2 research outputs found

    A PROTECTED TRANSFER ROUTING WITH KEY PRE-SHARING: A LINEAR COLDNESS OPTIMIZATION APPROACH

    Get PDF
    Trivial secure communications inside the random quantity of network nodes requires each node to help keep n - 1 pairwise keys inside the situation of symmetric cryptography and n - 1 public keys inside the situation of uneven cryptography where n represents the quantity of network nodes. Within the network operation phase, each node finds the underlay path length connected getting its overlay neighbors by delivering simple route demands. An important pool for key pre-distribution schemes that's built based on symmetric cryptography concepts contains secret pairwise keys. In this particular paper, we reference the network layer since the underlay layer together with cryptographic layer since the overlay layer. Our recommended option is basically damaged whipped cream an LP problem derived by relaxing all of the Boolean constraints inside the original problem. The effectiveness of our formula reaches solving the Boolean LP challenge with a while complexity not exceeding individuals of solving the relaxed LP problem while guaranteeing to know the very best solution. We noted the main advantage of our formula as acquiring the opportunity to solve the very best routing problem for each graph either directed or undirected in addition to weighted or unweighted. evaluating network performance, security, and consumption characteristics inside the recommended formula for symmetric and uneven key pre-distribution methods operating on top of on-demand routing protocols. So that you can think about the performance within our recommended formula, we employ it three key pre-distribution methods, namely, 2-UKP, SST, and PAKP running on top of ad-hoc when needed distance vector routing protocol

    Algorithms For Clustering Problems:Theoretical Guarantees and Empirical Evaluations

    Get PDF
    Clustering is a classic topic in combinatorial optimization and plays a central role in many areas, including data science and machine learning. In this thesis, we first focus on the dynamic facility location problem (i.e., the facility location problem in evolving metrics). We present a new LP-rounding algorithm for facility location problems, which yields the first constant factor approximation algorithm for the dynamic facility location problem. Our algorithm installs competing exponential clocks on clients and facilities, and connects every client by the path that repeatedly follows the smallest clock in the neighborhood. The use of exponential clocks gives rise to several properties that distinguish our approach from previous LP-roundings for facility location problems. In particular, we use \emph{no clustering} and we enable clients to connect through paths of \emph{arbitrary lengths}. In fact, the clustering-free nature of our algorithm is crucial for applying our LP-rounding approach to the dynamic problem. Furthermore, we present both empirical and theoretical aspects of the kk-means problem. The best known algorithm for kk-means with a provable guarantee is a simple local-search heuristic that yields an approximation guarantee of 9+ϵ9+\epsilon, a ratio that is known to be tight with respect to such methods. We overcome this barrier by presenting a new primal-dual approach that enables us (1) to exploit the geometric structure of kk-means and (2) to satisfy the hard constraint that at most kk clusters are selected without deteriorating the approximation guarantee. Our main result is a 6.3576.357-approximation algorithm with respect to the standard LP relaxation. Our techniques are quite general and we also show improved guarantees for the general version of kk-means where the underlying metric is not required to be Euclidean and for kk-median in Euclidean metrics. We also improve the running time of our algorithm to almost linear running time and still maintain a provable guarantee. We compare our algorithm with {\sc K-Means++} (a widely studied algorithm) and show that we obtain better accuracy with comparable and even better running time
    corecore