Graph Security Testing
|
|
|
- Daniella Simon
- 10 years ago
- Views:
Transcription
1 JOURNAL OF APPLIED COMPUTER SCIENCE Vol. 23 No. 1 (2015), pp Graph Security Testing Tomasz Gieniusz 1, Robert Lewoń 1, Michał Małafiejski 1 1 Gdańsk University of Technology, Poland Department of Algorithms and System Modeling ul. Gabriela Narutowicza 11/12, Gdańsk Wrzeszcz [email protected] [email protected] [email protected] Abstract. In this paper we consider probabilistic approach to the decision problem of security in graphs. In this purpose we define general model (called property tester) and criteria for approximating answers for decision problems. We constructed two property testers and one heuristics for the problem of security in graphs. Keywords: secure set, property testing. 1. Introduction Set S V is called secure set iff X S N[X] S N(X) \ S [1]. That means that every subset of a secure set has at least as many friends (neighbour vertices in S ) as enemies (neighbour vertices outside S ) and will be defended in case of attack. Problem of determining if given set is secure is co NP-complete, there is no efficient algorithm solving it [1]. Property testers are algorithms that distinguish inputs with a given property from those that are far from satisfying the property [2]. Property testers are allowed to be probabilistic and approximate in exchange for much reduced complexity. In our work we apply the idea of testing to construct probabilistic and approximate algorithms for graph security problems that run in polynomial time. Our goal was to formalize the testing model and propose various approaches for security
2 30 Graph Security Testing testing and general methods of rating them. We take into account possibilities of practical application, algorithm complexity and quality of the approximation. 2. Property testing Definition 1 (Property tester [2][3]) Property testers are algorithms that distinguish inputs with a given property from those that are far from satisfying the property. Far means that significant part of the input must be changed so that property can be satisfied Tester response Classical deterministic algorithm for decision problem answers the question Does the given input satisfy that property? Property tester for decision problem answers the question Does the given input satisfy that property or is it far from satisfying it? 2.2. Tester requirements We require our property testers to satisfy two properties: Accept secure set with probability > 95%. Reject set that is ε-far from being secure with probability > 95%. If input set is close to being secure we don t put any requirements on the given answer. YES ε Far from YES Accept with probability > 95% Don't care Reject with probability > 95% Figure 1. Property tester requirements
3 T. Gieniusz, R. Lewoń, M. Małafiejski Meaning of ε-far Meaning of ε-far depends on chosen model and can have impact on: Possibilities of practical application. Algorithm complexity. Fraction of cases we can guarantee the probability of answer correctness Test witness Witness is a fragment of input or structure generated basing on input. For example number from given input sequence.witness testimony is its property, that can be an evidence of some global input property. For example unordered pair of sequence elements proved it s global unsortedness. Remark 2 Testimonies of some witnesses may not entail any informations about global input property. For example ordered pair of sequence elements tells nothing about its global sortedness. Witness testimony is valuable, if it entails some information about global input property. We call witness valuable if its testimony is valuable. Lemma 3 (Witness lemma) If a single test catches a valuable witness with a probability p, than s = 3/p iterations of the test catch a witness with probability > 95%. Proof. Probability of not catching a valuable witness with s tries does not exceed P (1 p) s. Using 1 x e x, we get P e ps = e 3 95%. 3. Formal testing model 3.1. Model definition Proposed testing model contains of:
4 32 Graph Security Testing Definition of ε-far, Specification of attributes input must have to be ε-far from satisfying given property. Definition of witness and it s evidence, Specification of local and easily verifiable property that can give evidence of given global property. Witness choose algorithm, Specification of witness selection method from the set of every possible witnesses. Witness testimony extraction algorithm, Specification of method to designate if local property is satisfied for chosen witness. Together with witness choose algorithm it specified probability p s of catching valuable witness Model rating criteria For a single problem it is possible to construct many correct testing models. Here is the general model rating schema which fulfilment is required for model usefulness. Practical and intuitive understanding of ε-far. Is information that input is ε-far from satisfying given property is valuable for us. Uniform witness choose. Does every witness have the same probability to be chosen. If, despite of many valuable witnesses, our algorithm somehow ignores them than we can give guarantee on probability of answer correctness. If it is not uniform distribution than we can not use lemma 3. Relationship between ε and p s. How does probability of choosing valuable witness change depending on how far input is far from satisfying given property.
5 T. Gieniusz, R. Lewoń, M. Małafiejski 33 Choose and check of witness algorithms complexity. What is the complexity of witness choose and witness testimony check algorithms and is it an advantage over deterministic algorithm. Tester complexity can be described us: O(3/p s f (I) g(i)), where 3/p s is number of necessary witness tests to be repeated, f (I) is witness choose algorithm complexity, g(i) is witness check algorithm complexity. Fraction of cases that we can give probability guarantee on. How fraction of cases that we can give probability guarantee on changes depending on ε. Other words, how small ε is required to give this guarantee on at least δ fraction of possible inputs. If for given definition of ε-far significant fraction of input cases is very close to satisfy given property, than we will need very small ε for that cases to be considered as ε-far. That in other hand has impact on algorithm complexity Problem decomposition Here we present a way to construct proper testing model using problem decomposition. Definition 4 (General predicate) Let our decision problem be predicate on set of all possible inputs and call it general. P G : I {true, f alse}, where I is a set of all possible problem inputs. Definition 5 (Special predicate) Let D(I) = {I 1, I 2,..., I k } be a function defining an input decomposition and P S : D(I) {true, f alse} a predicate on the element of that decomposition (part of the input), such that I I P G (I) = true Ii D(I) P S (I i ) = true. P S is called special predicate. 4. Security in graphs In this section we present basic graph security definitions derived from [4][5][1][6] and reworded for better readability.
