---
_id: '1168'
abstract:
- lang: eng
  text: Optimum experimental design theory has recently been extended for parameter
    estimation in copula models. The use of these models allows one to gain in flexibility
    by considering the model parameter set split into marginal and dependence parameters.
    However, this separation also leads to the natural issue of estimating only a
    subset of all model parameters. In this work, we treat this problem with the application
    of the (Formula presented.)-optimality to copula models. First, we provide an
    extension of the corresponding equivalence theory. Then, we analyze a wide range
    of flexible copula models to highlight the usefulness of (Formula presented.)-optimality
    in many possible scenarios. Finally, we discuss how the usage of the introduced
    design criterion also relates to the more general issue of copula selection and
    optimal design for model discrimination.
acknowledgement: 'This work has been supported by the project ANR-2011-IS01-001-01
  “DESIRE” and Austrian Science Fund (FWF) I833-N18. Open access funding is provided
  by the Austrian Science Fund (FWF). '
article_processing_charge: No
author:
- first_name: Elisa
  full_name: Perrone, Elisa
  id: 2A5F8724-F248-11E8-B48F-1D18A9856A87
  last_name: Perrone
  orcid: 0000-0003-0370-9835
- first_name: Andreas
  full_name: Rappold, Andreas
  last_name: Rappold
- first_name: Werner
  full_name: Müller, Werner
  last_name: Müller
citation:
  ama: Perrone E, Rappold A, Müller W. D inf s optimality in copula models. <i>Statistical
    Methods and Applications</i>. 2017;26(3):403-418. doi:<a href="https://doi.org/10.1007/s10260-016-0375-6">10.1007/s10260-016-0375-6</a>
  apa: Perrone, E., Rappold, A., &#38; Müller, W. (2017). D inf s optimality in copula
    models. <i>Statistical Methods and Applications</i>. Springer. <a href="https://doi.org/10.1007/s10260-016-0375-6">https://doi.org/10.1007/s10260-016-0375-6</a>
  chicago: Perrone, Elisa, Andreas Rappold, and Werner Müller. “D Inf s Optimality
    in Copula Models.” <i>Statistical Methods and Applications</i>. Springer, 2017.
    <a href="https://doi.org/10.1007/s10260-016-0375-6">https://doi.org/10.1007/s10260-016-0375-6</a>.
  ieee: E. Perrone, A. Rappold, and W. Müller, “D inf s optimality in copula models,”
    <i>Statistical Methods and Applications</i>, vol. 26, no. 3. Springer, pp. 403–418,
    2017.
  ista: Perrone E, Rappold A, Müller W. 2017. D inf s optimality in copula models.
    Statistical Methods and Applications. 26(3), 403–418.
  mla: Perrone, Elisa, et al. “D Inf s Optimality in Copula Models.” <i>Statistical
    Methods and Applications</i>, vol. 26, no. 3, Springer, 2017, pp. 403–18, doi:<a
    href="https://doi.org/10.1007/s10260-016-0375-6">10.1007/s10260-016-0375-6</a>.
  short: E. Perrone, A. Rappold, W. Müller, Statistical Methods and Applications 26
    (2017) 403–418.
corr_author: '1'
date_created: 2018-12-11T11:50:31Z
date_published: 2017-08-01T00:00:00Z
date_updated: 2024-10-09T20:57:17Z
day: '01'
ddc:
- '519'
department:
- _id: CaUh
doi: 10.1007/s10260-016-0375-6
external_id:
  isi:
  - '000407973200004'
file:
- access_level: open_access
  checksum: 0b2d1b647ca96e9ef13a14b8b6775e0f
  content_type: application/pdf
  creator: system
  date_created: 2018-12-12T10:16:13Z
  date_updated: 2020-07-14T12:44:37Z
  file_id: '5199'
  file_name: IST-2017-739-v1+2_10260_2016_375_MOESM1_ESM.pdf
  file_size: 56664
  relation: main_file
- access_level: open_access
  checksum: 3321ef34e02e28acfc427f77cf32812a
  content_type: application/pdf
  creator: system
  date_created: 2018-12-12T10:16:14Z
  date_updated: 2020-07-14T12:44:37Z
  file_id: '5200'
  file_name: IST-2017-739-v1+3_s10260-016-0375-6.pdf
  file_size: 688953
  relation: main_file
file_date_updated: 2020-07-14T12:44:37Z
has_accepted_license: '1'
intvolume: '        26'
isi: 1
issue: '3'
language:
- iso: eng
month: '08'
oa: 1
oa_version: Submitted Version
page: 403 - 418
publication: Statistical Methods and Applications
publication_status: published
publisher: Springer
publist_id: '6189'
pubrep_id: '739'
quality_controlled: '1'
scopus_import: '1'
status: public
title: D inf s optimality in copula models
tmp:
  image: /images/cc_by.png
  legal_code_url: https://creativecommons.org/licenses/by/4.0/legalcode
  name: Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)
  short: CC BY (4.0)
type: journal_article
user_id: c635000d-4b10-11ee-a964-aac5a93f6ac1
volume: 26
year: '2017'
...
---
_id: '1169'
abstract:
- lang: eng
  text: Dispersal is a crucial factor in natural evolution, since it determines the
    habitat experienced by any population and defines the spatial scale of interactions
    between individuals. There is compelling evidence for systematic differences in
    dispersal characteristics within the same population, i.e., genotype-dependent
    dispersal. The consequences of genotype-dependent dispersal on other evolutionary
    phenomena, however, are poorly understood. In this article we investigate the
    effect of genotype-dependent dispersal on spatial gene frequency patterns, using
    a generalization of the classical diffusion model of selection and dispersal.
    Dispersal is characterized by the variance of dispersal (diffusion coefficient)
    and the mean displacement (directional advection term). We demonstrate that genotype-dependent
    dispersal may change the qualitative behavior of Fisher waves, which change from
    being “pulled” to being “pushed” wave fronts as the discrepancy in dispersal between
    genotypes increases. The speed of any wave is partitioned into components due
    to selection, genotype-dependent variance of dispersal, and genotype-dependent
    mean displacement. We apply our findings to wave fronts maintained by selection
    against heterozygotes. Furthermore, we identify a benefit of increased variance
    of dispersal, quantify its effect on the speed of the wave, and discuss the implications
    for the evolution of dispersal strategies.
article_processing_charge: No
author:
- first_name: Sebastian
  full_name: Novak, Sebastian
  id: 461468AE-F248-11E8-B48F-1D18A9856A87
  last_name: Novak
  orcid: 0000-0002-2519-824X
- first_name: Richard
  full_name: Kollár, Richard
  last_name: Kollár
citation:
  ama: Novak S, Kollár R. Spatial gene frequency waves under genotype dependent dispersal.
    <i>Genetics</i>. 2017;205(1):367-374. doi:<a href="https://doi.org/10.1534/genetics.116.193946">10.1534/genetics.116.193946</a>
  apa: Novak, S., &#38; Kollár, R. (2017). Spatial gene frequency waves under genotype
    dependent dispersal. <i>Genetics</i>. Genetics Society of America. <a href="https://doi.org/10.1534/genetics.116.193946">https://doi.org/10.1534/genetics.116.193946</a>
  chicago: Novak, Sebastian, and Richard Kollár. “Spatial Gene Frequency Waves under
    Genotype Dependent Dispersal.” <i>Genetics</i>. Genetics Society of America, 2017.
    <a href="https://doi.org/10.1534/genetics.116.193946">https://doi.org/10.1534/genetics.116.193946</a>.
  ieee: S. Novak and R. Kollár, “Spatial gene frequency waves under genotype dependent
    dispersal,” <i>Genetics</i>, vol. 205, no. 1. Genetics Society of America, pp.
    367–374, 2017.
  ista: Novak S, Kollár R. 2017. Spatial gene frequency waves under genotype dependent
    dispersal. Genetics. 205(1), 367–374.
  mla: Novak, Sebastian, and Richard Kollár. “Spatial Gene Frequency Waves under Genotype
    Dependent Dispersal.” <i>Genetics</i>, vol. 205, no. 1, Genetics Society of America,
    2017, pp. 367–74, doi:<a href="https://doi.org/10.1534/genetics.116.193946">10.1534/genetics.116.193946</a>.
  short: S. Novak, R. Kollár, Genetics 205 (2017) 367–374.
date_created: 2018-12-11T11:50:31Z
date_published: 2017-01-01T00:00:00Z
date_updated: 2025-07-10T11:50:13Z
day: '01'
ddc:
- '576'
department:
- _id: NiBa
doi: 10.1534/genetics.116.193946
ec_funded: 1
external_id:
  isi:
  - '000393677300025'
file:
- access_level: open_access
  checksum: 7c8ab79cda1f92760bbbbe0f53175bfc
  content_type: application/pdf
  creator: system
  date_created: 2018-12-12T10:10:43Z
  date_updated: 2020-07-14T12:44:37Z
  file_id: '4833'
  file_name: IST-2016-727-v1+1_SFC_Genetics_final.pdf
  file_size: 361500
  relation: main_file
file_date_updated: 2020-07-14T12:44:37Z
has_accepted_license: '1'
intvolume: '       205'
isi: 1
issue: '1'
language:
- iso: eng
month: '01'
oa: 1
oa_version: Submitted Version
page: 367 - 374
project:
- _id: 25B1EC9E-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '618091'
  name: Speed of Adaptation in Population Genetics and Evolutionary Computation
- _id: 25B07788-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '250152'
  name: Limits to selection in biology and in evolutionary computation
publication: Genetics
publication_identifier:
  issn:
  - 0016-6731
publication_status: published
publisher: Genetics Society of America
publist_id: '6188'
pubrep_id: '727'
quality_controlled: '1'
scopus_import: '1'
status: public
title: Spatial gene frequency waves under genotype dependent dispersal
type: journal_article
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
volume: 205
year: '2017'
...
---
_id: '1173'
abstract:
- lang: eng
  text: We introduce the Voronoi functional of a triangulation of a finite set of
    points in the Euclidean plane and prove that among all geometric triangulations
    of the point set, the Delaunay triangulation maximizes the functional. This result
    neither extends to topological triangulations in the plane nor to geometric triangulations
    in three and higher dimensions.
acknowledgement: This research is partially supported by the Russian Government under
  the Mega Project 11.G34.31.0053, by the Toposys project FP7-ICT-318493-STREP, by
  ESF under the ACAT Research Network Programme, by RFBR grant 11-01-00735, and by
  NSF grants DMS-1101688, DMS-1400876.
article_processing_charge: No
arxiv: 1
author:
- first_name: Herbert
  full_name: Edelsbrunner, Herbert
  id: 3FB178DA-F248-11E8-B48F-1D18A9856A87
  last_name: Edelsbrunner
  orcid: 0000-0002-9823-6833
- first_name: Alexey
  full_name: Glazyrin, Alexey
  last_name: Glazyrin
- first_name: Oleg
  full_name: Musin, Oleg
  last_name: Musin
- first_name: Anton
  full_name: Nikitenko, Anton
  id: 3E4FF1BA-F248-11E8-B48F-1D18A9856A87
  last_name: Nikitenko
  orcid: 0000-0002-0659-3201
citation:
  ama: Edelsbrunner H, Glazyrin A, Musin O, Nikitenko A. The Voronoi functional is
    maximized by the Delaunay triangulation in the plane. <i>Combinatorica</i>. 2017;37(5):887-910.
    doi:<a href="https://doi.org/10.1007/s00493-016-3308-y">10.1007/s00493-016-3308-y</a>
  apa: Edelsbrunner, H., Glazyrin, A., Musin, O., &#38; Nikitenko, A. (2017). The
    Voronoi functional is maximized by the Delaunay triangulation in the plane. <i>Combinatorica</i>.
    Springer. <a href="https://doi.org/10.1007/s00493-016-3308-y">https://doi.org/10.1007/s00493-016-3308-y</a>
  chicago: Edelsbrunner, Herbert, Alexey Glazyrin, Oleg Musin, and Anton Nikitenko.
    “The Voronoi Functional Is Maximized by the Delaunay Triangulation in the Plane.”
