7,270 results on '"010201 computation theory & mathematics"'
Search Results
2. Using Fractals and Turtle Geometry to Visually Explain the Spread of a Virus to Kids: A STEM Multitarget Activity
- Author
-
Eugenio Roanes-Lozano and Carmen Solano-Macías
- Subjects
2019-20 coronavirus outbreak ,Coronavirus disease 2019 (COVID-19) ,28A80 ,Computer science ,Epidemiology ,Severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) ,Geometry ,97P70 ,0102 computer and information sciences ,Plan (drawing) ,Modeling and interdisciplinarity (aspects of mathematics education) ,01 natural sciences ,Code (semiotics) ,Article ,97M10 ,law.invention ,Computer graphics ,law ,92D30 ,0101 mathematics ,Turtle (robot) ,Applied Mathematics ,010102 general mathematics ,97R60 ,Computational Mathematics ,Fractals ,Computational Theory and Mathematics ,010201 computation theory & mathematics ,English version ,Computer science and society - Abstract
A lockdown was ordered in Spain on March 2020 due to the COVID-19 pandemic. The first author, advised by the second author, developed a tale and video (in Spanish) with a simplified explanation of virus propagation for their teenager son, justifying the need to stay at home. The tale and video relate the spread of the virus to fractal trees and aim to raise awareness about the transmission of the disease. The video is available from the web page of the Instituto de Matematica Interdisciplinar of the first author’s university. The code was implemented in Scratch 3 and takes advantage of the “Turtle Geometry” (there is an ulterior version using Maple, available from Mapleprimes). This article includes the English version of the original tale, describes the Scratch 3 code, and details possible derived STEM activities. We plan to experiment them in the classroom during the 2020–2021 academic year.
- Published
- 2021
3. A Proof of the Multiplicative 1-2-3 Conjecture
- Author
-
Bensmail, Julien, Hocquard, Hervé, Lajou, Dimitri, Sopena, Eric, Combinatorics, Optimization and Algorithms for Telecommunications (COATI), Inria Sophia Antipolis - Méditerranée (CRISAM), Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-COMmunications, Réseaux, systèmes Embarqués et Distribués (Laboratoire I3S - COMRED), Laboratoire d'Informatique, Signaux, et Systèmes de Sophia Antipolis (I3S), Université Nice Sophia Antipolis (1965 - 2019) (UNS), COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-Centre National de la Recherche Scientifique (CNRS)-Université Côte d'Azur (UCA)-Université Nice Sophia Antipolis (1965 - 2019) (UNS), COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-Centre National de la Recherche Scientifique (CNRS)-Université Côte d'Azur (UCA)-Laboratoire d'Informatique, Signaux, et Systèmes de Sophia Antipolis (I3S), COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-Centre National de la Recherche Scientifique (CNRS)-Université Côte d'Azur (UCA), Laboratoire Bordelais de Recherche en Informatique (LaBRI), Université de Bordeaux (UB)-École Nationale Supérieure d'Électronique, Informatique et Radiocommunications de Bordeaux (ENSEIRB)-Centre National de la Recherche Scientifique (CNRS), COMmunications, Réseaux, systèmes Embarqués et Distribués (Laboratoire I3S - COMRED), Université Nice Sophia Antipolis (... - 2019) (UNS), COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-Centre National de la Recherche Scientifique (CNRS)-Université Côte d'Azur (UCA)-Université Nice Sophia Antipolis (... - 2019) (UNS), COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-Centre National de la Recherche Scientifique (CNRS)-Université Côte d'Azur (UCA)-Inria Sophia Antipolis - Méditerranée (CRISAM), Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria), Université de Bordeaux (UB)-Centre National de la Recherche Scientifique (CNRS)-École Nationale Supérieure d'Électronique, Informatique et Radiocommunications de Bordeaux (ENSEIRB), Université côte d'azur, and Université de bordeaux
- Subjects
FOS: Computer and information sciences ,Discrete Mathematics (cs.DM) ,1-2-3 Conjecture ,0211 other engineering and technologies ,021107 urban & regional planning ,0102 computer and information sciences ,02 engineering and technology ,[INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM] ,01 natural sciences ,product version ,Computational Mathematics ,labels 1-2-3 ,010201 computation theory & mathematics ,FOS: Mathematics ,Discrete Mathematics and Combinatorics ,Mathematics - Combinatorics ,Combinatorics (math.CO) ,Computer Science - Discrete Mathematics - Abstract
International audience; We prove that the product version of the 1-2-3 Conjecture, raised by Skowronek-Kaziów in 2012, is true. Namely, for every connected graph with order at least 3, we prove that we can assign labels 1,2,3 to the edges in such a way that no two adjacent vertices are incident to the same product of labels.
- Published
- 2022
4. Abstract Argumentation with Qualitative Uncertainty: An Analysis in Dynamic Logic
- Author
-
Herzig, Andreas, Yuste-Ginel, Antonio, Logique, Interaction, Langue et Calcul (IRIT-LILaC), Institut de recherche en informatique de Toulouse (IRIT), Université Toulouse Capitole (UT Capitole), Université de Toulouse (UT)-Université de Toulouse (UT)-Université Toulouse - Jean Jaurès (UT2J), Université de Toulouse (UT)-Université Toulouse III - Paul Sabatier (UT3), Université de Toulouse (UT)-Centre National de la Recherche Scientifique (CNRS)-Institut National Polytechnique (Toulouse) (Toulouse INP), Université de Toulouse (UT)-Toulouse Mind & Brain Institut (TMBI), Université Toulouse - Jean Jaurès (UT2J), Université de Toulouse (UT)-Université de Toulouse (UT)-Université Toulouse III - Paul Sabatier (UT3), Université de Toulouse (UT)-Université Toulouse Capitole (UT Capitole), Université de Toulouse (UT), Universidad de Málaga [Málaga] = University of Málaga [Málaga], Antonio Yuste-Ginel PhD grant N° MECDFPU 2016/04113, and European Project: 952215,TAILOR(2020)
- Subjects
[INFO.INFO-SC]Computer Science [cs]/Symbolic Computation [cs.SC] ,Theoretical computer science ,Computer science ,Incomplete argumentation frameworks ,0102 computer and information sciences ,02 engineering and technology ,[INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM] ,Control argumentation frameworks ,ENCODE ,01 natural sciences ,Rotation formalisms in three dimensions ,[INFO.INFO-AI]Computer Science [cs]/Artificial Intelligence [cs.AI] ,Argumentation theory ,[MATH.MATH-LO]Mathematics [math]/Logic [math.LO] ,010201 computation theory & mathematics ,0202 electrical engineering, electronic engineering, information engineering ,Encoding (semiotics) ,Dynamic logic (modal logic) ,020201 artificial intelligence & image processing ,Control (linguistics) ,Dynamic logic of propositional assignments - Abstract
International audience; We extend the existing encoding of abstract argumentation frameworks in DL-PA (Dynamic Logic of Propositional Assignments) in order to capture different formalisms for arguing with qualitative forms of uncertainty. More in particular, we encode the main reasoning tasks of (rich) incomplete argumentation frameworks and control argumentation frameworks. After that, and inspired by our encoding, we define and study a new class of structures that are shown to be maximally expressive: constrained incomplete argumentation frameworks.
- Published
- 2021
5. On Tools for Completeness of Kleene Algebra with Hypotheses
- Author
-
Jurriaan Rot, Jana Wagemaker, Damien Pous, Preuves et Langages (PLUME), Laboratoire de l'Informatique du Parallélisme (LIP), École normale supérieure de Lyon (ENS de Lyon)-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-Université de Lyon-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-École normale supérieure de Lyon (ENS de Lyon)-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-Université de Lyon-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS), Radboud University [Nijmegen], Plume, ANR-10-LABX-0070,MILYON,Community of mathematics and fundamental computer science in Lyon(2010), European Project: 678157,H2020,ERC-2015-STG,CoVeCe(2016), Centre National de la Recherche Scientifique (CNRS)-Université de Lyon-Institut National de Recherche en Informatique et en Automatique (Inria)-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-École normale supérieure - Lyon (ENS Lyon)-Centre National de la Recherche Scientifique (CNRS)-Université de Lyon-Institut National de Recherche en Informatique et en Automatique (Inria)-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-École normale supérieure - Lyon (ENS Lyon), Radboud university [Nijmegen], École normale supérieure - Lyon (ENS Lyon)-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-Université de Lyon-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-École normale supérieure - Lyon (ENS Lyon)-Université Claude Bernard Lyon 1 (UCBL), and Fahrenberg, U.