6 34 Graph Security Testing Nonempty set S V in graph G = (V, E) is called an alliance, if v S N[v] S N(v) V \ S. That means that every member of an alliance (vertex in S ) has at least as many friends (neighbour vertices in S ) as enemies (neighbour vertices outside S ) and will be defended in case of attack. In addition if S is also dominating set of G we call it global alliance. Definition 6 For set X V we define predicate SEC(X) N[X S ] N(X V \ S ). Set S is called k-alliance, if X S X k SEC(X) and again when S is dominating set of G we call it global k-alliance. For nonempty subset S = (v 1, v 2,..., v k ) V in graph G = (V, E), attack on S is every sequence of k mutually disjoint sets A = (A 1, A 2,..., A k ), such that 1 i k a Ai a N(v) \ S. If a A i we say that a attacks v i. Similarly we define defence of S as every sequence of k mutually disjoint sets D = (D 1, D 2,..., D k ), such that 1 i k d Di a N[s i ] S. If d D i we say that d defends v i. Attack A on S can be defended, if there exists defence D such that 1 i k D i A i. Set S is secure iff every attack on S can be defended. Theorem 7 (Secure set as k-alliance) Set S is secure in graph G iff it is global S -alliance. Proof. This theorem was proved in [1]. 5. Security testing 5.1. Attack based model The simplest, natural way for security testing is to take into account all possible maximal attacks and require given fraction of them to be defendable Model Definition of ε-far, S is ε-far from being secure iff ε fraction of attacks cannot be defended. For example set is 1/2-far from being secure iff half of the possible attacks cannot be defended.
7 T. Gieniusz, R. Lewoń, M. Małafiejski 35 Definition of witness and it s evidence, Maximal attack on S is a witness, defence possibility is his testimony. Witness is valuable if there is not defence for him. Witness choose algorithm, For every enemy we choose his target uniformly and independently at random (his neighbour in S ). This way we get a maximal attack, because every enemy is making use of his attack possibility. Witness testimony extraction algorithm, To check if attack is defendable we use security matching algorithm described in [4] Model rating Practical and intuitive understanding of ε-far, ε-far is defined that way to be the most intuitive. Enemies usually don t choose their targets at random, so practical application may be narrowed, but it is still valuable information to know that for example half of the attacks cannot be defended. Uniform witness choose, Every maximal attack is chosen with the same probability, because every of them can be constructed in exactly one way and there is no such attack, algorithm couldn t construct. Relationship between ε and p s, Relationship is linear, set is ε-far from being secure iff ε fraction of witnesses (attacks) is undefendable, so they are valuable witnesses.
8 36 Graph Security Testing ps ε Figure 2. Relationship between ε and p s in attack based model. Choose and check of witness algorithms complexity, Witness choose can be done in O( V \ S S ) - for every enemy we choose his neighbour to be the target of the attack. Witness check is determined by security matching algorithm [4] and is O(n 5/2 ). Fraction of cases that we can give probability guarantee on, We have done computer simulations for random graphs with nodes. Results are shown on the plot below. YN ε Figure 3. Fraction of cases that we can give probability guarantee on attack based model. That means that even for high ε (low algorithm complexity) random graph is either secure or ε-far from being secure (there are many witnesses) and we can give probability guarantee on algorithm answer.
9 T. Gieniusz, R. Lewoń, M. Małafiejski Algorithm Algorithm 5.1 Attack based tester Repeat 3/ε times Chose maximal attack A independently and uniformly at random A. if A cannot be defended then return S is ε-far from being secure. end if return S is secure. End Analysis Secure set will always be correctly determined. For the set that is ε-far from being secure, probability of choosing undefendable attack in one test is no less than ε. Using witness lemma 3 3/ε test repetitions chooses undefendable attack in no less than 95% of the cases Conclusions Probability of failure to recognize insecure set despite of ε fraction of undefendable attacks is no more than 5%. Algorithm complexity is O(n 5/2 /ε) Examples Troubling example 1 2 Figure 4. Troubling example for attack based model. k
10 38 Graph Security Testing In the above graphs family only attacks that are focused on single vertex cannot be defended. There is exactly k of such attacks and in set of all k 3 attacks they are only 1/k 2 fraction. That means that for any ε we can construct a graph, that is close to being secure and our algorithm cannot guarantee the correctness of the given answer. Easy example a d Figure 5. Easy example for attack based model. In the above graphs family exactly half of the attacks cannot be defended. Cycle can be defended independently, every attack in which a chooses d as his target cannot be defended. That means that our algorithm has 50% chance to choose valuable witness in single test and according to witness lemma 3 that gives 95% success rate with only 6 repetitions Subset based model Next model is derived directly from subset secure set definition [7]. In this case we will take into account all possible subsets of S and require given fraction of them to satisfy [6] Model Definition of ε-far, S is ε-far from being secure iff ε fraction of subsets doesn t satisfy [6].