    <i>Combinatorica</i>. Springer, 2017. <a href="https://doi.org/10.1007/s00493-016-3308-y">https://doi.org/10.1007/s00493-016-3308-y</a>.
  ieee: H. Edelsbrunner, A. Glazyrin, O. Musin, and A. Nikitenko, “The Voronoi functional
    is maximized by the Delaunay triangulation in the plane,” <i>Combinatorica</i>,
    vol. 37, no. 5. Springer, pp. 887–910, 2017.
  ista: Edelsbrunner H, Glazyrin A, Musin O, Nikitenko A. 2017. The Voronoi functional
    is maximized by the Delaunay triangulation in the plane. Combinatorica. 37(5),
    887–910.
  mla: Edelsbrunner, Herbert, et al. “The Voronoi Functional Is Maximized by the Delaunay
    Triangulation in the Plane.” <i>Combinatorica</i>, vol. 37, no. 5, Springer, 2017,
    pp. 887–910, doi:<a href="https://doi.org/10.1007/s00493-016-3308-y">10.1007/s00493-016-3308-y</a>.
  short: H. Edelsbrunner, A. Glazyrin, O. Musin, A. Nikitenko, Combinatorica 37 (2017)
    887–910.
date_created: 2018-12-11T11:50:32Z
date_published: 2017-10-01T00:00:00Z
date_updated: 2025-06-04T08:44:44Z
day: '01'
department:
- _id: HeEd
doi: 10.1007/s00493-016-3308-y
ec_funded: 1
external_id:
  arxiv:
  - '1411.6337'
  isi:
  - '000418056000005'
intvolume: '        37'
isi: 1
issue: '5'
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://arxiv.org/abs/1411.6337
month: '10'
oa: 1
oa_version: Submitted Version
page: 887 - 910
project:
- _id: 255D761E-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '318493'
  name: Topological Complex Systems
publication: Combinatorica
publication_identifier:
  issn:
  - 0209-9683
publication_status: published
publisher: Springer
publist_id: '6182'
quality_controlled: '1'
scopus_import: '1'
status: public
title: The Voronoi functional is maximized by the Delaunay triangulation in the plane
type: journal_article
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
volume: 37
year: '2017'
...
---
_id: '1174'
abstract:
- lang: eng
  text: Security of cryptographic applications is typically defined by security games.
    The adversary, within certain resources, cannot win with probability much better
    than 0 (for unpredictability applications, like one-way functions) or much better
    than 1/2 (indistinguishability applications for instance encryption schemes).
    In so called squared-friendly applications the winning probability of the adversary,
    for different values of the application secret randomness, is not only close to
    0 or 1/2 on average, but also concentrated in the sense that its second central
    moment is small. The class of squared-friendly applications, which contains all
    unpredictability applications and many indistinguishability applications, is particularly
    important for key derivation. Barak et al. observed that for square-friendly applications
    one can beat the &quot;RT-bound&quot;, extracting secure keys with significantly
    smaller entropy loss. In turn Dodis and Yu showed that in squared-friendly applications
    one can directly use a &quot;weak&quot; key, which has only high entropy, as a
    secure key. In this paper we give sharp lower bounds on square security assuming
    security for &quot;weak&quot; keys. We show that any application which is either
    (a) secure with weak keys or (b) allows for entropy savings for keys derived by
    universal hashing, must be square-friendly. Quantitatively, our lower bounds match
    the positive results of Dodis and Yu and Barak et al. (TCC\'13, CRYPTO\'11) Hence,
    they can be understood as a general characterization of squared-friendly applications.
    While the positive results on squared-friendly applications where derived by one
    clever application of the Cauchy-Schwarz Inequality, for tight lower bounds we
    need more machinery. In our approach we use convex optimization techniques and
    some theory of circular matrices.
alternative_title:
- LIPIcs
article_number: '57'
article_processing_charge: No
author:
- first_name: Maciej
  full_name: Skórski, Maciej
  id: EC09FA6A-02D0-11E9-8223-86B7C91467DD
  last_name: Skórski
citation:
  ama: 'Skórski M. Lower bounds on key derivation for square-friendly applications.
    In: Vol 66. Schloss Dagstuhl - Leibniz-Zentrum für Informatik; 2017. doi:<a href="https://doi.org/10.4230/LIPIcs.STACS.2017.57">10.4230/LIPIcs.STACS.2017.57</a>'
  apa: 'Skórski, M. (2017). Lower bounds on key derivation for square-friendly applications
    (Vol. 66). Presented at the STACS: Symposium on Theoretical Aspects of Computer
    Science, Hannover, Germany: Schloss Dagstuhl - Leibniz-Zentrum für Informatik.
    <a href="https://doi.org/10.4230/LIPIcs.STACS.2017.57">https://doi.org/10.4230/LIPIcs.STACS.2017.57</a>'
  chicago: Skórski, Maciej. “Lower Bounds on Key Derivation for Square-Friendly Applications,”
    Vol. 66. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2017. <a href="https://doi.org/10.4230/LIPIcs.STACS.2017.57">https://doi.org/10.4230/LIPIcs.STACS.2017.57</a>.
  ieee: 'M. Skórski, “Lower bounds on key derivation for square-friendly applications,”
    presented at the STACS: Symposium on Theoretical Aspects of Computer Science,
    Hannover, Germany, 2017, vol. 66.'
  ista: 'Skórski M. 2017. Lower bounds on key derivation for square-friendly applications.
    STACS: Symposium on Theoretical Aspects of Computer Science, LIPIcs, vol. 66,
    57.'
  mla: Skórski, Maciej. <i>Lower Bounds on Key Derivation for Square-Friendly Applications</i>.
    Vol. 66, 57, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2017, doi:<a href="https://doi.org/10.4230/LIPIcs.STACS.2017.57">10.4230/LIPIcs.STACS.2017.57</a>.
  short: M. Skórski, in:, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2017.
conference:
  end_date: 2017-03-11
  location: Hannover, Germany
  name: 'STACS: Symposium on Theoretical Aspects of Computer Science'
  start_date: 2017-03-08
date_created: 2018-12-11T11:50:32Z
date_published: 2017-03-01T00:00:00Z
date_updated: 2025-07-10T11:50:14Z
day: '01'
department:
- _id: KrPi
doi: 10.4230/LIPIcs.STACS.2017.57
ec_funded: 1
external_id:
  isi:
  - '000521077300057'
intvolume: '        66'
isi: 1
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: http://drops.dagstuhl.de/opus/volltexte/2017/6976
month: '03'
oa: 1
oa_version: Submitted Version
project:
- _id: 258AA5B2-B435-11E9-9278-68D0E5697425
  call_identifier: H2020
  grant_number: '682815'
  name: Teaching Old Crypto New Tricks
publication_identifier:
  issn:
  - 1868-8969
publication_status: published
publisher: Schloss Dagstuhl - Leibniz-Zentrum für Informatik
publist_id: '6180'
quality_controlled: '1'
scopus_import: '1'
status: public
title: Lower bounds on key derivation for square-friendly applications
type: conference
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
volume: 66
year: '2017'
...
---
_id: '1175'
abstract:
- lang: eng
  text: We study space complexity and time-space trade-offs with a focus not on peak
    memory usage but on overall memory consumption throughout the computation.  Such
    a cumulative space measure was introduced for the computational model of parallel
    black pebbling by [Alwen and Serbinenko ’15] as a tool for obtaining results in
    cryptography. We consider instead the non- deterministic black-white pebble game
    and prove optimal cumulative space lower bounds and trade-offs, where in order
    to minimize pebbling time the space has to remain large during a significant fraction
    of the pebbling. We also initiate the study of cumulative space in proof complexity,
    an area where other space complexity measures have been extensively studied during
    the last 10–15 years. Using and extending the connection between proof complexity
    and pebble games in [Ben-Sasson and Nordström ’08, ’11] we obtain several strong
    cumulative space results for (even parallel versions of) the resolution proof
    system, and outline some possible future directions of study of this, in our opinion,
    natural and interesting space measure.
alternative_title:
- LIPIcs
article_processing_charge: No
author:
- first_name: Joel F
  full_name: Alwen, Joel F
  id: 2A8DFA8C-F248-11E8-B48F-1D18A9856A87
  last_name: Alwen
- first_name: Susanna
  full_name: De Rezende, Susanna
  last_name: De Rezende
- first_name: Jakob
  full_name: Nordstrom, Jakob
  last_name: Nordstrom
- first_name: Marc
  full_name: Vinyals, Marc
  last_name: Vinyals
citation:
  ama: 'Alwen JF, De Rezende S, Nordstrom J, Vinyals M. Cumulative space in black-white
    pebbling and resolution. In: Papadimitriou C, ed. Vol 67. Schloss Dagstuhl - Leibniz-Zentrum
    für Informatik; 2017:38:1-38-21. doi:<a href="https://doi.org/10.4230/LIPIcs.ITCS.2017.38">10.4230/LIPIcs.ITCS.2017.38</a>'
  apa: 'Alwen, J. F., De Rezende, S., Nordstrom, J., &#38; Vinyals, M. (2017). Cumulative
    space in black-white pebbling and resolution. In C. Papadimitriou (Ed.) (Vol.
    67, p. 38:1-38-21). Presented at the ITCS: Innovations in Theoretical Computer
    Science, Berkeley, CA, United States: Schloss Dagstuhl - Leibniz-Zentrum für Informatik.
    <a href="https://doi.org/10.4230/LIPIcs.ITCS.2017.38">https://doi.org/10.4230/LIPIcs.ITCS.2017.38</a>'
  chicago: Alwen, Joel F, Susanna De Rezende, Jakob Nordstrom, and Marc Vinyals. “Cumulative
    Space in Black-White Pebbling and Resolution.” edited by Christos Papadimitriou,
    67:38:1-38-21. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2017. <a href="https://doi.org/10.4230/LIPIcs.ITCS.2017.38">https://doi.org/10.4230/LIPIcs.ITCS.2017.38</a>.
  ieee: 'J. F. Alwen, S. De Rezende, J. Nordstrom, and M. Vinyals, “Cumulative space
    in black-white pebbling and resolution,” presented at the ITCS: Innovations in
    Theoretical Computer Science, Berkeley, CA, United States, 2017, vol. 67, p. 38:1-38-21.'
  ista: 'Alwen JF, De Rezende S, Nordstrom J, Vinyals M. 2017. Cumulative space in
    black-white pebbling and resolution. ITCS: Innovations in Theoretical Computer
    Science, LIPIcs, vol. 67, 38:1-38-21.'
  mla: Alwen, Joel F., et al. <i>Cumulative Space in Black-White Pebbling and Resolution</i>.
    Edited by Christos Papadimitriou, vol. 67, Schloss Dagstuhl - Leibniz-Zentrum
    für Informatik, 2017, p. 38:1-38-21, doi:<a href="https://doi.org/10.4230/LIPIcs.ITCS.2017.38">10.4230/LIPIcs.ITCS.2017.38</a>.
  short: J.F. Alwen, S. De Rezende, J. Nordstrom, M. Vinyals, in:, C. Papadimitriou
    (Ed.), Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2017, p. 38:1-38-21.
conference:
  end_date: 2017-01-11
  location: Berkeley, CA, United States
  name: 'ITCS: Innovations in Theoretical Computer Science'
  start_date: 2017-01-09
corr_author: '1'
date_created: 2018-12-11T11:50:33Z
date_published: 2017-01-01T00:00:00Z
date_updated: 2025-09-10T10:49:13Z
day: '01'
ddc:
- '005'
- '600'
department:
- _id: KrPi
doi: 10.4230/LIPIcs.ITCS.2017.38
editor:
- first_name: Christos
  full_name: Papadimitriou, Christos
  last_name: Papadimitriou
external_id:
  isi:
  - '001532708700038'
file:
- access_level: open_access
  checksum: dbc94810be07c2fb1945d5c2a6130e6c
  content_type: application/pdf
  creator: system
  date_created: 2018-12-12T10:17:11Z
  date_updated: 2020-07-14T12:44:37Z
  file_id: '5263'
  file_name: IST-2018-927-v1+1_LIPIcs-ITCS-2017-38.pdf
  file_size: 557769
  relation: main_file
file_date_updated: 2020-07-14T12:44:37Z
has_accepted_license: '1'
intvolume: '        67'
isi: 1
language:
- iso: eng
month: '01'
oa: 1
oa_version: Published Version
page: 38:1-38-21
publication_identifier:
  issn:
  - 1868-8969
publication_status: published
publisher: Schloss Dagstuhl - Leibniz-Zentrum für Informatik
publist_id: '6179'
pubrep_id: '927'
quality_controlled: '1'
scopus_import: '1'
status: public
title: Cumulative space in black-white pebbling and resolution
tmp:
  image: /images/cc_by.png
  legal_code_url: https://creativecommons.org/licenses/by/4.0/legalcode
  name: Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)
  short: CC BY (4.0)
type: conference
user_id: 317138e5-6ab7-11ef-aa6d-ffef3953e345
volume: 67
year: '2017'
...
