Loading
description Publicationkeyboard_double_arrow_right Article , Preprint , Conference object 2017Springer Science and Business Media LLC NSF | AF: Small: Random Process... (1420934)Jingcheng Liu; Alistair Sinclair; Piyush Srivastava;Jingcheng Liu; Alistair Sinclair; Piyush Srivastava;We study the problem of approximating the partition function of the ferromagnetic Ising model in graphs and hypergraphs. Our first result is a deterministic approximation scheme (an FPTAS) for the partition function in bounded degree graphs that is valid over the entire range of parameters $\beta$ (the interaction) and $\lambda$ (the external field), except for the case $\vert{\lambda}\vert=1$ (the "zero-field" case). A randomized algorithm (FPRAS) for all graphs, and all $\beta,\lambda$, has long been known. Unlike most other deterministic approximation algorithms for problems in statistical physics and counting, our algorithm does not rely on the "decay of correlations" property. Rather, we exploit and extend machinery developed recently by Barvinok, and Patel and Regts, based on the location of the complex zeros of the partition function, which can be seen as an algorithmic realization of the classical Lee-Yang approach to phase transitions. Our approach extends to the more general setting of the Ising model on hypergraphs of bounded degree and edge size, where no previous algorithms (even randomized) were known for a wide range of parameters. In order to achieve this extension, we establish a tight version of the Lee-Yang theorem for the Ising model on hypergraphs, improving a classical result of Suzuki and Fisher. Comment: clarified presentation of combinatorial arguments, added new results on optimality of univariate Lee-Yang theorems
Journal of Statistic... arrow_drop_down Journal of Statistical PhysicsArticle . 2018License: http://www.springer.com/tdmData sources: Crossrefadd ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.Do the share buttons not appear? Please make sure, any blocking addon is disabled, and then reload the page.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1007/s10955-018-2199-2&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eu23 citations 23 popularity Average influence Average impulse Average Powered by BIP!
description Publicationkeyboard_double_arrow_right Other literature type , Article 2009 France EnglishHAL CCSD Nacim Ramdani; Nacim Meslem; Yves Candau;Nacim Ramdani; Nacim Meslem; Yves Candau;International audience; In this paper, we show how to compute an over-approximation for the reachable set of uncertain nonlinear continuous dynamical systems by using guaranteed set integration. We introduce two ways to do so. The first one is a full interval method which handles whole domains for set computation and relies on state-of-the-art validated numerical integration methods. The second one relies on comparison theorems for differential inequalities in order to bracket the uncertain dynamics between two dynamical systems where there is no uncertainty. Since the derived bracketing systems are piecewise Ck-differentiable functions, validated numerical integration methods cannot be used directly. Hence, our contribution resides in the use of hybrid automata to model the bounding systems. We give a rule for building these automata and we show how to run them and address mode switching in a guaranteed way in order to compute the over approximation for the reachable set. The computational cost of our method is also analyzed and shown to be smaller that the one of classical interval techniques. Sufficient conditions are given which ensure the epsiv-practical stability of the enclosures given by our hybrid bounding method. Two examples are also given which show that the performance of our method is very promising.
IEEE Transactions on... arrow_drop_down INRIA a CCSD electronic archive serverArticle . 2009Data sources: INRIA a CCSD electronic archive serveradd ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.Do the share buttons not appear? Please make sure, any blocking addon is disabled, and then reload the page.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1109/tac.2009.2028974&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eu76 citations 76 popularity Average influence Average impulse Average Powered by BIP!
description Publicationkeyboard_double_arrow_right Article 2020 EnglishElsevier Daiki Miyahara; Yu-ichi Hayashi; Takaaki Mizuki; Hideaki Sone;Daiki Miyahara; Yu-ichi Hayashi; Takaaki Mizuki; Hideaki Sone;handle: 10097/00133826
Abstract Yao's millionaire protocol enables Alice and Bob to know whether or not Bob is richer than Alice by using a public-key cryptosystem without revealing the actual amounts of their properties. In this paper, we present simple and practical implementations of Yao's millionaire protocol using a physical deck of playing cards; we straightforwardly implement the idea behind Yao's millionaire protocol so that even non-experts can easily understand their correctness and secrecy. Our implementations are based partially on the previous card-based scheme proposed by Nakai, Tokushige, Misawa, Iwamoto, and Ohta; their scheme admits players' private actions on a sequence of cards called Private Permutation (PP), implying that a malicious player could make an active attack (for example, he/she could exchange some of the cards stealthily when doing such a private action). By contrast, our implementations rely on a familiar shuffling operation called a random cut, and hence, they can be conducted completely publicly so as to avoid any active attack. More specifically, we present two card-based implementations of Yao's millionaire protocol; one uses a two-colored deck of cards (which consists of black and red cards), and the other uses a standard deck of playing cards. Furthermore, we also provide card-based protocols that rely on a logical circuit representing the comparison.
