deterministic algorithms
Recently Published Documents


TOTAL DOCUMENTS

173
(FIVE YEARS 41)

H-INDEX

19
(FIVE YEARS 1)

PLoS ONE ◽  
2021 ◽  
Vol 16 (11) ◽  
pp. e0259736
Author(s):  
Arindam Saha ◽  
James A. R. Marshall ◽  
Andreagiovanni Reina

Node counting on a graph is subject to some fundamental theoretical limitations, yet a solution to such problems is necessary in many applications of graph theory to real-world systems, such as collective robotics and distributed sensor networks. Thus several stochastic and naïve deterministic algorithms for distributed graph size estimation or calculation have been provided. Here we present a deterministic and distributed algorithm that allows every node of a connected graph to determine the graph size in finite time, if an upper bound on the graph size is provided. The algorithm consists in the iterative aggregation of information in local hubs which then broadcast it throughout the whole graph. The proposed node-counting algorithm is on average more efficient in terms of node memory and communication cost than its previous deterministic counterpart for node counting, and appears comparable or more efficient in terms of average-case time complexity. As well as node counting, the algorithm is more broadly applicable to problems such as summation over graphs, quorum sensing, and spontaneous hierarchy creation.


2021 ◽  
Author(s):  
Dúnia Marchiori ◽  
Ricardo Custódio ◽  
Daniel Panario ◽  
Lucia Moura

In code-based cryptography, deterministic algorithms are used in the root-finding step of the decryption process. However, probabilistic algorithms are more time efficient than deterministic ones for large fields. These algorithms can be useful for long-term security where larger parameters are relevant. Still, current probabilistic root-finding algorithms suffer from time variations making them susceptible to timing side-channel attacks. To prevent these attacks, we propose a countermeasure to a probabilistic root-finding algorithm so that its execution time does not depend on the degree of the input polynomial but on the cryptosystem parameters. We compare the performance of our proposed algorithm to other root-finding algorithms already used in code-based cryptography. In general, our method is faster than the straightforward algorithm in Classic McEliece. The results also show the range of degrees in larger finite fields where our proposed algorithm is faster than the Additive Fast Fourier Transform algorithm.


Sensors ◽  
2021 ◽  
Vol 21 (18) ◽  
pp. 6268
Author(s):  
Krzysztof Sawicki ◽  
Grzegorz Bieszczad ◽  
Zbigniew Piotrowski

The proposed StegoFrameOrder (SFO) method enables the transmission of covert data in wireless computer networks exploiting non-deterministic algorithms of medium access (such as the distributed coordination function), especially in IEEE 802.11 networks. Such a covert channel enables the possibility of leaking crucial information outside secured network in a manner that is difficult to detect. The SFO method embeds hidden bits of information in the relative order of frames transmitted by wireless terminals operating on the same radio channel. The paper presents an idea of this covert channel, its implementation, and possible variants. The paper also discusses implementing the SFO method in a real environment and the experiments performed in the real-world scenario.


Author(s):  
Mrinmoyee Chattoraj ◽  
Udaya Rani Vinayakamurthy

<p>Route planning is an important part of road network. To select an optimized route several factors such as flow of traffic, speed limits of road. are concerned. Total cost of such a network depends on the number of junctions between the source and the destination. Due to the growth of the nodes in the network it becomes a tough job to determine the exact path using deterministic algorithms so in such cases genetic algorithms (GA) plays a vital role to find the optimized route. Crossover is an important operator ingenetic algorithm. The efficiency of thegenetic algorithmis directlyinfluenced by the time of a crossover operation. In this paper a new crossoveroperator closest-node pairing crossover (CNPC) is recommended which is explicitly designed to improve the performance of the genetic algorithm compared to other well-known crossover operators such as point based crossover and order crossover. The distance aspect of the network problem has been exploited in this crossover operator. This proposed technique gives a better result compared to the other crossover operator with the fitness value of 0.0048. The CNPC operator gives better rate of convergence compared to the other crossover operators.</p>


2021 ◽  
Vol 50 (1) ◽  
pp. 6-13
Author(s):  
Omri Ben-Eliezer ◽  
Rajesh Jayaram ◽  
David P. Woodruff ◽  
Eylon Yogev

We investigate the adversarial robustness of streaming algorithms. In this context, an algorithm is considered robust if its performance guarantees hold even if the stream is chosen adaptively by an adversary that observes the outputs of the algorithm along the stream and can react in an online manner. While deterministic streaming algorithms are inherently robust, many central problems in the streaming literature do not admit sublinear-space deterministic algorithms; on the other hand, classical space-efficient randomized algorithms for these problems are generally not adversarially robust. This raises the natural question of whether there exist efficient adversarially robust (randomized) streaming algorithms for these problems.


Author(s):  
Sanchit Gupta ◽  

Pseudorandom bit sequences are generated using deterministic algorithms to simulate truly random sequences. Many cryptographic algorithms use pseudorandom sequences, and the randomness of these sequences greatly impacts the robustness of these algorithms. Important crypto primitive Linear Feedback Shift Register (LFSR) and its combinations have long been used in stream ciphers for the generation of pseudorandom bit sequences. The sequences generated by LFSR can be predicted using the traditional Berlekamp Massey Algorithm, which solves LFSR in 2×n number of bits, where n is the degree of LFSR. Many different techniques based on ML classifiers have been successful at predicting the next bit of the sequences generated by LFSR. However, the main limitation in the existing approaches is that they require a large number (as compared to the degree of LFSR) of bits to solve the LFSR. In this paper, we have proposed a novel Pattern Duplication technique that exponentially reduces the input bits requirement for training the ML Model. This Pattern Duplication technique generates new samples from the available data using two properties of the XOR function used in LFSRs. We have used the Deep Neural Networks (DNN) as the next bit predictor of the sequences generated by LFSR along with the Pattern Duplication technique. Due to the Pattern Duplication technique, we need a very small number of input patterns for DNN. Moreover, in some cases, the DNN model managed to predict LFSRs in less than 2n bits as compared to the Berlekamp Massey Algorithm. However, this technique was not successful in cases where LFSRs have primitive polynomials with a higher number of tap points.


2021 ◽  
Author(s):  
Preeti Sharma

Evacuation problems fall under the vast area of search theory and operations research. Problems of evacuation of two robots on a unit disc have been studied for an efficient evacuation time. Work done so far has focused on improving the ’worst-case’ evacuation time with deterministic algorithms. We study the ’average-case’ evacuation time (randomized algorithms) while considering the efficiency trade-off between worst-case and average-case costs. Our other contribution is to analyze average-case and worst-case costs for the cowpath problem (another search problem) which helped us to set a parallel method for the evacuation problem.


2021 ◽  
Author(s):  
Preeti Sharma

Evacuation problems fall under the vast area of search theory and operations research. Problems of evacuation of two robots on a unit disc have been studied for an efficient evacuation time. Work done so far has focused on improving the ’worst-case’ evacuation time with deterministic algorithms. We study the ’average-case’ evacuation time (randomized algorithms) while considering the efficiency trade-off between worst-case and average-case costs. Our other contribution is to analyze average-case and worst-case costs for the cowpath problem (another search problem) which helped us to set a parallel method for the evacuation problem.


Sign in / Sign up

Export Citation Format

Share Document