# Graph Security Testing

Save this PDF as:

Size: px
Start display at page:

## Transcription

1 JOURNAL OF APPLIED COMPUTER SCIENCE Vol. 23 No. 1 (2015), pp Graph Security Testing Tomasz Gieniusz 1, Robert Lewoń 1, Michał Małafiejski 1 1 Gdańsk University of Technology, Poland Department of Algorithms and System Modeling ul. Gabriela Narutowicza 11/12, Gdańsk Wrzeszcz Abstract. In this paper we consider probabilistic approach to the decision problem of security in graphs. In this purpose we define general model (called property tester) and criteria for approximating answers for decision problems. We constructed two property testers and one heuristics for the problem of security in graphs. Keywords: secure set, property testing. 1. Introduction Set S V is called secure set iff X S N[X] S N(X) \ S [1]. That means that every subset of a secure set has at least as many friends (neighbour vertices in S ) as enemies (neighbour vertices outside S ) and will be defended in case of attack. Problem of determining if given set is secure is co NP-complete, there is no efficient algorithm solving it [1]. Property testers are algorithms that distinguish inputs with a given property from those that are far from satisfying the property [2]. Property testers are allowed to be probabilistic and approximate in exchange for much reduced complexity. In our work we apply the idea of testing to construct probabilistic and approximate algorithms for graph security problems that run in polynomial time. Our goal was to formalize the testing model and propose various approaches for security

2 30 Graph Security Testing testing and general methods of rating them. We take into account possibilities of practical application, algorithm complexity and quality of the approximation. 2. Property testing Definition 1 (Property tester [2][3]) Property testers are algorithms that distinguish inputs with a given property from those that are far from satisfying the property. Far means that significant part of the input must be changed so that property can be satisfied Tester response Classical deterministic algorithm for decision problem answers the question Does the given input satisfy that property? Property tester for decision problem answers the question Does the given input satisfy that property or is it far from satisfying it? 2.2. Tester requirements We require our property testers to satisfy two properties: Accept secure set with probability > 95%. Reject set that is ε-far from being secure with probability > 95%. If input set is close to being secure we don t put any requirements on the given answer. YES ε Far from YES Accept with probability > 95% Don't care Reject with probability > 95% Figure 1. Property tester requirements

3 T. Gieniusz, R. Lewoń, M. Małafiejski Meaning of ε-far Meaning of ε-far depends on chosen model and can have impact on: Possibilities of practical application. Algorithm complexity. Fraction of cases we can guarantee the probability of answer correctness Test witness Witness is a fragment of input or structure generated basing on input. For example number from given input sequence.witness testimony is its property, that can be an evidence of some global input property. For example unordered pair of sequence elements proved it s global unsortedness. Remark 2 Testimonies of some witnesses may not entail any informations about global input property. For example ordered pair of sequence elements tells nothing about its global sortedness. Witness testimony is valuable, if it entails some information about global input property. We call witness valuable if its testimony is valuable. Lemma 3 (Witness lemma) If a single test catches a valuable witness with a probability p, than s = 3/p iterations of the test catch a witness with probability > 95%. Proof. Probability of not catching a valuable witness with s tries does not exceed P (1 p) s. Using 1 x e x, we get P e ps = e 3 95%. 3. Formal testing model 3.1. Model definition Proposed testing model contains of:

4 32 Graph Security Testing Definition of ε-far, Specification of attributes input must have to be ε-far from satisfying given property. Definition of witness and it s evidence, Specification of local and easily verifiable property that can give evidence of given global property. Witness choose algorithm, Specification of witness selection method from the set of every possible witnesses. Witness testimony extraction algorithm, Specification of method to designate if local property is satisfied for chosen witness. Together with witness choose algorithm it specified probability p s of catching valuable witness Model rating criteria For a single problem it is possible to construct many correct testing models. Here is the general model rating schema which fulfilment is required for model usefulness. Practical and intuitive understanding of ε-far. Is information that input is ε-far from satisfying given property is valuable for us. Uniform witness choose. Does every witness have the same probability to be chosen. If, despite of many valuable witnesses, our algorithm somehow ignores them than we can give guarantee on probability of answer correctness. If it is not uniform distribution than we can not use lemma 3. Relationship between ε and p s. How does probability of choosing valuable witness change depending on how far input is far from satisfying given property.

5 T. Gieniusz, R. Lewoń, M. Małafiejski 33 Choose and check of witness algorithms complexity. What is the complexity of witness choose and witness testimony check algorithms and is it an advantage over deterministic algorithm. Tester complexity can be described us: O(3/p s f (I) g(i)), where 3/p s is number of necessary witness tests to be repeated, f (I) is witness choose algorithm complexity, g(i) is witness check algorithm complexity. Fraction of cases that we can give probability guarantee on. How fraction of cases that we can give probability guarantee on changes depending on ε. Other words, how small ε is required to give this guarantee on at least δ fraction of possible inputs. If for given definition of ε-far significant fraction of input cases is very close to satisfy given property, than we will need very small ε for that cases to be considered as ε-far. That in other hand has impact on algorithm complexity Problem decomposition Here we present a way to construct proper testing model using problem decomposition. Definition 4 (General predicate) Let our decision problem be predicate on set of all possible inputs and call it general. P G : I {true, f alse}, where I is a set of all possible problem inputs. Definition 5 (Special predicate) Let D(I) = {I 1, I 2,..., I k } be a function defining an input decomposition and P S : D(I) {true, f alse} a predicate on the element of that decomposition (part of the input), such that I I P G (I) = true Ii D(I) P S (I i ) = true. P S is called special predicate. 4. Security in graphs In this section we present basic graph security definitions derived from [4][5][1][6] and reworded for better readability.

