Dissertations / Theses on the topic 'Randomness'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Randomness.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Ghoudi, Kilani. "Multivariate randomness statistics." Thesis, University of Ottawa (Canada), 1993. http://dx.doi.org/10.20381/ruor-17165.
Full textJustamante, David. "Randomness from space." Thesis, Monterey, California: Naval Postgraduate School, 2017. http://hdl.handle.net/10945/52996.
Full textIncludes supplementary material
Reissued 30 May 2017 with correction to degree on title page.
Randomness is at the heart of today's computing. There are two categorical methods to generate random numbers: pseudorandom number generation (PRNG) methods and true random number generation (TRNG) methods. While PRNGs operate orders of magnitude faster than TRNGs, the strength of PRNGs lies in their initial seed. TRNGs can function to generate such a seed. This thesis will focus on studying the feasibility of using the next generation Naval Postgraduate School Femto Satellite (NPSFS) as a TRNG. The hardware for the next generation will come from the Intel Quark D2000 along with its onboard BMC150 6-axis eCompass. We simulated 3-dimensional motion to see if any raw data from the BMC150 could be used as an entropy source for random number generation.We studied various "schemes" on how to select and output specific data bits to determine if more entropy and increased bitrate could be reached. Data collected in this thesis suggests that the BMC150 contains certain bits that could be considered good sources of entropy. Various schemes further utilized these bits to yield a strong entropy source with higher bitrate. We propose the NPSFS be studied further to find other sources of entropy. We also propose a prototype be sent into space for experimental verification of these results.
Lieutenant, United States Navy
Yu, Ru Qi. "Mechanisms of randomness cognition." Thesis, University of British Columbia, 2017. http://hdl.handle.net/2429/62682.
Full textArts, Faculty of
Psychology, Department of
Graduate
Bourdoncle, Boris. "Quantifying randomness from Bell nonlocality." Doctoral thesis, Universitat Politècnica de Catalunya, 2019. http://hdl.handle.net/10803/666591.
Full textEl siglo XX estuvo marcado por dos revoluciones científicas. Por un lado, la mecánica cuántica cuestionó nuestro entendimiento de la naturaleza y de la física. Por otro lado, quedó claro que la información podía ser tratada como un objeto matemático. Juntos, ambas revoluciones dieron inicio a la era de la información. Un salto conceptual ocurrió en los años 80: se descubrió que la información podía ser tratada de manera cuántica. La idea de que la noción intuitiva de información podía ser gobernada por las leyes contra intuitivas de la mecánica cuántica resultó extremadamente fructífera tanto desde un punto de vista teórico como práctico. El concepto de aleatoriedad desempeña un papel central en este respecto. En efecto, las leyes de la física cuántica son probabilistas, lo que contrasta con siglos de teorías físicas cuyo objetivo era elaborar leyes deterministas de la naturaleza. Además, esto constituye una fuente de números aleatorios, un recurso crucial para criptografía. El hecho de que la física cuántica solo describe comportamientos aleatorios fue a veces considerado como una forma de incompletitud en la teoría. Pero la no-localidad, en el sentido de Bell, probó que no era el caso: las leyes cuánticas son intrínsecamente probabilistas, es decir, el azar que contienen no puede ser atribuido a una falta de conocimiento. Esta observación tiene consecuencias prácticas: los datos procedentes de un proceso físico no-local son necesariamente impredecibles. Además, el carácter aleatorio de estos datos no depende del sistema físico, sino solo de su carácter no-local. Por esta razón, el azar basado en la no-localidad está certificado independientemente del dispositivo físico. En esta tesis, cuantificamos el azar basado en la no-localidad en varios escenarios. En el primero, no utilizamos el formalismo cuántico. Estudiamos un proceso no-local dotado de varias estructuras causales en relación con su evolución temporal, y calculamos las relaciones entre aleatoriedad y no-localidad para estas diferentes estructuras causales. El azar basado en la no-localidad suele ser definido en un marco teórico. En el segundo escenario, adoptamos un enfoque práctico, y examinamos la relación entre aleatoriedad y no-localidad en una situación real, donde solo tenemos una información parcial, procedente de un experimento, sobre el proceso. Proponemos un método para optimizar la aleatoriedad en este caso. Hasta ahora, las relaciones entre aleatoriedad y no-localidad han sido estudiadas en el caso bipartito, dado que dos agentes forman el requisito mínimo para definir el concepto de no-localidad. En el tercer escenario, estudiamos esta relación en el caso tripartito. Aunque el azar basado en la no-localidad no depende del dispositivo físico, el proceso que sirve para generar azar debe sin embargo ser implementado con un estado cuántico. En el cuarto escenario, preguntamos si hay que imponer requisitos sobre el estado para poder certificar una máxima aleatoriedad de los resultados. Mostramos que se puede obtener la cantidad máxima de aleatoriedad indiferentemente del nivel de entrelazamiento del estado cuántico.
Elias, Joran. "Randomness In Tree Ensemble Methods." The University of Montana, 2009. http://etd.lib.umt.edu/theses/available/etd-10092009-110301/.
Full textVaikuntanathan, Vinod. "Distributed computing with imperfect randomness." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/34354.
Full textIncludes bibliographical references (p. 41-43).