- Subjects
FOS: Computer and information sciences ,Completeness ,Structure (mathematical logic) ,Computer Science - Logic in Computer Science ,Interpretation (logic) ,[INFO.INFO-LO]Computer Science [cs]/Logic in Computer Science [cs.LO] ,020207 software engineering ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences ,Logic in Computer Science (cs.LO) ,Algebra ,Kleene algebra ,Set (abstract data type) ,010201 computation theory & mathematics ,Computer Science::Logic in Computer Science ,Completeness (order theory) ,Software Science ,0202 electrical engineering, electronic engineering, information engineering ,Language model ,Computer Science::Formal Languages and Automata Theory ,Reduction ,Mathematics - Abstract
In the literature on Kleene algebra, a number of variants have been proposed which impose additional structure specified by a theory, such as Kleene algebra with tests (KAT) and the recent Kleene algebra with observations (KAO), or make specific assumptions about certain constants, as for instance in NetKAT. Many of these variants fit within the unifying perspective offered by Kleene algebra with hypotheses, which comes with a canonical language model constructed from a given set of hypotheses. For the case of KAT, this model corresponds to the familiar interpretation of expressions as languages of guarded strings. A relevant question therefore is whether Kleene algebra together with a given set of hypotheses is complete with respect to its canonical language model. In this paper, we revisit, combine and extend existing results on this question to obtain tools for proving completeness in a modular way. We showcase these tools by giving new and modular proofs of completeness for KAT, KAO and NetKAT, and we prove completeness for new variants of KAT: KAT extended with a constant for the full relation, KAT extended with a converse operation, and a version of KAT where the collection of tests only forms a distributive lattice.
- Published
- 2021
6. Classic McEliece Implementation with Low Memory Footprint
- Author
-
Juliane Krämer, Johannes Roth, and Evangelos G. Karatsiolis
- Subjects
Post-quantum cryptography ,business.industry ,Computer science ,Denial-of-service attack ,Cryptography ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences ,Bridge (nautical) ,Public-key cryptography ,010201 computation theory & mathematics ,Embedded system ,McEliece cryptosystem ,0202 electrical engineering, electronic engineering, information engineering ,Key (cryptography) ,Memory footprint ,020201 artificial intelligence & image processing ,business - Abstract
The Classic McEliece cryptosystem is one of the most trusted quantum-resistant cryptographic schemes. Deploying it in practical applications, however, is challenging due to the size of its public key. In this work, we bridge this gap. We present an implementation of Classic McEliece on an ARM Cortex-M4 processor, optimized to overcome memory constraints. To this end, we present an algorithm to retrieve the public key ad-hoc. This reduces memory and storage requirements and enables the generation of larger key pairs on the device. To further improve the implementation, we perform the public key operation by streaming the key to avoid storing it as a whole. This additionally reduces the risk of denial of service attacks. Finally, we use these results to implement and run TLS on the embedded device.
- Published
- 2021
7. Scheduling with Testing on Multiple Identical Parallel Machines
- Author
-
Susanne Albers and Alexander Eckl
- Subjects
Schedule ,Mathematical optimization ,021103 operations research ,Job shop scheduling ,Competitive analysis ,Computer science ,0211 other engineering and technologies ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences ,Upper and lower bounds ,Scheduling (computing) ,Task (project management) ,010201 computation theory & mathematics ,Limit (mathematics) ,Duration (project management) - Abstract
Scheduling with testing is a recent online problem within the framework of explorable uncertainty motivated by environments where some preliminary action can influence the duration of a task. Jobs have an unknown processing time that can be explored by running a test. Alternatively, jobs can be executed for the duration of a given upper limit. We consider this problem within the setting of multiple identical parallel machines and present competitive deterministic algorithms and lower bounds for the objective of minimizing the makespan of the schedule. In the non-preemptive setting, we present the SBS algorithm whose competitive ratio approaches 3.1016 if the number of machines becomes large. We compare this result with a simple greedy strategy and a lower bound which approaches 2. In the case of uniform testing times, we can improve the SBS algorithm to be 3-competitive. For the preemptive case we provide a 2-competitive algorithm and a tight lower bound which approaches the same value.
- Published
- 2021
8. Graph Pricing with Limited Supply
- Author
-
Zachary Friggstad and Maryam Mahboub
- Subjects
Combinatorics ,Vertex (graph theory) ,010201 computation theory & mathematics ,0202 electrical engineering, electronic engineering, information engineering ,Graph (abstract data type) ,020206 networking & telecommunications ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences ,Mathematics - Abstract
We study approximation algorithms for graph pricing with vertex capacities yet without the traditional envy-free constraint. Specifically, we have a set of items V and a set of customers X where each customer \(i \in X\) has a budget \(b_i\) and is interested in a bundle of items \(S_i \subseteq V\) with \(|S_i| \le 2\). However, there is a limited supply of each item: we only have \(\mu _v\) copies of item v to sell for each \(v \in V\). We should assign a price p(v) to each \(v \in V\) and choose a subset \(Y \subseteq X\) of customers so that each \(i \in Y\) can afford their bundle (\(p(S_i) \le b_i\)) and at most \(\mu _v\) chosen customers have item v in their bundle for each item \(v \in V\). Each customer \(i \in Y\) pays \(p(S_i)\) for the bundle they purchased: our goal is to do this in a way that maximizes revenue. Such pricing problems have been studied from the perspective of envy-freeness where we also must ensure that \(p(S_i) \ge b_i\) for each \(i \notin Y\). However, the version where we simply allocate items to customers after setting prices and do not worry about the envy-free condition has received less attention.
- Published
- 2021
9. Runtime Monitors for Markov Decision Processes
- Author
-
Sebastian Junges, Sanjit A. Seshia, and Hazem Torfah
- Subjects
Model checking ,Theoretical computer science ,Computer science ,Probabilistic logic ,020207 software engineering ,Observable ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences ,Unobservable ,Nondeterministic algorithm ,010201 computation theory & mathematics ,Reachability ,0202 electrical engineering, electronic engineering, information engineering ,State (computer science) ,Markov decision process - Abstract
We investigate the problem of monitoring partially observable systems with nondeterministic and probabilistic dynamics. In such systems, every state may be associated with a risk, e.g., the probability of an imminent crash. During runtime, we obtain partial information about the system state in form of observations. The monitor uses this information to estimate the risk of the (unobservable) current system state. Our results are threefold. First, we show that extensions of state estimation approaches do not scale due the combination of nondeterminism and probabilities. While exploiting a geometric interpretation of the state estimates improves the practical runtime, this cannot prevent an exponential memory blowup. Second, we present a tractable algorithm based on model checking conditional reachability probabilities. Third, we provide prototypical implementations and manifest the applicability of our algorithms to a range of benchmarks. The results highlight the possibilities and boundaries of our novel algorithms.
- Published
- 2021
10. An Improvement of Reed’s Treewidth Approximation
- Author
-
Mahdi Belbasi and Martin Fürer
- Subjects
Polynomial (hyperelastic model) ,Parameterized complexity ,Approximation algorithm ,0102 computer and information sciences ,02 engineering and technology ,Binary logarithm ,01 natural sciences ,Tree decomposition ,Treewidth ,Combinatorics ,Tree (descriptive set theory) ,Computable function ,010201 computation theory & mathematics ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Mathematics - Abstract
We present a new approximation algorithm for the treewidth problem which constructs a corresponding tree decomposition as well. Our algorithm is a faster variation of Reed’s classical algorithm. For the benefit of the reader, and to be able to compare these two algorithms, we start with a detailed time analysis for Reed’s algorithm. We fill in many details that have been omitted in Reed’s paper. Computing tree decompositions parameterized by the treewidth k is fixed parameter tractable (FPT), meaning that there are algorithms running in time O(f(k)g(n)) where f is a computable function, g(n) is polynomial in n, and n is the number of vertices. An analysis of Reed’s algorithm shows \(f(k) = 2^{O(k \log k)}\) and \(g(n) = n \log n\) for a 5-approximation. Reed simply claims time \(O(n \log n)\) for bounded k for his constant factor approximation algorithm, but the bound of \(2^{\varOmega (k \log k)} n \log n\) is well known. From a practical point of view, we notice that the time of Reed’s algorithm also contains a term of \(O(k^2 2^{24k} n \log n)\), which for small k is much worse than the asymptotically leading term of \(2^{O(k \log k)} n \log n\). We analyze f(k) more precisely, because the purpose of this paper is to improve the running times for all reasonably small values of k.
