516 research outputs found

    Fast Two-Robot Disk Evacuation with Wireless Communication

    Get PDF
    In the fast evacuation problem, we study the path planning problem for two robots who want to minimize the worst-case evacuation time on the unit disk. The robots are initially placed at the center of the disk. In order to evacuate, they need to reach an unknown point, the exit, on the boundary of the disk. Once one of the robots finds the exit, it will instantaneously notify the other agent, who will make a beeline to it. The problem has been studied for robots with the same speed~\cite{s1}. We study a more general case where one robot has speed 11 and the other has speed s1s \geq 1. We provide optimal evacuation strategies in the case that sc2.752.75s \geq c_{2.75} \approx 2.75 by showing matching upper and lower bounds on the worst-case evacuation time. For 1s<c2.751\leq s < c_{2.75}, we show (non-matching) upper and lower bounds on the evacuation time with a ratio less than 1.221.22. Moreover, we demonstrate that a generalization of the two-robot search strategy from~\cite{s1} is outperformed by our proposed strategies for any sc1.711.71s \geq c_{1.71} \approx 1.71.Comment: 18 pages, 10 figure

    Byzantine Gathering in Networks

    Full text link
    This paper investigates an open problem introduced in [14]. Two or more mobile agents start from different nodes of a network and have to accomplish the task of gathering which consists in getting all together at the same node at the same time. An adversary chooses the initial nodes of the agents and assigns a different positive integer (called label) to each of them. Initially, each agent knows its label but does not know the labels of the other agents or their positions relative to its own. Agents move in synchronous rounds and can communicate with each other only when located at the same node. Up to f of the agents are Byzantine. A Byzantine agent can choose an arbitrary port when it moves, can convey arbitrary information to other agents and can change its label in every round, in particular by forging the label of another agent or by creating a completely new one. What is the minimum number M of good agents that guarantees deterministic gathering of all of them, with termination? We provide exact answers to this open problem by considering the case when the agents initially know the size of the network and the case when they do not. In the former case, we prove M=f+1 while in the latter, we prove M=f+2. More precisely, for networks of known size, we design a deterministic algorithm gathering all good agents in any network provided that the number of good agents is at least f+1. For networks of unknown size, we also design a deterministic algorithm ensuring the gathering of all good agents in any network but provided that the number of good agents is at least f+2. Both of our algorithms are optimal in terms of required number of good agents, as each of them perfectly matches the respective lower bound on M shown in [14], which is of f+1 when the size of the network is known and of f+2 when it is unknown

    Almost optimal asynchronous rendezvous in infinite multidimensional grids

    Get PDF
    Two anonymous mobile agents (robots) moving in an asynchronous manner have to meet in an infinite grid of dimension δ&gt; 0, starting from two arbitrary positions at distance at most d. Since the problem is clearly infeasible in such general setting, we assume that the grid is embedded in a δ-dimensional Euclidean space and that each agent knows the Cartesian coordinates of its own initial position (but not the one of the other agent). We design an algorithm permitting the agents to meet after traversing a trajectory of length O(d δ polylog d). This bound for the case of 2d-grids subsumes the main result of [12]. The algorithm is almost optimal, since the Ω(d δ) lower bound is straightforward. Further, we apply our rendezvous method to the following network design problem. The ports of the δ-dimensional grid have to be set such that two anonymous agents starting at distance at most d from each other will always meet, moving in an asynchronous manner, after traversing a O(d δ polylog d) length trajectory. We can also apply our method to a version of the geometric rendezvous problem. Two anonymous agents move asynchronously in the δ-dimensional Euclidean space. The agents have the radii of visibility of r1 and r2, respectively. Each agent knows only its own initial position and its own radius of visibility. The agents meet when one agent is visible to the other one. We propose an algorithm designing the trajectory of each agent, so that they always meet after traveling a total distance of O( ( d)), where r = min(r1, r2) and for r ≥ 1. r)δpolylog ( d r

    A Basic Framework for the Cryptanalysis of Digital Chaos-Based Cryptography

    Full text link
    Chaotic cryptography is based on the properties of chaos as source of entropy. Many different schemes have been proposed to take advantage of those properties and to design new strategies to encrypt information. However, the right and efficient use of chaos in the context of cryptography requires a thorough knowledge about the dynamics of the selected chaotic system. Indeed, if the final encryption system reveals enough information about the underlying chaotic system it could be possible for a cryptanalyst to get the key, part of the key or some information somehow equivalent to the key just analyzing those dynamical properties leaked by the cryptosystem. This paper shows what those dynamical properties are and how a cryptanalyst can use them to prove the inadequacy of an encryption system for the secure exchange of information. This study is performed through the introduction of a series of mathematical tools which should be the basic framework of cryptanalysis in the context of digital chaos-based cryptography.Comment: 6 pages, 5 figure