---
_id: '1176'
abstract:
- lang: eng
  text: The algorithm Argon2i-B of Biryukov, Dinu and Khovratovich is currently being
    considered by the IRTF (Internet Research Task Force) as a new de-facto standard
    for password hashing. An older version (Argon2i-A) of the same algorithm was chosen
    as the winner of the recent Password Hashing Competition. An important competitor
    to Argon2i-B is the recently introduced Balloon Hashing (BH) algorithm of Corrigan-Gibs,
    Boneh and Schechter. A key security desiderata for any such algorithm is that
    evaluating it (even using a custom device) requires a large amount of memory amortized
    across multiple instances. Alwen and Blocki (CRYPTO 2016) introduced a class of
    theoretical attacks against Argon2i-A and BH. While these attacks yield large
    asymptotic reductions in the amount of memory, it was not, a priori, clear if
    (1) they can be extended to the newer Argon2i-B, (2) the attacks are effective
    on any algorithm for practical parameter ranges (e.g., 1GB of memory) and (3)
    if they can be effectively instantiated against any algorithm under realistic
    hardware constrains. In this work we answer all three of these questions in the
    affirmative for all three algorithms. This is also the first work to analyze the
    security of Argon2i-B. In more detail, we extend the theoretical attacks of Alwen
    and Blocki (CRYPTO 2016) to the recent Argon2i-B proposal demonstrating severe
    asymptotic deficiencies in its security. Next we introduce several novel heuristics
    for improving the attack's concrete memory efficiency even when on-chip memory
    bandwidth is bounded. We then simulate our attacks on randomly sampled Argon2i-A,
    Argon2i-B and BH instances and measure the resulting memory consumption for various
    practical parameter ranges and for a variety of upperbounds on the amount of parallelism
    available to the attacker. Finally we describe, implement, and test a new heuristic
    for applying the Alwen-Blocki attack to functions employing a technique developed
    by Corrigan-Gibs et al. for improving concrete security of memory-hard functions.
    We analyze the collected data and show the effects various parameters have on
    the memory consumption of the attack. In particular, we can draw several interesting
    conclusions about the level of security provided by these functions. · For the
    Alwen-Blocki attack to fail against practical memory parameters, Argon2i-B must
    be instantiated with more than 10 passes on memory - beyond the "paranoid" parameter
    setting in the current IRTF proposal. · The technique of Corrigan-Gibs for improving
    security can also be overcome by the Alwen-Blocki attack under realistic hardware
    constraints. · On a positive note, both the asymptotic and concrete security of
    Argon2i-B seem to improve on that of Argon2i-A.
article_number: '7961977'
article_processing_charge: No
author:
- first_name: Joel F
  full_name: Alwen, Joel F
  id: 2A8DFA8C-F248-11E8-B48F-1D18A9856A87
  last_name: Alwen
- first_name: Jeremiah
  full_name: Blocki, Jeremiah
  last_name: Blocki
citation:
  ama: 'Alwen JF, Blocki J. Towards practical attacks on Argon2i and balloon hashing.
    In: IEEE; 2017. doi:<a href="https://doi.org/10.1109/EuroSP.2017.47">10.1109/EuroSP.2017.47</a>'
  apa: 'Alwen, J. F., &#38; Blocki, J. (2017). Towards practical attacks on Argon2i
    and balloon hashing. Presented at the EuroS&#38;P: European Symposium on Security
    and Privacy, Paris, France: IEEE. <a href="https://doi.org/10.1109/EuroSP.2017.47">https://doi.org/10.1109/EuroSP.2017.47</a>'
  chicago: Alwen, Joel F, and Jeremiah Blocki. “Towards Practical Attacks on Argon2i
    and Balloon Hashing.” IEEE, 2017. <a href="https://doi.org/10.1109/EuroSP.2017.47">https://doi.org/10.1109/EuroSP.2017.47</a>.
  ieee: 'J. F. Alwen and J. Blocki, “Towards practical attacks on Argon2i and balloon
    hashing,” presented at the EuroS&#38;P: European Symposium on Security and Privacy,
    Paris, France, 2017.'
  ista: 'Alwen JF, Blocki J. 2017. Towards practical attacks on Argon2i and balloon
    hashing. EuroS&#38;P: European Symposium on Security and Privacy, 7961977.'
  mla: Alwen, Joel F., and Jeremiah Blocki. <i>Towards Practical Attacks on Argon2i
    and Balloon Hashing</i>. 7961977, IEEE, 2017, doi:<a href="https://doi.org/10.1109/EuroSP.2017.47">10.1109/EuroSP.2017.47</a>.
  short: J.F. Alwen, J. Blocki, in:, IEEE, 2017.
conference:
  end_date: 2017-04-28
  location: Paris, France
  name: 'EuroS&P: European Symposium on Security and Privacy'
  start_date: 2017-04-26
date_created: 2018-12-11T11:50:33Z
date_published: 2017-07-03T00:00:00Z
date_updated: 2023-09-20T11:22:25Z
day: '03'
department:
- _id: KrPi
doi: 10.1109/EuroSP.2017.47
external_id:
  isi:
  - '000424197300011'
isi: 1
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://eprint.iacr.org/2016/759
month: '07'
oa: 1
oa_version: Submitted Version
publication_identifier:
  isbn:
  - 978-150905761-0
publication_status: published
publisher: IEEE
publist_id: '6178'
quality_controlled: '1'
scopus_import: '1'
status: public
title: Towards practical attacks on Argon2i and balloon hashing
type: conference
user_id: c635000d-4b10-11ee-a964-aac5a93f6ac1
year: '2017'
...
---
_id: '11772'
abstract:
- lang: eng
  text: A dynamic graph algorithm is a data structure that supports operations on
    dynamically changing graphs.
alternative_title:
- LNCS
article_processing_charge: No
author:
- first_name: Monika H
  full_name: Henzinger, Monika H
  id: 540c9bbd-f2de-11ec-812d-d04a5be85630
  last_name: Henzinger
  orcid: 0000-0002-5008-6530
citation:
  ama: 'Henzinger M. The state of the art in dynamic graph algorithms. In: <i>44th
    International Conference on Current Trends in Theory and Practice of Computer
    Science</i>. Vol 10706. Springer Nature; 2017:40–44. doi:<a href="https://doi.org/10.1007/978-3-319-73117-9_3">10.1007/978-3-319-73117-9_3</a>'
  apa: 'Henzinger, M. (2017). The state of the art in dynamic graph algorithms. In
    <i>44th International Conference on Current Trends in Theory and Practice of Computer
    Science</i> (Vol. 10706, pp. 40–44). Krems, Austria: Springer Nature. <a href="https://doi.org/10.1007/978-3-319-73117-9_3">https://doi.org/10.1007/978-3-319-73117-9_3</a>'
  chicago: Henzinger, Monika. “The State of the Art in Dynamic Graph Algorithms.”
    In <i>44th International Conference on Current Trends in Theory and Practice of
    Computer Science</i>, 10706:40–44. Springer Nature, 2017. <a href="https://doi.org/10.1007/978-3-319-73117-9_3">https://doi.org/10.1007/978-3-319-73117-9_3</a>.
  ieee: M. Henzinger, “The state of the art in dynamic graph algorithms,” in <i>44th
    International Conference on Current Trends in Theory and Practice of Computer
    Science</i>, Krems, Austria, 2017, vol. 10706, pp. 40–44.
  ista: 'Henzinger M. 2017. The state of the art in dynamic graph algorithms. 44th
    International Conference on Current Trends in Theory and Practice of Computer
    Science. SOFSEM: Theory and Practice of Computer Science, LNCS, vol. 10706, 40–44.'
  mla: Henzinger, Monika. “The State of the Art in Dynamic Graph Algorithms.” <i>44th
    International Conference on Current Trends in Theory and Practice of Computer
    Science</i>, vol. 10706, Springer Nature, 2017, pp. 40–44, doi:<a href="https://doi.org/10.1007/978-3-319-73117-9_3">10.1007/978-3-319-73117-9_3</a>.
  short: M. Henzinger, in:, 44th International Conference on Current Trends in Theory
    and Practice of Computer Science, Springer Nature, 2017, pp. 40–44.
conference:
  end_date: 2018-02-02
  location: Krems, Austria
  name: 'SOFSEM: Theory and Practice of Computer Science'
  start_date: 2018-01-29
date_created: 2022-08-08T13:16:37Z
date_published: 2017-12-22T00:00:00Z
date_updated: 2024-11-06T08:15:42Z
day: '22'
doi: 10.1007/978-3-319-73117-9_3
extern: '1'
intvolume: '     10706'
language:
- iso: eng
month: '12'
oa_version: None
page: 40–44
publication: 44th International Conference on Current Trends in Theory and Practice
  of Computer Science
publication_identifier:
  eisbn:
  - '9783319731179'
  isbn:
  - '9783319731162'
  issn:
  - 0302-9743
publication_status: published
publisher: Springer Nature
quality_controlled: '1'
scopus_import: '1'
status: public
title: The state of the art in dynamic graph algorithms
type: conference
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
volume: 10706
year: '2017'
...
---
_id: '1178'
abstract:
- lang: eng
  text: 'For any pair (X, Z) of correlated random variables we can think of Z as a
    randomized function of X. If the domain of Z is small, one can make this function
    computationally efficient by allowing it to be only approximately correct. In
    folklore this problem is known as simulating auxiliary inputs. This idea of simulating
    auxiliary information turns out to be a very usefull tool, finding applications
    in complexity theory, cryptography, pseudorandomness and zero-knowledge. In this
    paper we revisit this problem, achieving the following results: (a) We present
    a novel boosting algorithm for constructing the simulator. This boosting proof
    is of independent interest, as it shows how to handle “negative mass” issues when
    constructing probability measures by shifting distinguishers in descent algorithms.
    Our technique essentially fixes the flaw in the TCC’14 paper “How to Fake Auxiliary
    Inputs”. (b) The complexity of our simulator is better than in previous works,
    including results derived from the uniform min-max theorem due to Vadhan and Zheng.
    To achieve (s,ϵ) -indistinguishability we need the complexity O(s⋅25ℓϵ−2) in time/circuit
    size, which improve previous bounds by a factor of ϵ−2. In particular, with we
    get meaningful provable security for the EUROCRYPT’09 leakage-resilient stream
    cipher instantiated with a standard 256-bit block cipher, like '
acknowledgement: This work was supported by the National Science Center, Poland (2015/17/N/ST6/03564).
alternative_title:
- LNCS
article_processing_charge: No
author:
- first_name: Maciej
  full_name: Skórski, Maciej
  id: EC09FA6A-02D0-11E9-8223-86B7C91467DD
  last_name: Skórski
citation:
  ama: 'Skórski M. Simulating auxiliary inputs, revisited. In: Vol 9985. Springer;
    2017:159-179. doi:<a href="https://doi.org/10.1007/978-3-662-53641-4_7">10.1007/978-3-662-53641-4_7</a>'
  apa: 'Skórski, M. (2017). Simulating auxiliary inputs, revisited (Vol. 9985, pp.
    159–179). Presented at the TCC: Theory of Cryptography Conference, Springer. <a
    href="https://doi.org/10.1007/978-3-662-53641-4_7">https://doi.org/10.1007/978-3-662-53641-4_7</a>'
  chicago: Skórski, Maciej. “Simulating Auxiliary Inputs, Revisited,” 9985:159–79.
    Springer, 2017. <a href="https://doi.org/10.1007/978-3-662-53641-4_7">https://doi.org/10.1007/978-3-662-53641-4_7</a>.
  ieee: 'M. Skórski, “Simulating auxiliary inputs, revisited,” presented at the TCC:
    Theory of Cryptography Conference, 2017, vol. 9985, pp. 159–179.'
  ista: 'Skórski M. 2017. Simulating auxiliary inputs, revisited. TCC: Theory of Cryptography
    Conference, LNCS, vol. 9985, 159–179.'
  mla: Skórski, Maciej. <i>Simulating Auxiliary Inputs, Revisited</i>. Vol. 9985,
    Springer, 2017, pp. 159–79, doi:<a href="https://doi.org/10.1007/978-3-662-53641-4_7">10.1007/978-3-662-53641-4_7</a>.
  short: M. Skórski, in:, Springer, 2017, pp. 159–179.
conference:
  name: 'TCC: Theory of Cryptography Conference'
date_created: 2018-12-11T11:50:34Z
date_published: 2017-01-01T00:00:00Z
date_updated: 2023-09-20T11:21:57Z
day: '01'
doi: 10.1007/978-3-662-53641-4_7
extern: '1'
external_id:
  isi:
  - '000390176000007'
intvolume: '      9985'
isi: 1
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: 'https://eprint.iacr.org/2016/808.pdf '
month: '01'
oa: 1
oa_version: Submitted Version
page: 159 - 179
publication_status: published
publisher: Springer
publist_id: '6176'
quality_controlled: '1'
status: public
title: Simulating auxiliary inputs, revisited
type: conference
user_id: c635000d-4b10-11ee-a964-aac5a93f6ac1
volume: 9985
year: '2017'
...