- Published
- 2021
11. Secure Computation from One-Way Noisy Communication, or: Anti-correlation via Anti-concentration
- Author
-
Vinod M. Prabhakaran, Varun Narayanan, Yuval Ishai, Shweta Agrawal, Manoj Prabhakaran, Alon Rosen, and Eyal Kushilevitz
- Subjects
SECURE COMPUTATION ,Computer science ,ANTICONCENTRATION ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,Data_CODINGANDINFORMATIONTHEORY ,0102 computer and information sciences ,ENCODE ,Binary erasure channel ,01 natural sciences ,ONE-WAY NOISY COMMUNICATION, ANTICONCENTRATION, ANTICORRELATION, SECURE COMPUTATION ,Correlation ,ONE-WAY NOISY COMMUNICATION ,03 medical and health sciences ,0302 clinical medicine ,010201 computation theory & mathematics ,030220 oncology & carcinogenesis ,Encoding (memory) ,Secure multi-party computation ,Communication source ,ANTICORRELATION ,Algorithm - Abstract
Can a sender encode a pair of messages \((m_0,m_1)\) jointly, and send their encoding over (say) a binary erasure channel, so that the receiver can decode exactly one of the two messages and the sender does not know which one?
- Published
- 2021
12. On Lexicographic Proof Rules for Probabilistic Termination
- Author
-
Krishnendu Chatterjee, Ehsan Kafshdar Goharshady, Petr Novotný, Jiří Zárevúcky, and Đorđe Žikelić
- Subjects
010201 computation theory & mathematics ,0202 electrical engineering, electronic engineering, information engineering ,020207 software engineering ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences - Published
- 2021
13. Cyclic Shift Problems on Graphs
- Author
-
Giovanni Viglietta, Kwon Kham Sai, and Ryuhei Uehara
- Subjects
Discrete mathematics ,Vertex (graph theory) ,Sequence ,Computer science ,010102 general mathematics ,Control reconfiguration ,0102 computer and information sciences ,Permutation group ,Mathematical proof ,Security token ,01 natural sciences ,Constructive ,Set (abstract data type) ,010201 computation theory & mathematics ,0101 mathematics - Abstract
We study a new reconfiguration problem inspired by classic mechanical puzzles: a colored token is placed on each vertex of a given graph; we are also given a set of distinguished cycles on the graph. We are tasked with rearranging the tokens from a given initial configuration to a final one by using cyclic shift operations along the distinguished cycles. We first investigate a large class of graphs, which generalizes several classic puzzles, and we give a characterization of which final configurations can be reached from a given initial configuration. Our proofs are constructive, and yield efficient methods for shifting tokens to reach the desired configurations. On the other hand, when the goal is to find a shortest sequence of shifting operations, we show that the problem is NP-hard, even for puzzles with tokens of only two different colors.
- Published
- 2021
14. Lattice Enumeration for Tower NFS: A 521-Bit Discrete Logarithm Computation
- Author
-
Gabrielle De Micheli, Pierrick Gaudry, Cécile Pierrot, Cryptology, arithmetic : algebraic methods for better algorithms (CARAMBA), Inria Nancy - Grand Est, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Department of Algorithms, Computation, Image and Geometry (LORIA - ALGO), Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Institut National de Recherche en Informatique et en Automatique (Inria)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Institut National de Recherche en Informatique et en Automatique (Inria)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Institut National de Recherche en Informatique et en Automatique (Inria)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS), M. Tibouchi, H. Wang, Department of Algorithms, Computation, Image and Geometry (LORIA - ALGO), Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL)-Institut National de Recherche en Informatique et en Automatique (Inria)-Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL)-Institut National de Recherche en Informatique et en Automatique (Inria)-Inria Nancy - Grand Est, Institut National de Recherche en Informatique et en Automatique (Inria), and Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL)
- Subjects
Discrete mathematics ,Degree (graph theory) ,Lattice (group) ,Context (language use) ,010103 numerical & computational mathematics ,0102 computer and information sciences ,01 natural sciences ,Tower (mathematics) ,General number field sieve ,[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR] ,Finite field ,Dimension (vector space) ,010201 computation theory & mathematics ,Discrete logarithm ,0101 mathematics ,Mathematics - Abstract
International audience; The Tower variant of the Number Field Sieve (TNFS) is known to be asymptotically the most efficient algorithm to solve the discrete logarithm problem in finite fields of medium characteristics, when the extension degree is composite. A major obstacle to an efficient implementation of TNFS is the collection of algebraic relations, as it happens in dimension greater than 2. This requires the construction of new sieving algorithms which remain efficient as the dimension grows. In this article, we overcome this difficulty by considering a lattice enumeration algorithm which we adapt to this specific context. We also consider a new sieving area, a high-dimensional sphere, whereas previous sieving algorithms for the classical NFS considered an orthotope. Our new sieving technique leads to a much smaller running time, despite the larger dimension of the search space, and even when considering a larger target, as demonstrated by a record computation we performed in a 521-bit finite field GF(p^6). The target finite field is of the same form than finite fields used in recent zero-knowledge proofs in some blockchains. This is the first reported implementation of TNFS.
- Published
- 2021
15. Uniform Embeddings for Robinson Similarity Matrices
- Author
-
Zhiyuan Zhang and Jeannette Janssen
- Subjects
Similarity (geometry) ,060102 archaeology ,Diagonal ,0102 computer and information sciences ,06 humanities and the arts ,01 natural sciences ,Combinatorics ,Indifference graph ,Matrix (mathematics) ,010201 computation theory & mathematics ,Symmetric matrix ,Embedding ,0601 history and archaeology ,Adjacency matrix ,Unit interval ,Mathematics - Abstract
A Robinson similarity matrix is a symmetric matrix where all entries in all rows and columns are increasing towards the diagonal. A Robinson matrix can be decomposed into the weighted sum of k adjacency matrices of a nested family of unit interval graphs. We study the problem of finding an embedding which gives a simultaneous unit interval embedding for all graphs in the family. This is called a uniform embedding. We give a necessary and sufficient condition for the existence of a uniform embedding, derived from paths in an associated graph. We also give an efficient combinatorial algorithm to find a uniform embedding or give proof that it does not exist, for the case where \(k=2\).
- Published
- 2021
16. Getting a Head Start on Program Synthesis with Genetic Programming
- Author
-
Jordan Wick, Erik Hemberg, and Una-May O'Reilly
- Subjects
Schedule ,education.field_of_study ,Grammar ,Operations research ,Computer science ,media_common.quotation_subject ,Population ,Initialization ,Genetic programming ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences ,010201 computation theory & mathematics ,Head start ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,education ,Program synthesis ,media_common - Abstract
We explore how to give Genetic Programming (GP) a head start to synthesize a programming problem. Our method uses a related problem and introduces a schedule that directs GP to solve the related problem first either fully or to some extent first, or at the same time. In addition, if the related problem’s solutions are written by students or evolved by GP, we explore the extent to which initializing the GP population with some of these solutions provides a head start. We find that having a population solve one programming problem before working to solve a related programming problem helps to a greater extent as the targeted problems and the intermediate problems themselves are selected to be more challenging.
- Published
- 2021
17. Nominal Equational Problems
- Author
-
Maribel Fernández, Mauricio Ayala-Rincón, Daniele Nantes-Sobrinho, and Deivid Vale
- Subjects
Discrete mathematics ,Nominal terms ,Image (category theory) ,Modulo ,Atom (order theory) ,0102 computer and information sciences ,02 engineering and technology ,Approx ,01 natural sciences ,Term algebra ,Decidability ,Alpha (programming language) ,010201 computation theory & mathematics ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Mathematics - Abstract
We define nominal equational problems of the form $$\exists \overline{W} \forall \overline{Y} : P$$ ∃ W ¯ ∀ Y ¯ : P , where $$P$$ P consists of conjunctions and disjunctions of equations $$s\approx _\alpha t$$ s ≈ α t , freshness constraints $$a\#t$$ a # t and their negations: $$s \not \approx _\alpha t$$ s ≉ α t and "Equation missing", where $$a$$ a is an atom and $$s, t$$ s , t nominal terms. We give a general definition of solution and a set of simplification rules to compute solutions in the nominal ground term algebra. For the latter, we define notions of solved form from which solutions can be easily extracted and show that the simplification rules are sound, preserving, and complete. With a particular strategy for rule application, the simplification process terminates and thus specifies an algorithm to solve nominal equational problems. These results generalise previous results obtained by Comon and Lescanne for first-order languages to languages with binding operators. In particular, we show that the problem of deciding the validity of a first-order equational formula in a language with binding operators (i.e., validity modulo $$\alpha $$ α -equality) is decidable.