    Robustly Safe Compilation

    Get PDF
    Secure compilers generate compiled code that withstands many target-level attacks such as alteration of control flow, data leaks or memory corruption. Many existing secure compilers are proven to be fully abstract, meaning that they reflect and preserve observational equivalence. Fully abstract compilation is strong and useful but, in certain cases, comes at the cost of requiring expensive runtime constructs in compiled code. These constructs may have no relevance for security, but are needed to accommodate differences between the source and target languages that fully abstract compilation necessarily needs

    Access to primary care is associated with better autoimmune hepatitis outcomes in an urban county hospital

    Get PDF
    BACKGROUND: Autoimmune hepatitis causes chronic hepatitis and often leads to cirrhosis and death without treatment. We wanted to see if having access to primary care or insurance prior to diagnosis is associated with better outcomes for patients in an urban, public hospital with mostly socioeconomically disadvantaged Hispanic patients. METHODS: We did a retrospective study at our institution. Kaplan Meier survival analysis was done looking at transplant-free overall survival for patients diagnosed at our institution. The log-rank test was done to compare survival between patients with and without prior access to primary care, and between patients with and without insurance at diagnosis. RESULTS: Overall 5- and 10-year transplant-free overall survival was 91 % (95 % CI, 83-100 %) and 75 % (95 % CI, 50-99 %), respectively. Patients with primary care prior to diagnosis had significantly better transplant-free overall survival than those without (log rank test p = 0.019). Patients with primary care also had better clinical markers at diagnosis. Having insurance at diagnosis was not associated with better outcomes. CONCLUSIONS: Outcomes of autoimmune hepatitis are poor in our setting but access to primary care prior to diagnosis was associated with better outcomes. This is likely due to the important role that primary care plays in detecting disease and initiating treatment earlier. With the expansion of access to healthcare that the Affordable Care Act provides, future patients are likely to do better with even rare diseases like autoimmune hepatitis

    Patientâ level Factors and the Quality of Care Delivered in Pediatric Emergency Departments

    Full text link
    ObjectiveQuality of care delivered to adult patients in the emergency department (ED) is often associated with demographic and clinical factors such as a patient’s race/ethnicity and insurance status. We sought to determine whether the quality of care delivered to children in the ED was associated with a variety of patientâ level factors.MethodsThis was a retrospective, observational cohort study. Pediatric patients (<18 years) who received care between January 2011 and December 2011 at one of 12 EDs participating in the Pediatric Emergency Care Applied Research Network (PECARN) were included. We analyzed demographic factors (including age, sex, and payment source) and clinical factors (including triage, chief complaint, and severity of illness). We measured quality of care using a previously validated implicit review instrument using chart review with a summary score that ranged from 5 to 35. We examined associations between demographic and clinical factors and quality of care using a hierarchical multivariable linear regression model with hospital site as a random effect.ResultsIn the multivariable model, among the 620 ED encounters reviewed, we did not find any association between patient age, sex, race/ethnicity, and payment source and the quality of care delivered. However, we did find that some chief complaint categories were significantly associated with lower than average quality of care, including fever (â 0.65 points in quality, 95% confidence interval [CI] = â 1.24 to â 0.06) and upper respiratory symptoms (â 0.68 points in quality, 95% CI = â 1.30 to â 0.07).ConclusionWe found that quality of ED care delivered to children among a cohort of 12 EDs participating in the PECARN was high and did not differ by patient age, sex, race/ethnicity, and payment source, but did vary by the presenting chief complaint.Peer Reviewedhttps://deepblue.lib.umich.edu/bitstream/2027.42/142981/1/acem13347_am.pdfhttps://deepblue.lib.umich.edu/bitstream/2027.42/142981/2/acem13347-sup-0001-DataSupplementS1.pdfhttps://deepblue.lib.umich.edu/bitstream/2027.42/142981/3/acem13347.pdfhttps://deepblue.lib.umich.edu/bitstream/2027.42/142981/4/acem13347-sup-0002-DataSupplementS2.pd
    corecore