16,759 research outputs found
Securing Databases from Probabilistic Inference
Databases can leak confidential information when users combine query results
with probabilistic data dependencies and prior knowledge. Current research
offers mechanisms that either handle a limited class of dependencies or lack
tractable enforcement algorithms. We propose a foundation for Database
Inference Control based on ProbLog, a probabilistic logic programming language.
We leverage this foundation to develop Angerona, a provably secure enforcement
mechanism that prevents information leakage in the presence of probabilistic
dependencies. We then provide a tractable inference algorithm for a practically
relevant fragment of ProbLog. We empirically evaluate Angerona's performance
showing that it scales to relevant security-critical problems.Comment: A short version of this paper has been accepted at the 30th IEEE
Computer Security Foundations Symposium (CSF 2017
Pipelined genetic propagation
© 2015 IEEE.Genetic Algorithms (GAs) are a class of numerical and combinatorial optimisers which are especially useful for solving complex non-linear and non-convex problems. However, the required execution time often limits their application to small-scale or latency-insensitive problems, so techniques to increase the computational efficiency of GAs are needed. FPGA-based acceleration has significant potential for speeding up genetic algorithms, but existing FPGA GAs are limited by the generational approaches inherited from software GAs. Many parts of the generational approach do not map well to hardware, such as the large shared population memory and intrinsic loop-carried dependency. To address this problem, this paper proposes a new hardware-oriented approach to GAs, called Pipelined Genetic Propagation (PGP), which is intrinsically distributed and pipelined. PGP represents a GA solver as a graph of loosely coupled genetic operators, which allows the solution to be scaled to the available resources, and also to dynamically change topology at run-time to explore different solution strategies. Experiments show that pipelined genetic propagation is effective in solving seven different applications. Our PGP design is 5 times faster than a recent FPGA-based GA system, and 90 times faster than a CPU-based GA system
On Structural Parameterizations of Hitting Set: Hitting Paths in Graphs Using 2-SAT
Hitting Set is a classic problem in combinatorial optimization. Its input
consists of a set system F over a finite universe U and an integer t; the
question is whether there is a set of t elements that intersects every set in
F. The Hitting Set problem parameterized by the size of the solution is a
well-known W[2]-complete problem in parameterized complexity theory. In this
paper we investigate the complexity of Hitting Set under various structural
parameterizations of the input. Our starting point is the folklore result that
Hitting Set is polynomial-time solvable if there is a tree T on vertex set U
such that the sets in F induce connected subtrees of T. We consider the case
that there is a treelike graph with vertex set U such that the sets in F induce
connected subgraphs; the parameter of the problem is a measure of how treelike
the graph is. Our main positive result is an algorithm that, given a graph G
with cyclomatic number k, a collection P of simple paths in G, and an integer
t, determines in time 2^{5k} (|G| +|P|)^O(1) whether there is a vertex set of
size t that hits all paths in P. It is based on a connection to the 2-SAT
problem in multiple valued logic. For other parameterizations we derive
W[1]-hardness and para-NP-completeness results.Comment: Presented at the 41st International Workshop on Graph-Theoretic
Concepts in Computer Science, WG 2015. (The statement of Lemma 4 was
corrected in this update.
- …