---
_id: '1180'
abstract:
- lang: eng
  text: In this article we define an algebraic vertex of a generalized polyhedron
    and show that the set of algebraic vertices is the smallest set of points needed
    to define the polyhedron. We prove that the indicator function of a generalized
    polytope P is a linear combination of indicator functions of simplices whose vertices
    are algebraic vertices of P. We also show that the indicator function of any generalized
    polyhedron is a linear combination, with integer coefficients, of indicator functions
    of cones with apices at algebraic vertices and line-cones. The concept of an algebraic
    vertex is closely related to the Fourier–Laplace transform. We show that a point
    v is an algebraic vertex of a generalized polyhedron P if and only if the tangent
    cone of P, at v, has non-zero Fourier–Laplace transform.
article_processing_charge: No
arxiv: 1
author:
- first_name: Arseniy
  full_name: Akopyan, Arseniy
  id: 430D2C90-F248-11E8-B48F-1D18A9856A87
  last_name: Akopyan
  orcid: 0000-0002-2548-617X
- first_name: Imre
  full_name: Bárány, Imre
  last_name: Bárány
- first_name: Sinai
  full_name: Robins, Sinai
  last_name: Robins
citation:
  ama: Akopyan A, Bárány I, Robins S. Algebraic vertices of non-convex polyhedra.
    <i>Advances in Mathematics</i>. 2017;308:627-644. doi:<a href="https://doi.org/10.1016/j.aim.2016.12.026">10.1016/j.aim.2016.12.026</a>
  apa: Akopyan, A., Bárány, I., &#38; Robins, S. (2017). Algebraic vertices of non-convex
    polyhedra. <i>Advances in Mathematics</i>. Academic Press. <a href="https://doi.org/10.1016/j.aim.2016.12.026">https://doi.org/10.1016/j.aim.2016.12.026</a>
  chicago: Akopyan, Arseniy, Imre Bárány, and Sinai Robins. “Algebraic Vertices of
    Non-Convex Polyhedra.” <i>Advances in Mathematics</i>. Academic Press, 2017. <a
    href="https://doi.org/10.1016/j.aim.2016.12.026">https://doi.org/10.1016/j.aim.2016.12.026</a>.
  ieee: A. Akopyan, I. Bárány, and S. Robins, “Algebraic vertices of non-convex polyhedra,”
    <i>Advances in Mathematics</i>, vol. 308. Academic Press, pp. 627–644, 2017.
  ista: Akopyan A, Bárány I, Robins S. 2017. Algebraic vertices of non-convex polyhedra.
    Advances in Mathematics. 308, 627–644.
  mla: Akopyan, Arseniy, et al. “Algebraic Vertices of Non-Convex Polyhedra.” <i>Advances
    in Mathematics</i>, vol. 308, Academic Press, 2017, pp. 627–44, doi:<a href="https://doi.org/10.1016/j.aim.2016.12.026">10.1016/j.aim.2016.12.026</a>.
  short: A. Akopyan, I. Bárány, S. Robins, Advances in Mathematics 308 (2017) 627–644.
date_created: 2018-12-11T11:50:34Z
date_published: 2017-02-21T00:00:00Z
date_updated: 2025-06-04T08:45:48Z
day: '21'
department:
- _id: HeEd
doi: 10.1016/j.aim.2016.12.026
ec_funded: 1
external_id:
  arxiv:
  - '1508.07594'
  isi:
  - '000409292900015'
intvolume: '       308'
isi: 1
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://arxiv.org/abs/1508.07594
month: '02'
oa: 1
oa_version: Submitted Version
page: 627 - 644
project:
- _id: 25681D80-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '291734'
  name: International IST Postdoc Fellowship Programme
publication: Advances in Mathematics
publication_identifier:
  issn:
  - 0001-8708
publication_status: published
publisher: Academic Press
publist_id: '6173'
quality_controlled: '1'
scopus_import: '1'
status: public
title: Algebraic vertices of non-convex polyhedra
type: journal_article
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
volume: 308
year: '2017'
...
---
_id: '11829'
abstract:
- lang: eng
  text: "In recent years it has become popular to study dynamic problems in a sensitivity
    setting: Instead of allowing for an arbitrary sequence of updates, the sensitivity
    model only allows to apply batch updates of small size to the original input data.
    The sensitivity model is particularly appealing since recent strong conditional
    lower bounds ruled out fast algorithms for many dynamic problems, such as shortest
    paths, reachability, or subgraph connectivity.\r\n\r\nIn this paper we prove conditional
    lower bounds for these and additional problems in a sensitivity setting. For example,
    we show that under the Boolean Matrix Multiplication (BMM) conjecture combinatorial
    algorithms cannot compute the (4/3-\\varepsilon)-approximate diameter of an undirected
    unweighted dense graph with truly subcubic preprocessing time and truly subquadratic
    update/query time. This result is surprising since in the static setting it is
    not clear whether a reduction from BMM to diameter is possible. We further show
    under the BMM conjecture that many problems, such as reachability or approximate
    shortest paths, cannot be solved faster than by recomputation from scratch even
    after only one or two edge insertions. We extend our reduction from BMM to Diameter
    to give a reduction from All Pairs Shortest Paths to Diameter under one deletion
    in weighted graphs. This is intriguing, as in the static setting it is a big open
    problem whether Diameter is as hard as APSP. We further get a nearly tight lower
    bound for shortest paths after two edge deletions based on the APSP conjecture.
    We give more lower bounds under the Strong Exponential Time Hypothesis. Many of
    our lower bounds also hold for static oracle data structures where no sensitivity
    is required.\r\n\r\nFinally, we give the first algorithm for the (1+\\varepsilon)-approximate
    radius, diameter, and eccentricity problems in directed or undirected unweighted
    graphs in case of single edges failures. The algorithm has a truly subcubic running
    time for graphs with a truly subquadratic number of edges; it is tight w.r.t.
    the conditional lower bounds we obtain."
alternative_title:
- LIPIcs
article_number: '26'
article_processing_charge: No
arxiv: 1
author:
- first_name: Monika H
  full_name: Henzinger, Monika H
  id: 540c9bbd-f2de-11ec-812d-d04a5be85630
  last_name: Henzinger
  orcid: 0000-0002-5008-6530
- first_name: Andrea
  full_name: Lincoln, Andrea
  last_name: Lincoln
- first_name: Stefan
  full_name: Neumann, Stefan
  last_name: Neumann
- first_name: Virginia
  full_name: Vassilevska Williams, Virginia
  last_name: Vassilevska Williams
citation:
  ama: 'Henzinger M, Lincoln A, Neumann S, Vassilevska Williams V. Conditional hardness
    for sensitivity problems. In: <i>8th Innovations in Theoretical Computer Science
    Conference</i>. Vol 67. Schloss Dagstuhl - Leibniz-Zentrum für Informatik; 2017.
    doi:<a href="https://doi.org/10.4230/LIPICS.ITCS.2017.26">10.4230/LIPICS.ITCS.2017.26</a>'
  apa: 'Henzinger, M., Lincoln, A., Neumann, S., &#38; Vassilevska Williams, V. (2017).
    Conditional hardness for sensitivity problems. In <i>8th Innovations in Theoretical
    Computer Science Conference</i> (Vol. 67). Berkley, CA, United States: Schloss
    Dagstuhl - Leibniz-Zentrum für Informatik. <a href="https://doi.org/10.4230/LIPICS.ITCS.2017.26">https://doi.org/10.4230/LIPICS.ITCS.2017.26</a>'
  chicago: Henzinger, Monika, Andrea Lincoln, Stefan Neumann, and Virginia Vassilevska
    Williams. “Conditional Hardness for Sensitivity Problems.” In <i>8th Innovations
    in Theoretical Computer Science Conference</i>, Vol. 67. Schloss Dagstuhl - Leibniz-Zentrum
    für Informatik, 2017. <a href="https://doi.org/10.4230/LIPICS.ITCS.2017.26">https://doi.org/10.4230/LIPICS.ITCS.2017.26</a>.
  ieee: M. Henzinger, A. Lincoln, S. Neumann, and V. Vassilevska Williams, “Conditional
    hardness for sensitivity problems,” in <i>8th Innovations in Theoretical Computer
    Science Conference</i>, Berkley, CA, United States, 2017, vol. 67.
  ista: 'Henzinger M, Lincoln A, Neumann S, Vassilevska Williams V. 2017. Conditional
    hardness for sensitivity problems. 8th Innovations in Theoretical Computer Science
    Conference. ITCS: Innovations in Theoretical Computer Science Conference, LIPIcs,
    vol. 67, 26.'
  mla: Henzinger, Monika, et al. “Conditional Hardness for Sensitivity Problems.”
    <i>8th Innovations in Theoretical Computer Science Conference</i>, vol. 67, 26,
    Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2017, doi:<a href="https://doi.org/10.4230/LIPICS.ITCS.2017.26">10.4230/LIPICS.ITCS.2017.26</a>.
  short: M. Henzinger, A. Lincoln, S. Neumann, V. Vassilevska Williams, in:, 8th Innovations
    in Theoretical Computer Science Conference, Schloss Dagstuhl - Leibniz-Zentrum
    für Informatik, 2017.
conference:
  end_date: 2017-01-11
  location: Berkley, CA, United States
  name: 'ITCS: Innovations in Theoretical Computer Science Conference'
  start_date: 2017-01-09
date_created: 2022-08-12T08:55:33Z
date_published: 2017-11-28T00:00:00Z
date_updated: 2024-11-06T11:56:09Z
day: '28'
doi: 10.4230/LIPICS.ITCS.2017.26
extern: '1'
external_id:
  arxiv:
  - '1703.01638'
intvolume: '        67'
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://doi.org/10.4230/LIPICS.ITCS.2017.26
month: '11'
oa: 1
oa_version: Published Version
publication: 8th Innovations in Theoretical Computer Science Conference
publication_identifier:
  isbn:
  - '9783959770293'
  issn:
  - 1868-8969
publication_status: published
publisher: Schloss Dagstuhl - Leibniz-Zentrum für Informatik
quality_controlled: '1'
scopus_import: '1'
status: public
title: Conditional hardness for sensitivity problems
type: conference
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
volume: 67
year: '2017'
...
---
_id: '11831'
abstract:
- lang: eng
  text: "Graph Sparsification aims at compressing large graphs into smaller ones while
    (approximately) preserving important characteristics of the input graph. In this
    work we study Vertex Sparsifiers, i.e., sparsifiers whose goal is to reduce the
    number of vertices. Given a weighted graph G=(V,E), and a terminal set K with
    |K|=k, a quality-q vertex cut sparsifier of G is a graph H with K contained in
    V_H that preserves the value of minimum cuts separating any bipartition of K,
    up to a factor of q. We show that planar graphs with all the k terminals lying
    on the same face admit quality-1 vertex cut sparsifier of size O(k^2) that are
    also planar. Our result extends to vertex flow and distance sparsifiers. It improves
    the previous best known bound of O(k^2 2^(2k)) for cut and flow sparsifiers by
    an exponential factor, and matches an Omega(k^2) lower-bound for this class of
    graphs.\r\n\r\nWe also study vertex reachability sparsifiers for directed graphs.
    Given a digraph G=(V,E) and a terminal set K, a vertex reachability sparsifier
    of G is a digraph H=(V_H,E_H), K contained in V_H that preserves all reachability
    information among terminal pairs. We introduce the notion of reachability-preserving
    minors, i.e., we require H to be a minor of G. Among others, for general planar
    digraphs, we construct reachability-preserving minors of size O(k^2 log^2 k).