6 34 Graph Security Testing Nonempty set S V in graph G = (V, E) is called an alliance, if v S N[v] S N(v) V \ S. That means that every member of an alliance (vertex in S ) has at least as many friends (neighbour vertices in S ) as enemies (neighbour vertices outside S ) and will be defended in case of attack. In addition if S is also dominating set of G we call it global alliance. Definition 6 For set X V we define predicate SEC(X) N[X S ] N(X V \ S ). Set S is called k-alliance, if X S X k SEC(X) and again when S is dominating set of G we call it global k-alliance. For nonempty subset S = (v 1, v 2,..., v k ) V in graph G = (V, E), attack on S is every sequence of k mutually disjoint sets A = (A 1, A 2,..., A k ), such that 1 i k a Ai a N(v) \ S. If a A i we say that a attacks v i. Similarly we define defence of S as every sequence of k mutually disjoint sets D = (D 1, D 2,..., D k ), such that 1 i k d Di a N[s i ] S. If d D i we say that d defends v i. Attack A on S can be defended, if there exists defence D such that 1 i k D i A i. Set S is secure iff every attack on S can be defended. Theorem 7 (Secure set as k-alliance) Set S is secure in graph G iff it is global S -alliance. Proof. This theorem was proved in [1]. 5. Security testing 5.1. Attack based model The simplest, natural way for security testing is to take into account all possible maximal attacks and require given fraction of them to be defendable Model Definition of ε-far, S is ε-far from being secure iff ε fraction of attacks cannot be defended. For example set is 1/2-far from being secure iff half of the possible attacks cannot be defended.

7 T. Gieniusz, R. Lewoń, M. Małafiejski 35 Definition of witness and it s evidence, Maximal attack on S is a witness, defence possibility is his testimony. Witness is valuable if there is not defence for him. Witness choose algorithm, For every enemy we choose his target uniformly and independently at random (his neighbour in S ). This way we get a maximal attack, because every enemy is making use of his attack possibility. Witness testimony extraction algorithm, To check if attack is defendable we use security matching algorithm described in [4] Model rating Practical and intuitive understanding of ε-far, ε-far is defined that way to be the most intuitive. Enemies usually don t choose their targets at random, so practical application may be narrowed, but it is still valuable information to know that for example half of the attacks cannot be defended. Uniform witness choose, Every maximal attack is chosen with the same probability, because every of them can be constructed in exactly one way and there is no such attack, algorithm couldn t construct. Relationship between ε and p s, Relationship is linear, set is ε-far from being secure iff ε fraction of witnesses (attacks) is undefendable, so they are valuable witnesses.

8 36 Graph Security Testing ps ε Figure 2. Relationship between ε and p s in attack based model. Choose and check of witness algorithms complexity, Witness choose can be done in O( V \ S S ) - for every enemy we choose his neighbour to be the target of the attack. Witness check is determined by security matching algorithm [4] and is O(n 5/2 ). Fraction of cases that we can give probability guarantee on, We have done computer simulations for random graphs with nodes. Results are shown on the plot below. YN ε Figure 3. Fraction of cases that we can give probability guarantee on attack based model. That means that even for high ε (low algorithm complexity) random graph is either secure or ε-far from being secure (there are many witnesses) and we can give probability guarantee on algorithm answer.

9 T. Gieniusz, R. Lewoń, M. Małafiejski Algorithm Algorithm 5.1 Attack based tester Repeat 3/ε times Chose maximal attack A independently and uniformly at random A. if A cannot be defended then return S is ε-far from being secure. end if return S is secure. End Analysis Secure set will always be correctly determined. For the set that is ε-far from being secure, probability of choosing undefendable attack in one test is no less than ε. Using witness lemma 3 3/ε test repetitions chooses undefendable attack in no less than 95% of the cases Conclusions Probability of failure to recognize insecure set despite of ε fraction of undefendable attacks is no more than 5%. Algorithm complexity is O(n 5/2 /ε) Examples Troubling example 1 2 Figure 4. Troubling example for attack based model. k

10 38 Graph Security Testing In the above graphs family only attacks that are focused on single vertex cannot be defended. There is exactly k of such attacks and in set of all k 3 attacks they are only 1/k 2 fraction. That means that for any ε we can construct a graph, that is close to being secure and our algorithm cannot guarantee the correctness of the given answer. Easy example a d Figure 5. Easy example for attack based model. In the above graphs family exactly half of the attacks cannot be defended. Cycle can be defended independently, every attack in which a chooses d as his target cannot be defended. That means that our algorithm has 50% chance to choose valuable witness in single test and according to witness lemma 3 that gives 95% success rate with only 6 repetitions Subset based model Next model is derived directly from subset secure set definition [7]. In this case we will take into account all possible subsets of S and require given fraction of them to satisfy [6] Model Definition of ε-far, S is ε-far from being secure iff ε fraction of subsets doesn t satisfy [6].