Theoretical Computer... arrow_drop_down add ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.Do the share buttons not appear? Please make sure, any blocking addon is disabled, and then reload the page.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1016/j.tcs.2019.11.005&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eu25 citations 25 popularity Average influence Average impulse Average Powered by BIP!
description Publicationkeyboard_double_arrow_right Conference object 2018 Belgium EnglishACM Press Francois Aubry; Stefano Vissicchio; Olivier Bonaventure; Yves Deville;Francois Aubry; Stefano Vissicchio; Olivier Bonaventure; Yves Deville;handle: 2078.1/214183
Motivated by conversations with operators and by possibilities to unlock future Internet-based applications, we study how to enable Internet Service Providers (ISPs) to reliably offer connectivity through disjoint paths as an advanced, value-added service. As ISPs are increasingly deploying Segment Routing (SR), we focus on implementing such service with SR. We introduce the concept of robustly disjoint paths, pairs of paths that are constructed to remain disjoint even after an input set of failures, with no external intervention (e.g., configuration change). We extend the routing theory, study the problem complexity, and design efficient algorithms to automatically compute SR-based robustly disjoint paths. Our algorithms enable a fully automated approach to offer the disjoint-path connectivity, based on configuration synthesis. Our evaluation on real topologies shows that such an approach is practical, and scales to large ISP networks.
Dépôt Institutionel ... arrow_drop_down add ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.Do the share buttons not appear? Please make sure, any blocking addon is disabled, and then reload the page.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1145/3281411.3281424&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eu15 citations 15 popularity Average influence Average impulse Average Powered by BIP!
description Publicationkeyboard_double_arrow_right Part of book or chapter of book 2018Springer International Publishing Ishai Kones; Asaf Levin;Ishai Kones; Asaf Levin;We consider a general load balancing problem on parallel machines. Our machine environment in particular generalizes the standard models of identical machines, and the model of uniformly related machines, as well as machines with a constant number of types, and machines with activation costs. The objective functions that we consider contain in particular the makespan objective and the minimization of the \(\ell _p\)-norm of the vector of loads of the machines, and each case allow the possibility of job rejection.
http://arxiv.org/pdf... arrow_drop_down https://doi.org/10.1007/978-3-...Part of book or chapter of book . 2018License: http://www.springer.com/tdmData sources: Crossrefadd ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.Do the share buttons not appear? Please make sure, any blocking addon is disabled, and then reload the page.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1007/978-3-319-94418-0_23&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eu2 citations 2 popularity Average influence Average impulse Average Powered by BIP!
description Publicationkeyboard_double_arrow_right Part of book or chapter of book 2012Springer Berlin Heidelberg NSERCJacques Carette; Russell O'Connor;Jacques Carette; Russell O'Connor;We motivate and give semantics to theory presentation combinators as the foundational building blocks for a scalable library of theories. The key observation is that the category of contexts and fibered categories are the ideal theoretical tools for this purpose.
http://arxiv.org/pdf... arrow_drop_down add ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.Do the share buttons not appear? Please make sure, any blocking addon is disabled, and then reload the page.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1007/978-3-642-31374-5_14&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eu12 citations 12 popularity Average influence Average impulse Average Powered by BIP!
description Publicationkeyboard_double_arrow_right Article , Preprint 2017Institute of Electrical and Electronics Engineers (IEEE) NSERCNavid Nasr Esfahani; Ian Goldberg; Douglas R. Stinson;Navid Nasr Esfahani; Ian Goldberg; Douglas R. Stinson;A $(t, s, v)$-all-or-nothing transform is a bijective mapping defined on $s$-tuples over an alphabet of size $v$, which satisfies the condition that the values of any $t$ input co-ordinates are completely undetermined, given only the values of any $s-t$ output co-ordinates. The main question we address in this paper is: for which choices of parameters does a $(t, s, v)$-all-or-nothing transform (AONT) exist? More specifically, if we fix $t$ and $v$, we want to determine the maximum integer $s$ such that a $(t, s, v)$-AONT exists. We mainly concentrate on the case $t=2$ for arbitrary values of $v$, where we obtain various necessary as well as sufficient conditions for existence of these objects. We consider both linear and general (linear or nonlinear) AONT. We also show some connections between AONT, orthogonal arrays and resilient functions. Comment: 13 pages
arXiv.org e-Print Ar... arrow_drop_down add ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.Do the share buttons not appear? Please make sure, any blocking addon is disabled, and then reload the page.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1109/tit.2017.2780233&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eu7 citations 7 popularity Average influence Average impulse Average Powered by BIP!