Randomness is a critical resource in many computational scenarios, enabling solutions where deterministic ones are elusive or even provably impossible. However, the randomized solutions to these tasks assume access to a pure source of unbiased, independent coins. Physical sources of randomness, on the other hand, are rarely unbiased and independent although they do seem to exhibit somewhat imperfect randomness. This gap in modeling questions the relevance of current randomized solutions to computational tasks. Indeed, there has been substantial investigation of this issue in complexity theory in the context of the applications to efficient algorithms and cryptography. This work seeks to determine whether imperfect randomness, modeled appropriately, is "good enough" for distributed algorithms. Namely, can we do with imperfect randomness all that we can do with perfect randomness, and with comparable efficiency ? We answer this question in the affirmative, for the problem of Byzantine agreement. We construct protocols for Byzantine agreement in a variety of scenarios (synchronous or asynchronous networks, with or without private channels), in which the players have imperfect randomness. Our solutions are essentially as efficient as the best known randomized Byzantine agreement protocols, which traditionally assume that all the players have access to perfect randomness.
by Vinod Vaikuntanathan.
S.M.
Mezher, Rawad. "Randomness for quantum information processing." Electronic Thesis or Diss., Sorbonne université, 2019. https://accesdistant.sorbonne-universite.fr/login?url=https://theses-intra.sorbonne-universite.fr/2019SORUS244.pdf.
Full textThis thesis is focused on the generation and understanding of particular kinds of quantum randomness. Randomness is useful for many tasks in physics and information processing, from randomized benchmarking , to black hole physics , as well demonstrating a so-called quantum speedup , and many other applications. On the one hand we explore how to generate a particular form of random evolution known as a t-design. On the other we show how this can also give instances for quantum speedup - where classical computers cannot simulate the randomness efficiently. We also show that this is still possible in noisy realistic settings. More specifically, this thesis is centered around three main topics. The first of these being the generation of epsilon-approximate unitary t-designs. In this direction, we first show that non-adaptive, fixed measurements on a graph state composed of poly(n,t,log(1/epsilon)) qubits, and with a regular structure (that of a brickwork state) effectively give rise to a random unitary ensemble which is a epsilon-approximate t-design. This work is presented in Chapter 3. Before this work, it was known that non-adaptive fixed XY measurements on a graph state give rise to unitary t-designs , however the graph states used there were of complicated structure and were therefore not natural candidates for measurement based quantum computing (MBQC), and the circuits to make them were complicated. The novelty in our work is showing that t-designs can be generated by fixed, non-adaptive measurements on graph states whose underlying graphs are regular 2D lattices. These graph states are universal resources for MBQC. Therefore, our result allows the natural integration of unitary t-designs, which provide a notion of quantum pseudorandomness which is very useful in quantum algorithms, into quantum algorithms running in MBQC. Moreover, in the circuit picture this construction for t-designs may be viewed as a constant depth quantum circuit, albeit with a polynomial number of ancillas. We then provide new constructions of epsilon-approximate unitary t-designs both in the circuit model and in MBQC which are based on a relaxation of technical requirements in previous constructions. These constructions are found in Chapters 4 and 5
Morphett, Anthony William. "Degrees of computability and randomness." Thesis, University of Leeds, 2009. http://etheses.whiterose.ac.uk/11291/.
Full textSpiegel, Christoph. "Additive structures and randomness in combinatorics." Doctoral thesis, Universitat Politècnica de Catalunya, 2020. http://hdl.handle.net/10803/669327.
Full textLa combinatòria aritmètica, la teoria combinatòria dels nombres, la teoria additiva estructural i la teoria additiva de nombres són alguns dels termes que es fan servir per descriure una branca extensa i activa que es troba en la intersecció de la teoria de nombres i de la combinatòria, i que serà el motiu d'aquesta tesi doctoral. La primera part tracta la qüestió de sota quines circumstàncies es solen produir solucions a sistemes lineals d’equacions arbitràries en estructures additives. Una primera pregunta que s'estudia es refereix al punt en que conjunts d’una mida determinada contindran normalment una solució. Establirem un llindar i estudiarem també la distribució del nombre de solucions en aquest llindar, tot demostrant que en certs casos aquesta distribució convergeix a una distribució de Poisson. El següent tema de la tesis es relaciona amb el teorema de Van der Waerden, que afirma que cada coloració finita dels nombres enters conté una progressió aritmètica monocromàtica de longitud arbitrària. Aquest es considera el primer resultat en la teoria de Ramsey. Rado va generalitzar el resultat de van der Waerden tot caracteritzant en aquells sistemes lineals les solucions de les quals satisfan una propietat similar i Szemerédi la va reforçar amb una versió de densitat del resultat. Centrarem la nostra atenció cap a versions del teorema de Rado i Szemerédi en conjunts aleatoris, ampliant els treballs anteriors de Friedgut, Rödl, Rucinski i Schacht i de Conlon, Gowers i Schacht. Per últim, Chvátal i Erdos van suggerir estudiar estudiar jocs posicionals del tipus Maker-Breaker. Aquests jocs tenen una connexió profunda amb la teoria de les estructures aleatòries i ens basarem en el treball de Bednarska i Luczak per establir el llindar de la quantitat que necessitem per analitzar una gran varietat de jocs en favor del segon jugador. S'inclouen jocs en què el primer jugador vol ocupar una solució d'un sistema lineal d'equacions donat, generalitzant els jocs de van der Waerden introduïts per Beck. La segona part de la tesis tracta sobre el comportament extrem dels conjunts amb propietats additives interessants. Primer, considerarem els conjunts de Sidon, és a dir, conjunts d’enters amb diferències úniques quan es consideren parelles d'elements. Estudiarem una generalització dels conjunts de Sidons proposats recentment per Kohayakawa, Lee, Moreira i Rödl, en que les diferències entre parelles no són només diferents, sinó que, en realitat, estan allunyades una certa proporció en relació a l'element més gran. Obtindrem límits més baixos per a conjunts infinits que els obtinguts pels anteriors autors tot usant una construcció de conjunts de Sidon infinits deguda a Cilleruelo. Com a conseqüència d'aquests límits, obtindrem també el millor límit inferior actual per als conjunts de Sidon en conjunts infinits generats aleatòriament de nombres enters d'alta densitat. A continuació, un dels resultats centrals a la intersecció de la combinatòria i la teoria dels nombres és el teorema de Freiman-Ruzsa, que afirma que el conjunt suma d'un conjunt finit d’enters donats pot ser cobert de manera eficient per una progressió aritmètica generalitzada. En el cas de que el conjunt suma sigui de mida petita, existeixen descripcions estructurals més precises. Primer estudiarem els resultats que van més enllà del conegut teorema de Freiman 3k-4 en els enters. Llavors veurem una aplicació d’aquests resultats a conjunts de dobles petits en grups cíclics finits. Finalment, dirigirem l’atenció cap a conjunts amb funcions de representació gairebé constants. Erdos i Fuchs van establir que les funcions de representació de conjunts arbitraris d’enters no poden estar massa a prop de ser constants. Primer estendrem el resultat d’Erdos i Fuchs a funcions de representació ordenades. A continuació, abordarem una pregunta relacionada de Sárközy i Sós sobre funció de representació ponderada.
