Matsoft :: Research :: Computer Science
 
Home
|  
Products
|  
Services
|  
Startups
|  
Research
|  
Better World Project
|  
Beletristics
|  
Permanent Digulescian Authority
|  
Freemasonry
|  
Downloads
|  
News
|  
Contact
|  
About
|
 
* Law


Computer Science Research Papers


Mircea Digulescu is an active Researcher in Computer Science. His main fileds of interest are Cryptology (Cryptography), Game Theory and Computability/Complexity Theory. This is by far the field where he adds the highest, top-knotch, disruptive value, researching in "Nobel-prize"-grade areas. Note that Mircea Digulescu has a PhD (ABD - All But Dissertation) in Computer Science from University of Bucharest (2019), has scored 800 (out of 800) on SAT2 Maths, is a Div1 Codeforces.com coder and has succesfully participated at International Olympiads in Computer Science and at ACM SEERC contest.

A discussion of each paper, including Abstract is available in the subsequent sections on this page.

Like with any Researcher, if the above works inspire you in anyway.. and you happen to publish your own paper leveraging this inspiration, thanking with a citation is much appreciated.

See also the credentials section below for Mircea's credentials and a list of prospective future papers in Computer Science by him.


top


Cryptology (Cryptography)


Below are details of each paper published by Mircea Digulescu in Cryptology.

Applications of SKREM-like ciphers (2021) (Cryptology).
Link (peer-reviewed): https://aircconline.com/csit/abstract/v11n9/csit110912.html and https://csitcp.com/abstract/11/119csit12. IACR: https://eprint.iacr.org/2021/496. The full text is also available on the Downloads page.
Abstract: In a prior paper we introduced a new symmetric key encryption scheme called Short Key Random Encryption Machine (SKREM), for which we claimed excellent security guarantees. In this paper we present and briefly discuss how some other cryptographic applications besides plain text encryption can benefit from the same security guarantees. We task ourselves with and succeed in showing how Secure Coin Flipping, Cryptographic Hashing, Zero-Leaked-Knowledge Authentication and Authorization and a Digital Signature scheme which can be employed on a block-chain, can all be achieved using SKREM-like ciphers, benefiting from their security guarantees. We also briefly recap SKREMlike ciphers and the core traits which make them so secure. The realizations of the above applications are novel because they do not involve public key cryptography. Furthermore, the security of SKREMlike ciphers is not based on hardness of some algebraic operations, thus not opening them up to specific quantum computing attacks.
Keywords: Symmetric Key Encryption, Provable Security, One Time Pad, Zero Knowledge, Cryptographic Commit Protocol, Secure Coin Flipping, Authentication, Authorization, Cryptographic Hash, Digital Signature, Chaos Machine.
Discussion: This paper presents SKREM in a more human-readable fashion and shows how the above applications can be achieved using it (yes, even being a symmetric-key cipher). The core of "how that works" is new randomness which is obtained (and can be commmited to) via SKREM using a short secret key.
---

Hiding Data in Plain Sight: Towards Provably Unbreakable Encryption with Short Secret Keys and One-Way Functions (2021) (Cryptology).
Link (peer-reviewed): https://aircconline.com/csit/abstract/v11n9/csit110914.html and https://csitcp.com/abstract/11/119csit14. IACR: https://eprint.iacr.org/2021/495. The full text is also available on the Downloads page.
Abstract: It has long been known that cryptographic schemes offering provably unbreakable security exist, namely the One Time Pad (OTP). The OTP, however, comes at the cost of a very long secret key - as long as the plain-text itself. In this paper we propose an encryption scheme which we (boldly) claim offers the same level of security as the OTP, while allowing for much shorter keys, of size polylogarithmic in the computing power available to the adversary. The Scheme requires a large sequence of truly random words, of length polynomial in the both plain-text size and the logarithm of the computing power the adversary has. We claim that it ensures such an attacker cannot discern the cipher output from random data, except with small probability. We also show how it can be adapted to allow for several plain-texts to be encrypted in the same cipher output, with almost independent keys. Also, we describe how it can be used in lieu of a One Way Function.
Keywords: Encryption, Provable Security, Chaos Machine, Truly Random, One Time Pad, One Way Function. Discussion: The novel scheme makes use of a large, public, truly-random master table to import entropy in a secure fashion, based on both the contents of the master table and the secret key.
---