11 T. Gieniusz, R. Lewoń, M. Małafiejski 39 Definition of witness and it s evidence, Subset A S is a witness and value of SEC(A) is his testimony. Witness is valuable if his testimony equals f alse. Witness choose algorithm, For every vertex v S choose one possibility uniformly and independently at random: v is in witness, v is not in witness. Witness testimony extraction algorithm. Compute SEC(A) from definition Model rating Lets use 3.2 for such testing model. Practical and intuitive understanding of ε-far, This model derives from security definition, so the definition of ε-far is very intuitive. It has practical applications, because it is a valuable information to know that for example half of the subsets are not secure. Uniform witness choose, From the set of all possible subsets of S every one is chosen with the same probability, because every of them can be constructed in exactly one way and there is no such subset that algorithm could not construct. Relationship between ε and p s, Relationship is linear, set is ε-far from being secure iff exactly ε fraction of witnesses (subsets) doesn t satisfy [6], so they are valuable.
12 40 Graph Security Testing ps ε Figure 6. Relationship between ε and p s for subset based model. Choose and check of witness algorithms complexity, Witness choose complexity is O( S ) - for every ally we choose if it is in the witness. Witness check complexity is determined by SEC definition and is O(n). Fraction of cases that we can give probability guarantee on. We have done computer simulations for random graphs with nodes. Results are shown on the plot below. YN ε Figure 7. Fraction of cases that we can give probability guarantee on subset based model. That means that even for high ε (low algorithm complexity) random graph is either secure or ε-far from being secure (there are many witnesses) and we can give probability guarantee on algorithm answer.
13 T. Gieniusz, R. Lewoń, M. Małafiejski Algorithm Algorithm 5.2 Subset based tester Repeat 3/ε times Choose subset X S uniformly and independently at random. if SEC(X) [6] then return S is ε-far fro being secure. end if return S is secure. End Analysis Secure set will always be correctly determined. For the set that is ε-far from being secure, probability of choosing subset that doesn t satisfy SEC in one test is no less than ε. Using witness lemma 3 3/ε test repetitions chooses such subset in no less than 95% of the cases Conclusions Probability of failure to recognize insecure set despite of ε fraction of undefendable attacks is no more than 5%. Algorithm complexity is O(n 2 /ε) Examples Troubling example
14 42 Graph Security Testing Figure 8. Troubling example for subset based model. In the above graphs family SEC is not satisfied for only the whole S. In set of every 2 S possible subsets of S it is only fraction of 1/2 S. That means that for any ε we can construct a graph, that is close to being secure and our algorithm cannot guarantee the correctness of the given answer. Easy example Secure subgraph Figure 9. Easy example for subset based model. In the above graphs family SEC is not satisfied for exactly half of the subsets. That means that our algorithm has 50% chance to choose valuable witness in single test and according to witness lemma 3 that gives 95% success rate with only 6 repetitions. 6. Security problem heuristic In this section we will present heuristic algorithms based on simple idea. Idea is to construct subset that is a valuable witness for security problem in subset based model - subset that does not satisfy SEC. Specific versions of this algorithm differs
15 T. Gieniusz, R. Lewoń, M. Małafiejski 43 in subset construction approach. We will use following naming convention: S V is a subset of vertices to be checked for security c and d are optimization criteria for any subset S S 6.1. Algorithm schema Algorithm 6.1 Security problem heuristic schema Split S into n disjoint clusters S 1, S 2,..., S n repeat For every pair of clusters S i, S j, i j calculate c(s i S j ) Join two clusters optimizing c, in the case of ambiguity use d criteria until There are at least two clusters or one of the clusters does not satisfy SEC if Any of the clusters does not satisfy SEC then return false else return true end if Remark 8 First step of the algorithm can be randomized (and algorithm can be repeated many times). The simplest version is to take one-element clusters, for S = {s 1, s 2,..., s k } take S i = {s i }, i = 1, 2,..., k as initial clusters. In all presented variant of algorithm we take the same c criteria, for every X S : c(x) = N[X] S N(X) \ S We will minimize this criteria, negative value means that X does not satisfy SEC, therefore S is not secure. Algorithm objective is to construct valuable witness, so minimization of c is well founded.
16 44 Graph Security Testing 6.2. Secondary criteria proposals Second criteria is used in the case of ambiguity of c criteria. In such situation we propose following approaches: Avoid massive clusters creation For any X S : d 1 = X. This will lead to small clusters creation. Support massive and strong clusters creation For any X S : d 2 = N[X] S. This will lead to bigger clusters with greater support from the outside creation. Support neighbourhood-dependent clusters creation For any X S : d 3 = (N[X] \ X) S. This will lead to creation of the clusters that require maximum help from neighbours outside of X. Remark 9 In the simplest version secondary criteria can be omitted. We can also use many criteria by choosing secondary criteria randomly at every iteration. In case of further ambiguity after second criteria usage we can introduce additional resolve phases or choose cluster at random. References [1] Dutton, R., Secure set algorithms and complexity, In: Proceedings of the Thirty-Seventh Southeastern International Conference on Combinatorics, Graph Theory and Computing, Vol. 180, 2006, pp [2] Raskhodnikova, S., Property Testing: Theory and Applications, Ph.D. thesis, Massachusetts Institute of Technology, 2003.