- Published
- 2021
18. Parameterized Complexity of d-Hitting Set with Quotas
- Author
-
Sushmita Gupta, Sagar Singh, Aditya Petety, and Pallavi Jain
- Subjects
Physics ,Star (game theory) ,Parameterized complexity ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences ,Upper and lower bounds ,Running time ,Set (abstract data type) ,Combinatorics ,Integer ,010201 computation theory & mathematics ,Kernelization ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Universe (mathematics) - Abstract
In this paper we study a variant of the classic d -Hitting Set problem with lower and upper capacity constraints, say A and B, respectively. The input to the problem consists of a universe U, a set family, \(\mathscr {S} \), of sets over U, where each set in the family is of size at most d, a non-negative integer k; and additionally two functions \(\alpha :\mathscr {S} \rightarrow \{1,\ldots ,A\}\) and \(\beta :\mathscr {S} \rightarrow \{1,\ldots ,B\}\). The goal is to decide if there exists a hitting set of size at most k such that for every set S in the family \(\mathscr {S} \), the solution contains at least \(\alpha (S)\) elements and at most \(\beta (S)\) elements from S. We call this the \((A, B)\)-Multi d-Hitting Set problem. We study the problem in the realm of parameterized complexity. We show that \((A, B)\)-Multi d-Hitting Set can be solved in \(\mathcal {O}^{\star }(d^{k}) \) time. For the special case when \(d=3\) and \(d=4\), we have an improved bound of \(\mathcal {O}^\star (2.2738^k)\) and \(\mathcal {O}^\star (3.562^{k})\), respectively. The former matches the running time of the classical 3-Hitting Set problem. Furthermore, we show that if we do not have an upper bound constraint and the lower bound constraint is same for all the sets in the family, say \(A>1\), then the problem can be solved even faster than d-Hitting Set.
- Published
- 2021
19. Secret Sharing with Statistical Privacy and Computational Relaxed Non-malleability
- Author
-
Keisuke Tanaka, Yusuke Yoshida, Fuyuki Kitagawa, and Tasuku Narita
- Subjects
Theoretical computer science ,Malleability ,010201 computation theory & mathematics ,Computer science ,TheoryofComputation_GENERAL ,Data_CODINGANDINFORMATIONTHEORY ,0102 computer and information sciences ,Chosen-ciphertext attack ,Construct (python library) ,01 natural sciences ,Secret sharing ,GeneralLiterature_MISCELLANEOUS ,Drawback - Abstract
Goyal and Kumar (STOC ’18, CRYPTO ’18) initiate the study of non-malleability for secret sharing and proposed the definition of information-theoretical non-malleability for secret sharing. Subsequently, Brian, Faonio, and Venturi (CRYPTO ’19, TCC ’19) proposed computational variants of non-malleability for secret sharing and showed that by focusing on computational non-malleability, it is possible to construct more efficient schemes compared to the existing ones. However, their schemes have a drawback that they do not satisfy statistical privacy.
- Published
- 2021
20. Nondeterministic Syntactic Complexity
- Author
-
Robert S. R. Myers, Stefan Milius, and Henning Urbat
- Subjects
Discrete mathematics ,TheoryofComputation_COMPUTATIONBYABSTRACTDEVICES ,Interpretation (logic) ,Computer science ,Computer Science::Information Retrieval ,Syntactic monoid ,Structure (category theory) ,Semilattice ,020207 software engineering ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences ,Nondeterministic algorithm ,TheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGES ,Deterministic finite automaton ,Regular language ,010201 computation theory & mathematics ,0202 electrical engineering, electronic engineering, information engineering ,Nondeterministic finite automaton ,Computer Science::Formal Languages and Automata Theory - Abstract
We introduce a new measure on regular languages: their nondeterministic syntactic complexity. It is the least degree of any extension of the ‘canonical boolean representation’ of the syntactic monoid. Equivalently, it is the least number of states of any subatomic nondeterministic acceptor. It turns out that essentially all previous structural work on nondeterministic state-minimality computes this measure. Our approach rests on an algebraic interpretation of nondeterministic finite automata as deterministic finite automata endowed with semilattice structure. Crucially, the latter form a self-dual category.
- Published
- 2021
21. Security in Asynchronous Interactive Systems
- Author
-
Ivan Geffner and Joseph Y. Halpern
- Subjects
010201 computation theory & mathematics ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences - Published
- 2021
22. Near-Optimal Scheduling in the Congested Clique
- Author
-
Volodymyr Polosukhin, Keren Censor-Hillel, and Yannic Maus
- Subjects
Clique ,Round complexity ,020206 networking & telecommunications ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences ,Scheduling (computing) ,Combinatorics ,Dilation (metric space) ,010201 computation theory & mathematics ,Distributed algorithm ,Optimal scheduling ,0202 electrical engineering, electronic engineering, information engineering ,Maximal independent set ,Mathematics - Abstract
This paper provides three nearly-optimal algorithms for scheduling t jobs in the \(\mathsf {CLIQUE}\) model. First, we present a deterministic scheduling algorithm that runs in \(O(\mathsf {Global}\mathsf {Congestion} + \mathsf {dilation})\) rounds for jobs that are sufficiently efficient in terms of their memory. The \(\mathsf {dilation}\) is the maximum round complexity of any of the given jobs, and the \(\mathsf {Global}\mathsf {Congestion}\) is the total number of messages in all jobs divided by the per-round bandwidth of \(n^2\) of the \(\mathsf {CLIQUE}\) model. Both are inherent lower bounds for any scheduling algorithm.
- Published
- 2021
23. Subdivided Claws and the Clique-Stable Set Separation Property
- Author
-
Paul Seymour and Maria Chudnovsky
- Subjects
Vertex (graph theory) ,Conjecture ,Induced subgraph ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences ,Graph ,Combinatorics ,010201 computation theory & mathematics ,020204 information systems ,Independent set ,0202 electrical engineering, electronic engineering, information engineering ,Separation property ,Mathematics - Abstract
Let \( {\mathscr{C}} \) be a class of graphs closed under taking induced subgraphs. We say that \( {\mathscr{C}} \) has the clique-stable set separation property if there exists \( c \in {\mathbb{N}} \) such that for every graph \( G \in {\mathscr{C}} \) there is a collection \( {\mathscr{P}} \) of partitions (X, Y) of the vertex set of G with |\( {\mathscr{P}}\)| ≤ |V(G)|c and with the following property: if K is a clique of G, and S is a stable set of G, and K ∩ S = \( \emptyset\), then there is (X, Y) ∊ \( {\mathscr{P}}\) with K ⊆ X and S ⊆ Y. In 1991 M. Yannakakis conjectured that the class of all graphs has the clique-stable set separation property, but this conjecture was disproved by M. Goos in 2014. Therefore it is now of interest to understand for which classes of graphs such a constant c exists. In this paper we define two infinite families \( {\mathscr{S}}, {\mathscr{K}}\)of graphs and show that for every S ∊ \( {\mathscr{S}}\) and K ∊ \({\mathscr{K}}\), the class of graphs with no induced subgraph isomorphic to S or K has the clique-stable set separation property.
- Published
- 2021
24. Monte Carlo Search Algorithms for Network Traffic Engineering
- Author
-
Tristan Cazenave, Cristina Bazgan, Pierre-Henri Wuillemin, Morgan Chopin, Chen Dang, DECISION, LIP6, and Sorbonne Université (SU)-Centre National de la Recherche Scientifique (CNRS)-Sorbonne Université (SU)-Centre National de la Recherche Scientifique (CNRS)
- Subjects
Routing protocol ,Optimization problem ,policy adaptation ,traffic engineering ,Computer science ,Distributed computing ,Monte Carlo search ,Open Shortest Path First ,0211 other engineering and technologies ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences ,[INFO.INFO-AI]Computer Science [cs]/Artificial Intelligence [cs.AI] ,[STAT.ML]Statistics [stat]/Machine Learning [stat.ML] ,[MATH.MATH-ST]Mathematics [math]/Statistics [math.ST] ,Search algorithm ,021103 operations research ,business.industry ,Quality of service ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,[STAT.TH]Statistics [stat]/Statistics Theory [stat.TH] ,[MATH.MATH-PR]Mathematics [math]/Probability [math.PR] ,010201 computation theory & mathematics ,Traffic engineering ,Shortest path problem ,Routing (electronic design automation) ,business - Abstract
International audience; The aim of Traffic Engineering is to provide routing configurations in networks such that the used resources are minimized while maintaining a high level of quality of service (QoS). Among the optimization problems arising in this domain, we address in this paper the one related to setting weights in networks that are based on shortest path routing protocols (OSPF, IS-IS). Finding weights that induce efficient routing paths (e.g that minimize the maximum congested link) is a computationally hard problem. We propose to use Monte Carlo Search for the first time for this problem. More specifically we apply Nested Rollout Policy Adaptation (NRPA). We also extend NRPA with the force_exploration algorithm to improve the results. In comparison to other algorithms NRPA scales better with the size of the instance and can be easily extended to take into account additional constraints (cost utilization, delay,. . .) or linear/non-linear optimization criteria. For difficult instances the optimum is not known but a lower bound can be computed. NRPA gives results close to the lower bound on a standard dataset of telecommunication networks.