Ideas for key exchange over symmetric-key ciphers beyond Meet-in-the-Middle (~2026) (Cryptology).
While most ideas of this paper have been fully developed, the text has not yet been authored.
Link: n/a.
Abstract: text.
Discussion: This paper discusses how two parties using a public channel can perform secret key exchange so as to ensure that future communications between them are secure, making use of just symmetric-key ciphers (no PKI). Of course, the Digital Signatures scheme over SKREM presented in 2021 can be used to prevent meet-in-the-middle-attacks, but how about actual key exchange?.. It seems that it is possible, if but unconventional and a bit unorthodox from a computer science perspective.
---

K-of-N secret sharing with physical locks (~2026) (Cryptology).
While the ideas of this paper have been fully developed, the text has not yet been authored. Link: n/a.
Abstract: text.
Discussion: This paper discusses a k-of-n secret sharing scheme which makes use of a potentially large number of distinct Locks and an even larger number of keys to each lock, distributed amongs the N participants. It is suitable for low values of k. The scheme can be used both digitally (the product of the Locks could be XORed to obtain a master key for example) and offline: where sturdy physical locks or valuts with corresponding keys are acquired from a locksmith. Note: We are aware of the K-of-N secret sharing scheme involving polynamial interpolation, however Mircea is yet to have seen the proof that such scheme is sound even when the polynamial is over a finite field.
---

Make sure to download the full text of these papers on the Downloads Page.

top


Game Theory


Below are details of each paper published by Mircea Digulescu in Game Theory.

Farsighted Collusion in Stable Marriage Problem, with No Self-Harmful Plays: Efficient Algorithm for Determining the Unique Man-Optimal Matching: Efficient Algorithm for Determining the Unique Man-Optimal Matching (2022) (Game Theory, Complexity Theory).
Link (peer-reviewed): https://sciencepg.com/article/10.11648/j.ajcst.20220502.24. The full text is also available on the Downloads page.
Abstract: The Stable Marriage Problem, as proposed by Gale and Shapley, considers producing a bipartite matching between two equally sized sets of boys (proposers) and respectively girls (acceptors), each member having a total preference order over the other set, such that the outcome is stable. This paper considers the Game directly induced by this problem and analyze the case when proposers collude. A linear time method for determining the unique optimal collusion matching which is farsightedly stable (liner in the number of bits of the input), under the following assumptions: (i) the sole utility in the Game is the rank of the match in own preference list (in particular, proposers are indifferent as to how other proposers fare); (ii) proposers make proposals iff farsightedly such plays would strictly improve their own outcome (thus proposers cooperate by refraining from making proposals which can only harm others, but not strictly help them; also, they cannot make concessions to others which harm themselves). It is proved that this optimal outcome is actually stronger than a Strong Nash Equilibrium - no alternative feasible (realistic, rational) coalition exists which can offer at least one member a strictly better outcome under these assumptions. This paper also shows why some prior results pertaining to collusion of proposers do not always yield a realistic outcome.
Keywords:Stable Marriage; Farsighted Stability; Gale Shapley; Collusion; Strategic Play.
Discussion: Note that the describes an optimal algorithm for the problem (linear in input, quadric in number of market participants). Also note that this is only for the case where No Self-Harmful Plays are permitted - ie. more or less, the boys are friendly towards each other and wish to collude. The case where threats and bribes are allowed will be analyzed in a subsequent paper. Some existential results for this latter case are presented in the 2016 paper below.
---

Strategic Play in Stable Marriage Problem (2016) (Game Theory).
This was the basis for the peer-reviewed paper, upon which the latter expanded. Note that some additional ideas are presented which have not yet been written to the academic quality standards for a peer-reviewed published paper, however which are interesting and relevant nevertheless, both for Stable Marriage and for Competitive Games in general. Link: https://arxiv.org/abs/1608.07575. The full text is also available on the Downloads page.
Abstract: The stable marriage problem, as addressed by Gale and Shapely [1] consists of providing a bipartite matching between n " boys " and n " girls "-each of whom have a totally ordered preference list over the other set-such that there exists no " boy " and no " girl " that would prefer each other over their partner in the matching. In this paper, we analyze the cases of strategic play by the " boys " in the game directly inspired by this problem. We provide an O(n^3) algorithm for determining a matching which is not necessarily stable in the Gale-Shapely sense, but it is coalition-stable, in that no player has a selfish interest to leave the resulting grand coalition to join any potential alternative one which might feasibly form, and is also man-optimal. Thus, under a realistic assumption set, no player has an interest to " destabilize " the matching, even though he theoretically could. The resulting matching is often better than the naïve Gale-Shapely one for some (not all) of the " boys " , being no worse for the rest. This matching is more realistic (stable) than the one produced by top-trading-cycles method, thus offering a qualitative improvement over the latter. Furthermore, we analyze the situation when players are allowed to make strategic threats (i.e. be willing to sacrifice their own outcome to hurt others), offer a relevant example to illustrate the benefits of this form of play, and ultimately provide an exponential time algorithm which tries to determine a good threat-making strategy. We then briefly examine a few other non-conventional possibilities a player has to affect his outcome. Most common variations to the game model are also described and analyzed with regard to applicability of the methods in this paper. Finally, a few examples of real-life problems which can be modeled and solved with the methods in this paper are presented.
Discussion: Note that this particular document was authored in Word, not LaTeX.
---

