9 research outputs found

    Genereerivate hulkade ja jadade süsteemid

    Get PDF
    Operaatorideaalide teooria sai alguse A. Pietschi monograafiast ning on tänaseks saanud kaasaegse Banachi ruumide teooria lahutamatuks osaks. I. Stephani tõi sisse kaks operaatorideaalidega tihedalt seotud mõistet: genereerivate hulkade süsteem ja genereerivate jadade süsteem. Nimelt, lähtudes kahest etteantud genereerivate hulkade süsteemist, saame me tekitada operaatorideaali, mis koosneb kõigist operaatoritest, mis teisendavad esimesse süsteemi kuuluvad hulgad teise süsteemi kuuluvateks hulkadeks. Genereerivate jadade süsteeme saab omakorda kasutada genereerivate hulkade süsteemide tekitamiseks. Väitekirjas uuritakse genereerivate hulkade ja jadade süsteemide klasse ning nendevahelisi seoseid. Muuhulgas tõestatakse, et leidub Galois' vastavus genereerivate hulkade süsteemide klassi ja teatava genereerivate jadade süsteemide faktorklassi vahel. Lisaks vaadeldakse eelmainitud struktuure ning nendega seotud klasse võreteoreetilisest aspektist. Üks levinud näide genereerivate hulkade süsteemide kohta on kõigi suhteliselt kompaktsete hulkade süsteem. A. Grothendieck tõestas 1955. aastal, et Banachi ruumi alamhulk on suhteliselt kompaktne parajasti siis, kui ta sisaldub nulli koonduva jada kinnises kumeras kattes. Väitekirjas uuritakse mitmeid kirjanduses varasemalt sisse toodud alternatiivseid suhtelise kompaktsuse mõisteid, mis baseeruvad sellel tulemusel. Väitekirjas tuuakse sisse üldine meetod, mis tekitab etteantud normeeritud jadaruumist ja normeeritud jadade süsteemist operaatorideaali ja varustab selle teatava kvaasinormiga. Tõestatakse, et sobivatel eeldustel on tulemuseks kvaasi-Banachi operaatorideaal. Selle konstruktsiooni näidetena saadakse uusi tulemusi eelmainitud alternatiivsete suhtelise kompaktsuse mõistete kohta.A. Pietsch created the theory of operator ideals, which has been widely adopted and permeates the contemporary field of Banach spaces. I. Stephani introduced the related notions of a generating system of sets and a generating system of sequences. Namely, given two generating systems of sets, one obtains an operator ideal by considering all of the operators that map the sets of the first system to the sets of the second system. Generating systems of sequences can be used to obtain generating systems of sets. This thesis studies the classes of generating systems of sets and sequences and the relations between them; in particular, we show that there is a Galois connection between the former and a certain quotient class of the latter. We also study the lattice structure of various classes of operator ideals, generating systems of sets, and generating systems of sequences. A well-known example of a generating system of sets is the system of relatively compact sets. A. Grothendieck proved in 1955 that a subset of a Banach space is relatively compact if and only if it is contained in the closed convex hull of a norm null sequence. Based on this result, various alternative notions of relatively compact sets have been introduced in the literature. Several of these notions are studied thoroughly in this thesis. We propose a general method for constructing generating systems of sets and operator ideals from a normed sequence space and a normed system of sequences. We prove that the constructed operator ideal is always quasi-Banach provided that certain assumptions are met. As examples of this construction, we obtain new results for some aforementioned alternative notions of relative compactnes

    Combinatorial Optimization

    Get PDF
    This report summarizes the meeting on Combinatorial Optimization where new and promising developments in the field were discussed. Th