11 T. Gieniusz, R. Lewoń, M. Małafiejski 39 Definition of witness and it s evidence, Subset A S is a witness and value of SEC(A) is his testimony. Witness is valuable if his testimony equals f alse. Witness choose algorithm, For every vertex v S choose one possibility uniformly and independently at random: v is in witness, v is not in witness. Witness testimony extraction algorithm. Compute SEC(A) from definition Model rating Lets use 3.2 for such testing model. Practical and intuitive understanding of ε-far, This model derives from security definition, so the definition of ε-far is very intuitive. It has practical applications, because it is a valuable information to know that for example half of the subsets are not secure. Uniform witness choose, From the set of all possible subsets of S every one is chosen with the same probability, because every of them can be constructed in exactly one way and there is no such subset that algorithm could not construct. Relationship between ε and p s, Relationship is linear, set is ε-far from being secure iff exactly ε fraction of witnesses (subsets) doesn t satisfy [6], so they are valuable.

12 40 Graph Security Testing ps ε Figure 6. Relationship between ε and p s for subset based model. Choose and check of witness algorithms complexity, Witness choose complexity is O( S ) - for every ally we choose if it is in the witness. Witness check complexity is determined by SEC definition and is O(n). Fraction of cases that we can give probability guarantee on. We have done computer simulations for random graphs with nodes. Results are shown on the plot below. YN ε Figure 7. Fraction of cases that we can give probability guarantee on subset based model. That means that even for high ε (low algorithm complexity) random graph is either secure or ε-far from being secure (there are many witnesses) and we can give probability guarantee on algorithm answer.

13 T. Gieniusz, R. Lewoń, M. Małafiejski Algorithm Algorithm 5.2 Subset based tester Repeat 3/ε times Choose subset X S uniformly and independently at random. if SEC(X) [6] then return S is ε-far fro being secure. end if return S is secure. End Analysis Secure set will always be correctly determined. For the set that is ε-far from being secure, probability of choosing subset that doesn t satisfy SEC in one test is no less than ε. Using witness lemma 3 3/ε test repetitions chooses such subset in no less than 95% of the cases Conclusions Probability of failure to recognize insecure set despite of ε fraction of undefendable attacks is no more than 5%. Algorithm complexity is O(n 2 /ε) Examples Troubling example

14 42 Graph Security Testing Figure 8. Troubling example for subset based model. In the above graphs family SEC is not satisfied for only the whole S. In set of every 2 S possible subsets of S it is only fraction of 1/2 S. That means that for any ε we can construct a graph, that is close to being secure and our algorithm cannot guarantee the correctness of the given answer. Easy example Secure subgraph Figure 9. Easy example for subset based model. In the above graphs family SEC is not satisfied for exactly half of the subsets. That means that our algorithm has 50% chance to choose valuable witness in single test and according to witness lemma 3 that gives 95% success rate with only 6 repetitions. 6. Security problem heuristic In this section we will present heuristic algorithms based on simple idea. Idea is to construct subset that is a valuable witness for security problem in subset based model - subset that does not satisfy SEC. Specific versions of this algorithm differs

15 T. Gieniusz, R. Lewoń, M. Małafiejski 43 in subset construction approach. We will use following naming convention: S V is a subset of vertices to be checked for security c and d are optimization criteria for any subset S S 6.1. Algorithm schema Algorithm 6.1 Security problem heuristic schema Split S into n disjoint clusters S 1, S 2,..., S n repeat For every pair of clusters S i, S j, i j calculate c(s i S j ) Join two clusters optimizing c, in the case of ambiguity use d criteria until There are at least two clusters or one of the clusters does not satisfy SEC if Any of the clusters does not satisfy SEC then return false else return true end if Remark 8 First step of the algorithm can be randomized (and algorithm can be repeated many times). The simplest version is to take one-element clusters, for S = {s 1, s 2,..., s k } take S i = {s i }, i = 1, 2,..., k as initial clusters. In all presented variant of algorithm we take the same c criteria, for every X S : c(x) = N[X] S N(X) \ S We will minimize this criteria, negative value means that X does not satisfy SEC, therefore S is not secure. Algorithm objective is to construct valuable witness, so minimization of c is well founded.

16 44 Graph Security Testing 6.2. Secondary criteria proposals Second criteria is used in the case of ambiguity of c criteria. In such situation we propose following approaches: Avoid massive clusters creation For any X S : d 1 = X. This will lead to small clusters creation. Support massive and strong clusters creation For any X S : d 2 = N[X] S. This will lead to bigger clusters with greater support from the outside creation. Support neighbourhood-dependent clusters creation For any X S : d 3 = (N[X] \ X) S. This will lead to creation of the clusters that require maximum help from neighbours outside of X. Remark 9 In the simplest version secondary criteria can be omitted. We can also use many criteria by choosing secondary criteria randomly at every iteration. In case of further ambiguity after second criteria usage we can introduce additional resolve phases or choose cluster at random. References [1] Dutton, R., Secure set algorithms and complexity, In: Proceedings of the Thirty-Seventh Southeastern International Conference on Combinatorics, Graph Theory and Computing, Vol. 180, 2006, pp [2] Raskhodnikova, S., Property Testing: Theory and Applications, Ph.D. thesis, Massachusetts Institute of Technology, 2003.