- Published
- 2021
25. On Syntactic Forgetting Under Uniform Equivalence
- Author
-
Ricardo Gonçalves, Matthias Knorr, João Leite, Tomi Janhunen, Faber, Wolfgang, Friedrich, Gerhard, Gebser, Martin, Morak, Michael, Tampere University, and Computing Sciences
- Subjects
Forgetting ,Theoretical computer science ,Computer science ,Modulo ,Operator (linguistics) ,Context (language use) ,Class (philosophy) ,0102 computer and information sciences ,02 engineering and technology ,Characterization (mathematics) ,113 Computer and information sciences ,01 natural sciences ,Answer set programming ,010201 computation theory & mathematics ,0202 electrical engineering, electronic engineering, information engineering ,Computer Science::Programming Languages ,020201 artificial intelligence & image processing ,Equivalence (measure theory) - Abstract
Forgetting in Answer Set Programming (ASP) aims at reducing the language of a logic program without affecting the consequences over the remaining language. It has recently gained interest in the context of modular ASP where it allows simplifying a program of a module, making it more declarative, by omitting auxiliary atoms or hiding certain atoms/parts of the program not to be disclosed. Unlike for arbitrary programs, it has been shown that forgetting for modular ASP can always be applied, for input, output and hidden atoms, and preserve all dependencies over the remaining language (in line with uniform equivalence). However, the definition of the result is based solely on a semantic characterization in terms of HT-models. Thus, computing an actual result is a complicated process and the result commonly bears no resemblance to the original program, i.e., we are lacking a corresponding syntactic operator. In this paper, we show that there is no forgetting operator that preserves uniform equivalence (modulo the forgotten atoms) between the given program and its forgetting result by only manipulating the rules of the original program that contain the atoms to be forgotten. We then present a forgetting operator that preserves uniform equivalence and is syntactic whenever this is suitable. We also introduce a special class of programs, where syntactic forgetting is always possible, and as a complementary result, establish it as the largest known class where forgetting while preserving all dependencies is always possible. acceptedVersion
- Published
- 2021
26. An Algebraic View on p-Admissible Concrete Domains for Lightweight Description Logics
- Author
-
Franz Baader and Jakub Rydval
- Subjects
010102 general mathematics ,0102 computer and information sciences ,Constraint satisfaction ,01 natural sciences ,Convexity ,Domain (mathematical analysis) ,Decidability ,Algebra ,Description logic ,010201 computation theory & mathematics ,Point (geometry) ,0101 mathematics ,Algebraic number ,Mathematics - Abstract
Concrete domains have been introduced in Description Logics (DLs) to enable reference to concrete objects (such as numbers) and predefined predicates on these objects (such as numerical comparisons) when defining concepts. To retain decidability when integrating a concrete domain into a decidable DL, the domain must satisfy quite strong restrictions. In previous work, we have analyzed the most prominent such condition, called \(\omega \)-admissibility, from an algebraic point of view. This provided us with useful algebraic tools for proving \(\omega \)-admissibility, which allowed us to find new examples for concrete domains whose integration leaves the prototypical expressive DL \(\mathcal {ALC}\) decidable.
- Published
- 2021
27. An Epistemic Logic for Multi-agent Systems with Budget and Costs
- Author
-
Stefania Costantini, Valentina Pitoni, and Andrea Formisano
- Subjects
Collective behavior ,Multi agents systems ,Computer science ,Group (mathematics) ,Process (engineering) ,Multi-agent system ,Mental actions ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences ,Logical framework ,Risk analysis (engineering) ,Action (philosophy) ,Epistemic modal logic ,010201 computation theory & mathematics ,Component (UML) ,0202 electrical engineering, electronic engineering, information engineering ,Epistemic logic ,020201 artificial intelligence & image processing - Abstract
In Artificial Intelligence, Multi-Agent Systems are able to model many kinds of collective behavior and have a wide range of application. Logic is often used to model aspects of agents’ reasoning process. In this paper, we discuss social aspects of such systems. We propose a logical framework (Logic of “Inferable”) which reasons about whether a group of agents can perform an action, highlighting the concepts of action cost and budget that the group must have available in order to perform actions. The focus is on modeling the group dynamics of cooperative agents: if an agent of a group performs an action, that action to be considered as performed by the whole group, and the group can support a component agent in performing actions not affordable by that agent alone.
- Published
- 2021
28. P2T: Pay to Transport
- Author
-
Claudio Schifanella and Fadi Barbara
- Subjects
Security properties ,Blockchain ,business.industry ,Computer science ,Transportation ,020206 networking & telecommunications ,Tracking system ,0102 computer and information sciences ,02 engineering and technology ,Computer security ,computer.software_genre ,01 natural sciences ,Article ,Privacy preserving ,Privacy ,010201 computation theory & mathematics ,Scripting language ,P2SH ,0202 electrical engineering, electronic engineering, information engineering ,Bitcoin ,business ,Protocol (object-oriented programming) ,computer - Abstract
We present Pay To Transport (P2T), a protocol that lets customers buy an item remotely in an atomic, privacy preserving and trustless manner. P2T needs only basic features of a blockchain scripting language and does not need any tracking systems, arbitrator or deposit to preserve its security properties. For this reason the protocol can be implemented on any permissionless blockchain, regardless of its scripting language, without additional trust. Merchants’ and transporters’ addresses are public, but in P2T the parties never pay those addresses directly. Therefore P2T maintains the privacy of customers, merchant and transporters.
- Published
- 2021
29. Neural Precedence Recommender
- Author
-
Martin Suda and Filip Bártek
- Subjects
Theoretical computer science ,Computer science ,Parameterized complexity ,020207 software engineering ,0102 computer and information sciences ,02 engineering and technology ,Predicate (mathematical logic) ,Function (mathematics) ,01 natural sciences ,Signature (logic) ,Permutation ,Superposition principle ,010201 computation theory & mathematics ,0202 electrical engineering, electronic engineering, information engineering ,Rule of inference ,Symbol (formal) - Abstract
The state-of-the-art superposition-based theorem provers for first-order logic rely on simplification orderings on terms to constrain the applicability of inference rules, which in turn shapes the ensuing search space. The popular Knuth-Bendix simplification ordering is parameterized by symbol precedence—a permutation of the predicate and function symbols of the input problem’s signature. Thus, the choice of precedence has an indirect yet often substantial impact on the amount of work required to complete a proof search successfully.This paper describes and evaluates a symbol precedence recommender, a machine learning system that estimates the best possible precedence based on observations of prover performance on a set of problems and random precedences. Using the graph convolutional neural network technology, the system does not presuppose the problems to be related or share a common signature. When coupled with the theorem prover Vampire and evaluated on the TPTP problem library, the recommender is found to outperform a state-of-the-art heuristic by more than 4 % on unseen problems.
- Published
- 2021
30. The Space Complexity of Sum Labelling
- Author
-
Henning Fernau and Kshitij Gajjar
- Subjects
Graph database ,Computational complexity theory ,010102 general mathematics ,0102 computer and information sciences ,Limiting ,Edge (geometry) ,computer.software_genre ,Space (mathematics) ,Binary logarithm ,01 natural sciences ,Graph ,Vertex (geometry) ,Combinatorics ,010201 computation theory & mathematics ,0101 mathematics ,computer ,Computer Science::Databases ,MathematicsofComputing_DISCRETEMATHEMATICS ,Mathematics - Abstract
A graph is called a sum graph if its vertices can be labelled by distinct positive integers such that there is an edge between two vertices if and only if the sum of their labels is the label of another vertex of the graph. Most papers on sum graphs consider combinatorial questions like the minimum number of isolated vertices that need to be added to a given graph to make it a sum graph. In this paper, we initiate the study of sum graphs from the viewpoint of computational complexity. Note that every n-vertex sum graph can be represented by a sorted list of n positive integers where edge queries can be answered in \(\mathscr {O}(\log n)\) time. Thus, limiting the size of the vertex labels upper-bounds the space complexity of storing the graph.