    We complement our upper-bound by showing that there exists an infinite family
    of acyclic planar digraphs such that any reachability-preserving minor must have
    Omega(k^2) vertices."
alternative_title:
- LIPIcs
article_number: '44'
article_processing_charge: No
arxiv: 1
author:
- first_name: Gramoz
  full_name: Goranci, Gramoz
  last_name: Goranci
- first_name: Monika H
  full_name: Henzinger, Monika H
  id: 540c9bbd-f2de-11ec-812d-d04a5be85630
  last_name: Henzinger
  orcid: 0000-0002-5008-6530
- first_name: Pan
  full_name: Peng, Pan
  last_name: Peng
citation:
  ama: 'Goranci G, Henzinger M, Peng P. Improved guarantees for vertex sparsification
    in planar graphs. In: <i>25th Annual European Symposium on Algorithms</i>. Vol
    87. Schloss Dagstuhl - Leibniz-Zentrum für Informatik; 2017. doi:<a href="https://doi.org/10.4230/LIPICS.ESA.2017.44">10.4230/LIPICS.ESA.2017.44</a>'
  apa: 'Goranci, G., Henzinger, M., &#38; Peng, P. (2017). Improved guarantees for
    vertex sparsification in planar graphs. In <i>25th Annual European Symposium on
    Algorithms</i> (Vol. 87). Vienna, Austria: Schloss Dagstuhl - Leibniz-Zentrum
    für Informatik. <a href="https://doi.org/10.4230/LIPICS.ESA.2017.44">https://doi.org/10.4230/LIPICS.ESA.2017.44</a>'
  chicago: Goranci, Gramoz, Monika Henzinger, and Pan Peng. “Improved Guarantees for
    Vertex Sparsification in Planar Graphs.” In <i>25th Annual European Symposium
    on Algorithms</i>, Vol. 87. Schloss Dagstuhl - Leibniz-Zentrum für Informatik,
    2017. <a href="https://doi.org/10.4230/LIPICS.ESA.2017.44">https://doi.org/10.4230/LIPICS.ESA.2017.44</a>.
  ieee: G. Goranci, M. Henzinger, and P. Peng, “Improved guarantees for vertex sparsification
    in planar graphs,” in <i>25th Annual European Symposium on Algorithms</i>, Vienna,
    Austria, 2017, vol. 87.
  ista: 'Goranci G, Henzinger M, Peng P. 2017. Improved guarantees for vertex sparsification
    in planar graphs. 25th Annual European Symposium on Algorithms. ESA: Annual European
    Symposium on Algorithms, LIPIcs, vol. 87, 44.'
  mla: Goranci, Gramoz, et al. “Improved Guarantees for Vertex Sparsification in Planar
    Graphs.” <i>25th Annual European Symposium on Algorithms</i>, vol. 87, 44, Schloss
    Dagstuhl - Leibniz-Zentrum für Informatik, 2017, doi:<a href="https://doi.org/10.4230/LIPICS.ESA.2017.44">10.4230/LIPICS.ESA.2017.44</a>.
  short: G. Goranci, M. Henzinger, P. Peng, in:, 25th Annual European Symposium on
    Algorithms, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2017.
conference:
  end_date: 2017-09-06
  location: Vienna, Austria
  name: 'ESA: Annual European Symposium on Algorithms'
  start_date: 2017-09-04
date_created: 2022-08-12T09:27:11Z
date_published: 2017-09-01T00:00:00Z
date_updated: 2024-11-06T11:57:54Z
day: '01'
doi: 10.4230/LIPICS.ESA.2017.44
extern: '1'
external_id:
  arxiv:
  - '1702.01136'
intvolume: '        87'
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://doi.org/10.4230/LIPIcs.ESA.2017.44
month: '09'
oa: 1
oa_version: Published Version
publication: 25th Annual European Symposium on Algorithms
publication_identifier:
  isbn:
  - 978-3-95977-049-1
  issn:
  - 1868-8969
publication_status: published
publisher: Schloss Dagstuhl - Leibniz-Zentrum für Informatik
quality_controlled: '1'
related_material:
  record:
  - id: '11894'
    relation: later_version
    status: public
scopus_import: '1'
status: public
title: Improved guarantees for vertex sparsification in planar graphs
type: conference
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
volume: 87
year: '2017'
...
---
_id: '11832'
abstract:
- lang: eng
  text: "In this paper, we study the problem of opening centers to cluster a set of
    clients in a metric space so as to minimize the sum of the costs of the centers
    and of the cluster radii, in a dynamic environment where clients arrive and depart,
    and the solution must be updated efficiently while remaining competitive with
    respect to the current optimal solution. We call this dynamic sum-of-radii clustering
    problem.\r\n\r\nWe present a data structure that maintains a solution whose cost
    is within a constant factor of the cost of an optimal solution in metric spaces
    with bounded doubling dimension and whose worst-case update time is logarithmic
    in the parameters of the problem."
alternative_title:
- LIPIcs
article_number: '48'
article_processing_charge: No
arxiv: 1
author:
- first_name: Monika H
  full_name: Henzinger, Monika H
  id: 540c9bbd-f2de-11ec-812d-d04a5be85630
  last_name: Henzinger
  orcid: 0000-0002-5008-6530
- first_name: Dariusz
  full_name: Leniowski, Dariusz
  last_name: Leniowski
- first_name: Claire
  full_name: Mathieu, Claire
  last_name: Mathieu
citation:
  ama: 'Henzinger M, Leniowski D, Mathieu C. Dynamic clustering to minimize the sum
    of radii. In: <i>25th Annual European Symposium on Algorithms</i>. Vol 87. Schloss
    Dagstuhl - Leibniz-Zentrum für Informatik; 2017. doi:<a href="https://doi.org/10.4230/LIPICS.ESA.2017.48">10.4230/LIPICS.ESA.2017.48</a>'
  apa: 'Henzinger, M., Leniowski, D., &#38; Mathieu, C. (2017). Dynamic clustering
    to minimize the sum of radii. In <i>25th Annual European Symposium on Algorithms</i>
    (Vol. 87). Vienna, Austria: Schloss Dagstuhl - Leibniz-Zentrum für Informatik.
    <a href="https://doi.org/10.4230/LIPICS.ESA.2017.48">https://doi.org/10.4230/LIPICS.ESA.2017.48</a>'
  chicago: Henzinger, Monika, Dariusz Leniowski, and Claire Mathieu. “Dynamic Clustering
    to Minimize the Sum of Radii.” In <i>25th Annual European Symposium on Algorithms</i>,
    Vol. 87. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2017. <a href="https://doi.org/10.4230/LIPICS.ESA.2017.48">https://doi.org/10.4230/LIPICS.ESA.2017.48</a>.
  ieee: M. Henzinger, D. Leniowski, and C. Mathieu, “Dynamic clustering to minimize
    the sum of radii,” in <i>25th Annual European Symposium on Algorithms</i>, Vienna,
    Austria, 2017, vol. 87.
  ista: 'Henzinger M, Leniowski D, Mathieu C. 2017. Dynamic clustering to minimize
    the sum of radii. 25th Annual European Symposium on Algorithms. ESA: Annual European
    Symposium on Algorithms, LIPIcs, vol. 87, 48.'
  mla: Henzinger, Monika, et al. “Dynamic Clustering to Minimize the Sum of Radii.”
    <i>25th Annual European Symposium on Algorithms</i>, vol. 87, 48, Schloss Dagstuhl
    - Leibniz-Zentrum für Informatik, 2017, doi:<a href="https://doi.org/10.4230/LIPICS.ESA.2017.48">10.4230/LIPICS.ESA.2017.48</a>.
  short: M. Henzinger, D. Leniowski, C. Mathieu, in:, 25th Annual European Symposium
    on Algorithms, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2017.
conference:
  end_date: 2017-09-06
  location: Vienna, Austria
  name: 'ESA: Annual European Symposium on Algorithms'
  start_date: 2017-09-04
date_created: 2022-08-12T09:58:46Z
date_published: 2017-09-01T00:00:00Z
date_updated: 2024-11-06T11:59:20Z
day: '01'
doi: 10.4230/LIPICS.ESA.2017.48
extern: '1'
external_id:
  arxiv:
  - '1707.02577'
intvolume: '        87'
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://doi.org/10.4230/LIPICS.ESA.2017.48
month: '09'
oa: 1
oa_version: Published Version
publication: 25th Annual European Symposium on Algorithms
publication_identifier:
  isbn:
  - 978-3-95977-049-1
  issn:
  - 1868-8969
publication_status: published
publisher: Schloss Dagstuhl - Leibniz-Zentrum für Informatik
quality_controlled: '1'
scopus_import: '1'
status: public
title: Dynamic clustering to minimize the sum of radii
type: conference
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
volume: 87
year: '2017'
...
---
_id: '11833'
abstract:
- lang: eng
  text: "We introduce a new algorithmic framework for designing dynamic graph algorithms
    in minor-free graphs, by exploiting the structure of such graphs and a tool called
    vertex sparsification, which is a way to compress large graphs into small ones
    that well preserve relevant properties among a subset of vertices and has previously
    mainly been used in the design of approximation algorithms.\r\n\r\nUsing this
    framework, we obtain a Monte Carlo randomized fully dynamic algorithm for (1 +
    epsilon)-approximating the energy of electrical flows in n-vertex planar graphs
    with tilde{O}(r epsilon^{-2}) worst-case update time and tilde{O}((r + n / sqrt{r})
    epsilon^{-2}) worst-case query time, for any r larger than some constant. For
    r=n^{2/3}, this gives tilde{O}(n^{2/3} epsilon^{-2}) update time and tilde{O}(n^{2/3}
    epsilon^{-2}) query time. We also extend this algorithm to work for minor-free
    graphs with similar approximation and running time guarantees. Furthermore, we
    illustrate our framework on the all-pairs max flow and shortest path problems
    by giving corresponding dynamic algorithms in minor-free graphs with both sublinear
    update and query times. To the best of our knowledge, our results are the first
    to systematically establish such a connection between dynamic graph algorithms
    and vertex sparsification.\r\n\r\nWe also present both upper bound and lower bound
    for maintaining the energy of electrical flows in the incremental subgraph model,
    where updates consist of only vertex activations, which might be of independent
    interest."
alternative_title:
- LIPIcs
article_number: '45'
article_processing_charge: No
arxiv: 1
author:
- first_name: Gramoz
  full_name: Goranci, Gramoz
  last_name: Goranci
- first_name: Monika H
  full_name: Henzinger, Monika H
  id: 540c9bbd-f2de-11ec-812d-d04a5be85630
  last_name: Henzinger
  orcid: 0000-0002-5008-6530
- first_name: Pan
  full_name: Peng, Pan
  last_name: Peng
citation:
  ama: 'Goranci G, Henzinger M, Peng P. The power of vertex sparsifiers in dynamic
    graph algorithms. In: <i>25th Annual European Symposium on Algorithms</i>. Vol
    87. Schloss Dagstuhl - Leibniz-Zentrum für Informatik; 2017. doi:<a href="https://doi.org/10.4230/LIPICS.ESA.2017.45">10.4230/LIPICS.ESA.2017.45</a>'
  apa: 'Goranci, G., Henzinger, M., &#38; Peng, P. (2017). The power of vertex sparsifiers
    in dynamic graph algorithms. In <i>25th Annual European Symposium on Algorithms</i>
    (Vol. 87). Vienna, Austria: Schloss Dagstuhl - Leibniz-Zentrum für Informatik.
    <a href="https://doi.org/10.4230/LIPICS.ESA.2017.45">https://doi.org/10.4230/LIPICS.ESA.2017.45</a>'
  chicago: Goranci, Gramoz, Monika Henzinger, and Pan Peng. “The Power of Vertex Sparsifiers
    in Dynamic Graph Algorithms.” In <i>25th Annual European Symposium on Algorithms</i>,
    Vol. 87. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2017. <a href="https://doi.org/10.4230/LIPICS.ESA.2017.45">https://doi.org/10.4230/LIPICS.ESA.2017.45</a>.
  ieee: G. Goranci, M. Henzinger, and P. Peng, “The power of vertex sparsifiers in
    dynamic graph algorithms,” in <i>25th Annual European Symposium on Algorithms</i>,
    Vienna, Austria, 2017, vol. 87.
  ista: 'Goranci G, Henzinger M, Peng P. 2017. The power of vertex sparsifiers in
    dynamic graph algorithms. 25th Annual European Symposium on Algorithms. ESA: Annual
    European Symposium on Algorithms, LIPIcs, vol. 87, 45.'
  mla: Goranci, Gramoz, et al. “The Power of Vertex Sparsifiers in Dynamic Graph Algorithms.”
