303 research outputs found

    LIPIcs, Volume 274, ESA 2023, Complete Volume

    Get PDF
    LIPIcs, Volume 274, ESA 2023, Complete Volum

    The Convex Hull Problem in Practice : Improving the Running Time of the Double Description Method

    Get PDF
    The double description method is a simple but widely used algorithm for computation of extreme points in polyhedral sets. One key aspect of its implementation is the question of how to efficiently test extreme points for adjacency. In this dissertation, two significant contributions related to adjacency testing are presented. First, the currently used data structures are revisited and various optimizations are proposed. Empirical evidence is provided to demonstrate their competitiveness. Second, a new adjacency test is introduced. It is a refinement of the well known algebraic test featuring a technique for avoiding redundant computations. Its correctness is formally proven. Its superiority in multiple degenerate scenarios is demonstrated through experimental results. Parallel computation is one further aspect of the double description method covered in this work. A recently introduced divide-and-conquer technique is revisited and considerable practical limitations are demonstrated

    Emergence in the security of protocols for mobile ad-hoc networks

    Get PDF
    This thesis is concerned with the study of secure wireless routing protocols, which have been deployed for the purpose of exchanging information in an adhoc networking enviromnent. A discrete event simulator is developed, utilising an adaptive systems modelling approach and emergence that aims to assess networking protocols in the presence of adversarial behaviour. The model is used in conjunction with the characteristics that routing protocols have and also a number of cryptographic primitives that can be deployed in order to safeguard the information being exchanged. It is shown that both adversarial behaviour, as well as protocol descriptions can be described in a way that allows for them to be treated as input on the machine level. Within the system, the output generated selects the fittest protocol design capable of withstanding one or more particular type of attacks. As a result, a number of new and improved protocol specifications are presented and benchmarked against conventional metrics, such as throughput, latency and delivery criteria. From this process, an architecture for designing wireless routing protocols based on a number of security criteria is presented, whereupon the decision of using particular characteristics in a specification has been passed onto the machine level

    27th Annual European Symposium on Algorithms: ESA 2019, September 9-11, 2019, Munich/Garching, Germany

    Get PDF

    Resource provision in object oriented distributed systems

    Get PDF

    End-to-end security in active networks

    Get PDF
    Active network solutions have been proposed to many of the problems caused by the increasing heterogeneity of the Internet. These ystems allow nodes within the network to process data passing through in several ways. Allowing code from various sources to run on routers introduces numerous security concerns that have been addressed by research into safe languages, restricted execution environments, and other related areas. But little attention has been paid to an even more critical question: the effect on end-to-end security of active flow manipulation. This thesis first examines the threat model implicit in active networks. It develops a framework of security protocols in use at various layers of the networking stack, and their utility to multimedia transport and flow processing, and asks if it is reasonable to give active routers access to the plaintext of these flows. After considering the various security problem introduced, such as vulnerability to attacks on intermediaries or coercion, it concludes not. We then ask if active network systems can be built that maintain end-to-end security without seriously degrading the functionality they provide. We describe the design and analysis of three such protocols: a distributed packet filtering system that can be used to adjust multimedia bandwidth requirements and defend against denial-of-service attacks; an efficient composition of link and transport-layer reliability mechanisms that increases the performance of TCP over lossy wireless links; and a distributed watermarking servicethat can efficiently deliver media flows marked with the identity of their recipients. In all three cases, similar functionality is provided to designs that do not maintain end-to-end security. Finally, we reconsider traditional end-to-end arguments in both networking and security, and show that they have continuing importance for Internet design. Our watermarking work adds the concept of splitting trust throughout a network to that model; we suggest further applications of this idea

    Redefine and reterritorialise: painting as an interdisciplinary form

    Full text link
    Any examination of painting as a practice or discipline must necessarily analyse the philosophical underpinning of formalist modes of thinking. Although contemporary practices are not as driven by the inherent rules of the discipline, they are still dependent upon the theoretical foundations within which they work, and effectively this leads to a retention of medium and material specificity. In contrast, a different methodological approach potentially changes the way in which painting can be thought and is explored within the thesis. The proposition of a particular type of methodological investigation challenges painting, attempting to change its alignment with different mediums or disciplines, by locating the relationship of theoretical models and their direct paradigmatic constraints on practice. In contrast to an Hegelian philosophical approach, embedded within the formalist critique, Gilles Deleuze's philosophy is present throughout the thesis as a catalyst for re-negotiating both the spaces of theory and the realisation of a painting practice that shares a commonality with Bergsonian and Deleuzian motifs of the `virtual' rather than the boundaried rule-based and medium-specific limitations of previous formalisms. The notion of interdisciplinarity stems from this particular philosophical investigation, and proposes painting as an intrinsically interdisciplinary practice. The motivation is to locate the relationship of different theoretical and philosophical models - including the fold, the notion of `technique', memory, the virtual and duration - in order to establish new ways for thinking concerning painting, and importantly how it can operate in an interdisciplinary manner. In particular the idea of `change' and `the new' in relation to Deleuzian `becomings', in contrast to Hegelian dialectics, drives the theoretical investigation, and how this challenges the idea of painting now. The research thinks through these integral component elements in terms of painting and analyses various examples of artworks and architectural projects (stemming from Deleuze's ideas including Greg Lynn and Bernard Cache), incorporating a new alignment with notions of spatiality and duration, which in turn constitutes a reterritorialisation of both painting and thinking as practices

    Deep Learning Applications in Industrial and Systems Engineering

    Get PDF
    Deep learning - the use of large neural networks to perform machine learning - has transformed the world. As the capabilities of deep models continue to grow, deep learning is becoming an increasingly valuable and practical tool for industrial engineering. With its wide applicability, deep learning can be turned to many industrial engineering tasks, including optimization, heuristic search, and functional approximation. In this dissertation, the major concepts and paradigms of deep learning are reviewed, and three industrial engineering projects applying these methods are described. The first applies a deep convolutional network to the task of absolute aerial geolocalization - the regression of real geographic coordinates from aerial photos - showing promising results. Next, continuing on this work, the features and characteristics of the deep aerial geolocalization model are further studied, with implications for future applications and methodological improvements. Lastly, a deep learning model is developed and applied to a difficult rare event problem of predicting failure times in oil and natural gas wells from process and site data. Practical details of applying deep learning to this sort of data are discussed, and methodological principles are proposed

    Emergence in the security of protocols for mobile ad-hoc networks

    Get PDF
    This thesis is concerned with the study of secure wireless routing protocols, which have been deployed for the purpose of exchanging information in an adhoc networking enviromnent. A discrete event simulator is developed, utilising an adaptive systems modelling approach and emergence that aims to assess networking protocols in the presence of adversarial behaviour. The model is used in conjunction with the characteristics that routing protocols have and also a number of cryptographic primitives that can be deployed in order to safeguard the information being exchanged. It is shown that both adversarial behaviour, as well as protocol descriptions can be described in a way that allows for them to be treated as input on the machine level. Within the system, the output generated selects the fittest protocol design capable of withstanding one or more particular type of attacks. As a result, a number of new and improved protocol specifications are presented and benchmarked against conventional metrics, such as throughput, latency and delivery criteria. From this process, an architecture for designing wireless routing protocols based on a number of security criteria is presented, whereupon the decision of using particular characteristics in a specification has been passed onto the machine level.EThOS - Electronic Theses Online ServiceGBUnited Kingdo
    • 

    corecore