91 research outputs found

    Number partitioning as random energy model

    Full text link
    Number partitioning is a classical problem from combinatorial optimisation. In physical terms it corresponds to a long range anti-ferromagnetic Ising spin glass. It has been rigorously proven that the low lying energies of number partitioning behave like uncorrelated random variables. We claim that neighbouring energy levels are uncorrelated almost everywhere on the energy axis, and that energetically adjacent configurations are uncorrelated, too. Apparently there is no relation between geometry (configuration) and energy that could be exploited by an optimization algorithm. This ``local random energy'' picture of number partitioning is corroborated by numerical simulations and heuristic arguments.Comment: 8+2 pages, 9 figures, PDF onl

    Cyber Insurance: recent advances, good practices & challenges

    Get PDF
    The aim of this ENISA report is to raise awareness for the most impact to market advances, by shortly identifying the most significant cyber insurance developments for the past four years – during 2012 to 2016 – and to capture the good practices and challenges during the early stages of the cyber insurance lifecycle, i.e. before an actual policy is signed, laying the ground for future work in the area

    Attacking Shortest Paths by Cutting Edges

    Full text link
    Identifying shortest paths between nodes in a network is a common graph analysis problem that is important for many applications involving routing of resources. An adversary that can manipulate the graph structure could alter traffic patterns to gain some benefit (e.g., make more money by directing traffic to a toll road). This paper presents the Force Path Cut problem, in which an adversary removes edges from a graph to make a particular path the shortest between its terminal nodes. We prove that this problem is APX-hard, but introduce PATHATTACK, a polynomial-time approximation algorithm that guarantees a solution within a logarithmic factor of the optimal value. In addition, we introduce the Force Edge Cut and Force Node Cut problems, in which the adversary targets a particular edge or node, respectively, rather than an entire path. We derive a nonconvex optimization formulation for these problems, and derive a heuristic algorithm that uses PATHATTACK as a subroutine. We demonstrate all of these algorithms on a diverse set of real and synthetic networks, illustrating the network types that benefit most from the proposed algorithms.Comment: 37 pages, 11 figures; Extended version of arXiv:2104.0376

    Defense Against Shortest Path Attacks

    Full text link
    Identifying shortest paths between nodes in a network is an important task in applications involving routing of resources. Recent work has shown that a malicious actor can manipulate a graph to make traffic between two nodes of interest follow their target path. In this paper, we develop a defense against such attacks by modifying the weights of the graph that users observe. The defender must balance inhibiting the attacker against any negative effects of the defense on benign users. Specifically, the defender's goals are: (a) to recommend the shortest paths possible to users, (b) for the lengths of the shortest paths in the published graph to be close to those of the same paths in the true graph, and (c) to minimize the probability of an attack. We formulate the defense as a Stackelberg game in which the defender is the leader and the attacker is the follower. In this context, we also consider a zero-sum version of the game, in which the defender's goal is to minimize cost while achieving the minimum possible attack probability. We show that this problem is NP-hard and propose heuristic solutions based on increasing edge weights along target paths in both the zero-sum and non-zero-sum settings. Relaxing some constraints of the original problem, we formulate a linear program for local optimization around a feasible point. We present defense results with both synthetic and real network datasets and show that these methods often reach the lower bound of the defender's cost

    Minimizing trade-offs and maximizing synergies for a just bioeconomy transition

    Full text link
    The transition to a bioeconomy holds promise for reducing greenhouse gas (GHG) emissions and advancing sustainable development but also presents complex challenges. This perspectives article critically examines the environmental, social, and economic implications of shifting from fossil-based to bio-based resources, addressing key concerns such as land use competition, biodiversity loss, and social equity. Rising biomass demand poses sustainability risks, especially for the Global South, where it may exacerbate food insecurity and ecosystem degradation. Without careful management, this transition could lead to deforestation, biodiversity loss, and increased carbon emissions, undermining its intended benefits. To navigate these challenges, the article outlines pathways for an inclusive and sustainable bioeconomy transition. It emphasizes the need for interdisciplinary approaches that integrate diverse knowledge systems and values to ensure the equitable distribution of benefits and risks. Policymakers should adopt governance frameworks that align sustainable development goals with local realities, fostering a just transition that mitigates socioecological challenges while maximizing long-term sustainability

    TEMPERATURE AND PRECIPITATION CHANGES IN SERBIA BETWEEN 1961 AND 2010

    Get PDF

    Analysis of the Karmarkar-Karp Differencing Algorithm

    Full text link
    The Karmarkar-Karp differencing algorithm is the best known polynomial time heuristic for the number partitioning problem, fundamental in both theoretical computer science and statistical physics. We analyze the performance of the differencing algorithm on random instances by mapping it to a nonlinear rate equation. Our analysis reveals strong finite size effects that explain why the precise asymptotics of the differencing solution is hard to establish by simulations. The asymptotic series emerging from the rate equation satisfies all known bounds on the Karmarkar-Karp algorithm and projects a scaling nclnnn^{-c\ln n}, where c=1/(2ln2)=0.7213...c=1/(2\ln2)=0.7213.... Our calculations reveal subtle relations between the algorithm and Fibonacci-like sequences, and we establish an explicit identity to that effect.Comment: 9 pages, 8 figures; minor change
    corecore