- Published
- 2021
31. Explorable Uncertainty in Scheduling with Non-uniform Testing Times
- Author
-
Susanne Albers and Alexander Eckl
- Subjects
Mathematical optimization ,021103 operations research ,Competitive analysis ,Job shop scheduling ,Computer science ,0211 other engineering and technologies ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences ,Upper and lower bounds ,Scheduling (computing) ,Task (project management) ,Randomized algorithm ,010201 computation theory & mathematics ,Limit (mathematics) ,Constant (mathematics) - Abstract
The problem of scheduling with testing in the framework of explorable uncertainty models environments where some preliminary action can influence the duration of a task. In the model, each job has an unknown processing time that can be revealed by running a test. Alternatively, jobs may be run untested for the duration of a given upper limit. Recently, Dürr et al. [4] have studied the setting where all testing times are of unit size and have given lower and upper bounds for the objectives of minimizing the sum of completion times and the makespan on a single machine. In this paper, we extend the problem to non-uniform testing times and present the first competitive algorithms. The general setting is motivated for example by online user surveys for market prediction or querying centralized databases in distributed computing. Introducing general testing times gives the problem a new flavor and requires updated methods with new techniques in the analysis. We present constant competitive ratios for the objective of minimizing the sum of completion times in the deterministic case, both in the non-preemptive and preemptive setting. For the preemptive setting, we additionally give a first lower bound. We also present a randomized algorithm with improved competitive ratio. Furthermore, we give tight competitive ratios for the objective of minimizing the makespan, both in the deterministic and the randomized setting.
- Published
- 2021
32. Evacuating from $$\ell _p$$ Unit Disks in the Wireless Model
- Author
-
Konstantinos Georgiou, Sean Leizerovich, Somnath Kundu, and Jesse Lucier
- Subjects
Discrete mathematics ,010102 general mathematics ,0102 computer and information sciences ,Space (mathematics) ,01 natural sciences ,Unit disk ,Upper and lower bounds ,Euclidean distance ,010201 computation theory & mathematics ,Homogeneous space ,Metric (mathematics) ,Euclidean geometry ,0101 mathematics ,Unit (ring theory) ,Mathematics - Abstract
The search-type problem of evacuating 2 robots in the wireless model from the (Euclidean) unit disk was first introduced and studied by Czyzowicz et al. [DISC’2014]. Since then, the problem has seen a long list of follow-up results pertaining to variations as well as to upper and lower bound improvements. All established results in the area study this 2-dimensional search-type problem in the Euclidean metric space where the search space, i.e. the unit disk, enjoys significant (metric) symmetries.
- Published
- 2021
33. Explicit Factorization of Some Period Polynomials
- Author
-
Gerardo Vega
- Subjects
Polynomial ,Degree (graph theory) ,Mathematics::Number Theory ,Prime number ,020206 networking & telecommunications ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences ,Combinatorics ,Finite field ,Factorization ,Integer ,010201 computation theory & mathematics ,Prime factor ,0202 electrical engineering, electronic engineering, information engineering ,Exponent ,Mathematics - Abstract
Let p, t, q, n, m and r be positive integers, such that p is a prime number, \(q=p^t\), \(\gcd (q,n)=1\), \(m=\text{ ord}_n(q)\), and suppose that the prime factors of r divide n but not \((q^m-1)/n\), and that \(q^m \equiv 1 \pmod {4}\), if 4|r. Also let u such that \(u=\gcd (\frac{q^m-1}{q-1},\frac{q^m-1}{n})\). Assume that \(u=1\) or p is semiprimitive modulo u. Under these conditions, we are going to obtain the explicit factorization of the period polynomial of degree \(\gcd (\frac{q^{mr}-1}{q-1},\frac{q^{mr}-1}{nr})\) for the finite field \({\mathbb {F}}_{q^{mr}}\). In fact, we will see that such polynomial has always integer roots, meaning that the corresponding Gaussian periods are also integer numbers. As an application, we also determine the number of solutions of certain diagonal equations with constant exponent.
- Published
- 2021
34. Parallel Social Spider Optimization Algorithms with Island Model for the Clustering Problem
- Author
-
Edwin Alvarez-Mamani, José Luis Soncco-Álvarez, Mauricio Ayala-Rincon, and Lauro Enciso-Rodas
- Subjects
Island model ,Optimization algorithm ,biology ,Computer science ,Parallel algorithm ,Ring network ,0102 computer and information sciences ,02 engineering and technology ,Parallel computing ,Network topology ,biology.organism_classification ,01 natural sciences ,Range (mathematics) ,010201 computation theory & mathematics ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Cluster analysis ,Social spider - Abstract
The digital age came with an extraordinary ability to generate data across organizations, people, and devices, data that needs to be analyzed, processed and stored. A well-known technique for analyzing this kind of data is Clustering. Many bio-inspired algorithms were proposed for this problem such as the Social Spider Optimization (SSO). In this work, we propose parallel island models of the SSO algorithm for the Clustering problem, using 24 processors for each parallel algorithm. Such models were implemented using static and dynamic topologies, and datasets from the UCI Machine Learning Repository used for the stage of experiments. The achieved average speedups range from 15 to 28 times faster than the SSO algorithm for large and small datasets, respectively, and a parallel model with static ring topology performs a little bit faster than the other parallel models. The parallel algorithms provide results with similar precision to the ones computed with the SSO algorithm.
- Published
- 2021
35. Learning Union of Integer Hypercubes with Queries
- Author
-
Oliver Markgraf, Daniel Stan, and Anthony W. Lin
- Subjects
Discrete mathematics ,Computer science ,Generalization ,Modulo ,Open problem ,Dimension (graph theory) ,Integer lattice ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences ,020202 computer hardware & architecture ,Computational learning theory ,010201 computation theory & mathematics ,0202 electrical engineering, electronic engineering, information engineering ,Hypercube ,Integer (computer science) - Abstract
We study the problem of learning a finite union of integer (axis-aligned) hypercubes over the d-dimensional integer lattice, i.e., whose edges are parallel to the coordinate axes. This is a natural generalization of the classic problem in the computational learning theory of learning rectangles. We provide a learning algorithm with access to a minimally adequate teacher (i.e. membership and equivalence oracles) that solves this problem in polynomial-time, for any fixed dimension d. Over a non-fixed dimension, the problem subsumes the problem of learning DNF boolean formulas, a central open problem in the field. We have also provided extensions to handle infinite hypercubes in the union, as well as showing how subset queries could improve the performance of the learning algorithm in practice. Our problem has a natural application to the problem of monadic decomposition of quantifier-free integer linear arithmetic formulas, which has been actively studied in recent years. In particular, a finite union of integer hypercubes correspond to a finite disjunction of monadic predicates over integer linear arithmetic (without modulo constraints). Our experiments suggest that our learning algorithms substantially outperform the existing algorithms.
- Published
- 2021
36. Preprocessing to Reduce the Search Space: Antler Structures for Feedback Vertex Set
- Author
-
Huib Donkers and Bart M. P. Jansen
- Subjects
Discrete mathematics ,Computer science ,010102 general mathematics ,Structure (category theory) ,Vertex cover ,Parameterized complexity ,0102 computer and information sciences ,Type (model theory) ,Space (mathematics) ,01 natural sciences ,010201 computation theory & mathematics ,Kernelization ,Graph (abstract data type) ,Feedback vertex set ,0101 mathematics ,MathematicsofComputing_DISCRETEMATHEMATICS - Abstract
The goal of this paper is to open up a new research direction aimed at understanding the power of preprocessing in speeding up algorithms that solve NP-hard problems exactly. We explore this direction for the classic Feedback Vertex Set problem on undirected graphs, leading to a new type of graph structure called antler decomposition, which identifies vertices that belong to an optimal solution. It is an analogue of the celebrated crown decomposition which has been used for Vertex Cover. We develop the graph structure theory around such decompositions and develop fixed-parameter tractable algorithms to find them, parameterized by the number of vertices for which they witness presence in an optimal solution. This reduces the search space of fixed-parameter tractable algorithms parameterized by the solution size that solve Feedback Vertex Set.