Wong, Erick Bryce. "Structure and randomness in arithmetic settings." Thesis, University of British Columbia, 2012. http://hdl.handle.net/2429/42887.
Full textJohnston, Wilder Peter. "Learners’ shifting perceptions of randomness." Thesis, Open University, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.424680.
Full textRoberts, Barnaby. "Structure and randomness in extremal combinatorics." Thesis, London School of Economics and Political Science (University of London), 2017. http://etheses.lse.ac.uk/3592/.
Full textKopparty, Swastik. "Algebraic methods in randomness and pseudorandomness." Thesis, Massachusetts Institute of Technology, 2010. http://hdl.handle.net/1721.1/62425.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (p. 183-188).
Algebra and randomness come together rather nicely in computation. A central example of this relationship in action is the Schwartz-Zippel lemma and its application to the fast randomized checking of polynomial identities. In this thesis, we further this relationship in two ways: (1) by compiling new algebraic techniques that are of potential computational interest, and (2) demonstrating the relevance of these techniques by making progress on several questions in randomness and pseudorandomness. The technical ingredients we introduce include: " Multiplicity-enhanced versions of the Schwartz-Zippel lenina and the "polynomial method", extending their applicability to "higher-degree" polynomials. " Conditions for polynomials to have an unusually small number of roots. " Conditions for polynomials to have an unusually structured set of roots, e.g., containing a large linear space. Our applications include: * Explicit constructions of randomness extractors with logarithmic seed and vanishing "entropy loss". " Limit laws for first-order logic augmented with the parity quantifier on random graphs (extending the classical 0-1 law). " Explicit dispersers for affine sources of imperfect randomness with sublinear entropy.
by Swastik Kopparty.
Ph.D.
Coudron, Matthew Ryan. "Trading isolation for certifiable randomness expansion." Thesis, Massachusetts Institute of Technology, 2013. http://hdl.handle.net/1721.1/84872.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (page 41).
A source of random bits is an important resource in modern cryptography, algorithms and statistics. Can one ever be sure that a "random" source is truly random, or in the case of cryptography, secure against potential adversaries or eavesdroppers? Recently the study of non-local properties of entanglement has produced an interesting new perspective on this question, which we will refer to broadly as Certifiable Randomness Expansion (CRE). CRE refers generally to a process by which a source of information-theoretically certified randomness can be constructed based only on two simple assumptions: the prior existence of a short random seed and the ability to ensure that two or more black-box devices do not communicate (i.e. are non-signaling). In this work we make progress on a conjecture of [Col09] which proposes a method for indefinite certifiable randomness expansion using a growing number of devices (we actually prove a slight modification of the original conjecture in which we use the CHSH game as a subroutine rather than the GHZ game as originally proposed). The proof requires a technique not used before in the study of randomness expansion, and inspired by the tools developed in [RUV12]. The result also establishes the existence of a protocol for constant factor CRE using a finite number of devices (here the constant factor can be much greater than 1). While much better expansion rates (polynomial, and even exponential) have been achieved with only two devices, our analysis requires techniques not used before in the study of randomness expansion, and represents progress towards a protocol which is provably secure against a quantum eavesdropper who knows the input to the protocol.
by Matthew Ryan Coudron.
S.M.
Melkebeek, Dieter van. "Randomness and completeness in computational complexity." New York : Springer, 2000. http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=1950.
Full textShoup, Victor. "Removing randomness from computational number theory." Madison, Wis. : University of Wisconsin-Madison, Computer Sciences Dept, 1989. http://catalog.hathitrust.org/api/volumes/oclc/20839526.html.
Full textVermeeren, Stijn. "Notions and applications of algorithmic randomness." Thesis, University of Leeds, 2013. http://etheses.whiterose.ac.uk/4569/.
