2,146 research outputs found
Polynomial Synthesis of Asynchronous Automata
Zielonka's theorem shows that each regular set of Mazurkiewicz traces can be
implemented as a system of synchronized processes with a distributed control
structure called asynchronous automaton. This paper gives a polynomial
algorithm for the synthesis of a non-deterministic asynchronous automaton from
a regular Mazurkiewicz trace language. This new construction is based on an
unfolding approach that improves the complexity of Zielonka's and Pighizzini's
techniques in terms of the number of states.Comment: The MOdelling and VErification (MOVE) tea
Cellular Automata Simulating Experimental Properties of Traffic Flows
A model for 1D traffic flow is developed, which is discrete in space and
time. Like the cellular automaton model by Nagel and Schreckenberg [J. Phys. I
France 2, 2221 (1992)], it is simple, fast, and can describe stop-and-go
traffic. Due to its relation to the optimal velocity model by Bando et al.
[Phys. Rev. E 51, 1035 (1995)], its instability mechanism is of deterministic
nature. The model can be easily calibrated to empirical data and displays the
experimental features of traffic data recently reported by Kerner and Rehborn
[Phys. Rev. E 53, R1297 (1996)].Comment: For related work see
http://www.theo2.physik.uni-stuttgart.de/helbing.html and
http://traffic.comphys.uni-duisburg.de/member/home_schreck.htm
Building Secure and Fast Cryptographic Hash Functions Using Programmable Cellular Automata
Cryptographic hash functions have recently brought an exceptional research interest. With the increasing number of attacks against the widely used functions as MD5, SHA-1 and RIPEMD, the need to consider new hash functions design and conception strategies becomes crucial. In this paper, we propose a fast and efficient hash function using programmable cellular automata that are very suitable for cryptographic applications due to their chaotic and complex behavior derived from simple rules interaction. The proposed function is evaluated using several statistical tests, while obtained results demonstrate very admissible cryptographic properties such as confusion/diffusion capability and high sensitivity to input changes. Furthermore, the hashing scheme can be easily implemented through software or hardware, so it provides very competitive running performances
Causality, Information and Biological Computation: An algorithmic software approach to life, disease and the immune system
Biology has taken strong steps towards becoming a computer science aiming at
reprogramming nature after the realisation that nature herself has reprogrammed
organisms by harnessing the power of natural selection and the digital
prescriptive nature of replicating DNA. Here we further unpack ideas related to
computability, algorithmic information theory and software engineering, in the
context of the extent to which biology can be (re)programmed, and with how we
may go about doing so in a more systematic way with all the tools and concepts
offered by theoretical computer science in a translation exercise from
computing to molecular biology and back. These concepts provide a means to a
hierarchical organization thereby blurring previously clear-cut lines between
concepts like matter and life, or between tumour types that are otherwise taken
as different and may not have however a different cause. This does not diminish
the properties of life or make its components and functions less interesting.
On the contrary, this approach makes for a more encompassing and integrated
view of nature, one that subsumes observer and observed within the same system,
and can generate new perspectives and tools with which to view complex diseases
like cancer, approaching them afresh from a software-engineering viewpoint that
casts evolution in the role of programmer, cells as computing machines, DNA and
genes as instructions and computer programs, viruses as hacking devices, the
immune system as a software debugging tool, and diseases as an
information-theoretic battlefield where all these forces deploy. We show how
information theory and algorithmic programming may explain fundamental
mechanisms of life and death.Comment: 30 pages, 8 figures. Invited chapter contribution to Information and
Causality: From Matter to Life. Sara I. Walker, Paul C.W. Davies and George
Ellis (eds.), Cambridge University Pres
Cellular Automata Models of Road Traffic
In this paper, we give an elaborate and understandable review of traffic
cellular automata (TCA) models, which are a class of computationally efficient
microscopic traffic flow models. TCA models arise from the physics discipline
of statistical mechanics, having the goal of reproducing the correct
macroscopic behaviour based on a minimal description of microscopic
interactions. After giving an overview of cellular automata (CA) models, their
background and physical setup, we introduce the mathematical notations, show
how to perform measurements on a TCA model's lattice of cells, as well as how
to convert these quantities into real-world units and vice versa. The majority
of this paper then relays an extensive account of the behavioural aspects of
several TCA models encountered in literature. Already, several reviews of TCA
models exist, but none of them consider all the models exclusively from the
behavioural point of view. In this respect, our overview fills this void, as it
focusses on the behaviour of the TCA models, by means of time-space and
phase-space diagrams, and histograms showing the distributions of vehicles'
speeds, space, and time gaps. In the report, we subsequently give a concise
overview of TCA models that are employed in a multi-lane setting, and some of
the TCA models used to describe city traffic as a two-dimensional grid of
cells, or as a road network with explicitly modelled intersections. The final
part of the paper illustrates some of the more common analytical approximations
to single-cell TCA models.Comment: Accepted for publication in "Physics Reports". A version of this
paper with high-quality images can be found at: http://phdsven.dyns.cx (go to
"Papers written"
A Novel Latin Square Image Cipher
In this paper, we introduce a symmetric-key Latin square image cipher (LSIC)
for grayscale and color images. Our contributions to the image encryption
community include 1) we develop new Latin square image encryption primitives
including Latin Square Whitening, Latin Square S-box and Latin Square P-box ;
2) we provide a new way of integrating probabilistic encryption in image
encryption by embedding random noise in the least significant image bit-plane;
and 3) we construct LSIC with these Latin square image encryption primitives
all on one keyed Latin square in a new loom-like substitution-permutation
network. Consequently, the proposed LSIC achieve many desired properties of a
secure cipher including a large key space, high key sensitivities, uniformly
distributed ciphertext, excellent confusion and diffusion properties,
semantically secure, and robustness against channel noise. Theoretical analysis
show that the LSIC has good resistance to many attack models including
brute-force attacks, ciphertext-only attacks, known-plaintext attacks and
chosen-plaintext attacks. Experimental analysis under extensive simulation
results using the complete USC-SIPI Miscellaneous image dataset demonstrate
that LSIC outperforms or reach state of the art suggested by many peer
algorithms. All these analysis and results demonstrate that the LSIC is very
suitable for digital image encryption. Finally, we open source the LSIC MATLAB
code under webpage https://sites.google.com/site/tuftsyuewu/source-code.Comment: 26 pages, 17 figures, and 7 table
- …