17 T. Gieniusz, R. Lewoń, M. Małafiejski 45 [3] Goldreich, O., Goldwasser, S., and Ron, D., Property testing and its connection to learning and approximation, Journal of the ACM (JACM), Vol. 45, No. 4, 1998, pp [4] Blukis, T., Zbiory bezpieczne w grafach, Master s thesis, Politechnika Gdańka, [5] Brigham, R., Dutton, R., and Hedetniemi, S., Security in graphs, Discrete applied mathematics, Vol. 155, No. 13, 2007, pp [6] Dutton, R. D., Lee, R., and Brigham, R. C., Bounds on a graph s security number, Discrete Appl. Math., Vol. 156, No. 5, March 2008, pp

### Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs

Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs Yong Zhang 1.2, Francis Y.L. Chin 2, and Hing-Fung Ting 2 1 College of Mathematics and Computer Science, Hebei University,

### CSC2420 Fall 2012: Algorithm Design, Analysis and Theory

CSC2420 Fall 2012: Algorithm Design, Analysis and Theory Allan Borodin November 15, 2012; Lecture 10 1 / 27 Randomized online bipartite matching and the adwords problem. We briefly return to online algorithms

### High degree graphs contain large-star factors

High degree graphs contain large-star factors Dedicated to László Lovász, for his 60th birthday Noga Alon Nicholas Wormald Abstract We show that any finite simple graph with minimum degree d contains a

### Computer Algorithms. NP-Complete Problems. CISC 4080 Yanjun Li

Computer Algorithms NP-Complete Problems NP-completeness The quest for efficient algorithms is about finding clever ways to bypass the process of exhaustive search, using clues from the input in order

### Every tree contains a large induced subgraph with all degrees odd

Every tree contains a large induced subgraph with all degrees odd A.J. Radcliffe Carnegie Mellon University, Pittsburgh, PA A.D. Scott Department of Pure Mathematics and Mathematical Statistics University

### Un survol de la domination de puissance dans les graphes

Un survol de la domination de puissance dans les graphes Paul Dorbec Univ. Bordeaux - CNRS Journées de combinatoire de Bordeaux 2013 Introduction Definition of power domination Electrical system monitoring

### Network Algorithms for Homeland Security

Network Algorithms for Homeland Security Mark Goldberg and Malik Magdon-Ismail Rensselaer Polytechnic Institute September 27, 2004. Collaborators J. Baumes, M. Krishmamoorthy, N. Preston, W. Wallace. Partially

### A Brief Introduction to Property Testing

A Brief Introduction to Property Testing Oded Goldreich Abstract. This short article provides a brief description of the main issues that underly the study of property testing. It is meant to serve as

### Global secure sets of trees and grid-like graphs. Yiu Yu Ho

Global secure sets of trees and grid-like graphs by Yiu Yu Ho B.S. University of Central Florida, 2006 M.S. University of Central Florida, 2010 A dissertation submitted in partial fulfillment of the requirements

### Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs

CSE599s: Extremal Combinatorics November 21, 2011 Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs Lecturer: Anup Rao 1 An Arithmetic Circuit Lower Bound An arithmetic circuit is just like

### Outline. NP-completeness. When is a problem easy? When is a problem hard? Today. Euler Circuits

Outline NP-completeness Examples of Easy vs. Hard problems Euler circuit vs. Hamiltonian circuit Shortest Path vs. Longest Path 2-pairs sum vs. general Subset Sum Reducing one problem to another Clique

### princeton univ. F 13 cos 521: Advanced Algorithm Design Lecture 6: Provable Approximation via Linear Programming Lecturer: Sanjeev Arora

princeton univ. F 13 cos 521: Advanced Algorithm Design Lecture 6: Provable Approximation via Linear Programming Lecturer: Sanjeev Arora Scribe: One of the running themes in this course is the notion of

### Exponential time algorithms for graph coloring

Exponential time algorithms for graph coloring Uriel Feige Lecture notes, March 14, 2011 1 Introduction Let [n] denote the set {1,..., k}. A k-labeling of vertices of a graph G(V, E) is a function V [k].

### 2.3 Scheduling jobs on identical parallel machines

2.3 Scheduling jobs on identical parallel machines There are jobs to be processed, and there are identical machines (running in parallel) to which each job may be assigned Each job = 1,,, must be processed

### On the k-path cover problem for cacti

On the k-path cover problem for cacti Zemin Jin and Xueliang Li Center for Combinatorics and LPMC Nankai University Tianjin 300071, P.R. China zeminjin@eyou.com, x.li@eyou.com Abstract In this paper we

### 1 Definitions. Supplementary Material for: Digraphs. Concept graphs

Supplementary Material for: van Rooij, I., Evans, P., Müller, M., Gedge, J. & Wareham, T. (2008). Identifying Sources of Intractability in Cognitive Models: An Illustration using Analogical Structure Mapping.

### Approximation Algorithms

Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NP-Completeness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms

### All trees contain a large induced subgraph having all degrees 1 (mod k)

All trees contain a large induced subgraph having all degrees 1 (mod k) David M. Berman, A.J. Radcliffe, A.D. Scott, Hong Wang, and Larry Wargo *Department of Mathematics University of New Orleans New

### Lecture 7: Approximation via Randomized Rounding

Lecture 7: Approximation via Randomized Rounding Often LPs return a fractional solution where the solution x, which is supposed to be in {0, } n, is in [0, ] n instead. There is a generic way of obtaining

### 8.1 Min Degree Spanning Tree

CS880: Approximations Algorithms Scribe: Siddharth Barman Lecturer: Shuchi Chawla Topic: Min Degree Spanning Tree Date: 02/15/07 In this lecture we give a local search based algorithm for the Min Degree

### FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM

International Journal of Innovative Computing, Information and Control ICIC International c 0 ISSN 34-48 Volume 8, Number 8, August 0 pp. 4 FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT

### A simpler and better derandomization of an approximation algorithm for Single Source Rent-or-Buy

A simpler and better derandomization of an approximation algorithm for Single Source Rent-or-Buy David P. Williamson Anke van Zuylen School of Operations Research and Industrial Engineering, Cornell University,

### On the Relationship between Classes P and NP

Journal of Computer Science 8 (7): 1036-1040, 2012 ISSN 1549-3636 2012 Science Publications On the Relationship between Classes P and NP Anatoly D. Plotnikov Department of Computer Systems and Networks,

### Nan Kong, Andrew J. Schaefer. Department of Industrial Engineering, Univeristy of Pittsburgh, PA 15261, USA

A Factor 1 2 Approximation Algorithm for Two-Stage Stochastic Matching Problems Nan Kong, Andrew J. Schaefer Department of Industrial Engineering, Univeristy of Pittsburgh, PA 15261, USA Abstract We introduce

### The positive minimum degree game on sparse graphs

The positive minimum degree game on sparse graphs József Balogh Department of Mathematical Sciences University of Illinois, USA jobal@math.uiuc.edu András Pluhár Department of Computer Science University

### How to Prove a Theorem So No One Else Can Claim It

Proceedings of the International Congress of Mathematicians Berkeley, California, USA, 1986 How to Prove a Theorem So No One Else Can Claim It MANUEL BLUM Goldwasser, Micali, and Rackoff [GMR] define for

### Lecture 10: CPA Encryption, MACs, Hash Functions. 2 Recap of last lecture - PRGs for one time pads

CS 7880 Graduate Cryptography October 15, 2015 Lecture 10: CPA Encryption, MACs, Hash Functions Lecturer: Daniel Wichs Scribe: Matthew Dippel 1 Topic Covered Chosen plaintext attack model of security MACs

### Lecture 2: Complexity Theory Review and Interactive Proofs

600.641 Special Topics in Theoretical Cryptography January 23, 2007 Lecture 2: Complexity Theory Review and Interactive Proofs Instructor: Susan Hohenberger Scribe: Karyn Benson 1 Introduction to Cryptography

### A Sublinear Bipartiteness Tester for Bounded Degree Graphs

A Sublinear Bipartiteness Tester for Bounded Degree Graphs Oded Goldreich Dana Ron February 5, 1998 Abstract We present a sublinear-time algorithm for testing whether a bounded degree graph is bipartite

### 1. Nondeterministically guess a solution (called a certificate) 2. Check whether the solution solves the problem (called verification)

Some N P problems Computer scientists have studied many N P problems, that is, problems that can be solved nondeterministically in polynomial time. Traditionally complexity question are studied as languages:

### Large induced subgraphs with all degrees odd

Large induced subgraphs with all degrees odd A.D. Scott Department of Pure Mathematics and Mathematical Statistics, University of Cambridge, England Abstract: We prove that every connected graph of order

### On the Unique Games Conjecture

On the Unique Games Conjecture Antonios Angelakis National Technical University of Athens June 16, 2015 Antonios Angelakis (NTUA) Theory of Computation June 16, 2015 1 / 20 Overview 1 Introduction 2 Preliminary

### Factoring & Primality

Factoring & Primality Lecturer: Dimitris Papadopoulos In this lecture we will discuss the problem of integer factorization and primality testing, two problems that have been the focus of a great amount

### An Empirical Study of Two MIS Algorithms

An Empirical Study of Two MIS Algorithms Email: Tushar Bisht and Kishore Kothapalli International Institute of Information Technology, Hyderabad Hyderabad, Andhra Pradesh, India 32. tushar.bisht@research.iiit.ac.in,

### The degree, size and chromatic index of a uniform hypergraph

The degree, size and chromatic index of a uniform hypergraph Noga Alon Jeong Han Kim Abstract Let H be a k-uniform hypergraph in which no two edges share more than t common vertices, and let D denote the

### Why? A central concept in Computer Science. Algorithms are ubiquitous.

Analysis of Algorithms: A Brief Introduction Why? A central concept in Computer Science. Algorithms are ubiquitous. Using the Internet (sending email, transferring files, use of search engines, online

### Near Optimal Solutions

Near Optimal Solutions Many important optimization problems are lacking efficient solutions. NP-Complete problems unlikely to have polynomial time solutions. Good heuristics important for such problems.

### Cycle transversals in bounded degree graphs

Electronic Notes in Discrete Mathematics 35 (2009) 189 195 www.elsevier.com/locate/endm Cycle transversals in bounded degree graphs M. Groshaus a,2,3 P. Hell b,3 S. Klein c,1,3 L. T. Nogueira d,1,3 F.

### Generating models of a matched formula with a polynomial delay

Generating models of a matched formula with a polynomial delay Petr Savicky Institute of Computer Science, Academy of Sciences of Czech Republic, Pod Vodárenskou Věží 2, 182 07 Praha 8, Czech Republic

### Introduction to Algorithms. Part 3: P, NP Hard Problems

Introduction to Algorithms Part 3: P, NP Hard Problems 1) Polynomial Time: P and NP 2) NP-Completeness 3) Dealing with Hard Problems 4) Lower Bounds 5) Books c Wayne Goddard, Clemson University, 2004 Chapter

### Complexity Classes P and NP

Complexity Classes P and NP MATH 3220 Supplemental Presentation by John Aleshunas The cure for boredom is curiosity. There is no cure for curiosity Dorothy Parker Computational Complexity Theory In computer

### Small Maximal Independent Sets and Faster Exact Graph Coloring

Small Maximal Independent Sets and Faster Exact Graph Coloring David Eppstein Univ. of California, Irvine Dept. of Information and Computer Science The Exact Graph Coloring Problem: Given an undirected

### A Study of Sufficient Conditions for Hamiltonian Cycles

DeLeon 1 A Study of Sufficient Conditions for Hamiltonian Cycles Melissa DeLeon Department of Mathematics and Computer Science Seton Hall University South Orange, New Jersey 07079, U.S.A. ABSTRACT A graph

### ARTICLE IN PRESS. European Journal of Operational Research xxx (2004) xxx xxx. Discrete Optimization. Nan Kong, Andrew J.