Full textEickmeyer, Kord. "Randomness in complexity theory and logics." Doctoral thesis, Humboldt-Universität zu Berlin, Mathematisch-Naturwissenschaftliche Fakultät II, 2011. http://dx.doi.org/10.18452/16364.
Full textThis thesis is comprised of two main parts whose common theme is the question of how powerful randomness as a computational resource is. In the first part we deal with random structures which possess -- with high probability -- properties than can be exploited by computer algorithms. We then give two new deterministic constructions for such structures: We derandomise a randomised reduction due to Alekhnovich and Razborov by constructing certain unbalanced bipartite expander graphs, and we give a reduction from a problem concerning bipartite graphs to the problem of computing the minmax-value in three-player games. In the second part we study the expressive power of various logics when they are enriched by random relation symbols. Our goal is to bridge techniques from descriptive complexity with the study of randomised complexity classes, and indeed we show that our randomised logics do capture complexity classes under study in complexity theory. Using strong results on the expressive power of first-order logic and the computational power of bounded-depth circuits, we give both positive and negative derandomisation results for our logics. On the negative side, we show that randomised first-order logic gains expressive power over standard first-order logic even on structures with a built-in addition relation. Furthermore, it is not contained in monadic second-order logic on ordered structures, nor in infinitary counting logic on arbitrary structures. On the positive side, we show that randomised first-order logic can be derandomised on structures with a unary vocabulary and is contained in monadic second-order logic on additive structures.
Liu, Zi-Wen. "On quantum randomness and quantum resources." Thesis, Massachusetts Institute of Technology, 2018. https://hdl.handle.net/1721.1/122846.
Full textCataloged from PDF version of thesis.
Includes bibliographical references.
This thesis is consisted of two independent parts. The first part is on entanglement, quantum randomness, and complexity beyond scrambling. More explicitly, we study the Rényi entanglement entropies of quantum designs. The results lay the mathematical foundation for studying the hierarchy of complexities in between scrambling and Haar randomness by entanglement. The second part explores the general aspects of quantum resource theory. We introduce three theories that do not rely on the specific resource: the theory of resource destroying maps, the one-shot operational resource theory, and the resource theory of quantum channels.
by Zi-Wen Liu.
Ph. D.
Ph.D. Massachusetts Institute of Technology, Department of Physics
Grilli, Jacopo. "Randomness and Criticality in Biological Interactions." Doctoral thesis, Università degli studi di Padova, 2015. http://hdl.handle.net/11577/3424011.
Full textIn questa tesi studiamo da una prospettiva fisica due problemi legati alle interazioni biologiche. Nella prima parte della tesi consideriamo le interazioni ecologiche, che danno forma agli ecosistemi e determinano la loro sorte, e la loro relazione con la stabilità degli stessi. Usando la teoria delle matrici aleatorie, siamo in grado di identificare gli aspetti chiave, i parametri d'ordine, che determinano la stabilità degli ecosistemi. Quindi consideriamo il problema di determinare la persistenza di una popolazione che vive in un territorio frammentato aleatoriamente. Usando alcune tecniche prese in prestito dalla teoria delle matrici aleatorie applicata ai sistemi disordinati, riusciamo a identificare quali sono gli ingredienti chiave per la persistenza. La seconda parte della tesi è dedicata all'osservazione che molti sistemi viventi sembrano essere calibrati precisamente vicino a un punto critico. Indroduciamo un modello stocastico, basato sulla teoria dell'informazione, che predice i punti critici come risultato naturale di un processo di voluzione e adattamento, senza una calibrazione dei parametri
Nouretdinov, Ilia. "Algorithmic theory of randomness and its applications." Thesis, Royal Holloway, University of London, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.406218.
Full textMartzoukos, Spyros. "Walks on graphs : From randomness to determinism." Thesis, Queen Mary, University of London, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.510880.
Full textRute, Jason. "Topics in algorithmic randomness and computable analysis." Research Showcase @ CMU, 2013. http://repository.cmu.edu/dissertations/260.
Full textMontanaro, Ashley. "Structure, randomness and complexity in quantum computation." Thesis, University of Bristol, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.443658.
Full textKilian, Joe. "Uses of randomness in algorithms and protocols." Thesis, Massachusetts Institute of Technology, 1989. http://hdl.handle.net/1721.1/60724.
Full textSaias, Alain Isaac. "Randomness versus non-determinism in distributed computing." Thesis, Massachusetts Institute of Technology, 1995. http://hdl.handle.net/1721.1/37022.
Full textRompel, John Taylor. "Techniques for computing with low-independence randomness." Thesis, Massachusetts Institute of Technology, 1990. http://hdl.handle.net/1721.1/33480.
Full textIncludes bibliographical references (p. 105-110).
by John Taylor Rompel.
Ph.D.
Yuen, Henry Ph D. Massachusetts Institute of Technology. "Quantum randomness expansion : upper and lower bounds." Thesis, Massachusetts Institute of Technology, 2013. http://hdl.handle.net/1721.1/84856.
Full textTitle as it appears in Degrees awarded booklet, September 2013: Upper and lower bounds for quantum randomness expansion. Cataloged from PDF version of thesis.
Includes bibliographical references (pages 62-64).
