A Revised Implementation of the Reverse Search Vertex Enumeration Algorithm

Author(s):  
David Avis
1970 ◽  
Vol 2 (3) ◽  
pp. 341-356
Author(s):  
G. Jándy

In cases where certain simplifications are allowed, the location optimisation of given and indivisible different economic units may be modelled as a bi-value weighted distribution problem. The paper presents a heuristic algorithm for this network-flow-type problem and also a partial enumeration algorithm for deriving the exact solution. But it is also pointed out that an initial sub-optimal solution can quickly be improved with a derivation on a direct line only, if the exact solution is not absolutely essential. A numerical example is used to illustrate the method of derivation on a direct line starting with an upper bound given by a sub-optimal solution.


Entropy ◽  
2019 ◽  
Vol 21 (10) ◽  
pp. 972 ◽  
Author(s):  
Ricardo Villanueva-Polanco

In this paper, we will study the key enumeration problem, which is connected to the key recovery problem posed in the cold boot attack setting. In this setting, an attacker with physical access to a computer may obtain noisy data of a cryptographic secret key of a cryptographic scheme from main memory via this data remanence attack. Therefore, the attacker would need a key-recovery algorithm to reconstruct the secret key from its noisy version. We will first describe this attack setting and then pose the problem of key recovery in a general way and establish a connection between the key recovery problem and the key enumeration problem. The latter problem has already been studied in the side-channel attack literature, where, for example, the attacker might procure scoring information for each byte of an Advanced Encryption Standard (AES) key from a side-channel attack and then want to efficiently enumerate and test a large number of complete 16-byte candidates until the correct key is found. After establishing such a connection between the key recovery problem and the key enumeration problem, we will present a comprehensive review of the most outstanding key enumeration algorithms to tackle the latter problem, for example, an optimal key enumeration algorithm (OKEA) and several nonoptimal key enumeration algorithms. Also, we will propose variants to some of them and make a comparison of them, highlighting their strengths and weaknesses.


2019 ◽  
Vol 118 ◽  
pp. 03025
Author(s):  
Han Sun ◽  
Hui-zi Ma ◽  
Xiang-rong Wang

In order to measure the portfolio credit risk of commercial banks in energy saving and environmental protection industry accurately, this paper proposes the value VaRGP of green credit risk and constructs a related model based on Pair Copula grouping model, VaR method (combined with enumeration algorithm).The results show that the credit schemes that commercial banks focus on investing in two areas of industrial emission reduction and environmental restoration is consistent with the conclusion that the two fields have the strongest development momentum.Besides, at different levels of confidence, all of VaRGP have passed the return test, which fully shows that the model is feasible and effective to measure the credit risk in different green fields and to formulate the optimal combination strategy.


Sign in / Sign up

Export Citation Format

Share Document