A factor 1 European Journal of Operational Research xxx (00) xxx xxx Discrete Optimization approximation algorithm for two-stage stochastic matching problems Nan Kong, Andrew J. Schaefer * Department of

### On an anti-ramsey type result

On an anti-ramsey type result Noga Alon, Hanno Lefmann and Vojtĕch Rödl Abstract We consider anti-ramsey type results. For a given coloring of the k-element subsets of an n-element set X, where two k-element

### Degree Hypergroupoids Associated with Hypergraphs

Filomat 8:1 (014), 119 19 DOI 10.98/FIL1401119F Published by Faculty of Sciences and Mathematics, University of Niš, Serbia Available at: http://www.pmf.ni.ac.rs/filomat Degree Hypergroupoids Associated

### ! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm.

Approximation Algorithms 11 Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of three

### Lecture 7: NP-Complete Problems

IAS/PCMI Summer Session 2000 Clay Mathematics Undergraduate Program Basic Course on Computational Complexity Lecture 7: NP-Complete Problems David Mix Barrington and Alexis Maciel July 25, 2000 1. Circuit

### 2.1 Complexity Classes

15-859(M): Randomized Algorithms Lecturer: Shuchi Chawla Topic: Complexity classes, Identity checking Date: September 15, 2004 Scribe: Andrew Gilpin 2.1 Complexity Classes In this lecture we will look

### Connected Identifying Codes for Sensor Network Monitoring

Connected Identifying Codes for Sensor Network Monitoring Niloofar Fazlollahi, David Starobinski and Ari Trachtenberg Dept. of Electrical and Computer Engineering Boston University, Boston, MA 02215 Email:

### FALSE ALARMS IN FAULT-TOLERANT DOMINATING SETS IN GRAPHS. Mateusz Nikodem

Opuscula Mathematica Vol. 32 No. 4 2012 http://dx.doi.org/10.7494/opmath.2012.32.4.751 FALSE ALARMS IN FAULT-TOLERANT DOMINATING SETS IN GRAPHS Mateusz Nikodem Abstract. We develop the problem of fault-tolerant

### Approximation Algorithms: LP Relaxation, Rounding, and Randomized Rounding Techniques. My T. Thai

Approximation Algorithms: LP Relaxation, Rounding, and Randomized Rounding Techniques My T. Thai 1 Overview An overview of LP relaxation and rounding method is as follows: 1. Formulate an optimization

Approximation Algorithms Chapter Approximation Algorithms Q. Suppose I need to solve an NP-hard problem. What should I do? A. Theory says you're unlikely to find a poly-time algorithm. Must sacrifice one

### Victor Shoup Avi Rubin. fshoup,rubing@bellcore.com. Abstract

Session Key Distribution Using Smart Cards Victor Shoup Avi Rubin Bellcore, 445 South St., Morristown, NJ 07960 fshoup,rubing@bellcore.com Abstract In this paper, we investigate a method by which smart

### Permutation Betting Markets: Singleton Betting with Extra Information

Permutation Betting Markets: Singleton Betting with Extra Information Mohammad Ghodsi Sharif University of Technology ghodsi@sharif.edu Hamid Mahini Sharif University of Technology mahini@ce.sharif.edu

### Page 1. CSCE 310J Data Structures & Algorithms. CSCE 310J Data Structures & Algorithms. P, NP, and NP-Complete. Polynomial-Time Algorithms

CSCE 310J Data Structures & Algorithms P, NP, and NP-Complete Dr. Steve Goddard goddard@cse.unl.edu CSCE 310J Data Structures & Algorithms Giving credit where credit is due:» Most of the lecture notes

### Short Cycles make W-hard problems hard: FPT algorithms for W-hard Problems in Graphs with no short Cycles

Short Cycles make W-hard problems hard: FPT algorithms for W-hard Problems in Graphs with no short Cycles Venkatesh Raman and Saket Saurabh The Institute of Mathematical Sciences, Chennai 600 113. {vraman

### On Integer Additive Set-Indexers of Graphs

On Integer Additive Set-Indexers of Graphs arxiv:1312.7672v4 [math.co] 2 Mar 2014 N K Sudev and K A Germina Abstract A set-indexer of a graph G is an injective set-valued function f : V (G) 2 X such that

### A security analysis of the SecLookOn authentication system

Institut f. Statistik u. Wahrscheinlichkeitstheorie 1040 Wien, Wiedner Hauptstr. 8-10/107 AUSTRIA http://www.statistik.tuwien.ac.at A security analysis of the SecLookOn authentication system K. Grill Forschungsbericht

### Offline sorting buffers on Line

Offline sorting buffers on Line Rohit Khandekar 1 and Vinayaka Pandit 2 1 University of Waterloo, ON, Canada. email: rkhandekar@gmail.com 2 IBM India Research Lab, New Delhi. email: pvinayak@in.ibm.com