description Publicationkeyboard_double_arrow_right Article , Preprint 2016Embargo end date: 01 Jan 2016arXiv Nathan Bowler; Stefan Geschke; Max Pitz;Nathan Bowler; Stefan Geschke; Max Pitz;Diestel and Leader have characterised connected graphs that admit a normal spanning tree via two classes of forbidden minors. One class are Halin's $(\aleph_0,\aleph_1)$-graphs: bipartite graphs with bipartition $(\mathbb{N},B)$ such that $B$ is uncountable and every vertex of $B$ has infinite degree. Our main result is that under Martin's Axiom and the failure of the Continuum Hypothesis, the class of forbidden $(\aleph_0,\aleph_1)$-graphs in Diestel and Leader's result can be replaced by one single instance of such a graph. Under CH, however, the class of $(\aleph_0,\aleph_1)$-graphs contains minor-incomparable elements, namely graphs of binary type, and $\mathcal{U}$-indivisible graphs. Assuming CH, Diestel and Leader asked whether every $(\aleph_0,\aleph_1)$-graph has an $(\aleph_0,\aleph_1)$-minor that is either indivisible or of binary type, and whether any two $\mathcal{U}$-indivisible graphs are necessarily minors of each other. For both questions, we construct examples showing that the answer is in the negative. Comment: 21 pages
arXiv.org e-Print Ar... arrow_drop_down add ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.Do the share buttons not appear? Please make sure, any blocking addon is disabled, and then reload the page.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.48550/arxiv.1609.01042&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eu5 citations 5 popularity Average influence Average impulse Average Powered by BIP!
description Publicationkeyboard_double_arrow_right Article 2005 United Kingdom EnglishVincent Danos; Elham Kashefi; Prakash Panangaden;Vincent Danos; Elham Kashefi; Prakash Panangaden;We present a new set of generators for unitary maps over ${\mathbb{C}}^{2}$ which differs from the traditional rotation-based generating set in that it uses a single-parameter family of unitaries $J(\ensuremath{\alpha})$. These generators are implementable in the one-way model [Raussendorf and Briegel, Phys. Rev. Lett. 86, 5188 (2001)] using only two qubits, and lead to both parsimonious and robust implementations of general unitaries. As an illustration, we give an implementation of the controlled-$U$ family which uses only 14 qubits, and has a 2-colorable underlying entanglement graph (known to yield robust entangled states).
add ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.Do the share buttons not appear? Please make sure, any blocking addon is disabled, and then reload the page.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1103/physreva.72.064301&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eu25 citations 25 popularity Average influence Average impulse Average Powered by BIP!
description Publicationkeyboard_double_arrow_right Conference object 2012 France EnglishHAL CCSD Soumaya Amdouni; Djamal Benslimane; Mahmoud Barhamgi; Allel Hadjali; Rim Faiz; Parisa Ghodous;International audience; Data Mashup is a special class of applications mashup thatcombines data elements from multiple data sources (that are often ex-ported as data web services) to respond to transient business needs onthe y. In this paper, we propose a semantic model for data servicesalong with a declarative approach for creating data mashups withoutany programming involved. Given a query formulated over domain on-tologies, and a set of preferences modeled using the fuzzy set theory,our approach selects the relevant data services based on their semanticmodeling using an RDF query rewriting algorithm. Selected services arethen orchestrated using a ranking-aware algebra to rank their returnedresults based on users preferences at the data mashup execution time.
Hyper Article en Lig... arrow_drop_down Hyper Article en LigneOther literature type . Part of book or chapter of book . 2012Mémoires en Sciences de l'Information et de la Communication; Hal-DiderotConference object . 2012add ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.Do the share buttons not appear? Please make sure, any blocking addon is disabled, and then reload the page.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1007/978-3-642-34002-4_32&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eu1 citations 1 popularity Average influence Average impulse Average Powered by BIP!