17 T. Gieniusz, R. Lewoń, M. Małafiejski 45 [3] Goldreich, O., Goldwasser, S., and Ron, D., Property testing and its connection to learning and approximation, Journal of the ACM (JACM), Vol. 45, No. 4, 1998, pp [4] Blukis, T., Zbiory bezpieczne w grafach, Master s thesis, Politechnika Gdańka, [5] Brigham, R., Dutton, R., and Hedetniemi, S., Security in graphs, Discrete applied mathematics, Vol. 155, No. 13, 2007, pp [6] Dutton, R. D., Lee, R., and Brigham, R. C., Bounds on a graph s security number, Discrete Appl. Math., Vol. 156, No. 5, March 2008, pp
High degree graphs contain large-star factors
High degree graphs contain large-star factors Dedicated to László Lovász, for his 60th birthday Noga Alon Nicholas Wormald Abstract We show that any finite simple graph with minimum degree d contains a
Computer Algorithms. NP-Complete Problems. CISC 4080 Yanjun Li
Computer Algorithms NP-Complete Problems NP-completeness The quest for efficient algorithms is about finding clever ways to bypass the process of exhaustive search, using clues from the input in order
Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs
Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs Yong Zhang 1.2, Francis Y.L. Chin 2, and Hing-Fung Ting 2 1 College of Mathematics and Computer Science, Hebei University,
CSC2420 Fall 2012: Algorithm Design, Analysis and Theory
CSC2420 Fall 2012: Algorithm Design, Analysis and Theory Allan Borodin November 15, 2012; Lecture 10 1 / 27 Randomized online bipartite matching and the adwords problem. We briefly return to online algorithms
Every tree contains a large induced subgraph with all degrees odd
Every tree contains a large induced subgraph with all degrees odd A.J. Radcliffe Carnegie Mellon University, Pittsburgh, PA A.D. Scott Department of Pure Mathematics and Mathematical Statistics University
Network Algorithms for Homeland Security
Network Algorithms for Homeland Security Mark Goldberg and Malik Magdon-Ismail Rensselaer Polytechnic Institute September 27, 2004. Collaborators J. Baumes, M. Krishmamoorthy, N. Preston, W. Wallace. Partially
Global secure sets of trees and grid-like graphs. Yiu Yu Ho
Global secure sets of trees and grid-like graphs by Yiu Yu Ho B.S. University of Central Florida, 2006 M.S. University of Central Florida, 2010 A dissertation submitted in partial fulfillment of the requirements
A Brief Introduction to Property Testing
A Brief Introduction to Property Testing Oded Goldreich Abstract. This short article provides a brief description of the main issues that underly the study of property testing. It is meant to serve as
Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs
CSE599s: Extremal Combinatorics November 21, 2011 Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs Lecturer: Anup Rao 1 An Arithmetic Circuit Lower Bound An arithmetic circuit is just like
Outline. NP-completeness. When is a problem easy? When is a problem hard? Today. Euler Circuits
Outline NP-completeness Examples of Easy vs. Hard problems Euler circuit vs. Hamiltonian circuit Shortest Path vs. Longest Path 2-pairs sum vs. general Subset Sum Reducing one problem to another Clique
On the k-path cover problem for cacti
On the k-path cover problem for cacti Zemin Jin and Xueliang Li Center for Combinatorics and LPMC Nankai University Tianjin 300071, P.R. China [email protected], [email protected] Abstract In this paper we
FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM
International Journal of Innovative Computing, Information and Control ICIC International c 0 ISSN 34-48 Volume 8, Number 8, August 0 pp. 4 FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT
1 Definitions. Supplementary Material for: Digraphs. Concept graphs
Supplementary Material for: van Rooij, I., Evans, P., Müller, M., Gedge, J. & Wareham, T. (2008). Identifying Sources of Intractability in Cognitive Models: An Illustration using Analogical Structure Mapping.
Near Optimal Solutions
Near Optimal Solutions Many important optimization problems are lacking efficient solutions. NP-Complete problems unlikely to have polynomial time solutions. Good heuristics important for such problems.
Approximation Algorithms
Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NP-Completeness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms
A simpler and better derandomization of an approximation algorithm for Single Source Rent-or-Buy
A simpler and better derandomization of an approximation algorithm for Single Source Rent-or-Buy David P. Williamson Anke van Zuylen School of Operations Research and Industrial Engineering, Cornell University,
The positive minimum degree game on sparse graphs
The positive minimum degree game on sparse graphs József Balogh Department of Mathematical Sciences University of Illinois, USA [email protected] András Pluhár Department of Computer Science University
Lecture 10: CPA Encryption, MACs, Hash Functions. 2 Recap of last lecture - PRGs for one time pads
CS 7880 Graduate Cryptography October 15, 2015 Lecture 10: CPA Encryption, MACs, Hash Functions Lecturer: Daniel Wichs Scribe: Matthew Dippel 1 Topic Covered Chosen plaintext attack model of security MACs
How to Prove a Theorem So No One Else Can Claim It
Proceedings of the International Congress of Mathematicians Berkeley, California, USA, 1986 How to Prove a Theorem So No One Else Can Claim It MANUEL BLUM Goldwasser, Micali, and Rackoff [GMR] define for
Exponential time algorithms for graph coloring
Exponential time algorithms for graph coloring Uriel Feige Lecture notes, March 14, 2011 1 Introduction Let [n] denote the set {1,..., k}. A k-labeling of vertices of a graph G(V, E) is a function V [k].