A recent sequence of works, initially motivated by the study of the nonlocal properties of entanglement, demonstrate that a source of information-theoretically certified randomness can be constructed based only on two simple assumptions: the prior existence of a short random seed and the ability to ensure that two black-box devices do not communicate (i.e. are non-signaling). We call protocols achieving such certified amplification of a short random seed randomness amplifiers. We introduce a simple framework in which we initiate the systematic study of the possibilities and limitations of randomness amplifiers. Our main results include a new, improved analysis of a robust randomness amplifier with exponential expansion, as well as the first upper bounds on the maximum expansion achievable by a broad class of randomness amplifiers. In particular, we show that non-adaptive randomness amplifiers that are robust to noise cannot achieve more than doubly exponential expansion. We show that a wide class of protocols based on the use of the CHSH game can only lead to (singly) exponential expansion if adversarial devices are allowed the full power of non-signaling strategies. Our upper bound results apply to all known non-adaptive randomness amplifier constructions to date. Finally, we demonstrate, for all positive integers k, a protocol involving 2k non-signaling black-box quantum devices that achieves an amount of expansion that is a tower of exponentials of height k. This hints at the intriguing possibility of infinite randomness expansion.
by Henry Yuen.
S.M.
Mjörnman, Jesper, and Daniel Mastell. "Randomness as a Cause of Test Flakiness." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-177303.
Full textStrandberg, Alicia Graziosi. "A Nonparametric Test for Deviation from Randomness." Diss., Temple University Libraries, 2012. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/214767.
Full textPh.D.
There are many existing tests used to determine if a series consists of a random sample. Often these tests have restrictive distributional assumptions, size distortions, or low power for key useful alternative situations. The interest of this dissertation lies in developing an alternative nonparametric test to determine whether a series consists of a random sample. The proposed test detects deviations from randomness, without a priori distributional assumption, when observations are not independent and identically distributed (i.i.d.), which is suitable for our motivating stock market index data. Departures from i.i.d. are tested by subdividing data into subintervals and then using a conditional probability measure within intervals as a binomial test. This nonparametric test is designed to detect deviations of neighboring observations from randomness when the data set consists of time series observations. Simulation results confirm correct test size for varied distributions and good power for detecting alternative cases. This test is compared to a number of other popular methods and shown to be a competitive alternative. Although the proposed test may be applicable to multiple areas, this dissertation is mostly interested in applications to stock market and regression data. The proposed test is effectively illustrated with the common three stock market index data sets using a newly created transformation, and shown to perform exceptionally well.
Temple University--Theses
Kalyanasundaram, Subrahmanyam. "Turing machine algorithms and studies in quasi-randomness." Diss., Georgia Institute of Technology, 2011. http://hdl.handle.net/1853/42808.
Full textEl, Omer. "Avalanche Properties And Randomness Of The Twofish Cipher." Master's thesis, METU, 2004. http://etd.lib.metu.edu.tr/upload/12605571/index.pdf.
Full texts results. The strength of the cipher to cryptanalytic attacks is investigated by measuring its randomness according to the avalanche criterion. The avalanche criterion results are compared with those of the Statistical Test Suite of the NIST and discrepancies in the second and third rounds are explained theoretically.
Chachulski, Szymon (Szymon Kazimierz). "Trading structure for randomness in wireless opportunistic routing." Thesis, Massachusetts Institute of Technology, 2007. http://hdl.handle.net/1721.1/40320.
Full textThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Includes bibliographical references (leaves 71-73).
Opportunistic routing is a recent technique that achieves high throughput in the face of lossy wireless links. The current opportunistic routing protocol, ExOR, ties the MAC with routing, imposing a strict schedule on routers' access to the medium. Although the scheduler delivers opportunistic gains, it eliminates the clean layering abstraction and misses some of the inherent features of the 802.11 MAC. In particular, it prevents spatial reuse and thus may underutilize the wireless medium. This thesis presents MORE, a MAC-independent opportunistic routing protocol. MORE randomly mixes packets before forwarding them. This randomness ensures that routers that hear the same transmission do not forward the same packets. Thus, MORE needs no special scheduler to coordinate routers and can run directly on top of 802.11. We analyze the theoretical gains provided by opportunistic routing and present the EOTX routing metric which minimizes the number of opportunistic transmissions to deliver a packet to its destination. We implemented MORE in the Click modular router running on off-the-shelf PCs equipped with 802.11 (WiFi) wireless interfaces. Experimental results from a 20-node wireless testbed show that MORE's median unicast throughput is 20% higher than ExOR, and the gains rise to 50% over ExOR when there is a chance of spatial reuse.
by Szymon Chachulski.
S.M.
Nieto-Silleras, Olmo. "Device-independent randomness generation from several Bell estimators." Doctoral thesis, Universite Libre de Bruxelles, 2018. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/271365.