    Devices and networks for optical switching

    Get PDF
    This thesis is concerned with some aspects of the application of optics to switching and computing. Two areas are dealt with: the design of switching networks which use optical interconnects, and the development and application of the t-SEED optical logic device. The work on optical interconnects looks at the multistage interconnection network which has been proposed as a hybrid switch using both electronics and optics. It is shown that the architecture can be mapped from one dimensional to two dimensional format, so that the machine makes full use of the space available to the optics. Other mapping rules are described which allow the network to make optimum use of the optical interconnects, and the endpoint is a hybrid optical-electronic machine which should be able to outperform an all-electronic equivalent. The development of the t-SEED optical logic device is described, which is the integration of a phototransistor with a multiple quantum well optical modulator. It is found to be important to have the modulator underneath rather than on top of the transistor to avoid unwanted thyristor action. In order for the transistor to have a high gain the collector must have a low doping level, the exit window in the substrate must be etched all the way to the emitter layer, and the etch must not damage the emitter-base junction. A real optical gain of 1.6 has been obtained, which is higher than has ever been reached before but is not as high as should be possible. Improvements to the device are suggested. A new model of the Fabry-Perot cavity is introduced which helps considerably in the interpretation of experimental measurements made on the quantum well modulators. Also a method of improving the contrast of the multiple quantum well modulator by grading the well widths is proposed which may find application in long wavelength transmission modulators. Some systems which make use of the t-SEED are considered. It is shown that the t-SEED device has the right characteristics for use as a neuron element in the optical implementation of a neural network. A new image processing network for clutter removal in binary images is introduced which uses the t-SEED, and a brief performance analysis suggests that the network may be superior to an all-electronic machine

    Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs

    Get PDF
    Succinct non-interactive arguments (SNARGs) enable verifying NP computations with significantly less complexity than that required for classical NP verification. In this work, we focus on simultaneously minimizing the proof size and the prover complexity of SNARGs. Concretely, for a security parameter λ\lambda, we measure the asymptotic cost of achieving soundness error 2λ2^{-\lambda} against provers of size 2λ2^\lambda. We say a SNARG is quasi-optimally succinct if its proof length is O~(λ)\tilde{O}(\lambda), and that it is quasi-optimal, if moreover, its prover complexity is only polylogarithmically greater than the running time of the classical NP prover. We show that this definition is the best we could hope for assuming that NP does not have succinct proofs. Our definition strictly strengthens the previous notion of quasi-optimality introduced in the work of Boneh et al. (Eurocrypt 2017). This work gives the first quasi-optimal SNARG for Boolean circuit satisfiability from a concrete cryptographic assumption. Our construction takes a two-step approach. The first is an information-theoretic construction of a quasi-optimal linear multi-prover interactive proof (linear MIP) for circuit satisfiability. Then, we describe a generic cryptographic compiler that transforms our quasi-optimal linear MIP into a quasi-optimal SNARG by relying on the notion of linear-only vector encryption over rings introduced by Boneh et al. Combining these two primitives yields the first quasi-optimal SNARG based on linear-only vector encryption. Moreover, our linear MIP construction leverages a new robust circuit decomposition primitive that allows us to decompose a circuit satisfiability instance into several smaller circuit satisfiability instances. This primitive may be of independent interest. Finally, we consider (designated-verifier) SNARGs that provide optimal succinctness for a non-negligible soundness error. Concretely, we put forward the notion of 1-bit SNARGs that achieve soundness error 1/2 with only one bit of proof. We first show how to build 1-bit SNARGs from indistinguishability obfuscation, and then show that 1-bit SNARGs also suffice for realizing a form of witness encryption. The latter result highlights a two-way connection between the soundness of very succinct argument systems and powerful forms of encryption

    Scalable, transparent, and post-quantum secure computational integrity

    Get PDF
    Human dignity demands that personal information, like medical and forensic data, be hidden from the public. But veils of secrecy designed to preserve privacy may also be abused to cover up lies and deceit by parties entrusted with Data, unjustly harming citizens and eroding trust in central institutions. Zero knowledge (ZK) proof systems are an ingenious cryptographic solution to the tension between the ideals of personal privacy and institutional integrity, enforcing the latter in a way that does not compromise the former. Public trust demands transparency from ZK systems, meaning they be set up with no reliance on any trusted party, and have no trapdoors that could be exploited by powerful parties to bear false witness. For ZK systems to be used with Big Data, it is imperative that the public verification process scale sublinearly in data size. Transparent ZK proofs that can be verified exponentially faster than data size were first described in the 1990s but early constructions were impractical, and no ZK system realized thus far in code (including that used by crypto-currencies like Zcash) has achieved both transparency and exponential verification speedup, simultaneously, for general computations. Here we report the first realization of a transparent ZK system (ZK-STARK) in which verification scales exponentially faster than database size, and moreover, this exponential speedup in verification is observed concretely for meaningful and sequential computations, described next. Our system uses several recent advances on interactive oracle proofs (IOP), such as a “fast” (linear time) IOP system for error correcting codes. Our proof-of-concept system allows the Police to prove to the public that the DNA profile of a Presidential Candidate does not appear in the forensic DNA profile database maintained by the Police. The proof, which is generated by the Police, relies on no external trusted party, and reveals no further information about the contents of the database, nor about the candidate’s profile; in particular, no DNA information is disclosed to any party outside the Police. The proof is shorter than the size of the DNA database, and verified faster than the time needed to examine that database naively