All trees contain a large induced subgraph having all degrees 1 (mod k)
All trees contain a large induced subgraph having all degrees 1 (mod k) David M. Berman, A.J. Radcliffe, A.D. Scott, Hong Wang, and Larry Wargo *Department of Mathematics University of New Orleans New
Factoring & Primality
Factoring & Primality Lecturer: Dimitris Papadopoulos In this lecture we will discuss the problem of integer factorization and primality testing, two problems that have been the focus of a great amount
On the Unique Games Conjecture
On the Unique Games Conjecture Antonios Angelakis National Technical University of Athens June 16, 2015 Antonios Angelakis (NTUA) Theory of Computation June 16, 2015 1 / 20 Overview 1 Introduction 2 Preliminary
An Empirical Study of Two MIS Algorithms
An Empirical Study of Two MIS Algorithms Email: Tushar Bisht and Kishore Kothapalli International Institute of Information Technology, Hyderabad Hyderabad, Andhra Pradesh, India 32. [email protected],
8.1 Min Degree Spanning Tree
CS880: Approximations Algorithms Scribe: Siddharth Barman Lecturer: Shuchi Chawla Topic: Min Degree Spanning Tree Date: 02/15/07 In this lecture we give a local search based algorithm for the Min Degree
On the Relationship between Classes P and NP
Journal of Computer Science 8 (7): 1036-1040, 2012 ISSN 1549-3636 2012 Science Publications On the Relationship between Classes P and NP Anatoly D. Plotnikov Department of Computer Systems and Networks,
Nan Kong, Andrew J. Schaefer. Department of Industrial Engineering, Univeristy of Pittsburgh, PA 15261, USA
A Factor 1 2 Approximation Algorithm for Two-Stage Stochastic Matching Problems Nan Kong, Andrew J. Schaefer Department of Industrial Engineering, Univeristy of Pittsburgh, PA 15261, USA Abstract We introduce
Cycle transversals in bounded degree graphs
Electronic Notes in Discrete Mathematics 35 (2009) 189 195 www.elsevier.com/locate/endm Cycle transversals in bounded degree graphs M. Groshaus a,2,3 P. Hell b,3 S. Klein c,1,3 L. T. Nogueira d,1,3 F.
Small Maximal Independent Sets and Faster Exact Graph Coloring
Small Maximal Independent Sets and Faster Exact Graph Coloring David Eppstein Univ. of California, Irvine Dept. of Information and Computer Science The Exact Graph Coloring Problem: Given an undirected
Complexity Classes P and NP
Complexity Classes P and NP MATH 3220 Supplemental Presentation by John Aleshunas The cure for boredom is curiosity. There is no cure for curiosity Dorothy Parker Computational Complexity Theory In computer
Large induced subgraphs with all degrees odd
Large induced subgraphs with all degrees odd A.D. Scott Department of Pure Mathematics and Mathematical Statistics, University of Cambridge, England Abstract: We prove that every connected graph of order
Lecture 2: Complexity Theory Review and Interactive Proofs
600.641 Special Topics in Theoretical Cryptography January 23, 2007 Lecture 2: Complexity Theory Review and Interactive Proofs Instructor: Susan Hohenberger Scribe: Karyn Benson 1 Introduction to Cryptography
2.1 Complexity Classes
15-859(M): Randomized Algorithms Lecturer: Shuchi Chawla Topic: Complexity classes, Identity checking Date: September 15, 2004 Scribe: Andrew Gilpin 2.1 Complexity Classes In this lecture we will look
The degree, size and chromatic index of a uniform hypergraph
The degree, size and chromatic index of a uniform hypergraph Noga Alon Jeong Han Kim Abstract Let H be a k-uniform hypergraph in which no two edges share more than t common vertices, and let D denote the
1. Nondeterministically guess a solution (called a certificate) 2. Check whether the solution solves the problem (called verification)
Some N P problems Computer scientists have studied many N P problems, that is, problems that can be solved nondeterministically in polynomial time. Traditionally complexity question are studied as languages:
MapReduce and Distributed Data Analysis. Sergei Vassilvitskii Google Research
MapReduce and Distributed Data Analysis Google Research 1 Dealing With Massive Data 2 2 Dealing With Massive Data Polynomial Memory Sublinear RAM Sketches External Memory Property Testing 3 3 Dealing With
Introduction to Algorithms. Part 3: P, NP Hard Problems
Introduction to Algorithms Part 3: P, NP Hard Problems 1) Polynomial Time: P and NP 2) NP-Completeness 3) Dealing with Hard Problems 4) Lower Bounds 5) Books c Wayne Goddard, Clemson University, 2004 Chapter
A Study of Sufficient Conditions for Hamiltonian Cycles
DeLeon 1 A Study of Sufficient Conditions for Hamiltonian Cycles Melissa DeLeon Department of Mathematics and Computer Science Seton Hall University South Orange, New Jersey 07079, U.S.A. ABSTRACT A graph
Why? A central concept in Computer Science. Algorithms are ubiquitous.