Full textL'approche indépendante des appareils ("device-independent" en anglais) est une nouvelle approche en informatique quantique. Cette nouvelle approche exploite la non-localité de la physique quantique afin de certifier le bon fonctionnement d'une tâche sans faire appel à des suppositions sur les appareils menant à bien cette tâche. Cette thèse traite de la certification et la génération d'aléa indépendante des appareils pour des applications cryptographiques. L'existence de cet aléa repose sur une relation fondamentale entre le caractère aléatoire de la théorie quantique et sa non-localité, mise en lumière dans le cadre des tests de Bell. Les protocoles de génération d'aléa et de distribution quantique de clés indépendants des appareils mesurent en général l'aléa produit en fonction de la violation d'une inégalité de Bell donnée. Cependant les probabilités qui caracterisent les résultats de mesures dans un test de Bell sont plus riches que le degré de violation d'une seule inégalité de Bell. Dans ce travail nous montrons qu'une évaluation plus exacte de l'aléa présent dans les corrélations nonlocales peut être faite si l'on tient compte de plusieurs expressions de Bell à la fois ou de l'ensemble des probabilités (ou comportement) caractérisant l'appareil testé. De plus nous montrons qu'à chaque comportement correspond une expression de Bell optimale permettant de certifier la quantité maximale d'aléa présente dans ces corrélations. À partir de ces resultats, nous introduisons une famille de protocoles de génération d'aléa indépendants des appareils, sécurisés contre des adversaires classiques, et reposant sur l'évaluation de l'aléa à partir d'un nombre arbitraire d'expressions de Bell, ou même à partir des fréquences expérimentales des résultats de mesure. Les protocoles proposés permettent aussi d'évaluer l'aléa à partir d'un sous-ensemble de choix de mesure, ce qui peut être avantageux lorsque l'on considère des corrélations pour lesquelles certains choix de mesure produisent plus d'aléa que d'autres. Nous fournissons des exemples numériques illustrant l'avantage de cette méthode pour des données finies et montrons qu'asymptotiquement cette méthode résulte en un taux de génération d'aléa optimal à partir des données expérimentales, sans devoir supposer à priori que l'expérience viole une inégalité de Bell spécifique.
Doctorat en Sciences
info:eu-repo/semantics/nonPublished
Anglès, d'Auriac Paul-Elliot. "Infinite Computations in Algorithmic Randomness and Reverse Mathematics." Thesis, Paris Est, 2019. http://www.theses.fr/2019PESC0061.
Full textThis thesis focuses on the gains of infinite time computations to mathematical logic. Infinite time computations is a variant of the traditional definition of computations as a finite sequence of stages, each stage being defined from the previous ones, and finally reaching a halting state. In this thesis, we consider the case where the number of stages is not necessarily finite, but can continue along ordinals, an extension of the integers. There exists several ways to implement this idea, we will use three of them: higher recursion, infinite time Turing machines and α-recursion.Part of this works concerns the domain of reverse mathematics, and especially Hindman's theorem. Reverse mathematics is a program consisting in the study of theorems and axioms from the point of view of their "strength", and establishing a hierarchy on these. In particular the question of which axioms are needed in a proof of a given statement is central. We study Hindman's theorem under this lens, a combinatorial result from Ramsey's theory stating that for every partitioning of the integers into finitely many colors, there must exists an infinite set such that any sum of elements taken from it has a fixed color. In this thesis, we make some progress in the question of the minimal axiomatic system needed to show this result, by showing that the existence of some intermediate combinatorial objects is provable in a weak system.Weihrauch reduction is a way to compare the strength of theorems, that has been introduced in reverse mathematics recently. It sees theorems as problems to solve, and then compare their difficulties. This reduction is still less studied in this context, in particular few of the most important principles of reverse mathematics are not yet well comprehended. One of these is the Arithmetical Transfinite Recursion principle, an axiomatic system with strong links with infinite time computations and especially higher recursion. We continue the study of this principle by showing its links with a particular type of axiom of choice, and use it to separate the dependent and independent version of this choice.Yet another field of mathematical logic that benefits from computability theory is the one of algorithmic randomness. It studies "random" reals, those that it would seem reasonable to think that they arise from a process picking a real uniformly in some interval. A way to study this is to considerate, for a given real, the smallest algorithmic complexity of a null set containing it. This domain has proven very rich and has already been extended to certain type of infinite time computation, thereby modifying the complexity class considered. However, it has been extended to infinite time Turing machine and α-recursion only recently, by Carl and Schlicht. In this thesis, we contribute to the study of the most natural randomness classes for ITTMs and α-recursion. We show that two important classes, Σ-randomness and ITTM-randomness, are not automatically different; in particular their categorical equivalent are in fact the same classes
Birch, Thomas. "Algorithmic randomness on computable metric spaces and hyperspaces." Master's thesis, University of Cape Town, 2012. http://hdl.handle.net/11427/22093.
Full textHellouin, de Menibus Benjamin. "Asymptotic behaviour of cellular automata : computation and randomness." Thesis, Aix-Marseille, 2014. http://www.theses.fr/2014AIXM4729/document.
Full textThe subject of this thesis is the study of self-organization in one-dimensional cellular automata.Cellular automata are a discrete dynamical system as well as a massively parallel model of computation, both theseaspects influencing each other. Self-organisation is a phenomenon where an organised behaviour is observed asymptotically, regardless of the initial configuration. Typically, we consider that the initial point is sampled at random; that is, we consider a probability measure describing the distribution of theinitial configurations, and we study its evolution under the action of the automaton, the asymptoticbehaviour being described by the limit measure(s).Our work is two-sided. On the one hand, we characterise measures that can bereached as limit measures by cellular automata; this corresponds to the possible kinds of asymptoticbehaviours that can arise in simulations. This approach is similar to several recent results characterising someparameters of dynamical systems by computability conditions, using tools from computable analysis. Thisresult is also a description of the measure-theoretical computational power of cellular automata.On the other hand, we provided tools for the practical study of self-organization in restricted classes of cellularautomata. We introduced a frameworkfor cellular automata that can be seen as a set of interacting particles, in order todeduce properties concerning their asymptotic behaviour. Another ongoing research direction focus on cellular automata that converge to the uniform measurefor a wide class of initial measures (randomization phenomenon)
Morris, Mary Beth. "Flow randomness and tip losses in transonic rotors." Thesis, This resource online, 1992. http://scholar.lib.vt.edu/theses/available/etd-07212009-040241/.