Farsighted Collusion in Stable Marriage Problem (2019) (Game Theory).
This was the preliminary version of the peer-reviewed paper. Link: https://arxiv.org/abs/1905.11064. The full text is also available on the Downloads page.
Abstract: The Stable Marriage Problem, as proposed by Gale and Shapley, considers producing a bipartite matching between two equally sized sets of boys (proposers) and respectively girls (acceptors), each member having a total preference order over the other set, such that the outcome is stable. In this paper we consider the Game directly induced by this problem and analyze the case when proposers collude. We present a linear time method for determining the unique optimal collusion matching which is farsightedly stable, under the following assumptions: (i) the sole utility in the Game is the rank of the match in own preference list (in particular, proposers are indifferent as to how other proposers fare); (ii) proposers make proposals iff farsightedly such plays would strictly improve their own outcome (thus proposers cooperate by refraining from making proposals which can only harm others, but not strictly help them; also, they cannot make concessions to others which harm themselves). We argue that this optimal outcome is actually stronger than a Strong Nash Equilibrium- no alternative feasible coalition exists which can offer at least one member a strictly better outcome under these assumptions. We also show why some prior results pertaining to collusion of proposers do not always yield a realistic outcome. The results in this paper are an independent rediscovery of results by Jun Wako (2010), derived in a simpler fashion and phrased such that less jargon is employed.
Keywords:Stable Marriage; Farsighted Stability; Gale Shapley; Collusion; Strategic Play.
Discussion: n/a.
---

Success Probability Calculator (2015) (Game Theory).
Link: https://informatica-computer-science.blogspot.com/2015/04/success-probability-calculator.html. Executable and Source Code are also available on the Downloads page.
Abstract: n/a.
Discussion: Mircea Digulescu says: As part of my endeavor to develop a technology for simulating military confrontations and financial decision making, I have so far developed a calculator which will enable decision makers to access an optimal strategy for attaining a cumulated bankroll within a specified number of maximum steps. This is a direct answer and follow-up to the observations posted here: http://informatica-computer-science.blogspot.ro/2013/08/strategie-de-atingere-unui-payoff.html. It is basically a finite-step Markov Decision Process solver. Since it's immediate application is in Poker Bankroll management it is such themed. Naturally it is applicable to any immediate-return financial investment. This calculator allows you to compute to chances of going bankrupt if you are playing poker at different stakes with different ROIs for a specified time period. You can also configure mandatory periodic expenses paid from the bankroll (such as cost of living). Here are two screenshots:


---

Dealing it multiple times in holdem poker does not change the Expected Value (2015) (Game Theory).
Link: https://informatica-computer-science.blogspot.com/2015/05/dealing-it-multiple-times-does-not.html. The full text is also available on the Downloads page.
Abstract: In this article I study the following problem: “Given a bin of N balls, X of which are red what is the expected number of ‘wins’ if you are taking out S balls at a time for a total of K times? A win is a ‘drawing’ (a taking out of S balls) which contains at least 1 red ball.”. The interesting case of this problem is when the drawing of balls is made without replacement. The problem is a generalisation of the classic holdem poker problem of determining the Expected Value (EV) of dealing the turn and river more than once (from the same deck, without replacement) once two players are all in. The main and only result of this work is a proof that the expected number of wins in the case without replacement is the same as in the case with replacement, namely K times the probability of winning for K=1 (a single draw). This shows that the Expected Value of multiple draws, when each draw is worth the same fraction of the total pot is precisely the same as that of a single draw.
Discussion: text.
---

Make sure to download the full text of these papers on the Downloads Page.

top


Computability and Complexity Theory


Below are details of each paper published by Mircea Digulescu in Computability and Complexity Theory.

