Software defined networking enables the programmability of network behaviors. The network resource re-quirements of different services vary with respect to the QoS demands. Network slices created by infrastructure pro...
详细信息
The problem PosSLP is the problem of determining whether a given straight-line program (SLP) computes a positive integer. PosSLP was introduced by Allender et al. to study the complexity of numerical analysis (Allende...
详细信息
In the context of mobile communication networks, the allocation of PCI is directly correlated with the quality of the user experience. Effective PCI allocation can mitigate signal interference and enhance the efficacy...
详细信息
We study the classical problem of inferring ancestral genomes from a set of extant genomes under a given phylogeny, known as the Small Parsimony Problem (SPP). Genomes are represented as sequences of oriented markers,...
详细信息
In addressing the signal intricacies of industrial frequency communication alongside the complexities of power grid harmonics, the application of digital differential technology for signal detection proves pivotal. Th...
详细信息
We investigate the question whether Subset Sum can be solved by a polynomial-time algorithm with access to a certificate of length poly(k) where k is the maximal number of bits in an input number. In other words, can ...
详细信息
Logic locking has become a promising approach to provide hardware security in the face of a possibly insecure fabrication supply chain. While many techniques have focused on locking combinational logic (CL), an altern...
详细信息
ISBN:
(纸本)9798350334753
Logic locking has become a promising approach to provide hardware security in the face of a possibly insecure fabrication supply chain. While many techniques have focused on locking combinational logic (CL), an alternative latch-locking approach in which the sequential elements are locked has also gained significant attention. Latch (LAT) locking duplicates a subset of the flip-flops (FF) of a design, retimes these FFs and replaces them with latches, and adds two types of decoy latches to obfuscate the netlist. It then adds control circuitry (CC) such that all latches must be correctly keyed for the circuit to function correctly. This paper presents a two-phase attack on latch-locked circuits that uses a novel combination of deep learning, Boolean analysis, and integer linear programming (ILP). The attack requires access to the reverse-engineered netlist but, unlike SAT attacks, is oracle-less, not needing access to the unlocked circuit or correct input/output pairs. We trained and evaluated the attack using the ISCAS'89 and ITC'99 benchmark circuits. The attack successfully identifies a key that is, on average, 96.9% accurate and fully discloses the correct functionality in 8 of the tested 19 circuits and leads to low function corruptibility (less than 4%) in 3 additional circuits. The attack run-times are manageable.
To improve the economic efficiency of wind farms, this paper proposes a method for simultaneously optimizing wind farm layout and cabling on complex terrain such as mountainous areas, which most previous studies have ...
详细信息
ISBN:
(纸本)9798400701191
To improve the economic efficiency of wind farms, this paper proposes a method for simultaneously optimizing wind farm layout and cabling on complex terrain such as mountainous areas, which most previous studies have not considered. Multiple wind turbines should be placed to maximize energy production while minimizing the cable length (between wind turbines and between the substation and wind turbines). To optimize both, especially on complex terrain where wind speeds at a site are not constant, the proposed method combines a genetic algorithm (NSGA-II) and a capacitated minimum spanning tree approximation algorithm (Esau-Williams algorithm). For five sites with complex terrain, the proposed method is compared with the exact optimal solution obtained by the weighted sum method using the integer linear programming formulation. For a small number of candidate locations, the proposed method obtains a hyper-volume equivalent to the exact solution. In comparison, the proposed method can obtain a larger hyper-volume even in the case of many candidate locations where the weighted sum method is computationally infeasible in terms of practical resources and time. These results indicate that the proposed method effectively contributes to the wind farm design on complex terrain.
Graph theoretical problems based on shortest paths are at the core of research due to their theoretical importance and applicability. This paper deals with the geodetic number which is a global measure for simple conn...
详细信息
Graph theoretical problems based on shortest paths are at the core of research due to their theoretical importance and applicability. This paper deals with the geodetic number which is a global measure for simple connected graphs and it belongs to the path covering problems: what is the minimal-cardinality set of vertices, such that all shortest paths between its elements cover every vertex of the graph. Inspired by the exact 0-1 integer linear programming formalism from the recent literature, we propose new method to obtain upper bounds for the geodetic number in an algorithmic way. The efficiency of these algorithms are demonstrated on a collection of structurally different graphs.
The current high costs of district heating systems set limits regarding the minimum heat demand density required for economic network *** routing with ideal pipe sizing offers a potential for cost ***, this paper intr...
详细信息
暂无评论