Analysis of Algorithms: A Brief Introduction Why? A central concept in Computer Science. Algorithms are ubiquitous. Using the Internet (sending email, transferring files, use of search engines, online
A security analysis of the SecLookOn authentication system
Institut f. Statistik u. Wahrscheinlichkeitstheorie 1040 Wien, Wiedner Hauptstr. 8-10/107 AUSTRIA http://www.statistik.tuwien.ac.at A security analysis of the SecLookOn authentication system K. Grill Forschungsbericht
On an anti-ramsey type result
On an anti-ramsey type result Noga Alon, Hanno Lefmann and Vojtĕch Rödl Abstract We consider anti-ramsey type results. For a given coloring of the k-element subsets of an n-element set X, where two k-element
ARTICLE IN PRESS. European Journal of Operational Research xxx (2004) xxx xxx. Discrete Optimization. Nan Kong, Andrew J.
A factor 1 European Journal of Operational Research xxx (00) xxx xxx Discrete Optimization approximation algorithm for two-stage stochastic matching problems Nan Kong, Andrew J. Schaefer * Department of
Connected Identifying Codes for Sensor Network Monitoring
Connected Identifying Codes for Sensor Network Monitoring Niloofar Fazlollahi, David Starobinski and Ari Trachtenberg Dept. of Electrical and Computer Engineering Boston University, Boston, MA 02215 Email:
! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm.
Approximation Algorithms 11 Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of three
Applied Algorithm Design Lecture 5
Applied Algorithm Design Lecture 5 Pietro Michiardi Eurecom Pietro Michiardi (Eurecom) Applied Algorithm Design Lecture 5 1 / 86 Approximation Algorithms Pietro Michiardi (Eurecom) Applied Algorithm Design
1 Formulating The Low Degree Testing Problem
6.895 PCP and Hardness of Approximation MIT, Fall 2010 Lecture 5: Linearity Testing Lecturer: Dana Moshkovitz Scribe: Gregory Minton and Dana Moshkovitz In the last lecture, we proved a weak PCP Theorem,
Degree Hypergroupoids Associated with Hypergraphs
Filomat 8:1 (014), 119 19 DOI 10.98/FIL1401119F Published by Faculty of Sciences and Mathematics, University of Niš, Serbia Available at: http://www.pmf.ni.ac.rs/filomat Degree Hypergroupoids Associated
Chapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling
Approximation Algorithms Chapter Approximation Algorithms Q. Suppose I need to solve an NP-hard problem. What should I do? A. Theory says you're unlikely to find a poly-time algorithm. Must sacrifice one
Generating models of a matched formula with a polynomial delay
Generating models of a matched formula with a polynomial delay Petr Savicky Institute of Computer Science, Academy of Sciences of Czech Republic, Pod Vodárenskou Věží 2, 182 07 Praha 8, Czech Republic
Victor Shoup Avi Rubin. fshoup,[email protected]. Abstract
Session Key Distribution Using Smart Cards Victor Shoup Avi Rubin Bellcore, 445 South St., Morristown, NJ 07960 fshoup,[email protected] Abstract In this paper, we investigate a method by which smart
5.1 Bipartite Matching
CS787: Advanced Algorithms Lecture 5: Applications of Network Flow In the last lecture, we looked at the problem of finding the maximum flow in a graph, and how it can be efficiently solved using the Ford-Fulkerson
Short Cycles make W-hard problems hard: FPT algorithms for W-hard Problems in Graphs with no short Cycles
Short Cycles make W-hard problems hard: FPT algorithms for W-hard Problems in Graphs with no short Cycles Venkatesh Raman and Saket Saurabh The Institute of Mathematical Sciences, Chennai 600 113. {vraman
Problem Set 7 Solutions
8 8 Introduction to Algorithms May 7, 2004 Massachusetts Institute of Technology 6.046J/18.410J Professors Erik Demaine and Shafi Goldwasser Handout 25 Problem Set 7 Solutions This problem set is due in
Graphical degree sequences and realizations
swap Graphical and realizations Péter L. Erdös Alfréd Rényi Institute of Mathematics Hungarian Academy of Sciences MAPCON 12 MPIPKS - Dresden, May 15, 2012 swap Graphical and realizations Péter L. Erdös
Guessing Game: NP-Complete?