Full textWallace, Kyle. "Understanding and Enriching Randomness Within Resource-Constrained Devices." W&M ScholarWorks, 2018. https://scholarworks.wm.edu/etd/1550153802.
Full textAvesani, Marco. "Practical and secure quantum randomness generation and communication." Doctoral thesis, Università degli studi di Padova, 2019. http://hdl.handle.net/11577/3423195.
Full textGallego, López Rodrigo. "Device-independent information protocols: measuring dimensionality, randomness and nonlocality." Doctoral thesis, Universitat Politècnica de Catalunya, 2013. http://hdl.handle.net/10803/108178.
Full textDhara, Chirag. "Intrinsic randomness in non-local theories: quantification and amplification." Doctoral thesis, Universitat Politècnica de Catalunya, 2013. http://hdl.handle.net/10803/128867.
Full textSadeh, Sadra [Verfasser], and Stefan [Akademischer Betreuer] Rotter. "Sensory processing in neocortical networks: randomness, specificity and learning." Freiburg : Universität, 2015. http://d-nb.info/1122593163/34.
Full textCharalambous, Ismini. "Distortion, randomness and quantitative measurements using optical coherence tomography." Thesis, University of Kent, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.443780.
Full textNUNES, VIVIAN DE ARAUJO DORNELAS. "EFFECTS OF CONTACT NETWORK RANDOMNESS ON MULTIPLE OPINION DYNAMICS." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2016. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=30466@1.
Full textCOORDENAÇÃO DE APERFEIÇOAMENTO DO PESSOAL DE ENSINO SUPERIOR
PROGRAMA DE SUPORTE À PÓS-GRADUAÇÃO DE INSTS. DE ENSINO
PROGRAMA DE EXCELENCIA ACADEMICA
Muitas vezes enfrentamos o desafio de escolher entre diferentes opções com atratividade semelhante como, por exemplo, na escolha de um candidato parlamentar, na escolha de um filme ou ao comprar um produto no supermercado. A fim de estudar a distribuição das preferências em tais situações, podemos considerar dinâmicas de opinião (com diversas opções possíveis, contemplando também os casos em que há indecisão) em redes. Neste trabalho, utilizamos duas dinâmicas distintas: uma envolvendo o contágio direto de cada sítio para a sua vizinhança (regra A) e a outra onde a opinião de cada sítio é definida pela maioria relativa local (regra B). A topologia da rede de contatos pode ter um efeito importante sobre a distribuição final de opiniões. Utilizamos as redes de Watts-Strogatz e, em particular, estamos interessados em investigar a contribuição da aleatoriedade p da rede no resultado final das dinâmicas. Dependendo das propriedades estruturais da rede e das condições iniciais, podemos ter diferentes resultados finais: equipartição de preferências, consenso e situações onde a indecisão é relevante. O papel da aleatoriedade da rede é não trivial: para um número pequeno de opiniões, as regras A e B (esta última com atualização síncrona) apresentam um valor ótimo de p, onde o predomínio da opinião vencedora é máximo. Já para a regra da pluralidade com atualização assíncrona, o aumento do número de atalhos pode até mesmo promover situações de consenso. Além disso, as duas dinâmicas (e seus diferentes modos de atualização) coincidem para baixa desordem da rede, mas diferem para graus de desordem maiores. Observaremos também que a quantidade de iniciadores diminui a fração da opinião vencedora para todas as dinâmicas e atenua o máximo local que aparece na região de mundo pequeno.
People often face the challenge of choosing amongst different options with similar attractiveness, such as when choosing a parliamentary candidate, a movie or buying a product in the supermarket. In order to study the distribution of preferences in such situations, we can consider opinion dynamics (where different options are available as well as the undecided state) in network. In this work, we use two different opinion dynamics: one involving the direct contagion from each site to its neighborhood (rule A) and another where the opinion of each site is defined by the local relative majority (rule B). The contact network topology can have a important effect in the final distribution of opinions. We use the Watts-Strogatz network and, in particular, we are interested in investigating the contribution of the network randomness p in the output of the dynamics. Depending on the structural properties of the network and the initial conditions, the final distribution can be: equipartition of preferences, consensus and situations where indecision is relevant. The role of network randomness is nontrivial: for a small number of opinions, the rules A and B (the latter with synchronous update) present an optimum value of p, where the predominance of a winning opinion is maximal. Moreover, for the plurality rule with asynchronous update, the increase of the number of shortcuts can even promote consensus situations. Furthermore, both dynamics coincide for small disorder of the network, but differ for larger disorder. Also we observe that the number of initiators decreases the value of the winning fraction in all types of dynamics and attenuates the local maximum that appears in the small-world region.
Verbeeck, Kenny. "Randomness as a generative principle in art and architecture." Thesis, Massachusetts Institute of Technology, 2006. http://hdl.handle.net/1721.1/35124.
Full textIncludes bibliographical references (leaves [87]-[98]).
As designers have become more eloquent in the exploitation of the powerful yet generic calculating capabilities of the computer, contemporary architectural practice seems to have set its mind on creating a logic machine that designs from predetermined constraints. Generating form from mathematical formulae thus gives the design process a scientific twist that allows the design to present itself as the outcome to a rigorous and objective process. So far, several designer-computer relations have been explored. The common designer-computer models are often described as either pre-rational or post-rational. Yet another approach would be the irrational. The hypothesis is that the early design process is in need of the unexpected, rather than iron logic. This research investigated how the use of randomness as a generative principle could present the designer with a creative design environment. The analysis and reading of randomness in art and architecture production takes as examples works of art where the artist/designer saw uncertainty or unpredictability as an intricate part of the process. The selected works incorporate, mostly, an instigating and an interpreting party embedded in the making of the work.
