16,235 research outputs found

    Stochastic Combinatorial Optimization via Poisson Approximation

    Full text link
    We study several stochastic combinatorial problems, including the expected utility maximization problem, the stochastic knapsack problem and the stochastic bin packing problem. A common technical challenge in these problems is to optimize some function of the sum of a set of random variables. The difficulty is mainly due to the fact that the probability distribution of the sum is the convolution of a set of distributions, which is not an easy objective function to work with. To tackle this difficulty, we introduce the Poisson approximation technique. The technique is based on the Poisson approximation theorem discovered by Le Cam, which enables us to approximate the distribution of the sum of a set of random variables using a compound Poisson distribution. We first study the expected utility maximization problem introduced recently [Li and Despande, FOCS11]. For monotone and Lipschitz utility functions, we obtain an additive PTAS if there is a multidimensional PTAS for the multi-objective version of the problem, strictly generalizing the previous result. For the stochastic bin packing problem (introduced in [Kleinberg, Rabani and Tardos, STOC97]), we show there is a polynomial time algorithm which uses at most the optimal number of bins, if we relax the size of each bin and the overflow probability by eps. For stochastic knapsack, we show a 1+eps-approximation using eps extra capacity, even when the size and reward of each item may be correlated and cancelations of items are allowed. This generalizes the previous work [Balghat, Goel and Khanna, SODA11] for the case without correlation and cancelation. Our algorithm is also simpler. We also present a factor 2+eps approximation algorithm for stochastic knapsack with cancelations. the current known approximation factor of 8 [Gupta, Krishnaswamy, Molinaro and Ravi, FOCS11].Comment: 42 pages, 1 figure, Preliminary version appears in the Proceeding of the 45th ACM Symposium on the Theory of Computing (STOC13

    Projection method for droplet dynamics on groove-textured surface with merging and splitting

    Full text link
    The geometric motion of small droplets placed on an impermeable textured substrate is mainly driven by the capillary effect, the competition among surface tensions of three phases at the moving contact lines, and the impermeable substrate obstacle. After introducing an infinite dimensional manifold with an admissible tangent space on the boundary of the manifold, by Onsager's principle for an obstacle problem, we derive the associated parabolic variational inequalities. These variational inequalities can be used to simulate the contact line dynamics with unavoidable merging and splitting of droplets due to the impermeable obstacle. To efficiently solve the parabolic variational inequality, we propose an unconditional stable explicit boundary updating scheme coupled with a projection method. The explicit boundary updating efficiently decouples the computation of the motion by mean curvature of the capillary surface and the moving contact lines. Meanwhile, the projection step efficiently splits the difficulties brought by the obstacle and the motion by mean curvature of the capillary surface. Furthermore, we prove the unconditional stability of the scheme and present an accuracy check. The convergence of the proposed scheme is also proved using a nonlinear Trotter-Kato's product formula under the pinning contact line assumption. After incorporating the phase transition information at splitting points, several challenging examples including splitting and merging of droplets are demonstrated.Comment: 26 page

    Enhancement of Secrecy of Block Ciphered Systems by Deliberate Noise

    Full text link
    This paper considers the problem of end-end security enhancement by resorting to deliberate noise injected in ciphertexts. The main goal is to generate a degraded wiretap channel in application layer over which Wyner-type secrecy encoding is invoked to deliver additional secure information. More specifically, we study secrecy enhancement of DES block cipher working in cipher feedback model (CFB) when adjustable and intentional noise is introduced into encrypted data in application layer. A verification strategy in exhaustive search step of linear attack is designed to allow Eve to mount a successful attack in the noisy environment. Thus, a controllable wiretap channel is created over multiple frames by taking advantage of errors in Eve's cryptanalysis, whose secrecy capacity is found for the case of known channel states at receivers. As a result, additional secure information can be delivered by performing Wyner type secrecy encoding over super-frames ahead of encryption, namely, our proposed secrecy encoding-then-encryption scheme. These secrecy bits could be taken as symmetric keys for upcoming frames. Numerical results indicate that a sufficiently large secrecy rate can be achieved by selective noise addition.Comment: 11 pages, 8 figures, journa

    High-dimensional limits of eigenvalue distributions for general Wishart process

    Get PDF
    In this article, we obtain an equation for the high-dimensional limit measure of eigenvalues of generalized Wishart processes, and the results is extended to random particle systems that generalize SDEs of eigenvalues. We also introduce a new set of conditions on the coefficient matrices for the existence and uniqueness of a strong solution for the SDEs of eigenvalues. The equation of the limit measure is further discussed assuming self-similarity on the eigenvalues.Comment: 28 page
    corecore