Skip to main content

Showing 1–17 of 17 results for author: Berndt, S

.
  1. arXiv:2305.08432  [pdf, ps, other

    cs.DS cs.DM

    New Support Size Bounds for Integer Programming, Applied to Makespan Minimization on Uniformly Related Machines

    Authors: Sebastian Berndt, Hauke Brinkop, Klaus Jansen, Matthias Mnich, Tobias Stamm

    Abstract: Mixed-integer linear programming (MILP) is at the core of many advanced algorithms for solving fundamental problems in combinatorial optimization. The complexity of solving MILPs directly correlates with their support size, which is the minimum number of non-zero integer variables in an optimal solution. A hallmark result by Eisenbrand and Shmonin (Oper. Res. Lett., 2006) shows that any feasible i… ▽ More

    Submitted 15 May, 2023; originally announced May 2023.

    Comments: 27 pages, 2 figures, submitted to ESA 2023

  2. arXiv:2302.06361  [pdf, other

    cs.CR cs.LG

    DASH: Accelerating Distributed Private Machine Learning Inference with Arithmetic Garbled Circuits

    Authors: Jonas Sander, Sebastian Berndt, Ida Bruhns, Thomas Eisenbarth

    Abstract: The adoption of machine learning solutions is rapidly increasing across all parts of society. Cloud service providers such as Amazon Web Services, Microsoft Azure and the Google Cloud Platform aggressively expand their Machine-Learning-as-a-Service offerings. While the widespread adoption of machine learning has huge potential for both research and industry, the large-scale evaluation of possibly… ▽ More

    Submitted 13 February, 2023; originally announced February 2023.

  3. Util::Lookup: Exploiting key decoding in cryptographic libraries

    Authors: Florian Sieck, Sebastian Berndt, Jan Wichelmann, Thomas Eisenbarth

    Abstract: Implementations of cryptographic libraries have been scrutinized for secret-dependent execution behavior exploitable by microarchitectural side-channel attacks. To prevent unintended leakages, most libraries moved to constant-time implementations of cryptographic primitives. There have also been efforts to certify libraries for use in sensitive areas, like Microsoft CNG and Botan, with specific at… ▽ More

    Submitted 10 August, 2021; originally announced August 2021.

    Journal ref: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, New York, NY, USA

  4. arXiv:2107.13638  [pdf, other

    cs.DS

    Load Balancing: The Long Road from Theory to Practice

    Authors: Sebastian Berndt, Max A. Deppert, Klaus Jansen, Lars Rohwedder

    Abstract: There is a long history of approximation schemes for the problem of scheduling jobs on identical machines to minimize the makespan. Such a scheme grants a $(1+ε)$-approximation solution for every $ε> 0$, but the running time grows exponentially in $1/ε$. For a long time, these schemes seemed like a purely theoretical concept. Even solving instances for moderate values of $ε$ seemed completely illu… ▽ More

    Submitted 28 July, 2021; originally announced July 2021.

  5. arXiv:2104.09803  [pdf, ps, other

    cs.DS

    Robust Online Algorithms for Dynamic Choosing Problems

    Authors: Sebastian Berndt, Kilian Grage, Klaus Jansen, Lukas Johannsen, Maria Kosche

    Abstract: Semi-online algorithms that are allowed to perform a bounded amount of repacking achieve guaranteed good worst-case behaviour in a more realistic setting. Most of the previous works focused on minimization problems that aim to minimize some costs. In this work, we study maximization problems that aim to maximize their profit. We mostly focus on a class of problems that we call choosing problems,… ▽ More

    Submitted 20 April, 2021; originally announced April 2021.

    Comments: CIE 2021

  6. arXiv:2010.09255  [pdf, ps, other

    cs.CC

    Tightness of Sensitivity and Proximity Bounds for Integer Linear Programs

    Authors: Sebastian Berndt, Klaus Jansen, Alexandra Lassota

    Abstract: We consider ILPs, where each variable corresponds to an integral point within a polytope $\mathcal{P}$, i. e., ILPs of the form $\min\{c^{\top}x\mid \sum_{p\in\mathcal P\cap \mathbb Z^d} x_p p = b, x\in\mathbb Z^{|\mathcal P\cap \mathbb Z^d|}_{\ge 0}\}$. The distance between an optimal fractional solution and an optimal integral solution (called proximity) is an important measure. A classical re… ▽ More

    Submitted 19 October, 2020; originally announced October 2020.