Guessing Game: NP-Complete? 1. LONGEST-PATH: Given a graph G = (V, E), does there exists a simple path of length at least k edges? YES 2. SHORTEST-PATH: Given a graph G = (V, E), does there exists a simple
Complexity Theory. IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar
Complexity Theory IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar Outline Goals Computation of Problems Concepts and Definitions Complexity Classes and Problems Polynomial Time Reductions Examples
International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013
FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED Omar Akchiche 1 and Omar Khadir 2 1,2 Laboratory of Mathematics, Cryptography and Mechanics, Fstm, University of Hassan II Mohammedia-Casablanca,
Determination of the normalization level of database schemas through equivalence classes of attributes
Computer Science Journal of Moldova, vol.17, no.2(50), 2009 Determination of the normalization level of database schemas through equivalence classes of attributes Cotelea Vitalie Abstract In this paper,
Lecture 7: NP-Complete Problems
IAS/PCMI Summer Session 2000 Clay Mathematics Undergraduate Program Basic Course on Computational Complexity Lecture 7: NP-Complete Problems David Mix Barrington and Alexis Maciel July 25, 2000 1. Circuit
MOBILE SOCIAL NETWORKS FOR LIVE MEETINGS
Computer Science 13 (4) 2012 http://dx.doi.org/10.7494/csci.2012.13.4.87 Michał Wrzeszcz Jacek Kitowski MOBILE SOCIAL NETWORKS FOR LIVE MEETINGS Abstract In this article, we present an idea of combining
On Integer Additive Set-Indexers of Graphs
On Integer Additive Set-Indexers of Graphs arxiv:1312.7672v4 [math.co] 2 Mar 2014 N K Sudev and K A Germina Abstract A set-indexer of a graph G is an injective set-valued function f : V (G) 2 X such that
ON GALOIS REALIZATIONS OF THE 2-COVERABLE SYMMETRIC AND ALTERNATING GROUPS
ON GALOIS REALIZATIONS OF THE 2-COVERABLE SYMMETRIC AND ALTERNATING GROUPS DANIEL RABAYEV AND JACK SONN Abstract. Let f(x) be a monic polynomial in Z[x] with no rational roots but with roots in Q p for
A Graph-Theoretic Network Security Game
A Graph-Theoretic Network Security Game Marios Mavronicolas 1, Vicky Papadopoulou 1, Anna Philippou 1, and Paul Spirakis 2 1 Department of Computer Science, University of Cyprus, Nicosia CY-1678, Cyprus.
Offline sorting buffers on Line
Offline sorting buffers on Line Rohit Khandekar 1 and Vinayaka Pandit 2 1 University of Waterloo, ON, Canada. email: [email protected] 2 IBM India Research Lab, New Delhi. email: [email protected]
Odd induced subgraphs in graphs of maximum degree three
Odd induced subgraphs in graphs of maximum degree three David M. Berman, Hong Wang, and Larry Wargo Department of Mathematics University of New Orleans New Orleans, Louisiana, USA 70148 Abstract A long-standing
The Online Set Cover Problem
The Online Set Cover Problem Noga Alon Baruch Awerbuch Yossi Azar Niv Buchbinder Joseph Seffi Naor ABSTRACT Let X = {, 2,..., n} be a ground set of n elements, and let S be a family of subsets of X, S
Algorithm Design and Analysis
Algorithm Design and Analysis LECTURE 27 Approximation Algorithms Load Balancing Weighted Vertex Cover Reminder: Fill out SRTEs online Don t forget to click submit Sofya Raskhodnikova 12/6/2011 S. Raskhodnikova;
Why Study NP- hardness. NP Hardness/Completeness Overview. P and NP. Scaling 9/3/13. Ron Parr CPS 570. NP hardness is not an AI topic
Why Study NP- hardness NP Hardness/Completeness Overview Ron Parr CPS 570 NP hardness is not an AI topic It s important for all computer scienhsts Understanding it will deepen your understanding of AI
CS 598CSC: Combinatorial Optimization Lecture date: 2/4/2010
CS 598CSC: Combinatorial Optimization Lecture date: /4/010 Instructor: Chandra Chekuri Scribe: David Morrison Gomory-Hu Trees (The work in this section closely follows [3]) Let G = (V, E) be an undirected
ON DEGREES IN THE HASSE DIAGRAM OF THE STRONG BRUHAT ORDER
Séminaire Lotharingien de Combinatoire 53 (2006), Article B53g ON DEGREES IN THE HASSE DIAGRAM OF THE STRONG BRUHAT ORDER RON M. ADIN AND YUVAL ROICHMAN Abstract. For a permutation π in the symmetric group
COUNTING INDEPENDENT SETS IN SOME CLASSES OF (ALMOST) REGULAR GRAPHS
COUNTING INDEPENDENT SETS IN SOME CLASSES OF (ALMOST) REGULAR GRAPHS Alexander Burstein Department of Mathematics Howard University Washington, DC 259, USA [email protected] Sergey Kitaev Mathematics
Distributed Computing over Communication Networks: Maximal Independent Set
Distributed Computing over Communication Networks: Maximal Independent Set What is a MIS? MIS An independent set (IS) of an undirected graph is a subset U of nodes such that no two nodes in U are adjacent.
Lecture 11: The Goldreich-Levin Theorem
COM S 687 Introduction to Cryptography September 28, 2006 Lecture 11: The Goldreich-Levin Theorem Instructor: Rafael Pass Scribe: Krishnaprasad Vikram Hard-Core Bits Definition: A predicate b : {0, 1}
USE OF EIGENVALUES AND EIGENVECTORS TO ANALYZE BIPARTIVITY OF NETWORK GRAPHS
USE OF EIGENVALUES AND EIGENVECTORS TO ANALYZE BIPARTIVITY OF NETWORK GRAPHS Natarajan Meghanathan Jackson State University, 1400 Lynch St, Jackson, MS, USA [email protected] ABSTRACT This
! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm.