    <i>25th Annual European Symposium on Algorithms</i>, vol. 87, 45, Schloss Dagstuhl
    - Leibniz-Zentrum für Informatik, 2017, doi:<a href="https://doi.org/10.4230/LIPICS.ESA.2017.45">10.4230/LIPICS.ESA.2017.45</a>.
  short: G. Goranci, M. Henzinger, P. Peng, in:, 25th Annual European Symposium on
    Algorithms, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2017.
conference:
  end_date: 2017-09-06
  location: Vienna, Austria
  name: 'ESA: Annual European Symposium on Algorithms'
  start_date: 2017-09-04
date_created: 2022-08-12T10:46:26Z
date_published: 2017-09-01T00:00:00Z
date_updated: 2024-11-06T11:58:29Z
day: '01'
doi: 10.4230/LIPICS.ESA.2017.45
extern: '1'
external_id:
  arxiv:
  - '1712.06473'
intvolume: '        87'
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://doi.org/10.4230/LIPIcs.ESA.2017.45
month: '09'
oa: 1
oa_version: Published Version
publication: 25th Annual European Symposium on Algorithms
publication_identifier:
  isbn:
  - 978-3-95977-049-1
  issn:
  - 1868-8969
publication_status: published
publisher: Schloss Dagstuhl - Leibniz-Zentrum für Informatik
quality_controlled: '1'
scopus_import: '1'
status: public
title: The power of vertex sparsifiers in dynamic graph algorithms
type: conference
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
volume: 87
year: '2017'
...
---
_id: '1187'
abstract:
- lang: eng
  text: We construct efficient authentication protocols and message authentication
    codes (MACs) whose security can be reduced to the learning parity with noise (LPN)
    problem. Despite a large body of work—starting with the (Formula presented.) protocol
    of Hopper and Blum in 2001—until now it was not even known how to construct an
    efficient authentication protocol from LPN which is secure against man-in-the-middle
    attacks. A MAC implies such a (two-round) protocol.
article_processing_charge: No
article_type: original
author:
- first_name: Eike
  full_name: Kiltz, Eike
  last_name: Kiltz
- first_name: Krzysztof Z
  full_name: Pietrzak, Krzysztof Z
  id: 3E04A7AA-F248-11E8-B48F-1D18A9856A87
  last_name: Pietrzak
  orcid: 0000-0002-9139-1654
- first_name: Daniele
  full_name: Venturi, Daniele
  last_name: Venturi
- first_name: David
  full_name: Cash, David
  last_name: Cash
- first_name: Abhishek
  full_name: Jain, Abhishek
  last_name: Jain
citation:
  ama: Kiltz E, Pietrzak KZ, Venturi D, Cash D, Jain A. Efficient authentication from
    hard learning problems. <i>Journal of Cryptology</i>. 2017;30(4):1238-1275. doi:<a
    href="https://doi.org/10.1007/s00145-016-9247-3">10.1007/s00145-016-9247-3</a>
  apa: Kiltz, E., Pietrzak, K. Z., Venturi, D., Cash, D., &#38; Jain, A. (2017). Efficient
    authentication from hard learning problems. <i>Journal of Cryptology</i>. Springer.
    <a href="https://doi.org/10.1007/s00145-016-9247-3">https://doi.org/10.1007/s00145-016-9247-3</a>
  chicago: Kiltz, Eike, Krzysztof Z Pietrzak, Daniele Venturi, David Cash, and Abhishek
    Jain. “Efficient Authentication from Hard Learning Problems.” <i>Journal of Cryptology</i>.
    Springer, 2017. <a href="https://doi.org/10.1007/s00145-016-9247-3">https://doi.org/10.1007/s00145-016-9247-3</a>.
  ieee: E. Kiltz, K. Z. Pietrzak, D. Venturi, D. Cash, and A. Jain, “Efficient authentication
    from hard learning problems,” <i>Journal of Cryptology</i>, vol. 30, no. 4. Springer,
    pp. 1238–1275, 2017.
  ista: Kiltz E, Pietrzak KZ, Venturi D, Cash D, Jain A. 2017. Efficient authentication
    from hard learning problems. Journal of Cryptology. 30(4), 1238–1275.
  mla: Kiltz, Eike, et al. “Efficient Authentication from Hard Learning Problems.”
    <i>Journal of Cryptology</i>, vol. 30, no. 4, Springer, 2017, pp. 1238–75, doi:<a
    href="https://doi.org/10.1007/s00145-016-9247-3">10.1007/s00145-016-9247-3</a>.
  short: E. Kiltz, K.Z. Pietrzak, D. Venturi, D. Cash, A. Jain, Journal of Cryptology
    30 (2017) 1238–1275.
date_created: 2018-12-11T11:50:37Z
date_published: 2017-10-01T00:00:00Z
date_updated: 2025-04-14T07:22:06Z
day: '01'
ddc:
- '000'
department:
- _id: KrPi
doi: 10.1007/s00145-016-9247-3
ec_funded: 1
external_id:
  isi:
  - '000410788600007'
file:
- access_level: open_access
  checksum: c647520d115b772a1682fc06fa273eb1
  content_type: application/pdf
  creator: dernst
  date_created: 2020-05-14T16:30:17Z
  date_updated: 2020-07-14T12:44:37Z
  file_id: '7843'
  file_name: 2017_JournalCrypto_Kiltz.pdf
  file_size: 516959
  relation: main_file
file_date_updated: 2020-07-14T12:44:37Z
has_accepted_license: '1'
intvolume: '        30'
isi: 1
issue: '4'
language:
- iso: eng
month: '10'
oa: 1
oa_version: Submitted Version
page: 1238 - 1275
project:
- _id: 258AA5B2-B435-11E9-9278-68D0E5697425
  call_identifier: H2020
  grant_number: '682815'
  name: Teaching Old Crypto New Tricks
- _id: 258C570E-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '259668'
  name: Provable Security for Physical Cryptography
publication: Journal of Cryptology
publication_status: published
publisher: Springer
publist_id: '6166'
quality_controlled: '1'
related_material:
  record:
  - id: '3238'
    relation: earlier_version
    status: public
scopus_import: '1'
status: public
title: Efficient authentication from hard learning problems
type: journal_article
user_id: c635000d-4b10-11ee-a964-aac5a93f6ac1
volume: 30
year: '2017'
...
---
_id: '11873'
abstract:
- lang: eng
  text: "We study the problem of computing a minimum cut in a simple, undirected graph
    and give a deterministic O(m log2 n log log2 n) time algorithm. This improves
    both on the best previously known deterministic running time of O(m log12 n) (Kawarabayashi
    and Thorup [12]) and the best previously known randomized running time of O(mlog3n)
    (Karger [11]) for this problem, though Karger's algorithm can be further applied
    to weighted graphs.\r\n\r\nOur approach is using the Kawarabayashi and Tho- rup
    graph compression technique, which repeatedly finds low-conductance cuts. To find
    these cuts they use a diffusion-based local algorithm. We use instead a flow-
    based local algorithm and suitably adjust their framework to work with our flow-based
    subroutine. Both flow and diffusion based methods have a long history of being
    applied to finding low conductance cuts. Diffusion algorithms have several variants
    that are naturally local while it is more complicated to make flow methods local.
    Some prior work has proven nice properties for local flow based algorithms with
    respect to improving or cleaning up low conductance cuts. Our flow subroutine,
    however, is the first that is both local and produces low conductance cuts. Thus,
    it may be of independent interest."
article_processing_charge: No
arxiv: 1
author:
- first_name: Monika H
  full_name: Henzinger, Monika H
  id: 540c9bbd-f2de-11ec-812d-d04a5be85630
  last_name: Henzinger
  orcid: 0000-0002-5008-6530
- first_name: Satish
  full_name: Rao, Satish
  last_name: Rao
- first_name: Di
  full_name: Wang, Di
  last_name: Wang
citation:
  ama: 'Henzinger M, Rao S, Wang D. Local flow partitioning for faster edge connectivity.
    In: <i>28th Annual ACM-SIAM Symposium on Discrete Algorithms</i>. Society for
    Industrial and Applied Mathematics; 2017:1919-1938. doi:<a href="https://doi.org/10.1137/1.9781611974782.125">10.1137/1.9781611974782.125</a>'
  apa: 'Henzinger, M., Rao, S., &#38; Wang, D. (2017). Local flow partitioning for
    faster edge connectivity. In <i>28th Annual ACM-SIAM Symposium on Discrete Algorithms</i>
    (pp. 1919–1938). Barcelona, Spain: Society for Industrial and Applied Mathematics.
    <a href="https://doi.org/10.1137/1.9781611974782.125">https://doi.org/10.1137/1.9781611974782.125</a>'
  chicago: Henzinger, Monika, Satish Rao, and Di Wang. “Local Flow Partitioning for
    Faster Edge Connectivity.” In <i>28th Annual ACM-SIAM Symposium on Discrete Algorithms</i>,
    1919–38. Society for Industrial and Applied Mathematics, 2017. <a href="https://doi.org/10.1137/1.9781611974782.125">https://doi.org/10.1137/1.9781611974782.125</a>.
  ieee: M. Henzinger, S. Rao, and D. Wang, “Local flow partitioning for faster edge
    connectivity,” in <i>28th Annual ACM-SIAM Symposium on Discrete Algorithms</i>,
    Barcelona, Spain, 2017, pp. 1919–1938.
  ista: 'Henzinger M, Rao S, Wang D. 2017. Local flow partitioning for faster edge
    connectivity. 28th Annual ACM-SIAM Symposium on Discrete Algorithms. SODA: Symposium
    on Discrete Algorithms, 1919–1938.'
  mla: Henzinger, Monika, et al. “Local Flow Partitioning for Faster Edge Connectivity.”
    <i>28th Annual ACM-SIAM Symposium on Discrete Algorithms</i>, Society for Industrial
    and Applied Mathematics, 2017, pp. 1919–38, doi:<a href="https://doi.org/10.1137/1.9781611974782.125">10.1137/1.9781611974782.125</a>.
  short: M. Henzinger, S. Rao, D. Wang, in:, 28th Annual ACM-SIAM Symposium on Discrete
    Algorithms, Society for Industrial and Applied Mathematics, 2017, pp. 1919–1938.
conference:
  end_date: 2017-01-19
  location: Barcelona, Spain
  name: 'SODA: Symposium on Discrete Algorithms'
  start_date: 2017-01-16
date_created: 2022-08-16T12:20:59Z
date_published: 2017-01-01T00:00:00Z
date_updated: 2024-11-06T12:22:42Z
day: '01'
doi: 10.1137/1.9781611974782.125
extern: '1'
external_id:
  arxiv:
  - '1704.01254'
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://arxiv.org/abs/1704.01254
month: '01'
oa: 1
oa_version: Preprint
page: 1919-1938
publication: 28th Annual ACM-SIAM Symposium on Discrete Algorithms
publication_identifier:
  eisbn:
  - 978-161197478-2
publication_status: published
publisher: Society for Industrial and Applied Mathematics
quality_controlled: '1'
related_material:
  record:
  - id: '11889'
    relation: earlier_version
    status: public
scopus_import: '1'
status: public
title: Local flow partitioning for faster edge connectivity
type: conference
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
year: '2017'
...
---
_id: '11874'
abstract:
- lang: eng
  text: "We consider the problem of maintaining an approximately maximum (fractional)
    matching and an approximately minimum vertex cover in a dynamic graph. Starting
    with the seminal paper by Onak and Rubinfeld [STOC 2010], this problem has received
    significant attention in recent years. There remains, however, a polynomial gap
    between the best known worst case update time and the best known amortised update
    time for this problem, even after allowing for randomisation. Specifically, Bernstein
    and Stein [ICALP 2015, SODA 2016] have the best known worst case update time.