Loading
description Publicationkeyboard_double_arrow_right Article , Preprint , Conference object 2017Springer Science and Business Media LLC NSF | AF: Small: Random Process... (1420934)Jingcheng Liu; Alistair Sinclair; Piyush Srivastava;Jingcheng Liu; Alistair Sinclair; Piyush Srivastava;We study the problem of approximating the partition function of the ferromagnetic Ising model in graphs and hypergraphs. Our first result is a deterministic approximation scheme (an FPTAS) for the partition function in bounded degree graphs that is valid over the entire range of parameters $\beta$ (the interaction) and $\lambda$ (the external field), except for the case $\vert{\lambda}\vert=1$ (the "zero-field" case). A randomized algorithm (FPRAS) for all graphs, and all $\beta,\lambda$, has long been known. Unlike most other deterministic approximation algorithms for problems in statistical physics and counting, our algorithm does not rely on the "decay of correlations" property. Rather, we exploit and extend machinery developed recently by Barvinok, and Patel and Regts, based on the location of the complex zeros of the partition function, which can be seen as an algorithmic realization of the classical Lee-Yang approach to phase transitions. Our approach extends to the more general setting of the Ising model on hypergraphs of bounded degree and edge size, where no previous algorithms (even randomized) were known for a wide range of parameters. In order to achieve this extension, we establish a tight version of the Lee-Yang theorem for the Ising model on hypergraphs, improving a classical result of Suzuki and Fisher. Comment: clarified presentation of combinatorial arguments, added new results on optimality of univariate Lee-Yang theorems
Journal of Statistic... arrow_drop_down Journal of Statistical PhysicsArticle . 2018License: http://www.springer.com/tdmData sources: Crossrefadd ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.Do the share buttons not appear? Please make sure, any blocking addon is disabled, and then reload the page.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1007/s10955-018-2199-2&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eu23 citations 23 popularity Average influence Average impulse Average Powered by BIP!
description Publicationkeyboard_double_arrow_right Other literature type , Article 2009 France EnglishHAL CCSD Nacim Ramdani; Nacim Meslem; Yves Candau;Nacim Ramdani; Nacim Meslem; Yves Candau;International audience; In this paper, we show how to compute an over-approximation for the reachable set of uncertain nonlinear continuous dynamical systems by using guaranteed set integration. We introduce two ways to do so. The first one is a full interval method which handles whole domains for set computation and relies on state-of-the-art validated numerical integration methods. The second one relies on comparison theorems for differential inequalities in order to bracket the uncertain dynamics between two dynamical systems where there is no uncertainty. Since the derived bracketing systems are piecewise Ck-differentiable functions, validated numerical integration methods cannot be used directly. Hence, our contribution resides in the use of hybrid automata to model the bounding systems. We give a rule for building these automata and we show how to run them and address mode switching in a guaranteed way in order to compute the over approximation for the reachable set. The computational cost of our method is also analyzed and shown to be smaller that the one of classical interval techniques. Sufficient conditions are given which ensure the epsiv-practical stability of the enclosures given by our hybrid bounding method. Two examples are also given which show that the performance of our method is very promising.
IEEE Transactions on... arrow_drop_down INRIA a CCSD electronic archive serverArticle . 2009Data sources: INRIA a CCSD electronic archive serveradd ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.Do the share buttons not appear? Please make sure, any blocking addon is disabled, and then reload the page.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1109/tac.2009.2028974&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eu76 citations 76 popularity Average influence Average impulse Average Powered by BIP!
description Publicationkeyboard_double_arrow_right Article 2020 EnglishElsevier Daiki Miyahara; Yu-ichi Hayashi; Takaaki Mizuki; Hideaki Sone;Daiki Miyahara; Yu-ichi Hayashi; Takaaki Mizuki; Hideaki Sone;handle: 10097/00133826
Abstract Yao's millionaire protocol enables Alice and Bob to know whether or not Bob is richer than Alice by using a public-key cryptosystem without revealing the actual amounts of their properties. In this paper, we present simple and practical implementations of Yao's millionaire protocol using a physical deck of playing cards; we straightforwardly implement the idea behind Yao's millionaire protocol so that even non-experts can easily understand their correctness and secrecy. Our implementations are based partially on the previous card-based scheme proposed by Nakai, Tokushige, Misawa, Iwamoto, and Ohta; their scheme admits players' private actions on a sequence of cards called Private Permutation (PP), implying that a malicious player could make an active attack (for example, he/she could exchange some of the cards stealthily when doing such a private action). By contrast, our implementations rely on a familiar shuffling operation called a random cut, and hence, they can be conducted completely publicly so as to avoid any active attack. More specifically, we present two card-based implementations of Yao's millionaire protocol; one uses a two-colored deck of cards (which consists of black and red cards), and the other uses a standard deck of playing cards. Furthermore, we also provide card-based protocols that rely on a logical circuit representing the comparison.
