighted farthest neighbors in a metric space to the unweighted problem. Combining our techniques with core-sets for approximate unweighted farthest neighbors, we show how to find (1+epsilon)-approximate farthest neighbors in time O(log n) per query in D-dimensional Euclidean space for any constants D and… ▽ More

    Submitted 7 February, 2006; originally announced February 2006.

    Comments: 12 pages, 2 figures