  7. arXiv:2007.02660  [pdf, other

    cs.DS

    Solving Packing Problems with Few Small Items Using Rainbow Matchings

    Authors: Max Bannach, Sebastian Berndt, Marten Maack, Matthias Mnich, Alexandra Lassota, Malin Rau, Malte Skambath

    Abstract: An important area of combinatorial optimization is the study of packing and covering problems, such as Bin Packing, Multiple Knapsack, and Bin Covering. Those problems have been studied extensively from the viewpoint of approximation algorithms, but their parameterized complexity has only been investigated barely. For problem instances containing no "small" items, classical matching algorithms yie… ▽ More

    Submitted 6 July, 2020; originally announced July 2020.

    Comments: MFCS 2020

  8. arXiv:2006.10847  [pdf, other

    cs.DS math.OC

    New Bounds for the Vertices of the Integer Hull

    Authors: Sebastian Berndt, Klaus Jansen, Kim-Manuel Klein

    Abstract: The vertices of the integer hull are the integral equivalent to the well-studied basic feasible solutions of linear programs. In this paper we give new bounds on the number of non-zero components -- their support -- of these vertices matching either the best known bounds or improving upon them. While the best known bounds make use of deep techniques, we only use basic results from probability theo… ▽ More

    Submitted 18 June, 2020; originally announced June 2020.

  9. arXiv:1905.07986  [pdf, ps, other

    cs.DS

    Robust Online Algorithms for Dynamic Problems

    Authors: Sebastian Berndt, Valentin Dreismann, Kilian Grage, Klaus Jansen, Ingmar Knof

    Abstract: Online algorithms that allow a small amount of migration or recourse have been intensively studied in the last years. They are essential in the design of competitive algorithms for dynamic problems, where objects can also depart from the instance. In this work, we give a general framework to obtain so called robust online algorithms for these dynamic problems: these online algorithm achieve an asy… ▽ More

    Submitted 20 May, 2019; originally announced May 2019.

  10. arXiv:1905.01134  [pdf, other

    cs.DS

    Positive-Instance Driven Dynamic Programming for Graph Searching

    Authors: Max Bannach, Sebastian Berndt

    Abstract: Research on the similarity of a graph to being a tree - called the treewidth of the graph - has seen an enormous rise within the last decade, but a practically fast algorithm for this task has been discovered only recently by Tamaki (ESA 2017). It is based on dynamic programming and makes use of the fact that the number of positive subinstances is typically substantially smaller than the number of… ▽ More

    Submitted 3 May, 2019; originally announced May 2019.

    Comments: WADS 2019

  11. arXiv:1904.10085  [pdf, other

    cs.CV

    Tertiary Eye Movement Classification by a Hybrid Algorithm

    Authors: Samuel-Hunter Berndt, Douglas Kirkpatrick, Timothy Taviano, Oleg Komogortsev

    Abstract: The proper classification of major eye movements, saccades, fixations, and smooth pursuits, remains essential to utilizing eye-tracking data. There is difficulty in separating out smooth pursuits from the other behavior types, particularly from fixations. To this end, we propose a new offline algorithm, I-VDT-HMM, for tertiary classification of eye movements. The algorithm combines the simplicity… ▽ More

    Submitted 22 April, 2019; originally announced April 2019.

    Comments: 10 pages, 18 figures, 3 tables

  12. arXiv:1904.06543  [pdf, ps, other

    cs.DS

    Online Bin Covering with Limited Migration

    Authors: Sebastian Berndt, Leah Epstein, Klaus Jansen, Asaf Levin, Marten Maack, Lars Rohwedder

    Abstract: Semi-online models where decisions may be revoked in a limited way have been studied extensively in the last years. This is motivated by the fact that the pure online model is often too restrictive to model real-world applications, where some changes might be allowed. A well-studied measure of the amount of decisions that can be revoked is the migration factor $β$: When an object $o$ of size… ▽ More

    Submitted 13 April, 2019; originally announced April 2019.

