3 research outputs found

    Algorithms for security in robotics and networks

    Get PDF
    The dissertation presents algorithms for robotics and security. The first chapter gives an overview of the area of visibility-based pursuit-evasion. The following two chapters introduce two specific algorithms in that area. The algorithms are based on research done together with Dr. Giora Slutzki and Dr. Steven LaValle. Chapter 2 presents a polynomial-time algorithm for clearing a polygon by a single 1-searcher. The result is extended to a polynomial-time algorithm for a pair of 1-searchers in Chapter 3.;Chapters 4 and 5 contain joint research with Dr. Srini Tridandapani, Dr. Jason Jue and Dr. Michael Borella in the area of computer networks. Chapter 4 presents a method of providing privacy over an insecure channel which does not require encryption. Chapter 5 gives approximate bounds for the link utilization in multicast traffic

    Wavelength and time division multiplexing with lightpath trespassing for all-optical star local area networks

    Get PDF
    Many medium access control protocols have been proposed for optical wavelength division multiplexing local area networks with a star topology. These protocols range from those based on the concept of fixed-assignment of communication subchannels, such as TDMA (Time Division Multiple Access); reservation of communication subchannels, such as DAS (Dynamic Allocation Scheme); or random-access to communication subchannels, such as DT-WDMA (Dynamic Time-Wavelength Division Multiple Access). In addition various hybrid protocols have been considered, for example, protocols incorporating both fixed-assignment and reservation rules, such as HTDM (Hybrid TDM). This thesis is on a novel hybrid protocol of fixed-assignment and random-access called "WTDMA with lightpath trespassing". This protocol combines the most desirable aspects of fixed-assignment and random-access protocols, while limiting their drawbacks. The performance of different versions of the protocol are analysed both mathematically and by stochastic simulation. The obtained results justify the introduction of the WTDMA with trespassing protocol, and indicate the situations where its use is advantageous
    corecore