471 |
Studies in program obfuscationVaria, Mayank (Mayank Harshad) January 2010 (has links)
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Mathematics, 2010. / This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections. / Cataloged from student submitted PDF version of thesis. / Includes bibliographical references (p. 159-164). / Program obfuscation is the software analog to the problem of tamper-proofing hardware. The goal of program obfuscation is to construct a compiler, called an "obfuscator," that garbles the code of a computer program while maintaining its functionality. Commercial products exist to perform this procedure, but they do not provide a rigorous security guarantee. Over the past decade, program obfuscation has been studied by the theoretical cryptography community, where rigorous definitions of security have been proposed and obfuscators have been constructed for some families of programs. This thesis presents three contributions based on the virtual black-box security definition of Barak et al [10]. First, we show tight connections between obfuscation and symmetric-key encryption. Specifically, obfuscation can be used to construct an encryption scheme with strong leakage resilience and key-dependent message security. The converse is also true, and these connections scale with the level of security desired. As a result, the known constructions and impossibility results for each primitive carry over to the other. Second, we present two new security definitions that augment the virtual black-box property to incorporate non-malleability. The virtual black-box definition does not prevent an adversary from modifying an obfuscated program intelligently. By contrast, our new definitions provide software with the same security guarantees as tamper-proof and tamper-evident hardware, respectively. The first definition prohibits tampering, and the second definition requires that tampering is detectable after the fact. We construct non-malleable obfuscators of both favors for some program families of interest. Third, we present an obfuscator for programs that test for membership in a hyperplane. This generalizes prior works that obfuscate equality testing. We prove the security of the obfuscator under a new strong variant of the Decisional Diffie-Hellman assumption that holds in the generic group model. Additionally, we show a cryptographic application of the new obfuscator to leak-ageresilient one-time digital signatures. The thesis also includes a survey of the prior results in the field. / by Mayank Varia. / Ph.D.
|
472 |
The blowup formula for higher rank Donaldson invariantsCuller, Lucas Howard January 2014 (has links)
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Mathematics, 2014. / 16 / Cataloged from PDF version of thesis. / Includes bibliographical references (pages 73-74). / In this thesis, I study the relationship between the higher rank Donaldson invariants of a smooth 4-manifold X and the invariants of its blowup X#CP2 . This relationship can be expressed in terms of a formal power series in several variables, called the blowup function. I compute the restriction of the blowup function to one of its variables, by solving a special system of ordinary differential equations. I also compute the SU(3) blowup function completely, and show that it is a theta function on a family of genus 2 hyperelliptic Jacobians. Finally, I give a formal argument to explain the appearance of Abelian varieties and theta functions in four dimensional topological field theories. / by Lucas Howard Culler. / Ph. D.
|
473 |
Testing regression models with residuals as data by Xia Hua.Hua, Xia, Ph. D. Massachusetts Institute of Technology January 2010 (has links)
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Mathematics, 2010. / Cataloged from PDF version of thesis. / Includes bibliographical references (p. 85-86). / Abstract In polynomial regression ... . In this thesis, I developed a residual based test, the turning point test for residuals, which tests the hypothesis that the kth order polynomial regression holds with ... while the alternative can simply be the negation or be more specific, e.g., polynomial regression with order higher than k. This test extends the rather well known turning point test and requires approximation of residuals by errors for large n. The simple linear regression model, namely k = 1, will be studied in most detail. It is proved that the expected absolute difference of numbers of turning points in the errors and residuals cannot become large and under mild conditions becomes small at given rates for large n. The power of the test is then compared with another residual based test, the convexity point test, using simulations. The turning point test is shown to be more powerful against quadratic alternatives. / Ph.D.
|
474 |
Diagrams of affine permutations and their labellingsYun, Taedong January 2013 (has links)
Thesis (Ph. D.)--Massachusetts Institute of Technology, Department of Mathematics, 2013. / Cataloged from PDF version of thesis. / Includes bibliographical references (pages 63-64). / We study affine permutation diagrams and their labellings with positive integers. Balanced labellings of a Rothe diagram of a finite permutation were defined by Fomin- Greene-Reiner-Shimozono, and we extend this notion to affine permutations. The balanced labellings give a natural encoding of the reduced decompositions of affine permutations. We show that the sum of weight monomials of the column-strict balanced labellings is the affine Stanley symmetric function which plays an important role in the geometry of the affine Grassmannian. Furthermore, we define set-valued balanced labellings in which the labels are sets of positive integers, and we investigate the relations between set-valued balanced labellings and nilHecke words in the nilHecke algebra. A signed generating function of column-strict set-valued balanced labellings is shown to coincide with the affine stable Grothendieck polynomial which is related to the K-theory of the affine Grassmannian. Moreover, for finite permutations, we show that the usual Grothendieck polynomial of Lascoux-Schiitzenberger can be obtained by flagged column-strict set-valued balanced labellings. Using the theory of balanced labellings, we give a necessary and sufficient condition for a diagram to be a permutation diagram. An affine diagram is an affine permutation diagram if and only if it is North-West and admits a special content map. We also characterize and enumerate the patterns of permutation diagrams. / by Taedong Yun. / Ph.D.
