Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceTarget AudienceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
22,178
result(s) for
"Discrete Mathematics"
Sort by:
Graph Theoretic Methods in Multiagent Networks
by
Mesbahi, Mehran
,
Egerstedt, Magnus
in
Abstraction (software engineering)
,
Adjacency matrix
,
Algebraic connectivity
2010
This accessible book provides an introduction to the analysis and design of dynamic multiagent networks. Such networks are of great interest in a wide range of areas in science and engineering, including: mobile sensor networks, distributed robotics such as formation flying and swarming, quantum networks, networked economics, biological synchronization, and social networks. Focusing on graph theoretic methods for the analysis and synthesis of dynamic multiagent networks, the book presents a powerful new formalism and set of tools for networked systems.
The book's three sections look at foundations, multiagent networks, and networks as systems. The authors give an overview of important ideas from graph theory, followed by a detailed account of the agreement protocol and its various extensions, including the behavior of the protocol over undirected, directed, switching, and random networks. They cover topics such as formation control, coverage, distributed estimation, social networks, and games over networks. And they explore intriguing aspects of viewing networks as systems, by making these networks amenable to control-theoretic analysis and automatic synthesis, by monitoring their dynamic evolution, and by examining higher-order interaction models in terms of simplicial complexes and their applications.
The book will interest graduate students working in systems and control, as well as in computer science and robotics. It will be a standard reference for researchers seeking a self-contained account of system-theoretic aspects of multiagent networks and their wide-ranging applications.
This book has been adopted as a textbook at the following universities:
University of Stuttgart, GermanyRoyal Institute of Technology, SwedenJohannes Kepler University, AustriaGeorgia Tech, USAUniversity of Washington, USAOhio University, USA
Frameworks, tensegrities, and symmetry
\"This introduction to the theory of rigid structures explains how to analyze the performance of built and natural structures under loads, paying special attention to the role of geometry. The book unifies the engineering and mathematical literatures by exploring different notions of rigidity -- local, global, and universal -- and how they are interrelated. Important results are stated formally, but also clarified with a wide range of revealing examples. An important generalization is to tensegrities, where fixed distances are replaced with \"cables\" not allowed to increase in length and \"struts\" not allowed to decrease in length. A special feature is the analysis of symmetric tensegrities, where the symmetry of the structure is used to simplify matters and allows the theory of group representations to be applied. Written for researchers and graduate students in structural engineering and mathematics, this work is also of interest to computer scientists and physicists\"-- Provided by publisher.
Mathematics of Public Key Cryptography
by
Galbraith, Steven D.
in
Coding theory
,
Cryptography -- Mathematics
,
MATHEMATICS / Discrete Mathematics. bisacsh
2012
Public key cryptography is a major interdisciplinary subject with many real-world applications, such as digital signatures. A strong background in the mathematics underlying public key cryptography is essential for a deep understanding of the subject, and this book provides exactly that for students and researchers in mathematics, computer science and electrical engineering. Carefully written to communicate the major ideas and techniques of public key cryptography to a wide readership, this text is enlivened throughout with historical remarks and insightful perspectives on the development of the subject. Numerous examples, proofs and exercises make it suitable as a textbook for an advanced course, as well as for self-study. For more experienced researchers it serves as a convenient reference for many important topics: the Pollard algorithms, Maurer reduction, isogenies, algebraic tori, hyperelliptic curves and many more.
Exact values for three domination-like problems in circular and infinite grid graphs of small height
by
Preissmann, Myriam
,
Moncel, Julien
,
Darlay, Julien
in
[info.info-dm]computer science [cs]/discrete mathematics [cs.dm]
,
acm: g.: mathematics of computing/g.2: discrete mathematics/g.2.2: graph theory
,
acm: g.: mathematics of computing/g.2: discrete mathematics/g.2.2: graph theory/g.2.2.0: graph algorithms
2019
In this paper we study three domination-like problems, namely identifying codes, locating-dominating codes, and locating-total-dominating codes. We are interested in finding the minimum cardinality of such codes in circular and infinite grid graphs of given height. We provide an alternate proof for already known results, as well as new results. These were obtained by a computer search based on a generic framework, that we developed earlier, for the search of a minimum labeling satisfying a pseudo-d-local property in rotagraphs.
