846 research outputs found
Return times for nonsingular measurable transformations
AbstractLet σ be a nonsingular antiperiodic automorphism of a Lebesgue probability space . Let π = (π1, π2, …, πk, …) be a probability vector with the property that the k's for which πk> 0 is a relatively prime set of integers and ∑i = 1∞ iπi < ∞. Then there is a measurable set B of positive measure such that the relative distribution of return times under σ to B is the given distribution
Parallel Search with no Coordination
We consider a parallel version of a classical Bayesian search problem.
agents are looking for a treasure that is placed in one of the boxes indexed by
according to a known distribution . The aim is to minimize
the expected time until the first agent finds it. Searchers run in parallel
where at each time step each searcher can "peek" into a box. A basic family of
algorithms which are inherently robust is \emph{non-coordinating} algorithms.
Such algorithms act independently at each searcher, differing only by their
probabilistic choices. We are interested in the price incurred by employing
such algorithms when compared with the case of full coordination. We first show
that there exists a non-coordination algorithm, that knowing only the relative
likelihood of boxes according to , has expected running time of at most
, where is the expected running time of the best
fully coordinated algorithm. This result is obtained by applying a refined
version of the main algorithm suggested by Fraigniaud, Korman and Rodeh in
STOC'16, which was designed for the context of linear parallel search.We then
describe an optimal non-coordinating algorithm for the case where the
distribution is known. The running time of this algorithm is difficult to
analyse in general, but we calculate it for several examples. In the case where
is uniform over a finite set of boxes, then the algorithm just checks boxes
uniformly at random among all non-checked boxes and is essentially times
worse than the coordinating algorithm.We also show simple algorithms for Pareto
distributions over boxes. That is, in the case where for
, we suggest the following algorithm: at step choose uniformly
from the boxes unchecked in ,
where . It turns out this algorithm is asymptotically
optimal, and runs about times worse than the case of full coordination
Rendezvous on a Line by Location-Aware Robots Despite the Presence of Byzantine Faults
A set of mobile robots is placed at points of an infinite line. The robots
are equipped with GPS devices and they may communicate their positions on the
line to a central authority. The collection contains an unknown subset of
"spies", i.e., byzantine robots, which are indistinguishable from the
non-faulty ones. The set of the non-faulty robots need to rendezvous in the
shortest possible time in order to perform some task, while the byzantine
robots may try to delay their rendezvous for as long as possible. The problem
facing a central authority is to determine trajectories for all robots so as to
minimize the time until the non-faulty robots have rendezvoused. The
trajectories must be determined without knowledge of which robots are faulty.
Our goal is to minimize the competitive ratio between the time required to
achieve the first rendezvous of the non-faulty robots and the time required for
such a rendezvous to occur under the assumption that the faulty robots are
known at the start. We provide a bounded competitive ratio algorithm, where the
central authority is informed only of the set of initial robot positions,
without knowing which ones or how many of them are faulty. When an upper bound
on the number of byzantine robots is known to the central authority, we provide
algorithms with better competitive ratios. In some instances we are able to
show these algorithms are optimal
Revisiting the Problem of Searching on a Line
We revisit the problem of searching for a target at an unknown location on a
line when given upper and lower bounds on the distance D that separates the
initial position of the searcher from the target. Prior to this work, only
asymptotic bounds were known for the optimal competitive ratio achievable by
any search strategy in the worst case. We present the first tight bounds on the
exact optimal competitive ratio achievable, parameterized in terms of the given
bounds on D, along with an optimal search strategy that achieves this
competitive ratio. We prove that this optimal strategy is unique. We
characterize the conditions under which an optimal strategy can be computed
exactly and, when it cannot, we explain how numerical methods can be used
efficiently. In addition, we answer several related open questions, including
the maximal reach problem, and we discuss how to generalize these results to m
rays, for any m >= 2
Deterministic meeting of sniffing agents in the plane
Two mobile agents, starting at arbitrary, possibly different times from
arbitrary locations in the plane, have to meet. Agents are modeled as discs of
diameter 1, and meeting occurs when these discs touch. Agents have different
labels which are integers from the set of 0 to L-1. Each agent knows L and
knows its own label, but not the label of the other agent. Agents are equipped
with compasses and have synchronized clocks. They make a series of moves. Each
move specifies the direction and the duration of moving. This includes a null
move which consists in staying inert for some time, or forever. In a non-null
move agents travel at the same constant speed, normalized to 1. We assume that
agents have sensors enabling them to estimate the distance from the other agent
(defined as the distance between centers of discs), but not the direction
towards it. We consider two models of estimation. In both models an agent reads
its sensor at the moment of its appearance in the plane and then at the end of
each move. This reading (together with the previous ones) determines the
decision concerning the next move. In both models the reading of the sensor
tells the agent if the other agent is already present. Moreover, in the
monotone model, each agent can find out, for any two readings in moments t1 and
t2, whether the distance from the other agent at time t1 was smaller, equal or
larger than at time t2. In the weaker binary model, each agent can find out, at
any reading, whether it is at distance less than \r{ho} or at distance at least
\r{ho} from the other agent, for some real \r{ho} > 1 unknown to them. Such
distance estimation mechanism can be implemented, e.g., using chemical sensors.