Approximation Algorithms Chapter Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of
FALSE ALARMS IN FAULT-TOLERANT DOMINATING SETS IN GRAPHS. Mateusz Nikodem
Opuscula Mathematica Vol. 32 No. 4 2012 http://dx.doi.org/10.7494/opmath.2012.32.4.751 FALSE ALARMS IN FAULT-TOLERANT DOMINATING SETS IN GRAPHS Mateusz Nikodem Abstract. We develop the problem of fault-tolerant
Welcome to... Problem Analysis and Complexity Theory 716.054, 3 VU
Welcome to... Problem Analysis and Complexity Theory 716.054, 3 VU Birgit Vogtenhuber Institute for Software Technology email: [email protected] office hour: Tuesday 10:30 11:30 slides: http://www.ist.tugraz.at/pact.html
An Approximation Algorithm for Bounded Degree Deletion
An Approximation Algorithm for Bounded Degree Deletion Tomáš Ebenlendr Petr Kolman Jiří Sgall Abstract Bounded Degree Deletion is the following generalization of Vertex Cover. Given an undirected graph
Random graphs with a given degree sequence
Sourav Chatterjee (NYU) Persi Diaconis (Stanford) Allan Sly (Microsoft) Let G be an undirected simple graph on n vertices. Let d 1,..., d n be the degrees of the vertices of G arranged in descending order.
Page 1. CSCE 310J Data Structures & Algorithms. CSCE 310J Data Structures & Algorithms. P, NP, and NP-Complete. Polynomial-Time Algorithms
CSCE 310J Data Structures & Algorithms P, NP, and NP-Complete Dr. Steve Goddard [email protected] CSCE 310J Data Structures & Algorithms Giving credit where credit is due:» Most of the lecture notes
NEUROMATHEMATICS: DEVELOPMENT TENDENCIES. 1. Which tasks are adequate of neurocomputers?
Appl. Comput. Math. 2 (2003), no. 1, pp. 57-64 NEUROMATHEMATICS: DEVELOPMENT TENDENCIES GALUSHKIN A.I., KOROBKOVA. S.V., KAZANTSEV P.A. Abstract. This article is the summary of a set of Russian scientists
Theoretical Computer Science (Bridging Course) Complexity
Theoretical Computer Science (Bridging Course) Complexity Gian Diego Tipaldi A scenario You are a programmer working for a logistics company Your boss asks you to implement a program that optimizes the
Security Aspects of. Database Outsourcing. Vahid Khodabakhshi Hadi Halvachi. Dec, 2012
Security Aspects of Database Outsourcing Dec, 2012 Vahid Khodabakhshi Hadi Halvachi Security Aspects of Database Outsourcing Security Aspects of Database Outsourcing 2 Outline Introduction to Database
INDISTINGUISHABILITY OF ABSOLUTELY CONTINUOUS AND SINGULAR DISTRIBUTIONS
INDISTINGUISHABILITY OF ABSOLUTELY CONTINUOUS AND SINGULAR DISTRIBUTIONS STEVEN P. LALLEY AND ANDREW NOBEL Abstract. It is shown that there are no consistent decision rules for the hypothesis testing problem
CHAPTER 7 GENERAL PROOF SYSTEMS
CHAPTER 7 GENERAL PROOF SYSTEMS 1 Introduction Proof systems are built to prove statements. They can be thought as an inference machine with special statements, called provable statements, or sometimes
Introduction to Logic in Computer Science: Autumn 2006
Introduction to Logic in Computer Science: Autumn 2006 Ulle Endriss Institute for Logic, Language and Computation University of Amsterdam Ulle Endriss 1 Plan for Today Now that we have a basic understanding
(67902) Topics in Theory and Complexity Nov 2, 2006. Lecture 7
(67902) Topics in Theory and Complexity Nov 2, 2006 Lecturer: Irit Dinur Lecture 7 Scribe: Rani Lekach 1 Lecture overview This Lecture consists of two parts In the first part we will refresh the definition
ERDOS PROBLEMS ON IRREGULARITIES OF LINE SIZES AND POINT DEGREES A. GYARFAS*
BOLYAI SOCIETY MATHEMATICAL STUDIES, 11 Paul Erdos and his Mathematics. II, Budapest, 2002, pp. 367-373. ERDOS PROBLEMS ON IRREGULARITIES OF LINE SIZES AND POINT DEGREES A. GYARFAS* Problems and results
Integer Factorization using the Quadratic Sieve
Integer Factorization using the Quadratic Sieve Chad Seibert* Division of Science and Mathematics University of Minnesota, Morris Morris, MN 56567 [email protected] March 16, 2011 Abstract We give
Class constrained bin covering
Class constrained bin covering Leah Epstein Csanád Imreh Asaf Levin Abstract We study the following variant of the bin covering problem. We are given a set of unit sized items, where each item has a color
Private Approximation of Clustering and Vertex Cover
Private Approximation of Clustering and Vertex Cover Amos Beimel, Renen Hallak, and Kobbi Nissim Department of Computer Science, Ben-Gurion University of the Negev Abstract. Private approximation of search