Towards Solving NP-Complete and Other Hard Problems in Practice (2019) (Complexity Theory).
Link (peer-reviewed): https://grspublisher.com/article/Towards-Solving-NP-Complete-and-other-Hard-Problems-Efficiently-in-Practice (DOI: DOI: https://doi.org/10.5281/zenodo.15025640)
The full text is also available on the Downloads page.
Abstract: Until now, Computer Scientists have concerned themselves with identifying efficient algorithms for solving the general case of some problem- that is finding one which performs well when the size of the input tends to innity. However, this is the precise opposite of what is actually needed in practice. Effectively solving some real-world problem entails identifying an algorithm which works well for all (or some) inputs up to some xed upper bound dictated by the concrete practical application. Such an algorithm may be distinct from the one which solves the general case. Furthermore, a general case algorithm may not exist at all or nding it might prove painstakingly hard for the human mind. Fortunately, in practice all that is needed is one which works on the nite cases involved in the real world situations, not one which can, unaltered, solve any input correctly. In this paper, we first introduce a theoretical framework for reasoning about finite algorithmics. It allows familiar concepts such as asymptotic complexity to be adapted to the case where the input size is bounded from above. We also present some elementary results within this theory. Secondly, we present a generic approach for automatically discovering an adequate algorithm for the finite case of some hard problem- if one exists. Thirdly, we argue why we expect the finite case of hard problems to be easier than the general case. Fourthly, we present some relevant ideas specific to three hard problems, namely 3CNF-SAT, String Compression and Integer Factorization. Fifthly, we discuss the significance of the theory and methods introduced in this paper- noting among other things that they can be used to automatically determine that either (i) P = NP, (ii) P!=NP or (iii) we dont really care about the distinction for practical purposes. Finally, we present four directions for immediate further research and formulate an open question which, when answered will, for all practical purposes, decide P = NP.
Keywords: NP-Complete, Finite Algorithmics, Intractability, Incomputability, Complexity Theory.
Discussion: text.
---

NP-Completitude of Bin-Packing Problem [RO] (2003) (Complexity Theory).
The full text is also available on the Downloads page.
Abstract: This proves that Bin Packing is NP-Complete.
Discussion: Proof is by smart reduction from subset sum, using just 2 bins.
---

Make sure to download the full text of these papers on the Downloads Page.

top


Algorithms, Datastructures and Others


Below are details of each paper published by Mircea Digulescu in Algorithms, Data Structures and Others.

Shortest Paths when Costs are Low [RO] (2003) (Complexity Theory).
Link (peer-reviewed): http://www.ginfo.ro/revista/13_6/focus2.pdf. The full text is also available on the Downloads page.
Abstract: n/a.
Discussion: The paper solves Single Source Shortest Path where the costs are small non-negative integers (say up to 1 million) in O(V+E+C*), where C* is the maximum cost of path. Note that in most practical cases this is linear in path length. It also details that using a Van Embde Boass datastructure a nearly linear O(V+E*log log C) can be achieved, without explicitly offering the method. If you are interested in the full method, please contact Mircea.
---

Make sure to download the full text of these papers on the Downloads Page.


Credentials


3. Computer Science R&D and Teaching by Mircea Digulescu

Mircea Digulescu is an independent researcher in Computer Science. He never got financing for his activities, but is actively looking. His interests and publications are detailed below. He would like to identify partners to finance research and development up to products in each of the following areas:

·         Cryptography. Mircea Digulescu is keen on Cryptography and has invented a novel cryptographic scheme based on a new technique he calls entropy enhancement. While not a mathematician, he is knowledgeable about the workings and fundamental security assumptions of most cryptographic schemes and protocols today. Also he is insightful about implementing and using cryptographic systems securely, avoiding common pitfalls like timing attacks, using low-entropy seeds, dictionary-based edit-distance attacks, using compromised machines to enter the secret key and more.

o    In Pipeline: Functional Encryption: Turing-complete computation over encrypted data using SKREM-like ciphers (~2029?). The aim is to allow computations of arbitrary algorithms for a registry machine (which is Turing complete) over encrypted data, without knowing the decryption key. This would allow for scenarios where data can be uploaded to the Cloud in encrypted form, the cloud can perform some advanced operation without revealing the algorithm to the user, and finally send back the result to the user also in encrypted form. As a result, the Cloud processor never learns the data it processes, and also the end-user never learns the details of the advanced algorithm used. This idea is in development.