Journal Article
Contact graphs of boxes with unidirectional contacts
by
Ochem, Pascal
,
Limouzy, Vincent
,
Gonçalves, Daniel
in
Computer Science
,
computer science - discrete mathematics
,
Discrete Mathematics
2024
This paper is devoted to the study of particular geometrically defined intersection classes of graphs. Those were previously studied by Magnant and Martin, who proved that these graphs have arbitrary large chromatic number, while being triangle-free. We give several structural properties of these graphs, and we raise several questions.
Journal Article
Hypergraph Theory
2013
This book presents hypergraph theory and covers traditional elements of the theory as well as original concepts such as entropy of hypergraph, similarities and kernels. It details applications in telecommunications and parallel data structure modeling.
On Monotonicity Testing and the 2-to-2 Games Conjecture
2022
This book discusses two questions in Complexity Theory: the Monotonicity Testing problem and the 2-to-2 Games Conjecture.
Monotonicity testing is a problem from the field of property testing, first considered by Goldreich et al. in 2000. The input of the algorithm is a function, and the goal is to design a tester that makes as few queries to the function as possible, accepts monotone functions and rejects far-from monotone functions with a probability close to 1.
The first result of this book is an essentially optimal algorithm for this problem. The analysis of the algorithm heavily relies on a novel, directed, and robust analogue of a Boolean isoperimetric inequality of Talagrand from 1993.
The probabilistically checkable proofs (PCP) theorem is one of the cornerstones of modern theoretical computer science. One area in which PCPs are essential is the area of hardness of approximation. Therein, the goal is to prove that some optimization problems are hard to solve, even approximately. Many hardness of approximation results were proved using the PCP theorem; however, for some problems optimal results were not obtained. This book touches on some of these problems, and in particular the 2-to-2 games problem and the vertex cover problem.
The second result of this book is a proof of the 2-to-2 games conjecture (with imperfect completeness), which implies new hardness of approximation results for problems such as vertex cover and independent set. It also serves as strong evidence towards the unique games conjecture, a notorious related open problem in theoretical computer science. At the core of the proof is a characterization of small sets of vertices in Grassmann graphs whose edge expansion is bounded away from 1.
On the algebraic degree of iterated power functions
by
Perrin, Léo
,
Canteaut, Anne
,
Bouvier, Clémence
in
Algebra
,
Codes
,
Coding and Information Theory
2023
New symmetric primitives are being designed to address a novel set of design criteria. Instead of being executed on regular processors or smartcards, they are instead intended to be run in abstract settings such as multi-party computations or zero-knowledge proof systems. This implies in particular that these new primitives are described using operations over large finite fields. As the number of such primitives grows, it is important to better understand the properties of their underlying operations. In this paper, we investigate the algebraic degree of one of the first such block ciphers, namely MiMC. It is composed of many iterations of a simple round function, which consists of an addition and of a low-degree power permutation applied to the full state, usually
x
↦
x
3
. We show in particular that, while the
univariate
degree increases predictably with the number of rounds, the
algebraic
degree (a.k.a multivariate degree) has a much more complex behaviour, and simply stays constant during some rounds. Such
plateaus
slightly slow down the growth of the algebraic degree. We present a full investigation of this behaviour. First, we prove some lower and upper bounds for the algebraic degree of an arbitrary number of iterations of MiMC and of its inverse. Then, we combine theoretical arguments with simulations to prove that the upper bound is tight for up to 16,265 rounds. Using these results, we slightly improve the higher-order differential attack presented at Asiacrypt 2020 to cover one or two more rounds. More importantly, our results provide some precise guarantees on the algebraic degree of this cipher, and then on the minimal complexity for a higher-order differential attack.
Journal Article