- Published
- 2021
37. Keeping Pace with the History of Evolving Runtime Models
- Author
-
Matthias Barkowsky, Holger Giese, and Lucas Sakizloglou
- Subjects
Computer science ,Distributed computing ,020207 software engineering ,0102 computer and information sciences ,02 engineering and technology ,Key features ,01 natural sciences ,Graph ,010201 computation theory & mathematics ,0202 electrical engineering, electronic engineering, information engineering ,Snapshot (computer storage) ,Time awareness ,State (computer science) ,Eclipse ,Pace - Abstract
Structural runtime models provide a snapshot of the constituents of a system and their state. Capturing the history of runtime models, i.e., previous snapshots, has been shown to be useful for a number of aims. Handling, however, history at runtime poses important challenges to tool support. We present the InTempo tool which is based on the Eclipse Modeling Framework and encodes runtime models as graphs. Key features of InTempo, such as, the integration of temporal requirements into graph queries, the in-memory storage of the model, and a systematic method to contain the model’s memory consumption, intend to address issues which seemingly place limitations on the available tool support. InTempo offers two operation modes which support both runtime and postmortem application scenarios.
- Published
- 2021
38. Evaluating Task-General Resilience Mechanisms in a Multi-robot Team Task
- Author
-
James Staley, Matthias Scheutz, Tufts University [Medford], Ilias Maglogiannis, John Macintyre, Lazaros Iliadis, TC 12, and WG 12.5
- Subjects
Resilience ,Computer science ,media_common.quotation_subject ,Long-term autonomy ,Intelligent decision support system ,0102 computer and information sciences ,02 engineering and technology ,computer.software_genre ,01 natural sciences ,Term (time) ,Task (project management) ,Intelligent agent ,010201 computation theory & mathematics ,Human–computer interaction ,Intelligent autonomous agents ,0202 electrical engineering, electronic engineering, information engineering ,Robot ,[INFO]Computer Science [cs] ,020201 artificial intelligence & image processing ,Set (psychology) ,Function (engineering) ,Resilience (network) ,computer ,media_common - Abstract
Part 5: Autonomous Agents; International audience; Real-word intelligent agents must be able to detect sudden and unexpected changes to their task environment and effectively respond to those changes in order to function properly in the long term. We thus isolate a set of perturbations that agents ought to address and demonstrate how task-agnostic perturbation detection and mitigation mechanisms can be integrated into a cognitive robotic architecture. We present results from experimental evaluations of perturbation mitigation strategies in a multi-robot system that show how intelligent systems can achieve higher levels of autonomy by explicitly handling perturbations.
- Published
- 2021
39. On 13-Crossing-Critical Graphs with Arbitrarily Large Degrees
- Author
-
Michal Korbela and Petr Hliněný
- Subjects
010102 general mathematics ,Value (computer science) ,0102 computer and information sciences ,Base (topology) ,01 natural sciences ,Graph ,Combinatorics ,Arbitrarily large ,010201 computation theory & mathematics ,Bounded function ,Key (cryptography) ,Crossing number (graph theory) ,0101 mathematics ,Mathematics - Abstract
A surprising result of Bokal et al. proved that the exact minimum value of c such that c-crossing-critical graphs do not have bounded maximum degree is \(c=13\). The key to the result is an inductive construction of a family of 13-crossing-critical graphs with many vertices of arbitrarily high degrees. While the inductive part of the construction is rather easy, it all relies on the fact that a certain 17-vertex base graph has the crossing number 13, which was originally verified only by a machine-readable computer proof. We now provide a relatively short self-contained computer-free proof.
- Published
- 2021
40. Drawing Two Posets
- Author
-
Vera Chekan and Guido Brückner
- Subjects
Order (ring theory) ,0102 computer and information sciences ,02 engineering and technology ,Directed graph ,Edge (geometry) ,01 natural sciences ,Task (project management) ,Combinatorics ,Set (abstract data type) ,Planar ,010201 computation theory & mathematics ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Mathematics - Abstract
We investigate the problem of drawing two posets of the same ground set so that one is drawn from left to right and the other one is drawn from the bottom up. The input to this problem is a directed graph \(G = (V, E)\) and two sets X, Y with \(X \cup Y = E\), each of which can be interpreted as a partial order of V. The task is to find a planar drawing of G such that each directed edge in X is drawn as an x-monotone edge, and each directed edge in Y is drawn as a y-monotone edge. Such a drawing is called an xy-planar drawing.
- Published
- 2021
41. Bagua: A NFSR-Based Stream Cipher Constructed Following Confusion and Diffusion Principles
- Author
-
Wen-Feng Qi, Lin Tan, and Xuanyong Zhu
- Subjects
Provable security ,Initialization vector ,Computer science ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences ,010201 computation theory & mathematics ,0202 electrical engineering, electronic engineering, information engineering ,Key (cryptography) ,Overhead (computing) ,020201 artificial intelligence & image processing ,Trivium (cipher) ,Confusion and diffusion ,Arithmetic ,Stream cipher ,Block cipher - Abstract
Confusion and diffusion are important design principles in block ciphers. The famous structures in block ciphers such as SPN, Feistel and Misty are proposed based on them and towards provable security against differential and linear cryptanalyses. There is few structure based on the two principles in stream ciphers except for Trivium. In this paper, we generalize the design ideas of Trivium to propose a new construction of Galois structure nonlinear feedback shift registers based on confusion and diffusion principles. As an application of this construction, a stream cipher named Bagua is proposed, which is a hardware-oriented primitive of 128-bit initialization vector and 128-bit or 256-bit key. It can be implemented in parallel up to 32 iterations at once, and the maximum throughout can be up to 8 Gbps. One can choose the parallel degree in implementation according to the requirement of throughput and hardware overhead in different application environments. Its resistances against differential and linear cryptanalyses are estimated theoretically and experimentally.
- Published
- 2021
42. A Power Side-Channel Attack on the CCA2-Secure HQC KEM
- Author
-
Julian Renner, Thomas Schamberger, Antonia Wachter-Zeh, and Georg Sigl
- Subjects
Post-quantum cryptography ,business.industry ,Computer science ,Data_CODINGANDINFORMATIONTHEORY ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences ,Public-key cryptography ,Power analysis ,Adaptive chosen-ciphertext attack ,Computer engineering ,010201 computation theory & mathematics ,Ciphertext ,0202 electrical engineering, electronic engineering, information engineering ,Key (cryptography) ,020201 artificial intelligence & image processing ,Side channel attack ,Key encapsulation ,business - Abstract
The Hamming Quasi-Cyclic (HQC) proposal is a promising candidate in the second round of the NIST Post-Quantum Cryptography Standardization project. It features small public key sizes, precise estimation of its decryption failure rates and contrary to most of the code-based systems, its security does not rely on hiding the structure of an error-correcting code. In this paper, we propose the first power side-channel attack on the Key Encapsulation Mechanism (KEM) version of HQC. Our attack utilizes a power side-channel to build an oracle that outputs whether the BCH decoder in HQC’s decryption algorithm corrects an error for a chosen ciphertext. Based on the decoding algorithm applied in HQC, it is shown how to design queries such that the output of the oracle allows to retrieve a large part of the secret key. The remaining part of the key can then be determined by an algorithm based on linear algebra. It is shown in experiments that less than 10000 measurements are sufficient to successfully mount the attack on the HQC reference implementation running on an ARM Cortex-M4 microcontroller.
- Published
- 2021
43. On Domain Conceptualization
- Author
-
Giancarlo Guizzardi and Henderik A. Proper
- Subjects
Reflection (computer programming) ,Conceptualization ,Computer science ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences ,Epistemology ,Domain (software engineering) ,010201 computation theory & mathematics ,Core (graph theory) ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Software system ,Enterprise engineering ,Universe (mathematics) - Abstract
The growing role of models across the life-cycle of enterprises, and their information and software systems, fuels the need for a more fundamental reflection on the foundations of modeling. Two of the core theories of the discipline of enterprise engineering (Factual Information (FI) theory and the Model Universe (MU) theory) aim at contributing to these foundations.
- Published
- 2021
44. Classical Proofs of Quantum Knowledge
- Author
-
Thomas Vidick and Tina Zhang
- Subjects
Protocol (science) ,Computer science ,TheoryofComputation_GENERAL ,Proof of knowledge ,020206 networking & telecommunications ,0102 computer and information sciences ,02 engineering and technology ,Gas meter prover ,Mathematical proof ,01 natural sciences ,010201 computation theory & mathematics ,Quantum state ,0202 electrical engineering, electronic engineering, information engineering ,Calculus ,State (computer science) ,Quantum ,Quantum money - Abstract
We define the notion of a proof of knowledge in the setting where the verifier is classical, but the prover is quantum, and where the witness that the prover holds is in general a quantum state. We establish simple properties of our definition, including that, if a nondestructive classical proof of quantum knowledge exists for some state, then that state can be cloned by an unbounded adversary, and that, under certain conditions on the parameters in our definition, a proof of knowledge protocol for a hard-to-clone state can be used as a (destructive) quantum money verification protocol. In addition, we provide two examples of protocols (both inspired by private-key classical verification protocols for quantum money schemes) which we can show to be proofs of quantum knowledge under our definition. In so doing, we introduce techniques for the analysis of such protocols which build on results from the literature on nonlocal games. Finally, we show that, under our definition, the verification protocol introduced by Mahadev (FOCS 2018) is a classical argument of quantum knowledge for QMA relations. In all cases, we construct an explicit quantum extractor that is able to produce a quantum witness given black-box quantum (rewinding) access to the prover, the latter of which includes the ability to coherently execute the prover’s black-box circuit controlled on a superposition of messages from the verifier.