    LIPIcs, Volume 248, ISAAC 2022, Complete Volume

    Get PDF
    LIPIcs, Volume 248, ISAAC 2022, Complete Volum

    Scheduling algorithms for throughput maximization in data networks

    Get PDF
    Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2007.Includes bibliographical references (p. 215-226).This thesis considers the performance implications of throughput optimal scheduling in physically and computationally constrained data networks. We study optical networks, packet switches, and wireless networks, each of which has an assortment of features and constraints that challenge the design decisions of network architects. In this work, each of these network settings are subsumed under a canonical model and scheduling framework. Tools of queueing analysis are used to evaluate network throughput properties, and demonstrate throughput optimality of scheduling and routing algorithms under stochastic traffic. Techniques of graph theory are used to study network topologies having desirable throughput properties. Combinatorial algorithms are proposed for efficient resource allocation. In the optical network setting, the key enabling technology is wavelength division multiplexing (WDM), which allows each optical fiber link to simultaneously carry a large number of independent data streams at high rate. To take advantage of this high data processing potential, engineers and physicists have developed numerous technologies, including wavelength converters, optical switches, and tunable transceivers.(cont.) While the functionality provided by these devices is of great importance in capitalizing upon the WDM resources, a major challenge exists in determining how to configure these devices to operate efficiently under time-varying data traffic. In the WDM setting, we make two main contributions. First, we develop throughput optimal joint WDM reconfiguration and electronic-layer routing algorithms, based on maxweight scheduling. To mitigate the service disruption associated with WDM reconfiguration, our algorithms make decisions at frame intervals. Second, we develop analytic tools to quantify the maximum throughput achievable in general network settings. Our approach is to characterize several geometric features of the maximum region of arrival rates that can be supported in the network. In the packet switch setting, we observe through numerical simulation the attractive throughput properties of a simple maximal weight scheduler. Subsequently, we consider small switches, and analytically demonstrate the attractive throughput properties achievable using maximal weight scheduling. We demonstrate that such throughput properties may not be sustained in larger switches.(cont.) In the wireless network setting, mesh networking is a promising technology for achieving connectivity in local and metropolitan area networks. Wireless access points and base stations adhering to the IEEE 802.11 wireless networking standard can be bought off the shelf at little cost, and can be configured to access the Internet in minutes. With ubiquitous low-cost Internet access perceived to be of tremendous societal value, such technology is naturally garnering strong interest. Enabling such wireless technology is thus of great importance. An important challenge in enabling mesh networks, and many other wireless network applications, results from the fact that wireless transmission is achieved by broadcasting signals through the air, which has the potential for interfering with other parts of the network. Furthermore, the scarcity of wireless transmission resources implies that link activation and packet routing should be effected using simple distributed algorithms. We make three main contributions in the wireless setting. First, we determine graph classes under which simple, distributed, maximal weight schedulers achieve throughput optimality.(cont.) Second, we use this acquired knowledge of graph classes to develop combinatorial algorithms, based on matroids, for allocating channels to wireless links, such that each channel can achieve maximum throughput using simple distributed schedulers. Third, we determine new conditions under which distributed algorithms for joint link activation and routing achieve throughput optimality.by Andrew Brzezinski.Ph.D

    Modernism and the posthumanist subject : the architecture of Hannes Meyer and Ludwig Hilberseimer

    Get PDF
    Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Architecture, 1990.Includes bibliographical references (p. 451-455).by K. Michael Hays.Ph.D
    corecore