91 research outputs found
Number partitioning as random energy model
Number partitioning is a classical problem from combinatorial optimisation.
In physical terms it corresponds to a long range anti-ferromagnetic Ising spin
glass. It has been rigorously proven that the low lying energies of number
partitioning behave like uncorrelated random variables. We claim that
neighbouring energy levels are uncorrelated almost everywhere on the energy
axis, and that energetically adjacent configurations are uncorrelated, too.
Apparently there is no relation between geometry (configuration) and energy
that could be exploited by an optimization algorithm. This ``local random
energy'' picture of number partitioning is corroborated by numerical
simulations and heuristic arguments.Comment: 8+2 pages, 9 figures, PDF onl
Cyber Insurance: recent advances, good practices & challenges
The aim of this ENISA report is to raise awareness for the most impact to market advances, by shortly identifying the most significant cyber insurance developments for the past four years – during 2012 to 2016 – and to capture the good practices and challenges during the early stages of the cyber insurance lifecycle, i.e. before an actual policy is signed, laying the ground for future work in the area
Attacking Shortest Paths by Cutting Edges
Identifying shortest paths between nodes in a network is a common graph
analysis problem that is important for many applications involving routing of
resources. An adversary that can manipulate the graph structure could alter
traffic patterns to gain some benefit (e.g., make more money by directing
traffic to a toll road). This paper presents the Force Path Cut problem, in
which an adversary removes edges from a graph to make a particular path the
shortest between its terminal nodes. We prove that this problem is APX-hard,
but introduce PATHATTACK, a polynomial-time approximation algorithm that
guarantees a solution within a logarithmic factor of the optimal value. In
addition, we introduce the Force Edge Cut and Force Node Cut problems, in which
the adversary targets a particular edge or node, respectively, rather than an
entire path. We derive a nonconvex optimization formulation for these problems,
and derive a heuristic algorithm that uses PATHATTACK as a subroutine. We
demonstrate all of these algorithms on a diverse set of real and synthetic
networks, illustrating the network types that benefit most from the proposed
algorithms.Comment: 37 pages, 11 figures; Extended version of arXiv:2104.0376
Defense Against Shortest Path Attacks
Identifying shortest paths between nodes in a network is an important task in
applications involving routing of resources. Recent work has shown that a
malicious actor can manipulate a graph to make traffic between two nodes of
interest follow their target path. In this paper, we develop a defense against
such attacks by modifying the weights of the graph that users observe. The
defender must balance inhibiting the attacker against any negative effects of
the defense on benign users. Specifically, the defender's goals are: (a) to
recommend the shortest paths possible to users, (b) for the lengths of the
shortest paths in the published graph to be close to those of the same paths in
the true graph, and (c) to minimize the probability of an attack. We formulate
the defense as a Stackelberg game in which the defender is the leader and the
attacker is the follower. In this context, we also consider a zero-sum version
of the game, in which the defender's goal is to minimize cost while achieving
the minimum possible attack probability. We show that this problem is NP-hard
and propose heuristic solutions based on increasing edge weights along target
paths in both the zero-sum and non-zero-sum settings. Relaxing some constraints
of the original problem, we formulate a linear program for local optimization
around a feasible point. We present defense results with both synthetic and
real network datasets and show that these methods often reach the lower bound
of the defender's cost
Minimizing trade-offs and maximizing synergies for a just bioeconomy transition
The transition to a bioeconomy holds promise for reducing greenhouse gas (GHG) emissions and advancing sustainable development but also presents complex challenges. This perspectives article critically examines the environmental, social, and economic implications of shifting from fossil-based to bio-based resources, addressing key concerns such as land use competition, biodiversity loss, and social equity. Rising biomass demand poses sustainability risks, especially for the Global South, where it may exacerbate food insecurity and ecosystem degradation. Without careful management, this transition could lead to deforestation, biodiversity loss, and increased carbon emissions, undermining its intended benefits. To navigate these challenges, the article outlines pathways for an inclusive and sustainable bioeconomy transition. It emphasizes the need for interdisciplinary approaches that integrate diverse knowledge systems and values to ensure the equitable distribution of benefits and risks. Policymakers should adopt governance frameworks that align sustainable development goals with local realities, fostering a just transition that mitigates socioecological challenges while maximizing long-term sustainability
Analysis of the Karmarkar-Karp Differencing Algorithm
The Karmarkar-Karp differencing algorithm is the best known polynomial time
heuristic for the number partitioning problem, fundamental in both theoretical
computer science and statistical physics. We analyze the performance of the
differencing algorithm on random instances by mapping it to a nonlinear rate
equation. Our analysis reveals strong finite size effects that explain why the
precise asymptotics of the differencing solution is hard to establish by
simulations. The asymptotic series emerging from the rate equation satisfies
all known bounds on the Karmarkar-Karp algorithm and projects a scaling
, where . Our calculations reveal subtle
relations between the algorithm and Fibonacci-like sequences, and we establish
an explicit identity to that effect.Comment: 9 pages, 8 figures; minor change
- …