    They present a deterministic data structure with approximation ratio (3/2 + ∊)
    and worst case update time O(m1/4/ ∊2), where m is the number of edges in the
    graph. In recent past, Gupta and Peng [FOCS 2013] gave a deterministic data structure
    with approximation ratio (1+ ∊) and worst case update time  No known randomised
    data structure beats the worst case update times of these two results. In contrast,
    the paper by Onak and Rubinfeld [STOC 2010] gave a randomised data structure with
    approximation ratio O(1) and amortised update time O(log2 n), where n is the number
    of nodes in the graph. This was later improved by Baswana, Gupta and Sen [FOCS
    2011] and Solomon [FOCS 2016], leading to a randomised date structure with approximation
    ratio 2 and amortised update time O(1).\r\n\r\nWe bridge the polynomial gap between
    the worst case and amortised update times for this problem, without using any
    randomisation. We present a deterministic data structure with approximation ratio
    (2 + ∊) and worst case update time O(log3 n), for all sufficiently small constants
    ∊."
article_processing_charge: No
arxiv: 1
author:
- first_name: Sayan
  full_name: Bhattacharya, Sayan
  last_name: Bhattacharya
- first_name: Monika H
  full_name: Henzinger, Monika H
  id: 540c9bbd-f2de-11ec-812d-d04a5be85630
  last_name: Henzinger
  orcid: 0000-0002-5008-6530
- first_name: Danupon
  full_name: Nanongkai, Danupon
  last_name: Nanongkai
citation:
  ama: 'Bhattacharya S, Henzinger M, Nanongkai D. Fully dynamic approximate maximum
    matching and minimum vertex cover in o(log3 n) worst case update time. In: <i>28th
    Annual ACM-SIAM Symposium on Discrete Algorithms</i>. Vol 0. Society for Industrial
    and Applied Mathematics; 2017:470-489. doi:<a href="https://doi.org/10.1137/1.9781611974782.30">10.1137/1.9781611974782.30</a>'
  apa: 'Bhattacharya, S., Henzinger, M., &#38; Nanongkai, D. (2017). Fully dynamic
    approximate maximum matching and minimum vertex cover in o(log3 n) worst case
    update time. In <i>28th Annual ACM-SIAM Symposium on Discrete Algorithms</i> (Vol.
    0, pp. 470–489). Barcelona, Spain: Society for Industrial and Applied Mathematics.
    <a href="https://doi.org/10.1137/1.9781611974782.30">https://doi.org/10.1137/1.9781611974782.30</a>'
  chicago: Bhattacharya, Sayan, Monika Henzinger, and Danupon Nanongkai. “Fully Dynamic
    Approximate Maximum Matching and Minimum Vertex Cover in o(Log3 n) Worst Case
    Update Time.” In <i>28th Annual ACM-SIAM Symposium on Discrete Algorithms</i>,
    0:470–89. Society for Industrial and Applied Mathematics, 2017. <a href="https://doi.org/10.1137/1.9781611974782.30">https://doi.org/10.1137/1.9781611974782.30</a>.
  ieee: S. Bhattacharya, M. Henzinger, and D. Nanongkai, “Fully dynamic approximate
    maximum matching and minimum vertex cover in o(log3 n) worst case update time,”
    in <i>28th Annual ACM-SIAM Symposium on Discrete Algorithms</i>, Barcelona, Spain,
    2017, vol. 0, pp. 470–489.
  ista: 'Bhattacharya S, Henzinger M, Nanongkai D. 2017. Fully dynamic approximate
    maximum matching and minimum vertex cover in o(log3 n) worst case update time.
    28th Annual ACM-SIAM Symposium on Discrete Algorithms. SODA: Symposium on Discrete
    Algorithms vol. 0, 470–489.'
  mla: Bhattacharya, Sayan, et al. “Fully Dynamic Approximate Maximum Matching and
    Minimum Vertex Cover in o(Log3 n) Worst Case Update Time.” <i>28th Annual ACM-SIAM
    Symposium on Discrete Algorithms</i>, vol. 0, Society for Industrial and Applied
    Mathematics, 2017, pp. 470–89, doi:<a href="https://doi.org/10.1137/1.9781611974782.30">10.1137/1.9781611974782.30</a>.
  short: S. Bhattacharya, M. Henzinger, D. Nanongkai, in:, 28th Annual ACM-SIAM Symposium
    on Discrete Algorithms, Society for Industrial and Applied Mathematics, 2017,
    pp. 470–489.
conference:
  end_date: 2017-01-19
  location: Barcelona, Spain
  name: 'SODA: Symposium on Discrete Algorithms'
  start_date: 2017-01-16
date_created: 2022-08-16T12:28:27Z
date_published: 2017-01-01T00:00:00Z
date_updated: 2024-11-06T12:20:58Z
day: '01'
doi: 10.1137/1.9781611974782.30
extern: '1'
external_id:
  arxiv:
  - '1704.02844'
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://arxiv.org/abs/1704.02844
month: '01'
oa: 1
oa_version: Preprint
page: 470 - 489
publication: 28th Annual ACM-SIAM Symposium on Discrete Algorithms
publication_identifier:
  eisbn:
  - 978-161197478-2
publication_status: published
publisher: Society for Industrial and Applied Mathematics
quality_controlled: '1'
scopus_import: '1'
status: public
title: Fully dynamic approximate maximum matching and minimum vertex cover in o(log3
  n) worst case update time
type: conference
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
volume: '0'
year: '2017'
...
---
_id: '11903'
abstract:
- lang: eng
  text: "Online social networks allow the collection of large amounts of data about
    the influence between users connected by a friendship-like relationship. When
    distributing items among agents forming a social network, this information allows
    us to exploit network externalities that each agent receives from his neighbors
    that get the same item. In this paper we consider Friends-of-Friends (2-hop) network
    externalities, i.e., externalities that not only depend on the neighbors that
    get the same item but also on neighbors of neighbors. For these externalities
    we study a setting where multiple different items are assigned to unit-demand
    agents. Specifically, we study the problem of welfare maximization under different
    types of externality functions. Let n be the number of agents and m be the number
    of items. Our contributions are the following: (1) We show that welfare maximization
    is APX-hard; we show that even for step functions with 2-hop (and also with 1-hop)
    externalities it is NP-hard to approximate social welfare better than (1−1/e).
    (2) On the positive side we present (i) an \U0001D442(\U0001D45B√)-approximation
    algorithm for general concave externality functions, (ii) an O(log m)-approximation
    algorithm for linear externality functions, and (iii) a 518(1−1/\U0001D452)-approximation
    algorithm for 2-hop step function externalities. We also improve the result from
    [7] for 1-hop step function externalities by giving a 12(1−1/\U0001D452)-approximation
    algorithm."
article_processing_charge: No
article_type: original
author:
- first_name: Sayan
  full_name: Bhattacharya, Sayan
  last_name: Bhattacharya
- first_name: Wolfgang
  full_name: Dvořák, Wolfgang
  last_name: Dvořák
- first_name: Monika H
  full_name: Henzinger, Monika H
  id: 540c9bbd-f2de-11ec-812d-d04a5be85630
  last_name: Henzinger
  orcid: 0000-0002-5008-6530
- first_name: Martin
  full_name: Starnberger, Martin
  last_name: Starnberger
citation:
  ama: Bhattacharya S, Dvořák W, Henzinger M, Starnberger M. Welfare maximization
    with friends-of-friends network externalities. <i>Theory of Computing Systems</i>.
    2017;61(4):948-986. doi:<a href="https://doi.org/10.1007/s00224-017-9759-8">10.1007/s00224-017-9759-8</a>
  apa: Bhattacharya, S., Dvořák, W., Henzinger, M., &#38; Starnberger, M. (2017).
    Welfare maximization with friends-of-friends network externalities. <i>Theory
    of Computing Systems</i>. Springer Nature. <a href="https://doi.org/10.1007/s00224-017-9759-8">https://doi.org/10.1007/s00224-017-9759-8</a>
  chicago: Bhattacharya, Sayan, Wolfgang Dvořák, Monika Henzinger, and Martin Starnberger.
    “Welfare Maximization with Friends-of-Friends Network Externalities.” <i>Theory
    of Computing Systems</i>. Springer Nature, 2017. <a href="https://doi.org/10.1007/s00224-017-9759-8">https://doi.org/10.1007/s00224-017-9759-8</a>.
  ieee: S. Bhattacharya, W. Dvořák, M. Henzinger, and M. Starnberger, “Welfare maximization
    with friends-of-friends network externalities,” <i>Theory of Computing Systems</i>,
    vol. 61, no. 4. Springer Nature, pp. 948–986, 2017.
  ista: Bhattacharya S, Dvořák W, Henzinger M, Starnberger M. 2017. Welfare maximization
    with friends-of-friends network externalities. Theory of Computing Systems. 61(4),
    948–986.
  mla: Bhattacharya, Sayan, et al. “Welfare Maximization with Friends-of-Friends Network
    Externalities.” <i>Theory of Computing Systems</i>, vol. 61, no. 4, Springer Nature,
    2017, pp. 948–86, doi:<a href="https://doi.org/10.1007/s00224-017-9759-8">10.1007/s00224-017-9759-8</a>.
  short: S. Bhattacharya, W. Dvořák, M. Henzinger, M. Starnberger, Theory of Computing
    Systems 61 (2017) 948–986.
date_created: 2022-08-17T11:14:12Z
date_published: 2017-11-01T00:00:00Z
date_updated: 2024-11-06T12:24:23Z
day: '01'
doi: 10.1007/s00224-017-9759-8
extern: '1'
intvolume: '        61'
issue: '4'
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://doi.org/10.1007/s00224-017-9759-8
month: '11'
oa: 1
oa_version: Published Version
page: 948-986
publication: Theory of Computing Systems
publication_identifier:
  eissn:
  - 1433-0490
  issn:
  - 1432-4350
publication_status: published
publisher: Springer Nature
quality_controlled: '1'
related_material:
  record:
  - id: '11837'
    relation: earlier_version
    status: public
scopus_import: '1'
status: public
title: Welfare maximization with friends-of-friends network externalities
type: journal_article
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
volume: 61
year: '2017'
...
---
_id: '1191'
abstract:
- lang: eng
  text: Variation in genotypes may be responsible for differences in dispersal rates,
    directional biases, and growth rates of individuals. These traits may favor certain
    genotypes and enhance their spatiotemporal spreading into areas occupied by the
    less advantageous genotypes. We study how these factors influence the speed of
    spreading in the case of two competing genotypes under the assumption that spatial
    variation of the total population is small compared to the spatial variation of
    the frequencies of the genotypes in the population. In that case, the dynamics
    of the frequency of one of the genotypes is approximately described by a generalized
    Fisher–Kolmogorov–Petrovskii–Piskunov (F–KPP) equation. This generalized F–KPP
    equation with (nonlinear) frequency-dependent diffusion and advection terms admits
    traveling wave solutions that characterize the invasion of the dominant genotype.
    Our existence results generalize the classical theory for traveling waves for
    the F–KPP with constant coefficients. Moreover, in the particular case of the
    quadratic (monostable) nonlinear growth–decay rate in the generalized F–KPP we
    study in detail the influence of the variance in diffusion and mean displacement
    rates of the two genotypes on the minimal wave propagation speed.
acknowledgement: "We thank Nick Barton, Katarína Bod’ová, and Sr\r\n-\r\ndan Sarikas
  for constructive feed-\r\nback and support. Furthermore, we would like to express
  our deep gratitude to the anonymous referees (one\r\nof whom, Jimmy Garnier, agreed
  to reveal his identity) and the editor Max Souza, for very helpful and\r\ndetailed
  comments and suggestions that significantly helped us to improve the manuscript.
  This project has\r\nreceived funding from the European Union’s Seventh Framework
  Programme for research, technological\r\ndevelopment and demonstration under Grant
  Agreement 618091 Speed of Adaptation in Population Genet-\r\nics and Evolutionary
  Computation (SAGE) and the European Research Council (ERC) Grant No. 250152\r\n(SN),
  from the Scientific Grant Agency of the Slovak Republic under the Grant 1/0459/13
  and by the Slovak\r\nResearch and Development Agency under the Contract No. APVV-14-0378
  (RK). RK would also like to\r\nthank IST Austria for its hospitality during the
  work on this project."
article_processing_charge: No
arxiv: 1
author:
- first_name: Richard
  full_name: Kollár, Richard
  last_name: Kollár
- first_name: Sebastian
  full_name: Novak, Sebastian
  id: 461468AE-F248-11E8-B48F-1D18A9856A87
  last_name: Novak
  orcid: 0000-0002-2519-824X
citation:
  ama: Kollár R, Novak S. Existence of traveling waves for the generalized F–KPP equation.