Theoretical Computer... arrow_drop_down add ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.Do the share buttons not appear? Please make sure, any blocking addon is disabled, and then reload the page.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1016/j.tcs.2019.11.005&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eu25 citations 25 popularity Average influence Average impulse Average Powered by BIP!
description Publicationkeyboard_double_arrow_right Conference object 2018 Belgium EnglishACM Press Francois Aubry; Stefano Vissicchio; Olivier Bonaventure; Yves Deville;Francois Aubry; Stefano Vissicchio; Olivier Bonaventure; Yves Deville;handle: 2078.1/214183
Motivated by conversations with operators and by possibilities to unlock future Internet-based applications, we study how to enable Internet Service Providers (ISPs) to reliably offer connectivity through disjoint paths as an advanced, value-added service. As ISPs are increasingly deploying Segment Routing (SR), we focus on implementing such service with SR. We introduce the concept of robustly disjoint paths, pairs of paths that are constructed to remain disjoint even after an input set of failures, with no external intervention (e.g., configuration change). We extend the routing theory, study the problem complexity, and design efficient algorithms to automatically compute SR-based robustly disjoint paths. Our algorithms enable a fully automated approach to offer the disjoint-path connectivity, based on configuration synthesis. Our evaluation on real topologies shows that such an approach is practical, and scales to large ISP networks.
Dépôt Institutionel ... arrow_drop_down add ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.Do the share buttons not appear? Please make sure, any blocking addon is disabled, and then reload the page.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1145/3281411.3281424&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eu15 citations 15 popularity Average influence Average impulse Average Powered by BIP!
description Publicationkeyboard_double_arrow_right Part of book or chapter of book 2018Springer International Publishing Ishai Kones; Asaf Levin;Ishai Kones; Asaf Levin;We consider a general load balancing problem on parallel machines. Our machine environment in particular generalizes the standard models of identical machines, and the model of uniformly related machines, as well as machines with a constant number of types, and machines with activation costs. The objective functions that we consider contain in particular the makespan objective and the minimization of the \(\ell _p\)-norm of the vector of loads of the machines, and each case allow the possibility of job rejection.
http://arxiv.org/pdf... arrow_drop_down https://doi.org/10.1007/978-3-...Part of book or chapter of book . 2018License: http://www.springer.com/tdmData sources: Crossrefadd ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.Do the share buttons not appear? Please make sure, any blocking addon is disabled, and then reload the page.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1007/978-3-319-94418-0_23&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eu2 citations 2 popularity Average influence Average impulse Average Powered by BIP!
description Publicationkeyboard_double_arrow_right Part of book or chapter of book 2012Springer Berlin Heidelberg NSERCJacques Carette; Russell O'Connor;Jacques Carette; Russell O'Connor;We motivate and give semantics to theory presentation combinators as the foundational building blocks for a scalable library of theories. The key observation is that the category of contexts and fibered categories are the ideal theoretical tools for this purpose.
http://arxiv.org/pdf... arrow_drop_down add ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.Do the share buttons not appear? Please make sure, any blocking addon is disabled, and then reload the page.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1007/978-3-642-31374-5_14&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eu12 citations 12 popularity Average influence Average impulse Average Powered by BIP!
description Publicationkeyboard_double_arrow_right Article , Preprint 2017Institute of Electrical and Electronics Engineers (IEEE) NSERCNavid Nasr Esfahani; Ian Goldberg; Douglas R. Stinson;Navid Nasr Esfahani; Ian Goldberg; Douglas R. Stinson;A $(t, s, v)$-all-or-nothing transform is a bijective mapping defined on $s$-tuples over an alphabet of size $v$, which satisfies the condition that the values of any $t$ input co-ordinates are completely undetermined, given only the values of any $s-t$ output co-ordinates. The main question we address in this paper is: for which choices of parameters does a $(t, s, v)$-all-or-nothing transform (AONT) exist? More specifically, if we fix $t$ and $v$, we want to determine the maximum integer $s$ such that a $(t, s, v)$-AONT exists. We mainly concentrate on the case $t=2$ for arbitrary values of $v$, where we obtain various necessary as well as sufficient conditions for existence of these objects. We consider both linear and general (linear or nonlinear) AONT. We also show some connections between AONT, orthogonal arrays and resilient functions. Comment: 13 pages
arXiv.org e-Print Ar... arrow_drop_down add ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.Do the share buttons not appear? Please make sure, any blocking addon is disabled, and then reload the page.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1109/tit.2017.2780233&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eu7 citations 7 popularity Average influence Average impulse Average Powered by BIP!