### Introduction to Logic in Computer Science: Autumn 2006

Introduction to Logic in Computer Science: Autumn 2006 Ulle Endriss Institute for Logic, Language and Computation University of Amsterdam Ulle Endriss 1 Plan for Today Now that we have a basic understanding

### 1 Formulating The Low Degree Testing Problem

6.895 PCP and Hardness of Approximation MIT, Fall 2010 Lecture 5: Linearity Testing Lecturer: Dana Moshkovitz Scribe: Gregory Minton and Dana Moshkovitz In the last lecture, we proved a weak PCP Theorem,

### Odd induced subgraphs in graphs of maximum degree three

Odd induced subgraphs in graphs of maximum degree three David M. Berman, Hong Wang, and Larry Wargo Department of Mathematics University of New Orleans New Orleans, Louisiana, USA 70148 Abstract A long-standing

### 5.1 Bipartite Matching

CS787: Advanced Algorithms Lecture 5: Applications of Network Flow In the last lecture, we looked at the problem of finding the maximum flow in a graph, and how it can be efficiently solved using the Ford-Fulkerson

### Applied Algorithm Design Lecture 5

Applied Algorithm Design Lecture 5 Pietro Michiardi Eurecom Pietro Michiardi (Eurecom) Applied Algorithm Design Lecture 5 1 / 86 Approximation Algorithms Pietro Michiardi (Eurecom) Applied Algorithm Design

### Problem Set 7 Solutions

8 8 Introduction to Algorithms May 7, 2004 Massachusetts Institute of Technology 6.046J/18.410J Professors Erik Demaine and Shafi Goldwasser Handout 25 Problem Set 7 Solutions This problem set is due in

### Graphical degree sequences and realizations

swap Graphical and realizations Péter L. Erdös Alfréd Rényi Institute of Mathematics Hungarian Academy of Sciences MAPCON 12 MPIPKS - Dresden, May 15, 2012 swap Graphical and realizations Péter L. Erdös

### Guessing Game: NP-Complete?

Guessing Game: NP-Complete? 1. LONGEST-PATH: Given a graph G = (V, E), does there exists a simple path of length at least k edges? YES 2. SHORTEST-PATH: Given a graph G = (V, E), does there exists a simple

### Complexity Theory. IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar

Complexity Theory IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar Outline Goals Computation of Problems Concepts and Definitions Complexity Classes and Problems Polynomial Time Reductions Examples

### Partitioning edge-coloured complete graphs into monochromatic cycles and paths

arxiv:1205.5492v1 [math.co] 24 May 2012 Partitioning edge-coloured complete graphs into monochromatic cycles and paths Alexey Pokrovskiy Departement of Mathematics, London School of Economics and Political

### MapReduce and Distributed Data Analysis. Sergei Vassilvitskii Google Research

MapReduce and Distributed Data Analysis Google Research 1 Dealing With Massive Data 2 2 Dealing With Massive Data Polynomial Memory Sublinear RAM Sketches External Memory Property Testing 3 3 Dealing With

### International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013

FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED Omar Akchiche 1 and Omar Khadir 2 1,2 Laboratory of Mathematics, Cryptography and Mechanics, Fstm, University of Hassan II Mohammedia-Casablanca,

### CHAPTER 7 GENERAL PROOF SYSTEMS

CHAPTER 7 GENERAL PROOF SYSTEMS 1 Introduction Proof systems are built to prove statements. They can be thought as an inference machine with special statements, called provable statements, or sometimes

### USE OF EIGENVALUES AND EIGENVECTORS TO ANALYZE BIPARTIVITY OF NETWORK GRAPHS

USE OF EIGENVALUES AND EIGENVECTORS TO ANALYZE BIPARTIVITY OF NETWORK GRAPHS Natarajan Meghanathan Jackson State University, 1400 Lynch St, Jackson, MS, USA natarajan.meghanathan@jsums.edu ABSTRACT This

### M.S. Ibrahim 1*, N. Maculan 2 and M. Minoux 3

Pesquisa Operacional (2014) 34(1): 117-124 2014 Brazilian Operations Research Society Printed version ISSN 0101-7438 / Online version ISSN 1678-5142 www.scielo.br/pope A NOTE ON THE NP-HARDNESS OF THE

### Determination of the normalization level of database schemas through equivalence classes of attributes

Computer Science Journal of Moldova, vol.17, no.2(50), 2009 Determination of the normalization level of database schemas through equivalence classes of attributes Cotelea Vitalie Abstract In this paper,

### ! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm.

Approximation Algorithms Chapter Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of

### ON GALOIS REALIZATIONS OF THE 2-COVERABLE SYMMETRIC AND ALTERNATING GROUPS

ON GALOIS REALIZATIONS OF THE 2-COVERABLE SYMMETRIC AND ALTERNATING GROUPS DANIEL RABAYEV AND JACK SONN Abstract. Let f(x) be a monic polynomial in Z[x] with no rational roots but with roots in Q p for

### MOBILE SOCIAL NETWORKS FOR LIVE MEETINGS

Computer Science 13 (4) 2012 http://dx.doi.org/10.7494/csci.2012.13.4.87 Michał Wrzeszcz Jacek Kitowski MOBILE SOCIAL NETWORKS FOR LIVE MEETINGS Abstract In this article, we present an idea of combining

### Random graphs with a given degree sequence

Sourav Chatterjee (NYU) Persi Diaconis (Stanford) Allan Sly (Microsoft) Let G be an undirected simple graph on n vertices. Let d 1,..., d n be the degrees of the vertices of G arranged in descending order.