    <i>Bulletin of Mathematical Biology</i>. 2017;79(3):525-559. doi:<a href="https://doi.org/10.1007/s11538-016-0244-3">10.1007/s11538-016-0244-3</a>
  apa: Kollár, R., &#38; Novak, S. (2017). Existence of traveling waves for the generalized
    F–KPP equation. <i>Bulletin of Mathematical Biology</i>. Springer. <a href="https://doi.org/10.1007/s11538-016-0244-3">https://doi.org/10.1007/s11538-016-0244-3</a>
  chicago: Kollár, Richard, and Sebastian Novak. “Existence of Traveling Waves for
    the Generalized F–KPP Equation.” <i>Bulletin of Mathematical Biology</i>. Springer,
    2017. <a href="https://doi.org/10.1007/s11538-016-0244-3">https://doi.org/10.1007/s11538-016-0244-3</a>.
  ieee: R. Kollár and S. Novak, “Existence of traveling waves for the generalized
    F–KPP equation,” <i>Bulletin of Mathematical Biology</i>, vol. 79, no. 3. Springer,
    pp. 525–559, 2017.
  ista: Kollár R, Novak S. 2017. Existence of traveling waves for the generalized
    F–KPP equation. Bulletin of Mathematical Biology. 79(3), 525–559.
  mla: Kollár, Richard, and Sebastian Novak. “Existence of Traveling Waves for the
    Generalized F–KPP Equation.” <i>Bulletin of Mathematical Biology</i>, vol. 79,
    no. 3, Springer, 2017, pp. 525–59, doi:<a href="https://doi.org/10.1007/s11538-016-0244-3">10.1007/s11538-016-0244-3</a>.
  short: R. Kollár, S. Novak, Bulletin of Mathematical Biology 79 (2017) 525–559.
date_created: 2018-12-11T11:50:38Z
date_published: 2017-03-01T00:00:00Z
date_updated: 2025-09-22T09:44:54Z
day: '01'
department:
- _id: NiBa
doi: 10.1007/s11538-016-0244-3
ec_funded: 1
external_id:
  arxiv:
  - '1607.00944'
  isi:
  - '000395156200005'
intvolume: '        79'
isi: 1
issue: '3'
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://arxiv.org/abs/1607.00944
month: '03'
oa: 1
oa_version: Preprint
page: 525-559
project:
- _id: 25B1EC9E-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '618091'
  name: Speed of Adaptation in Population Genetics and Evolutionary Computation
- _id: 25B07788-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '250152'
  name: Limits to selection in biology and in evolutionary computation
publication: Bulletin of Mathematical Biology
publication_status: published
publisher: Springer
publist_id: '6160'
quality_controlled: '1'
scopus_import: '1'
status: public
title: Existence of traveling waves for the generalized F–KPP equation
type: journal_article
user_id: 317138e5-6ab7-11ef-aa6d-ffef3953e345
volume: 79
year: '2017'
...
---
_id: '1192'
abstract:
- lang: eng
  text: The main result of this paper is a generalization of the classical blossom
    algorithm for finding perfect matchings. Our algorithm can efficiently solve Boolean
    CSPs where each variable appears in exactly two constraints (we call it edge CSP)
    and all constraints are even Δ-matroid relations (represented by lists of tuples).
    As a consequence of this, we settle the complexity classification of planar Boolean
    CSPs started by Dvorak and Kupec. Knowing that edge CSP is tractable for even
    Δ-matroid constraints allows us to extend the tractability result to a larger
    class of Δ-matroids that includes many classes that were known to be tractable
    before, namely co-independent, compact, local and binary.
article_processing_charge: No
arxiv: 1
author:
- first_name: Alexandr
  full_name: Kazda, Alexandr
  id: 3B32BAA8-F248-11E8-B48F-1D18A9856A87
  last_name: Kazda
- first_name: Vladimir
  full_name: Kolmogorov, Vladimir
  id: 3D50B0BA-F248-11E8-B48F-1D18A9856A87
  last_name: Kolmogorov
- first_name: Michal
  full_name: Rolinek, Michal
  id: 3CB3BC06-F248-11E8-B48F-1D18A9856A87
  last_name: Rolinek
citation:
  ama: 'Kazda A, Kolmogorov V, Rolinek M. Even delta-matroids and the complexity of
    planar Boolean CSPs. In: SIAM; 2017:307-326. doi:<a href="https://doi.org/10.1137/1.9781611974782.20">10.1137/1.9781611974782.20</a>'
  apa: 'Kazda, A., Kolmogorov, V., &#38; Rolinek, M. (2017). Even delta-matroids and
    the complexity of planar Boolean CSPs (pp. 307–326). Presented at the SODA: Symposium
    on Discrete Algorithms, Barcelona, Spain: SIAM. <a href="https://doi.org/10.1137/1.9781611974782.20">https://doi.org/10.1137/1.9781611974782.20</a>'
  chicago: Kazda, Alexandr, Vladimir Kolmogorov, and Michal Rolinek. “Even Delta-Matroids
    and the Complexity of Planar Boolean CSPs,” 307–26. SIAM, 2017. <a href="https://doi.org/10.1137/1.9781611974782.20">https://doi.org/10.1137/1.9781611974782.20</a>.
  ieee: 'A. Kazda, V. Kolmogorov, and M. Rolinek, “Even delta-matroids and the complexity
    of planar Boolean CSPs,” presented at the SODA: Symposium on Discrete Algorithms,
    Barcelona, Spain, 2017, pp. 307–326.'
  ista: 'Kazda A, Kolmogorov V, Rolinek M. 2017. Even delta-matroids and the complexity
    of planar Boolean CSPs. SODA: Symposium on Discrete Algorithms, 307–326.'
  mla: Kazda, Alexandr, et al. <i>Even Delta-Matroids and the Complexity of Planar
    Boolean CSPs</i>. SIAM, 2017, pp. 307–26, doi:<a href="https://doi.org/10.1137/1.9781611974782.20">10.1137/1.9781611974782.20</a>.
  short: A. Kazda, V. Kolmogorov, M. Rolinek, in:, SIAM, 2017, pp. 307–326.
conference:
  end_date: 2017-01019
  location: Barcelona, Spain
  name: 'SODA: Symposium on Discrete Algorithms'
  start_date: 2017-01-16
date_created: 2018-12-11T11:50:38Z
date_published: 2017-01-01T00:00:00Z
date_updated: 2025-06-04T08:46:59Z
day: '01'
department:
- _id: VlKo
doi: 10.1137/1.9781611974782.20
ec_funded: 1
external_id:
  arxiv:
  - '1602.03124'
  isi:
  - '000426965800020'
isi: 1
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://arxiv.org/abs/1602.03124
month: '01'
oa: 1
oa_version: Submitted Version
page: 307 - 326
project:
- _id: 25FBA906-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '616160'
  name: 'Discrete Optimization in Computer Vision: Theory and Practice'
publication_identifier:
  isbn:
  - 978-161197478-2
publication_status: published
publisher: SIAM
publist_id: '6159'
quality_controlled: '1'
related_material:
  record:
  - id: '6032'
    relation: later_version
    status: public
status: public
title: Even delta-matroids and the complexity of planar Boolean CSPs
type: conference
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
year: '2017'
...
---
_id: '1196'
abstract:
- lang: eng
  text: 'We define the . model-measuring problem: given a model . M and specification
    . ϕ, what is the maximal distance . ρ such that all models . M'' within distance
    . ρ from . M satisfy (or violate) . ϕ. The model-measuring problem presupposes
    a distance function on models. We concentrate on . automatic distance functions,
    which are defined by weighted automata. The model-measuring problem subsumes several
    generalizations of the classical model-checking problem, in particular, quantitative
    model-checking problems that measure the degree of satisfaction of a specification;
    robustness problems that measure how much a model can be perturbed without violating
    the specification; and parameter synthesis for hybrid systems. We show that for
    automatic distance functions, and (a) . ω-regular linear-time, (b) . ω-regular
    branching-time, and (c) hybrid specifications, the model-measuring problem can
    be solved.We use automata-theoretic model-checking methods for model measuring,
    replacing the emptiness question for word, tree, and hybrid automata by the .
    optimal-value question for the weighted versions of these automata. For automata
    over words and trees, we consider weighted automata that accumulate weights by
    maximizing, summing, discounting, and limit averaging. For hybrid automata, we
    consider monotonic (parametric) hybrid automata, a hybrid counterpart of (discrete)
    weighted automata.We give several examples of using the model-measuring problem
    to compute various notions of robustness and quantitative satisfaction for temporal
    specifications. Further, we propose the modeling framework for model measuring
    to ease the specification and reduce the likelihood of errors in modeling.Finally,
    we present a variant of the model-measuring problem, called the . model-repair
    problem. The model-repair problem applies to models that do not satisfy the specification;
    it can be used to derive restrictions, under which the model satisfies the specification,
    i.e., to repair the model.'
acknowledgement: "This research was supported in part by the European Research Council
  (ERC) under grant 267989 (QUAREM), by the Austrian Science Fund1 (FWF) under grants
  S11402-N23 (RiSE) and Z211-N23 (Wittgenstein Award), and by the National Science
  Centre (NCN), Poland under grant 2014/15/D/ST6/04543.\r\nA Technical Report of this
  article is available via: https://repository.ist.ac.at/171/"
article_processing_charge: No
author:
- first_name: Thomas A
  full_name: Henzinger, Thomas A
  id: 40876CD8-F248-11E8-B48F-1D18A9856A87
  last_name: Henzinger
  orcid: 0000−0002−2985−7724
- first_name: Jan
  full_name: Otop, Jan
  id: 2FC5DA74-F248-11E8-B48F-1D18A9856A87
  last_name: Otop
citation:
  ama: 'Henzinger TA, Otop J. Model measuring for discrete and hybrid systems. <i>Nonlinear
    Analysis: Hybrid Systems</i>. 2017;23:166-190. doi:<a href="https://doi.org/10.1016/j.nahs.2016.09.001">10.1016/j.nahs.2016.09.001</a>'
  apa: 'Henzinger, T. A., &#38; Otop, J. (2017). Model measuring for discrete and
    hybrid systems. <i>Nonlinear Analysis: Hybrid Systems</i>. Elsevier. <a href="https://doi.org/10.1016/j.nahs.2016.09.001">https://doi.org/10.1016/j.nahs.2016.09.001</a>'
  chicago: 'Henzinger, Thomas A, and Jan Otop. “Model Measuring for Discrete and Hybrid
    Systems.” <i>Nonlinear Analysis: Hybrid Systems</i>. Elsevier, 2017. <a href="https://doi.org/10.1016/j.nahs.2016.09.001">https://doi.org/10.1016/j.nahs.2016.09.001</a>.'
  ieee: 'T. A. Henzinger and J. Otop, “Model measuring for discrete and hybrid systems,”
    <i>Nonlinear Analysis: Hybrid Systems</i>, vol. 23. Elsevier, pp. 166–190, 2017.'
  ista: 'Henzinger TA, Otop J. 2017. Model measuring for discrete and hybrid systems.
    Nonlinear Analysis: Hybrid Systems. 23, 166–190.'
  mla: 'Henzinger, Thomas A., and Jan Otop. “Model Measuring for Discrete and Hybrid
    Systems.” <i>Nonlinear Analysis: Hybrid Systems</i>, vol. 23, Elsevier, 2017,
    pp. 166–90, doi:<a href="https://doi.org/10.1016/j.nahs.2016.09.001">10.1016/j.nahs.2016.09.001</a>.'
  short: 'T.A. Henzinger, J. Otop, Nonlinear Analysis: Hybrid Systems 23 (2017) 166–190.'
date_created: 2018-12-11T11:50:39Z
date_published: 2017-02-01T00:00:00Z
date_updated: 2025-04-15T06:25:59Z
day: '01'
department:
- _id: ToHe
doi: 10.1016/j.nahs.2016.09.001
ec_funded: 1
external_id:
  isi:
  - '000390637000011'
intvolume: '        23'
isi: 1
language:
- iso: eng
month: '02'
oa_version: None
page: 166 - 190
project:
- _id: 25EE3708-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '267989'
  name: Quantitative Reactive Modeling
- _id: 25832EC2-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: S 11407_N23
  name: Rigorous Systems Engineering
- _id: 25F42A32-B435-11E9-9278-68D0E5697425
  call_identifier: FWF
  grant_number: Z211
  name: Formal methods for the design and analysis of complex systems
publication: 'Nonlinear Analysis: Hybrid Systems'
publication_status: published
publisher: Elsevier
publist_id: '6154'
quality_controlled: '1'
scopus_import: '1'
status: public
title: Model measuring for discrete and hybrid systems
type: journal_article
user_id: c635000d-4b10-11ee-a964-aac5a93f6ac1
volume: 23
year: '2017'
...