- Published
- 2021
45. On Distinct Consecutive Differences
- Author
-
József Solymosi, Imre Z. Ruzsa, George Shakan, and Endre Szemerédi
- Subjects
Physics ,Combinatorics ,Number theory ,010201 computation theory & mathematics ,010102 general mathematics ,0102 computer and information sciences ,0101 mathematics ,Constant (mathematics) ,01 natural sciences ,Real number - Abstract
We show that if \(A=\{a_1< a_2< \ldots < a_k\}\) is a set of real numbers such that the differences of the consecutive elements are distinct, then for and finite \(B \subset \mathbb {R}\), $$ |A+B|\gg |A|^{1/2}|B|. $$ The bound is tight up to the constant.
- Published
- 2021
46. Quasi-Equal Clock Reduction On-the-Fly
- Author
-
Bernd Westphal
- Subjects
Speedup ,On the fly ,Computer science ,Value (computer science) ,0102 computer and information sciences ,02 engineering and technology ,Security token ,01 natural sciences ,Automaton ,Reduction (complexity) ,Computer Science::Hardware Architecture ,Transformation (function) ,010201 computation theory & mathematics ,Reachability ,ComputerSystemsOrganization_MISCELLANEOUS ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Hardware_ARITHMETICANDLOGICSTRUCTURES ,Arithmetic ,Computer Science::Formal Languages and Automata Theory - Abstract
For timed automata, there is the notion of quasi-equal clocks. Two clocks are quasi-equal if, in each reachable configuration, they are equal or at least one has value 0. There are approaches to exploit quasi-equality of clocks to speed up reachability checking for timed automata. There is a procedure to detect quasi-equal clocks and a syntactical transformation of networks of timed automata where quasi-equal clocks are encoded by one representative clock and one boolean token per clock.
- Published
- 2021
47. Finding Cut-Offs in Leaderless Rendez-Vous Protocols is Easy
- Author
-
Mikhail Raskin, A. R. Balasubramanian, and Javier Esparza
- Subjects
Protocol (science) ,Matching (graph theory) ,Computer science ,Reachability problem ,Window (computing) ,0102 computer and information sciences ,02 engineering and technology ,Petri net ,Topology ,01 natural sciences ,Image (mathematics) ,Arbitrarily large ,010201 computation theory & mathematics ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,State (computer science) - Abstract
In rendez-vous protocols an arbitrarily large number of indistinguishable finite-state agents interact in pairs. The cut-off problem asks if there exists a number B such that all initial configurations of the protocol with at least B agents in a given initial state can reach a final configuration with all agents in a given final state. In a recent paper [17], Horn and Sangnier prove that the cut-off problem is equivalent to the Petri net reachability problem for protocols with a leader, and in "Image missing" for leaderless protocols. Further, for the special class of symmetric protocols they reduce these bounds to "Image missing" and "Image missing" , respectively. The problem of lowering these upper bounds or finding matching lower bounds is left open. We show that the cut-off problem is "Image missing" -complete for leaderless protocols, "Image missing" -complete for symmetric protocols with a leader, and in "Image missing" for leaderless symmetric protocols, thereby solving all the problems left open in [17].
- Published
- 2021
48. Solving a Multi-resource Partial-Ordering Flexible Variant of the Job-Shop Scheduling Problem with Hybrid ASP
- Author
-
Mohammed M. S. El-Kholany, Giulia Francescutto, and Konstantin Schekotihin
- Subjects
Schedule ,Mathematical optimization ,Optimization problem ,Computer science ,media_common.quotation_subject ,Control (management) ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences ,Scheduling (computing) ,Set (abstract data type) ,Answer set programming ,010201 computation theory & mathematics ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Quality (business) ,Partially ordered set ,media_common - Abstract
Many complex activities in production cycles, such as quality control or fault analysis, require highly experienced specialists to perform various operations on (semi)finished products using different tools. In practical scenarios, the next operation selection is complicated since each expert has only a local view on the entire set of operations to be performed. As a result, decisions made by the specialists are suboptimal and might cause high costs. In this paper, we consider a Multi-resource Partial-ordering Flexible Job-shop Scheduling (MPF-JSS) problem where partially-ordered sequences of operations must be scheduled on multiple required resources, such as tools and specialists. The resources are flexible and can perform one or more operations depending on their properties. We model the problem using Answer Set Programming (ASP), which can efficiently handle time assignments using Difference Logic. Moreover, we suggest two multi-shot solving strategies aiming to identify the time bounds allowing for a solution to the schedule optimization problem. Experiments conducted on a set of instances extracted from a medium-sized semiconductor fault analysis lab indicate that our approach can find schedules for 87 out of 91 considered real-world instances.
- Published
- 2021
49. Fast and Slow Enigmas and Parental Guidance
- Author
-
Karel Chvalovský, Josef Urban, Miroslav Olšák, Zarathustra Goertzel, and Jan Jakubuv
- Subjects
education.field_of_study ,Speedup ,business.industry ,Computer science ,Population ,Inference ,020207 software engineering ,Prover9 ,0102 computer and information sciences ,02 engineering and technology ,Mizar system ,01 natural sciences ,Automated theorem proving ,010201 computation theory & mathematics ,0202 electrical engineering, electronic engineering, information engineering ,Benchmark (computing) ,State (computer science) ,Artificial intelligence ,business ,education - Abstract
We describe several additions to the ENIGMA system that guides clause selection in the E automated theorem prover. First, we significantly speed up its neural guidance by adding server-based GPU evaluation. The second addition is motivated by fast weight-based rejection filters that are currently used in systems like E and Prover9. Such systems can be made more intelligent by instead training fast versions of ENIGMA that implement more intelligent pre-filtering. This results in combinations of trainable fast and slow thinking that improves over both the fast-only and slow-only methods. The third addition is based on “judging the children by their parents”, i.e., possibly rejecting an inference before it produces a clause. This is motivated by standard evolutionary mechanisms, where there is always a cost to producing all possible offsprings in the current population. This saves time by not evaluating all clauses by more expensive methods and provides a complementary view of the generated clauses. The methods are evaluated on a large benchmark coming from the Mizar Mathematical Library, showing good improvements over the state of the art .
- Published
- 2021
50. A SMT-based Implementation for Safety Checking of Parameterized Multi-Agent Systems
- Author
-
Alessandro Gianola, Marco Montali, and Paolo Felli
- Subjects
Model checking ,Correctness ,Semantics (computer science) ,Computer science ,Programming language ,Multi-agent system ,Parameterized complexity ,0102 computer and information sciences ,02 engineering and technology ,computer.software_genre ,01 natural sciences ,010201 computation theory & mathematics ,Encoding (memory) ,Satisfiability modulo theories ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,State (computer science) ,computer - Abstract
We address the problem of verifying whether unwanted states, characterized as a given state formula, are reachable in a given parameterized multi-agent system (PMAS), i.e., whether the PMAS is unsafe. As the multi-agent system is parameterized, it only describes the finite set of possible agent templates, while the actual number of concrete agent instances for each template is unbounded and cannot be foreseen. However, as safety depends in general on the number of agent instances, the verification result must be correct irrespective of such a number. After having defined two distinct execution semantics of PMASs, in this paper we focus on an implemented approach for checking safety, which is composed of two steps. First, we have implemented a modeling tool, called SAFE, that allows to specify the agent templates in the PMAS and their possible interactions, and to automatically translate this model into a textual encoding of an array-based system (ABS). Second, we check safety via infinite-state model checking based on satisfiability modulo theories (SMT), by using the general purpose SMT-based model checker MCMT, which accepts ABS specifications as input. We show the correctness guarantees of this approach by relying on the theory of ABSs. Finally we discuss how this approach lends itself to richer parameterized and data-aware MAS settings beyond the state-of-the-art solutions in the literature, using SMT-based results now available thanks to this work.
- Published
- 2021
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.