Search results for "Computational complexity"

showing 10 items of 249 documents

Algorithmic Complexity Vulnerability Analysis of a Stateful Firewall

2016

Algorithmic complexity vulnerabilities are an opportunity for an ad-versary to conduct a sophisticated kind of attack i.e. on network infrastructure services. Such attacks take advantage of worst case time or space complexity of algorithms implemented on devices in their software. In this paper we address potential risks introduced by such algorithmic behavior in computer networks in particular on a stateful firewall. First we introduce the idea and theoretical background for the attack. We then describe in full detail a successfully con-ducted attack which takes advantage of the worst case computational complexi-ty of O(n2) of a hash table data structure used to store active sessions. The …

RouterComputer sciencenetwork vulnerabilitiesDenial-of-service attack02 engineering and technologyNetwork topologyComputer securitycomputer.software_genreFirewall (construction)Stateful firewall0202 electrical engineering electronic engineering information engineeringDenial of Servicecomplexity attackcomputational complexitybusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunicationsHash tablese-curitycomputer networksDoSbusinessSegmentation faultcomputerRebootComputer network
researchProduct

Partitionability, coverability and colorability in graphs

2014

Our research are about graph coloring with distance constraints (packing coloring) or neighborhood constraints (Grundy coloring). Let S={si| i in N*} be a non decreasing sequence of integers. An S-packing coloring is a proper coloring such that every set of color i is an si-packing (a set of vertices at pairwise distance greater than si). A graph G is (s1,... ,sk)-colorable if there exists a packing coloring of G with colors 1,... ,k. A Grundy coloring is a proper vertex coloring such that for every vertex of color i, u is adjacent to a vertex of color j, for each ji. These results allow us to determine S-packing coloring of these lattices for several sequences of integers. We examine a cla…

S-coloration de packingDistanceColoration de GrundyPacking coloringLatticDominationGraphColoration de packingComputational complexityParameterized complexity[INFO.INFO-DM] Computer Science [cs]/Discrete Mathematics [cs.DM]ColorationGrapheCombinatoricsRegular graphColoringGrundy coloringGraphe régulierS -packing coloringComplexité algorithmiqueComplexité paramétrée
researchProduct

A Learning Automata Based Solution to Service Selection in Stochastic Environments

2010

Published version of a paper published in the book: Trends in Applied Intelligent Systems. Also available on SpringerLink: http://dx.doi.org/10.1007/978-3-642-13033-5_22 With the abundance of services available in today’s world, identifying those of high quality is becoming increasingly difficult. Reputation systems can offer generic recommendations by aggregating user provided opinions about service quality, however, are prone to ballot stuffing and badmouthing . In general, unfair ratings may degrade the trustworthiness of reputation systems, and changes in service quality over time render previous ratings unreliable. In this paper, we provide a novel solution to the above problems based …

Scheme (programming language)Computational complexity theoryComputer sciencemedia_common.quotation_subject0102 computer and information sciences02 engineering and technologyMachine learningcomputer.software_genreComputer security01 natural sciences0202 electrical engineering electronic engineering information engineeringQuality (business)Simplicitymedia_commoncomputer.programming_languageService qualityLearning automatabusiness.industryVDP::Technology: 500::Information and communication technology: 550VDP::Mathematics and natural science: 400::Information and communication science: 420::Knowledge based systems: 425010201 computation theory & mathematics020201 artificial intelligence & image processingStochastic optimizationArtificial intelligencebusinesscomputerReputation
researchProduct

An Anonymous Delegatable Attribute-based Credential Scheme for a Collaborative E-health Environment

2019

We propose an efficient anonymous, attribute-based credential scheme capable of provisioning multi-level credential delegations. It is integrated with a mechanism to revoke the anonymity of credentials for resolving access disputes and making users accountable for their actions. The proposed scheme has a lower end-user computational complexity in comparison to existing credential schemes with delegatability and has a comparable level of performance with the credential standards of U-Prove and Idemix. Furthermore, we demonstrate how the proposed scheme can be applied to a collaborative e-health environment to provide its users with the necessary anonymous access with delegation capabilities.

Scheme (programming language)Computational complexity theoryDelegationComputer Networks and CommunicationsComputer sciencemedia_common.quotation_subject020206 networking & telecommunicationsProvisioning02 engineering and technologyComputer securitycomputer.software_genreCredentialComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS0202 electrical engineering electronic engineering information engineeringComputingMilieux_COMPUTERSANDSOCIETYcomputermedia_commoncomputer.programming_languageAnonymityACM Transactions on Internet Technology
researchProduct

An Introduction to Computational Complexity

2016

This chapter is not strictly about algebra. However, this chapter offers a set of mathematical and computational instruments that will allow us to introduce several concepts in the following chapters. Moreover, the contents of this chapter are related to algebra as they are ancillary concepts that help (and in some cases allow) the understanding of algebra.

