4,210 research outputs found
Stopping time signatures for some algorithms in cryptography
We consider the normalized distribution of the overall running times of some
cryptographic algorithms, and what information they reveal about the
algorithms. Recent work of Deift, Menon, Olver, Pfrang, and Trogdon has shown
that certain numerical algorithms applied to large random matrices exhibit a
characteristic distribution of running times, which depends only on the
algorithm but are independent of the choice of probability distributions for
the matrices. Different algorithms often exhibit different running time
distributions, and so the histograms for these running time distributions
provide a time-signature for the algorithms, making it possible, in many cases,
to distinguish one algorithm from another. In this paper we extend this
analysis to cryptographic algorithms, and present examples of such algorithms
with time-signatures that are indistinguishable, and others with
time-signatures that are clearly distinct.Comment: 20 page
Testing Small Set Expansion in General Graphs
We consider the problem of testing small set expansion for general graphs. A
graph is a -expander if every subset of volume at most has
conductance at least . Small set expansion has recently received
significant attention due to its close connection to the unique games
conjecture, the local graph partitioning algorithms and locally testable codes.
We give testers with two-sided error and one-sided error in the adjacency
list model that allows degree and neighbor queries to the oracle of the input
graph. The testers take as input an -vertex graph , a volume bound ,
an expansion bound and a distance parameter . For the
two-sided error tester, with probability at least , it accepts the graph
if it is a -expander and rejects the graph if it is -far
from any -expander, where and
. The
query complexity and running time of the tester are
, where is the number of
edges of the graph. For the one-sided error tester, it accepts every
-expander, and with probability at least , rejects every graph
that is -far from -expander, where
and for any . The query
complexity and running time of this tester are
.
We also give a two-sided error tester with smaller gap between and
in the rotation map model that allows (neighbor, index) queries and
degree queries.Comment: 23 pages; STACS 201
On sampling nodes in a network
Random walk is an important tool in many graph mining applications including estimating graph parameters, sampling portions of the graph, and extracting dense communities. In this paper we consider the problem of sampling nodes from a large graph according to a prescribed distribution by using random walk as the basic primitive. Our goal is to obtain algorithms that make a small number of queries to the graph but output a node that is sampled according to the prescribed distribution. Focusing on the uniform distribution case, we study the query complexity of three algorithms and show a near-tight bound expressed in terms of the parameters of the graph such as average degree and the mixing time. Both theoretically and empirically, we show that some algorithms are preferable in practice than the others. We also extend our study to the problem of sampling nodes according to some polynomial function of their degrees; this has implications for designing efficient algorithms for applications such as triangle counting
Contact and voter processes on the infinite percolation cluster as models of host-symbiont interactions
We introduce spatially explicit stochastic processes to model multispecies
host-symbiont interactions. The host environment is static, modeled by the
infinite percolation cluster of site percolation. Symbionts evolve on the
infinite cluster through contact or voter type interactions, where each host
may be infected by a colony of symbionts. In the presence of a single symbiont
species, the condition for invasion as a function of the density of the habitat
of hosts and the maximal size of the colonies is investigated in details. In
the presence of multiple symbiont species, it is proved that the community of
symbionts clusters in two dimensions whereas symbiont species may coexist in
higher dimensions.Comment: Published in at http://dx.doi.org/10.1214/10-AAP734 the Annals of
Applied Probability (http://www.imstat.org/aap/) by the Institute of
Mathematical Statistics (http://www.imstat.org
- …