Each agent emits some chemical substance (scent), and the sensor of the other
agent detects it, i.e., sniffs. The intensity of the scent decreases with the
distance.Comment: A preliminary version of this paper appeared in the Proc. 23rd
International Colloquium on Structural Information and Communication
Complexity (SIROCCO 2016), LNCS 998
Encrypt-to-self:Securely outsourcing storage
We put forward a symmetric encryption primitive tailored towards a specific application: outsourced storage. The setting assumes a memory-bounded computing device that inflates the amount of volatile or permanent memory available to it by letting other (untrusted) devices hold encryptions of information that they return on request. For instance, web servers typically hold for each of the client connections they manage a multitude of data, ranging from user preferences to technical information like database credentials. If the amount of data per session is considerable, busy servers sooner or later run out of memory. One admissible solution to this is to let the server encrypt the session data to itself and to let the client store the ciphertext, with the agreement that the client reproduce the ciphertext in each subsequent request (e.g., via a cookie) so that the session data can be recovered when required. In this article we develop the cryptographic mechanism that should be used to achieve confidential and authentic data storage in the encrypt-to-self setting, i.e., where encryptor and decryptor coincide and constitute the only entity holding keys. We argue that standard authenticated encryption represents only a suboptimal solution for preserving confidentiality, as much as message authentication codes are suboptimal for preserving authenticity. The crucial observation is that such schemes instantaneously give up on all security promises the moment the key is compromised. In contrast, data protected with our new primitive remains fully integrity protected and unmalleable. In the course of this paper we develop a formal model for encrypt-to-self systems, show that it solves the outsourced storage problem, propose surprisingly efficient provably secure constructions, and report on our implementations
NF-κB: A lesson in family values
A set of mobile robots (represented as points) is distributed in the Cartesian plane. The collection contains an unknown subset of byzantine robots which are indistinguishable from the reliable ones. The reliable robots need to gather, i.e., arrive to a configuration in which at the same time, all of them occupy the same point on the plane. The robots are equipped with GPS devices and at the beginning of the gathering process they communicate the Cartesian coordinates of their respective positions to the central authority. On the basis of this information, without the knowledge of which robots are faulty, the central authority designs a trajectory for every robot. The central authority aims to provide the trajectories which result in the shortest possible gathering time of the healthy robots. The efficiency of a gathering strategy is measured by its competitive ratio, i.e., the maximal ratio between the time required for gathering achieved by the given trajectories and the optimal time required for gathering in the offline case, i.e., when the faulty robots are known to the central authority in advance. The role of the byzantine robots, controlled by the adversary, is to act so that the gathering is delayed and the resulting competitive ratio is maximized. The objective of our paper is to propose efficient algorithms when the central authority is aware of an upper bound on the number of byzantine robots. We give optimal algorithms for collections of robots known to contain at most one faulty robot. When the proportion of byzantine robots is known to be less than one half or one third, we provide algorithms with small constant competitive ratios. We also propose algorithms with bounded competitive ratio in the case where the proportion of faulty robots is arbitrary
Evacuating Two Robots from a Disk: A Second Cut
We present an improved algorithm for the problem of evacuating two robots
from the unit disk via an unknown exit on the boundary. Robots start at the
center of the disk, move at unit speed, and can only communicate locally. Our
algorithm improves previous results by Brandt et al. [CIAC'17] by introducing a
second detour through the interior of the disk. This allows for an improved
evacuation time of . The best known lower bound of was shown by
Czyzowicz et al. [CIAC'15].Comment: 19 pages, 5 figures. This is the full version of the paper with the
same title accepted in the 26th International Colloquium on Structural
Information and Communication Complexity (SIROCCO'19
Time-Energy Tradeoffs for Evacuation by Two Robots in the Wireless Model
Two robots stand at the origin of the infinite line and are tasked with
searching collaboratively for an exit at an unknown location on the line. They
can travel at maximum speed and can change speed or direction at any time.
The two robots can communicate with each other at any distance and at any time.
The task is completed when the last robot arrives at the exit and evacuates. We
study time-energy tradeoffs for the above evacuation problem. The evacuation
time is the time it takes the last robot to reach the exit. The energy it takes
for a robot to travel a distance at speed is measured as . The
total and makespan evacuation energies are respectively the sum and maximum of
the energy consumption of the two robots while executing the evacuation
algorithm.
Assuming that the maximum speed is , and the evacuation time is at most
, where is the distance of the exit from the origin, we study the
problem of minimizing the total energy consumption of the robots. We prove that
the problem is solvable only for . For the case , we give an
optimal algorithm, and give upper bounds on the energy for the case .
We also consider the problem of minimizing the evacuation time when the
available energy is bounded by . Surprisingly, when is a
constant, independent of the distance of the exit from the origin, we prove
that evacuation is possible in time , and this is optimal up
to a logarithmic factor. When is linear in , we give upper bounds
on the evacuation time.Comment: This is the full version of the paper with the same title which will
appear in the proceedings of the 26th International Colloquium on Structural
Information and Communication Complexity (SIROCCO'19) L'Aquila, Italy during
July 1-4, 201
- …