Page 41 - profile2012.indd
P. 41

Research Laboratories  研究群



                                       計算理論與演算法實驗室


 Computation Theory




 and Algorithms  Laboratory




 Research Faculty
 Research Faculty

 Tsan-sheng Hsu  Ming-Tat Ko  Der-Tsai Lee  Churn-Jung Liau  Jing-Sin Liu  Chi-Jen Lu  Da-Wei Wang  Bo-Yin Yang
 Research Fellow  Research Fellow  Distinguished Research Fellow  Research Fellow  Associate Research Fellow  Research Fellow  Research Fellow  Associate Research Fellow





 Group Profile
 (1) Graph Theory and Algorithms  first approach is to study whether or not randomized algorithms can be effi-
           ciently converted into deterministic ones. We show how this can be achieved
 Fundation: Graphs are used to model many important applica-  under reasonable assumptions, and we also study its potential limitation.
 tions and are a main tool for solving many theoretical problems.   The second approach is to design procedures, called extractors, which can
 We often start with probing fundamental theoretical problems   extract almost perfect randomness from slightly random sources. We pro-
 such as the structure of graphs with certain properties. With   vide an optimal construction of extractors, and we also find applications of   Computation theory and
 these properties, we then design efficient solutions to them.   extractors in cryptography.
 We work on algorithmic graph problems arisen from real-world                  algorithms is the foundation
 applications.   (6) Cryptography                                              of Computer Science with
 Network Design and Analysis:  The network design problem   Efficient Cryptography and CHES (Crypto Hardware and Embedded Systems):   studies of power and limits
 considers  how  to  connect  a  collection  of  sites  by  a  network   We are working on designing cryptographical approaches for specialized
 such that certain requirements are met. Topics in network de-  hardware, including implementing cryptographical algorithms on vector   of computing problems.
 sign arise as central issues in wide areas, such as VLSI design,   units in CPUs, FPGAs, ASICs, and GPU (graphic processing units). One of our
 wireless sensor network, bioinformatics, and communication   record-breaking results is using GPUs to assist cryptanalytic computations.
 networks. With respect to different applications, these issues   We also study the implementation of practical information security algo-
 demonstrate themselves in different forms, with subtle simi-  rithms, such as using intelligent agents to assist server-less authenticated
 larities via various quality measurements and constraints in   information exchanges.
 practice.
 mous navigation based on 3D map building, smooth path plan-  Post-Quantum Cryptography: We work on MPKCs (Multivariate Public-Key
 (2) Geometric Computing  ning using soft computing and robot-assisted sensor network.  Cryptosystems) that has advanced the understanding of the field from both
           theoretical and practical viewpoints. MPKCs operate on a vector of variables
 The Voronoi diagram is a very versatile and well-studied geo-  (4) Data-Intensive Computation  over a small field, instead of on an element in a huge algebraic structure (as
 metric construct in geometric computing.  The properties,   in RSA or ECC). This key characteristic makes MPKCs faster while maintaining
 complexity, and computation of Voronoi diagram are among   Logic and knowledge representation: Much information and   comparable design security; hence, they are useful for low-resource environ-
 the fundamental problems to study. By introducing different   knowledge are implicit in massive data. Wewant to study the   ments, such as embedded systems and smart cards.
 metrics, such as time-distance, the diagram will change. In   related knowledge representation and reasoning problems
 general, we plan to study how the properties of the Voronoi   based on formal logics. With a proper representation frame-  Algebraic Cryptanalysis: We work on faster implementations and additional
 diagram vary with the metric selected, and how we make use   work, knowledge discovered from massive data can be used in   theory behind such system-solvers. This work also relates to the previously
 of the properties of the selected metric, if any, to construct the   intelligent data-intensive computational systems.  mentioned area above, since an attack on an MPKC is equivalent to solving
 diagram.  an instance of the multivariate quadratic systems (MQ) or the extended iso-
 Efficient algorithms: With the rapid development of computer   morphism of polynomials (EIP) problems.
 (3) Robtics  and communication technology, it has become much easier to
 access or store massive amounts of data electronically. We are
 The development of intelligent robotic systems to ensure the   interested in the research problems concerning efficient com-
 safety and comfort of human-robot interaction is of paramount   putation of massive data which include data privacy, issues in
 importance in current and near future robotics research.  To   large scale social networks and classical computer games.
 make robots as good partner and good helper of human be-
 ings requires the theory and technology of sensing, planning   (5) Complexity Theory
 and control and their integration. Along the line of robotics
 research, we conduct simulations and experiments on autono-  Randomness has become a valuable resource in computation,
 as randomized algorithms have provided the most efficient so-
 lutions for many important computational problems. However,
 randomized algorithms typically depend on the availability of
 a perfect random source, whose existence even in the nature is
 debatable. There are two approaches to resolve this issue. The

 研究群
 40  Research Laboratories
 40
                                                                                                                 41
                                                                                                                 41
   36   37   38   39   40   41   42   43   44   45   46