(cont.) The negotiations of boundaries between both parties determine the development of the work. Crucial to the selected works of art was the rendering of control or choice from one party to another - whether human, machine or nature - being used as a generative principle. Jackson Pollock serves as the analog example of a scattered computation: an indefinite number of calculations, of which each has a degree of randomness, that relate in a rhizomic manner. Pollock responds to each of these outcomes, allowing the painting to form from intentions rather than expectations. This looking and acting aspect to Pollock's approach is illustrated in the Jackson Pollock shape grammar. Ultimately the investigation of randomness in art is translated to architecture by comparing the Pollock approach in his drip paintings to Greg Lynn's digital design process in the Port Authority Gateway project. In the Pollock approach to digital design agency is given to the tools at hand, yet at the same time, the sheer indefinite number of designer-system interactions allows the design to emerge out of that constructive dialogue in an intuitive manner.
by Kenny Verbeeck.
S.M.
Cappelleri, Vincenzo-Maria. "Randomness, Age, Work: Ingredients for Secure Distributed Hash Tables." Doctoral thesis, Università degli studi di Padova, 2017. http://hdl.handle.net/11577/3423231.
Full textNel contesto dell’indirizzamento dinamico basato su risorse le Tabelle di Hash Distribuite (DHT) si rivelano una scelta naturale oltre che molto apprezzata. Le DHT forniscono due funzioni principali: il salvataggio di coppie (chiave, valore) e, data una chiave, la localizzazione del nodo per essa responsabile, opzionalmente unita al recupero del valore associato. La maggior parte delle DHT realizzate sono ad ogni modo vulnerabili a falle di sicurezza che espongono i nodi ed i dati salvati ad un certo numero di possibili attacchi. Tali attacchi spaziano dall’impedire il corretto instradamento sulla DHT al corrompere o rendere indisponibili i dati. Anche se le DHT sono uno standard de facto in sistemi molto diffusi (come per esempio i client di BitTorrent o per la rete KAD) la debolezza di fronte a questi attacchi potrebbe tuttavia impedirne l’adozione da parte di sistemi maggiormente incentrati sulla sicurezza, pur potendo trarre vantaggio dalla facilità di indicizzazione e pubblicazione delle DHT. Nel corso degli anni, sia da parte della comunità accademica che da parte di sviluppatori professionisti, sono state proposte molte possibili soluzioni al problema di sicurezza della DHT, spaziando da idee basate sul controllo esercitato da parte di Autorità Centrali a meccanismi basati sulle social network. Le proposte sono spesso personalizzate per specifiche realizzazioni delle DHT o, spesso, cercano semplicemente di mitigare senza eliminare la possibilità di azioni ostili verso i nodi o le risorse. Inoltre le soluzioni proposte spesso dimostrano di essere seriamente limitate o basate su assunzioni piuttosto forti relativamente alla rete di riferimento. In questo lavoro, dopo aver fornito un’utile e generica astrazione del protocollo e delle infrastrutture di una DHT, presentiamo due nuove primitive. Estendiamo la “normale” funzione di proof-of-work facendo si che offra anche una “prova d’età” (ossia, informalmente, permette di provare che un nodo sia sufficientemente “anziano”) ed una primitiva che permetta l’accesso ad un seme randomico distribuito. Utilizzando queste due nuove primitive ed integrandole nell’astrazione basilare otteniamo una DHT “migliorata”, resistente a molti degi comuni attacchi inferti a questi sistemi. Inoltre mostreremo come un sistema basato sulle Block Chain – una collezione di “blocchi di dati” protetta contro la contraffazione – possa fornire una possibile fondazione per la nostra DHT migliorata. Infine abbiamo realizzato un software prototipo che realizza una DHT sicura basata sul sistema Kademlia. Utilizzando questo software abbiamo condotto degli esperimenti, dimostrando come questo sistema sia utilizzabile in pratica nonostante il lavoro addizionale richiesto dai nodi. Concludendo questo lavoro forniamo il seguente contributo: descriviamo un nuovo insieme di primitive per ottenere una DHT sicura (adattabile ad ogni sistema conforme alla nostra definizione di DHT), proponiamo un’architettura concreta per ottenere una DHT migliorata, ed annunciamo una versione prototipale e funzionante di questo sistema.
Kephart, David E. "Topology, morphisms, and randomness in the space of formal languages." [Tampa, Fla.] : University of South Florida, 2005. http://purl.fcla.edu/fcla/etd/SFE0001250.
Full textYilek, Scott Christopher. "Public-key encryption secure in the presence of randomness failures." Diss., [La Jolla] : University of California, San Diego, 2010. http://wwwlib.umi.com/cr/ucsd/fullcit?p3404895.
Full textTitle from first page of PDF file (viewed June 23, 2010). Available via ProQuest Digital Dissertations. Vita. Includes bibliographical references (leaves 103-109).
Cantinotti, Michael. "Can gamblers beat randomness? : an experimental study on sport betting." Master's thesis, Université Laval, 2002. http://proquest.umi.com/pqdweb?did=766575321&sid=17&Fmt=2&clientId=9268&RQT=309&VName=PQD.
Full text