### Theoretical Computer Science (Bridging Course) Complexity

Theoretical Computer Science (Bridging Course) Complexity Gian Diego Tipaldi A scenario You are a programmer working for a logistics company Your boss asks you to implement a program that optimizes the

### Security Aspects of. Database Outsourcing. Vahid Khodabakhshi Hadi Halvachi. Dec, 2012

Security Aspects of Database Outsourcing Dec, 2012 Vahid Khodabakhshi Hadi Halvachi Security Aspects of Database Outsourcing Security Aspects of Database Outsourcing 2 Outline Introduction to Database

### NP-complete? NP-hard? Some Foundations of Complexity. Prof. Sven Hartmann Clausthal University of Technology Department of Informatics

NP-complete? NP-hard? Some Foundations of Complexity Prof. Sven Hartmann Clausthal University of Technology Department of Informatics Tractability of Problems Some problems are undecidable: no computer

### MINIMAL BOOKS OF RATIONALES

MINIMAL BOOKS OF RATIONALES José Apesteguía Miguel A. Ballester D.T.2005/01 MINIMAL BOOKS OF RATIONALES JOSE APESTEGUIA AND MIGUEL A. BALLESTER Abstract. Kalai, Rubinstein, and Spiegler (2002) propose

### Discrete Mathematics and Probability Theory Fall 2009 Satish Rao,David Tse Note 11

CS 70 Discrete Mathematics and Probability Theory Fall 2009 Satish Rao,David Tse Note Conditional Probability A pharmaceutical company is marketing a new test for a certain medical condition. According

### Data Migration in Heterogeneous Storage Systems

011 31st International Conference on Distributed Computing Systems Data Migration in Heterogeneous Storage Systems Chadi Kari Department of Computer Science and Engineering University of Connecticut Storrs,

### Quantum and Non-deterministic computers facing NP-completeness

Quantum and Non-deterministic computers facing NP-completeness Thibaut University of Vienna Dept. of Business Administration Austria Vienna January 29th, 2013 Some pictures come from Wikipedia Introduction

### Integer Factorization using the Quadratic Sieve

Integer Factorization using the Quadratic Sieve Chad Seibert* Division of Science and Mathematics University of Minnesota, Morris Morris, MN 56567 seib0060@morris.umn.edu March 16, 2011 Abstract We give

### Optimal Index Codes for a Class of Multicast Networks with Receiver Side Information

Optimal Index Codes for a Class of Multicast Networks with Receiver Side Information Lawrence Ong School of Electrical Engineering and Computer Science, The University of Newcastle, Australia Email: lawrence.ong@cantab.net

### A Graph-Theoretic Network Security Game. Marios Mavronicolas, Vicky G. Papadopoulou, Anna Philippou and Paul G. Spirakis

Int. J. Autonomous and Adaptive Communications Systems, Vol. x, No. x, xx 1 A Graph-Theoretic Network Security Game Marios Mavronicolas, Vicky G. Papadopoulou, Anna Philippou and Paul G. Spirakis Department

### Why Study NP- hardness. NP Hardness/Completeness Overview. P and NP. Scaling 9/3/13. Ron Parr CPS 570. NP hardness is not an AI topic

Why Study NP- hardness NP Hardness/Completeness Overview Ron Parr CPS 570 NP hardness is not an AI topic It s important for all computer scienhsts Understanding it will deepen your understanding of AI

### CS 598CSC: Combinatorial Optimization Lecture date: 2/4/2010

CS 598CSC: Combinatorial Optimization Lecture date: /4/010 Instructor: Chandra Chekuri Scribe: David Morrison Gomory-Hu Trees (The work in this section closely follows [3]) Let G = (V, E) be an undirected

### The Online Set Cover Problem

The Online Set Cover Problem Noga Alon Baruch Awerbuch Yossi Azar Niv Buchbinder Joseph Seffi Naor ABSTRACT Let X = {, 2,..., n} be a ground set of n elements, and let S be a family of subsets of X, S

### Efficiency of algorithms. Algorithms. Efficiency of algorithms. Binary search and linear search. Best, worst and average case.

Algorithms Efficiency of algorithms Computational resources: time and space Best, worst and average case performance How to compare algorithms: machine-independent measure of efficiency Growth rate Complexity

### Analysis of Approximation Algorithms for k-set Cover using Factor-Revealing Linear Programs

Analysis of Approximation Algorithms for k-set Cover using Factor-Revealing Linear Programs Stavros Athanassopoulos, Ioannis Caragiannis, and Christos Kaklamanis Research Academic Computer Technology Institute

### Private Approximation of Clustering and Vertex Cover

Private Approximation of Clustering and Vertex Cover Amos Beimel, Renen Hallak, and Kobbi Nissim Department of Computer Science, Ben-Gurion University of the Negev Abstract. Private approximation of search

### Algorithm Design and Analysis

Algorithm Design and Analysis LECTURE 27 Approximation Algorithms Load Balancing Weighted Vertex Cover Reminder: Fill out SRTEs online Don t forget to click submit Sofya Raskhodnikova 12/6/2011 S. Raskhodnikova;

### Lecture 11: The Goldreich-Levin Theorem

COM S 687 Introduction to Cryptography September 28, 2006 Lecture 11: The Goldreich-Levin Theorem Instructor: Rafael Pass Scribe: Krishnaprasad Vikram Hard-Core Bits Definition: A predicate b : {0, 1}