  13. arXiv:1806.10176  [pdf, other

    cs.DS

    Practical Access to Dynamic Programming on Tree Decompositions

    Authors: Max Bannach, Sebastian Berndt

    Abstract: Parameterized complexity theory has lead to a wide range of algorithmic breakthroughs within the last decades, but the practicability of these methods for real-world problems is still not well understood. We investigate the practicability of one of the fundamental approaches of this field: dynamic programming on tree decompositions. Indisputably, this is a key technique in parameterized algorithms… ▽ More

    Submitted 26 June, 2018; originally announced June 2018.

    Comments: ESA 2018

  14. arXiv:1801.08154  [pdf, ps, other

    cs.CR

    On the Gold Standard for Security of Universal Steganography

    Authors: Sebastian Berndt, Maciej Liśkiewicz

    Abstract: While symmetric-key steganography is quite well understood both in the information-theoretic and in the computational setting, many fundamental questions about its public-key counterpart resist persistent attempts to solve them. The computational model for public-key steganography was proposed by von Ahn and Hopper in EUROCRYPT 2004. At TCC 2005, Backes and Cachin gave the first universal public-k… ▽ More

    Submitted 24 January, 2018; originally announced January 2018.

    Comments: EUROCRYPT 2018, llncs style

  15. arXiv:1708.06199  [pdf, ps, other

    cs.CR

    Algorithm Substitution Attacks from a Steganographic Perspective

    Authors: Sebastian Berndt, Maciej Liskiewicz

    Abstract: The goal of an algorithm substitution attack (ASA), also called a subversion attack (SA), is to replace an honest implementation of a cryptographic tool by a subverted one which allows to leak private information while generating output indistinguishable from the honest output. Bellare, Paterson, and Rogaway provided at CRYPTO'14 a formal security model to capture this kind of attacks and construc… ▽ More

    Submitted 1 November, 2017; v1 submitted 21 August, 2017; originally announced August 2017.

    Comments: CCS 2017, 12 pages, double-column; fixed a typo in the advantage-definitions; removed the dependency on the random-oracle-model for the upper bound on the rate

  16. arXiv:1411.0960  [pdf, ps, other

    cs.DS

    Fully Dynamic Bin Packing Revisited

    Authors: Sebastian Berndt, Klaus Jansen, Kim-Manuel Klein

    Abstract: We consider the fully dynamic bin packing problem, where items arrive and depart in an online fashion and repacking of previously packed items is allowed. The goal is, of course, to minimize both the number of bins used as well as the amount of repacking. A recently introduced way of measuring the repacking costs at each timestep is the migration factor, defined as the total size of repacked items… ▽ More

    Submitted 14 January, 2015; v1 submitted 4 November, 2014; originally announced November 2014.

    ACM Class: F.2.2

  17. arXiv:1312.2675  [pdf

    q-bio.PE

    Genome-wide scan of 29,141 African Americans finds no evidence of selection since admixture

    Authors: Gaurav Bhatia, Arti Tandon, Melinda C. Aldrich, Christine B. Ambrosone, Christopher Amos, Elisa V. Bandera, Sonja I. Berndt, Leslie Bernstein, William J. Blot, Cathryn H. Bock, Neil Caporaso, Graham Casey, Sandra L. Deming, W. Ryan Diver, Susan M. Gapstur, Elizabeth M. Gillanders, Curtis C. Harris, Brian E. Henderson, Sue A. Ingles, William Isaacs, Esther M. John, Rick A. Kittles, Emma Larkin, Lorna H. McNeill, Robert C. Millikan , et al. (22 additional authors not shown)

    Abstract: We scanned through the genomes of 29,141 African Americans, searching for loci where the average proportion of African ancestry deviates significantly from the genome-wide average. We failed to find any genome-wide significant deviations, and conclude that any selection in African Americans since admixture is sufficiently weak that it falls below the threshold of our power to detect it using a lar… ▽ More

    Submitted 10 December, 2013; originally announced December 2013.