description Publicationkeyboard_double_arrow_right Article , Preprint 2016Embargo end date: 01 Jan 2016arXiv Nathan Bowler; Stefan Geschke; Max Pitz;Nathan Bowler; Stefan Geschke; Max Pitz;Diestel and Leader have characterised connected graphs that admit a normal spanning tree via two classes of forbidden minors. One class are Halin's $(\aleph_0,\aleph_1)$-graphs: bipartite graphs with bipartition $(\mathbb{N},B)$ such that $B$ is uncountable and every vertex of $B$ has infinite degree. Our main result is that under Martin's Axiom and the failure of the Continuum Hypothesis, the class of forbidden $(\aleph_0,\aleph_1)$-graphs in Diestel and Leader's result can be replaced by one single instance of such a graph. Under CH, however, the class of $(\aleph_0,\aleph_1)$-graphs contains minor-incomparable elements, namely graphs of binary type, and $\mathcal{U}$-indivisible graphs. Assuming CH, Diestel and Leader asked whether every $(\aleph_0,\aleph_1)$-graph has an $(\aleph_0,\aleph_1)$-minor that is either indivisible or of binary type, and whether any two $\mathcal{U}$-indivisible graphs are necessarily minors of each other. For both questions, we construct examples showing that the answer is in the negative. Comment: 21 pages
arXiv.org e-Print Ar... arrow_drop_down add ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.Do the share buttons not appear? Please make sure, any blocking addon is disabled, and then reload the page.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.48550/arxiv.1609.01042&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eu5 citations 5 popularity Average influence Average impulse Average Powered by BIP!
description Publicationkeyboard_double_arrow_right Article 2005 United Kingdom EnglishVincent Danos; Elham Kashefi; Prakash Panangaden;Vincent Danos; Elham Kashefi; Prakash Panangaden;We present a new set of generators for unitary maps over ${\mathbb{C}}^{2}$ which differs from the traditional rotation-based generating set in that it uses a single-parameter family of unitaries $J(\ensuremath{\alpha})$. These generators are implementable in the one-way model [Raussendorf and Briegel, Phys. Rev. Lett. 86, 5188 (2001)] using only two qubits, and lead to both parsimonious and robust implementations of general unitaries. As an illustration, we give an implementation of the controlled-$U$ family which uses only 14 qubits, and has a 2-colorable underlying entanglement graph (known to yield robust entangled states).
add ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.Do the share buttons not appear? Please make sure, any blocking addon is disabled, and then reload the page.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1103/physreva.72.064301&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eu25 citations 25 popularity Average influence Average impulse Average Powered by BIP!
description Publicationkeyboard_double_arrow_right Conference object 2012 France EnglishHAL CCSD Soumaya Amdouni; Djamal Benslimane; Mahmoud Barhamgi; Allel Hadjali; Rim Faiz; Parisa Ghodous;International audience; Data Mashup is a special class of applications mashup thatcombines data elements from multiple data sources (that are often ex-ported as data web services) to respond to transient business needs onthe y. In this paper, we propose a semantic model for data servicesalong with a declarative approach for creating data mashups withoutany programming involved. Given a query formulated over domain on-tologies, and a set of preferences modeled using the fuzzy set theory,our approach selects the relevant data services based on their semanticmodeling using an RDF query rewriting algorithm. Selected services arethen orchestrated using a ranking-aware algebra to rank their returnedresults based on users preferences at the data mashup execution time.
Hyper Article en Lig... arrow_drop_down Hyper Article en LigneOther literature type . Part of book or chapter of book . 2012Mémoires en Sciences de l'Information et de la Communication; Hal-DiderotConference object . 2012add ClaimPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.Do the share buttons not appear? Please make sure, any blocking addon is disabled, and then reload the page.All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=10.1007/978-3-642-34002-4_32&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eu1 citations 1 popularity Average influence Average impulse Average Powered by BIP!