|
475 |
The Seiberg-Witten equations on a surface times a circleLopes, William Manuel January 2010 (has links)
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Mathematics, 2010. / Cataloged from PDF version of thesis. / Includes bibliographical references (p. 63). / In this thesis I study the Seiberg-Witten equations on the product of a genus g surface [Sigma] and a circle. I exploit S1 invariance to reduce to the vortex equations on [Sigma] and thus completely describe the Seiberg-Witten monopoles. In the case where the monopoles are not Morse-Bott regular, I explicitly perturb the equations to obtain such a situation and thus find a candidate for the chain complex that calculates the Seiberg-Witten Floer homology groups. / by William Manuel Lopes. / Ph.D.
|
476 |
Revealing and analyzing imperceptible deviations in images and videosWadhwa, Neal January 2016 (has links)
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Mathematics, 2016. / Cataloged from PDF version of thesis. / Includes bibliographical references (pages 191-197). / The world is filled with objects that appear to follow some perfect model. A sleeping baby might look still and a house's roof .should be straight. However, both the baby and the roof can deviate subtly from their ideal models of perfect stillness and perfect straightness. These deviations can reveal important information like whether the baby is breathing normally or whether the house's roof is sagging. In this dissertation, we make the observation that these subtle deviations produce a visual signal that while invisible to the naked eye can be extracted from ordinary and ubiquitous images and videos. We propose new computational techniques to reveal these subtle deviations by producing new images and videos, in which the tiny deviations have been magnified. We focus on magnifying deviations from two ideal models: perfect stillness and perfect geometries in space. In the first case, we leverage the complex steerable pyramid, a localized version of the Fourier transform, whose notion of local phase can be used to process and manipulate small motions or changes from stillness in videos. In the second case, we find hidden geometric deformations in images by localizing edges to sub-pixel precision. In both cases, we experimentally validate that the tiny deviations we magnify are indeed real, comparing them to alternative ways of measuring tiny motions and subtle geometric deformations in the world. We also give a careful analysis of how noise in videos impacts our ability to see tiny motions. Additionally, we show the utility of revealing hidden deviations in a wide variety of fields, such as biology, physics and structural analysis. / by Neal Wadhwa. / Ph. D.
|
477 |
Studies on quasisymmetric functionsGrinberg, Darij January 2016 (has links)
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Mathematics, 2016. / This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections. / Cataloged from student-submitted PDF version of thesis. / Includes bibliographical references (pages 297-302). / In 1983, Ira Gessel introduced the ring of quasisymmetric functions (QSym), an extension of the ring of symmetric functions and nowadays one of the standard examples of a combinatorial Hopf algebra. In this thesis, I elucidate three aspects of its theory: 1) Gessel's P-partition enumerators are quasisymmetric functions that generalize, and share many properties of, the Schur functions; their Hopf-algebraic antipode satisfies a simple and explicit formula. Malvenuto and Reutenauer have generalized this formula to quasisymmetric functions "associated to a set of equalities and inequalities". I reformulate their generalization in the handier terminology of double posets, and present a new proof and an even further generalization in which a group acts on the double poset. 2) There is a second bialgebra structure on QSym, with its own "internal" comultiplication. I show how this bialgebra can be constructed using the Aguiar-Bergeron- Sottile universal property of QSym by extending the base ring; the same approach also constructs the so-called "Bernstein homomorphism", which makes any connected graded commutative Hopf algebra into a comodule over this second bialgebra QSym. 3) I prove a recursive formula for the "dual immaculate quasisymmetric functions" (a certain special case of P-partition enumerators) conjectured by Mike Zabrocki. The proof introduces a dendriform algebra structure on QSym. Two further results appearing in this thesis, but not directly connected to QSym, are: 4) generalizations of Whitney's formula for the chromatic polynomial of a graph in terms of broken circuits. One of these generalizations involves weights assigned to the broken circuits. A formula for the chromatic symmetric function is also obtained. 5) a proof of a conjecture by Bergeron, Ceballos and Labbé on reduced-word graphs in Coxeter groups (joint work with Alexander Postnikov). Given an element of a Coxeter group, we can form a graph whose vertices are the reduced expressions of this element, and whose edges connect two reduced expressions which are "a single braid move apart". The simplest part of the conjecture says that this graph is bipartite; we show finer claims about its cycles. / by Darij Grinberg. / Ph. D.
|
478 |
Existence and regularity of monotone solutions to a free boundary problemDe Silva, Daniela January 2005 (has links)
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Mathematics, 2005. / Includes bibliographical references (p. 71-72). / In the first part of this dissertation, we provide the first example of a singular energy minimizing free boundary. This singular solution occurs in dimension 7 and higher, and in fact it is conjectured that there are no singular minimizers in dimension lower than 7. Our example is the analogue of the 8-dimensional Simons cone in the theory of minimal surfaces. The minimality of the Simons cone is closely related to the existence of a complete minimal graph in dimension 9, which is not a hyperplane. The first step toward solving the analogous problem in the free boundary context, consists in developing a local existence and regularity theory for monotone solutions to a free boundary problem. This is the objective of the second part of our thesis. We also provide a partial result in the global context.. / by Daniela De Silva. / Ph.D.
|
479 |
Fault-tolerant sorting networksMa, Yuan January 1994 (has links)
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Mathematics, 1994. / Includes bibliographical references (p. 148-150). / by Yuan Ma. / Ph.D.
|
480 |
On von Mises functionals with emphasis on trace class kernelsGonzález-Barrios, José M January 1990 (has links)
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Mathematics, 1990. / Includes bibliographical references (leaves 78-80). / by José M. González-Barrios. / Ph.D.
|
Page generated in 0.0997 seconds