633 research outputs found

    Two-batch liar games on a general bounded channel

    Get PDF
    We consider an extension of the 2-person R\'enyi-Ulam liar game in which lies are governed by a channel CC, a set of allowable lie strings of maximum length kk. Carole selects x[n]x\in[n], and Paul makes tt-ary queries to uniquely determine xx. In each of qq rounds, Paul weakly partitions [n]=A0>...At1[n]=A_0\cup >... \cup A_{t-1} and asks for aa such that xAax\in A_a. Carole responds with some bb, and if aba\neq b, then xx accumulates a lie (a,b)(a,b). Carole's string of lies for xx must be in the channel CC. Paul wins if he determines xx within qq rounds. We further restrict Paul to ask his questions in two off-line batches. We show that for a range of sizes of the second batch, the maximum size of the search space [n][n] for which Paul can guarantee finding the distinguished element is tq+k/(Ek(C)(qk))\sim t^{q+k}/(E_k(C)\binom{q}{k}) as qq\to\infty, where Ek(C)E_k(C) is the number of lie strings in CC of maximum length kk. This generalizes previous work of Dumitriu and Spencer, and of Ahlswede, Cicalese, and Deppe. We extend Paul's strategy to solve also the pathological liar variant, in a unified manner which gives the existence of asymptotically perfect two-batch adaptive codes for the channel CC.Comment: 26 page

    Deterministic and Probabilistic Binary Search in Graphs

    Full text link
    We consider the following natural generalization of Binary Search: in a given undirected, positively weighted graph, one vertex is a target. The algorithm's task is to identify the target by adaptively querying vertices. In response to querying a node qq, the algorithm learns either that qq is the target, or is given an edge out of qq that lies on a shortest path from qq to the target. We study this problem in a general noisy model in which each query independently receives a correct answer with probability p>12p > \frac{1}{2} (a known constant), and an (adversarial) incorrect one with probability 1p1-p. Our main positive result is that when p=1p = 1 (i.e., all answers are correct), log2n\log_2 n queries are always sufficient. For general pp, we give an (almost information-theoretically optimal) algorithm that uses, in expectation, no more than (1δ)log2n1H(p)+o(logn)+O(log2(1/δ))(1 - \delta)\frac{\log_2 n}{1 - H(p)} + o(\log n) + O(\log^2 (1/\delta)) queries, and identifies the target correctly with probability at leas 1δ1-\delta. Here, H(p)=(plogp+(1p)log(1p))H(p) = -(p \log p + (1-p) \log(1-p)) denotes the entropy. The first bound is achieved by the algorithm that iteratively queries a 1-median of the nodes not ruled out yet; the second bound by careful repeated invocations of a multiplicative weights algorithm. Even for p=1p = 1, we show several hardness results for the problem of determining whether a target can be found using KK queries. Our upper bound of log2n\log_2 n implies a quasipolynomial-time algorithm for undirected connected graphs; we show that this is best-possible under the Strong Exponential Time Hypothesis (SETH). Furthermore, for directed graphs, or for undirected graphs with non-uniform node querying costs, the problem is PSPACE-complete. For a semi-adaptive version, in which one may query rr nodes each in kk rounds, we show membership in Σ2k1\Sigma_{2k-1} in the polynomial hierarchy, and hardness for Σ2k5\Sigma_{2k-5}

    MATCOS-10

    Get PDF

    A power efficient method against misbehaving node in reputation system to prevent sybil attack in mobile ad-hoc network

    Get PDF
    Mobile ad-hoc network has become a very important field of study for students and researchers owing to its wide application. In mobile ad-hoc network all nodes are responsible for routing and forwarding of packets, hence all nodes are required to act selflessly for proper functioning of mobile ad-hoc network. The presence of selfish behavior in a node can degrade the performance of the mobile ad hoc network to a large extent. Several works have been done for identification and punishment of the misbehaving nodes in mobile ad hoc network. We propose here a method where some selected neighbors are participated in detecting misbehaving nodes in power effective manners. These neighbors participating in selfish node detection are chosen randomly. It also alerts all other nodes about the misbehaving links in the network. The simulation studies show that this does the job efficiently with less power consumption in the network. The power effectiveness of the algorithm also reduces the number of misbehaving nodes because many nodes show misbehavior to save their power

    Succinct data structures for dynamics strings

    Get PDF
    A new simple algorithm for optimal embedding of complete binary trees into hypercubes as well as a node-by-node algorithm for embedding of nearly complete binary trees into hypercubes are presented

    Sixth annual conference on alaskan placer mining

    Get PDF
    An abridged format of papers, presentations and addresses given during the 1984 conference held on March 28-29, 1984, compiled and edited by Daniel E. Walsh and M. Susan Wray

    Identification through Finger Bone Structure Biometrics

    Get PDF
    corecore