Set (abstract data type)symbols.namesakeTheoretical computer scienceComputational complexity theoryComputer scienceAsymptotic computational complexityWorst-case complexitysymbolsComputational problemAlgebra over a fieldComputational resourceHuffman coding
researchProduct

Fast Channel Estimation in the Transformed Spatial Domain for Analog Millimeter Wave Systems

2021

Fast channel estimation in millimeter-wave (mmWave) systems is a fundamental enabler of high-gain beamforming, which boosts coverage and capacity. The channel estimation stage typically involves an initial beam training process where a subset of the possible beam directions at the transmitter and receiver is scanned along a predefined codebook. Unfortunately, the high number of transmit and receive antennas deployed in mmWave systems increase the complexity of the beam selection and channel estimation tasks. In this work, we tackle the channel estimation problem in analog systems from a different perspective than used by previous works. In particular, we propose to move the channel estimati…

Signal Processing (eess.SP)FOS: Computer and information sciencesBeamformingComputational complexity theoryComputer scienceComputer Science - Information TheoryInformation Theory (cs.IT)Applied MathematicsTransmitterCodebookDirection of arrivalComputer Science ApplicationsTelecomunicaciósymbols.namesakeAdditive white Gaussian noiseTecnologiaRobustness (computer science)FOS: Electrical engineering electronic engineering information engineeringsymbolsElectrical Engineering and Systems Science - Signal ProcessingElectrical and Electronic EngineeringAlgorithmComputer Science::Information TheoryCommunication channelIEEE Transactions on Wireless Communications
researchProduct

Random Feature Approximation for Online Nonlinear Graph Topology Identification

2021

Online topology estimation of graph-connected time series is challenging, especially since the causal dependencies in many real-world networks are nonlinear. In this paper, we propose a kernel-based algorithm for graph topology estimation. The algorithm uses a Fourier-based Random feature approximation to tackle the curse of dimensionality associated with the kernel representations. Exploiting the fact that the real-world networks often exhibit sparse topologies, we propose a group lasso based optimization framework, which is solve using an iterative composite objective mirror descent method, yielding an online algorithm with fixed computational complexity per iteration. The experiments con…

Signal Processing (eess.SP)FOS: Computer and information sciencesComputer Science - Machine LearningComputational complexity theoryComputer scienceApproximation algorithmTopology (electrical circuits)Network topologyMachine Learning (cs.LG)Kernel (statistics)FOS: Electrical engineering electronic engineering information engineeringTopological graph theoryElectrical Engineering and Systems Science - Signal ProcessingOnline algorithmAlgorithmCurse of dimensionality
researchProduct

Inference of Spatio-Temporal Functions over Graphs via Multi-Kernel Kriged Kalman Filtering

2018

Inference of space-time varying signals on graphs emerges naturally in a plethora of network science related applications. A frequently encountered challenge pertains to reconstructing such dynamic processes, given their values over a subset of vertices and time instants. The present paper develops a graph-aware kernel-based kriged Kalman filter that accounts for the spatio-temporal variations, and offers efficient online reconstruction, even for dynamically evolving network topologies. The kernel-based learning framework bypasses the need for statistical information by capitalizing on the smoothness that graph signals exhibit with respect to the underlying graph. To address the challenge o…

Signal Processing (eess.SP)FOS: Computer and information sciencesComputer Science - Machine LearningComputational complexity theoryComputer scienceInferenceMachine Learning (stat.ML)Network scienceMultikernel02 engineering and technologyNetwork topologyLinear spanMachine Learning (cs.LG)Kernel (linear algebra)Matrix (mathematics)Statistics - Machine LearningFOS: Electrical engineering electronic engineering information engineering0202 electrical engineering electronic engineering information engineeringElectrical and Electronic EngineeringElectrical Engineering and Systems Science - Signal Processing020206 networking & telecommunicationsKalman filterSignal Processing020201 artificial intelligence & image processingLaplace operatorAlgorithm
researchProduct

Energy Efficiency Optimization for Multi-cell Massive MIMO : Centralized and Distributed Power Allocation Algorithms

2021

This paper investigates the energy efficiency (EE) optimization in downlink multi-cell massive multiple-input multiple-output (MIMO). In our research, the statistical channel state information (CSI) is exploited to reduce the signaling overhead. To maximize the minimum EE among the neighbouring cells, we design the transmit covariance matrices for each base station (BS). Specifically, optimization schemes for this max-min EE problem are developed, in the centralized and distributed ways, respectively. To obtain the transmit covariance matrices, we first find out the closed-form optimal transmit eigenmatrices for the BS in each cell, and convert the original transmit covariance matrices desi…

Signal Processing (eess.SP)FOS: Computer and information sciencesmallintaminenComputational complexity theoryComputer scienceenergiatehokkuusComputer Science - Information TheoryMIMO02 engineering and technologyPrecoding0203 mechanical engineeringoptimointistatistical CSIalgoritmit0202 electrical engineering electronic engineering information engineeringFOS: Electrical engineering electronic engineering information engineeringOverhead (computing)Electrical and Electronic EngineeringElectrical Engineering and Systems Science - Signal Processingenergy efficiencymax-min fairnessInformation Theory (cs.IT)020206 networking & telecommunications020302 automobile design & engineeringmulti-cell MIMOCovarianceDistributed algorithmChannel state informationConvex optimizationdistributed processingAlgorithm
researchProduct

Quantum counter automata

2011

The question of whether quantum real-time one-counter automata (rtQ1CAs) can outperform their probabilistic counterparts has been open for more than a decade. We provide an affirmative answer to this question, by demonstrating a non-context-free language that can be recognized with perfect soundness by a rtQ1CA. This is the first demonstration of the superiority of a quantum model to the corresponding classical one in the real-time case with an error bound less than 1. We also introduce a generalization of the rtQ1CA, the quantum one-way one-counter automaton (1Q1CA), and show that they too are superior to the corresponding family of probabilistic machines. For this purpose, we provide gene…

SoundnessFOS: Computer and information sciencesQuantum PhysicsGeneralizationComputer scienceProbabilistic logicFOS: Physical sciences0102 computer and information sciences02 engineering and technologyComputational Complexity (cs.CC)01 natural sciencesAutomatonAlgebraComputer Science - Computational Complexity010201 computation theory & mathematics0202 electrical engineering electronic engineering information engineeringComputer Science (miscellaneous)Quantum finite automata020201 artificial intelligence & image processingPoint (geometry)Quantum Physics (quant-ph)Quantum
researchProduct