o    In Pipeline: Light Reading on Cryptanalysis: automating breaking of substitution ciphers and recognizing plain texts (~2028). The purpose is to build a system which takes as input a text encrypted with a substitution cipher and efficiently outputs the plain-text. As ciphers become ever more sophisticated, this can be useful in brute force attacks on more sophisticated encryption, in cases where not enough of the original plain text is known. Ideas for the paper have been fully developed.

o    In Pipeline: Super Simplified SKREM: Practicalizing Unbreakable Symmetric Key Encryption with Short Secret Keys (~2025). Introduces a simplified, practical variant of SKREM ciphers, based on the paper below, which has better algorithmic performance characteristics (number of random bits required, running time and memory complexity). Ideas for the paper have been fully developed. They include a one-time pre-permutation of the Grand Master Table based on the bitwise key and its negation alone.

o    Completed, Peer Reviewed: Irrefutable One-Time Cryptographic Digital Signatures based on SKREM-like ciphers (2021). Signing short documents with a priory published, one-time public key, without making use of public key cryptography. This can be used to sign transactions on a block chain. Ideas for the paper have been fully developed. Completed as part of the paper Applications of SKREM-like ciphers. See the Research Page for links. The full text is also available on the Downloads Page.

o    Completed, Peer Reviewed: Multilateral Secret Agent Recognition, Authorization and Coordination over a Public Channel based on a Shared Secret Key (2021). Introduces a symmetric-key protocol for secret agents on the field to recognize each other over a public, monitored channel by simultaneously proving to each other knowledge of a shared secret, with zero-knowledge about it leaked to other observers on the channel. It also allows them to prove their rank to the most senior one on the field, without revealing it to others of lower rank than themselves. They can then also use this scheme to coordinate actions secretly. Unlike other schemes which rely on public key cryptography with prime factorization at its core making them vulnerable to attacks by quantum computers, this scheme relies on security of SKREM-like ciphers which are not vulnerable to quantum attacks. Ideas for the paper have been fully developed. Completed as part of the paper Applications of SKREM-like ciphers. See the Research Page for links. The full text is also available on the Downloads Page.

o    Completed, Peer Reviewed: Secure Coin Flipping and Cryptographic Commit Protocol based on SKREM-like ciphers (2021).  Allows agents to commit to choosing a certain number without revealing it upfront. This in turns allows secure coin flipping. Unlike existing schemes whose security relies on prime factorization at its core, this scheme relies on security of SKREM-like ciphers. Ideas for the paper have been fully developed. Completed as part of the paper Applications of SKREM-like ciphers. See the Research Page for links. The full text is also available on the Downloads Page.

o    Completed, Peer Reviewed: Hiding Data in Plain Sight: Towards Provably Unbreakable Encryption with Short Secret Keys and One Way Functions (2019 December, 2021). Introduces a novel symmetric key encryption scheme based on a technique of entropy enhancement based on the theory of algorithmically random sequences, by requiring up-front a large master table of random bits. Unlike existing schemes, it does not rely on the hardness of algebraic operations (such as the algebraic field inverse) but instead on that of indirection based on a random sequence. This scheme is called SKREM and is claimed to be provably unbreakable. See the Research Page for links. The full text is also available on the Downloads Page.

o   Existing Topics Known: AES (Rijandel), RSA, El-Gamal, Kerberos as well as basic Quantum Cryptography, Kolmogorov Extraction, Algorithmically Random Sequences, SHA, MD5, Merkel Trees, elementary Functional Encryption, interactive proofs.

·         Complexity Theory and Computability.

o    In Pipeline: Building Hard Cases for Hard Problems (~2027). Discover (perhaps automatically) cases for hard problems which cannot be easily solved using the techniques of the 2025-2027 papers or any other approaches.

o    In Pipeline: How Intractable is Intractable: Solving Kolmogorov Complexity on the finite case (~2027). Discover (perhaps automatically) an algorithm which proves Kolmogorov complexity of short strings (up to 128 bits long? Or maybe 1024?) – or at least conveniently bounds it. Based on the techniques of the 2019-2027 papers.

o    In Pipeline: Automatic SAT Solver (~2026). Discover (perhaps automatically) and a better 3-CNF-SAT solver than those in existence, based on the ideas presented in the 2019 paper.

o    In Pipeline: Automatic Algorithm Finder (~2026). Refine and Implement the techniques from the 2019 paper to produce an algorithm which finds algorithms to solve hard problems. How fast will it find KMP, constant time 32- and 64- Bit Counting or A*? How about a good algorithm to efficiently factor 50 digit numbers?

o    In Pipeline: Exact 3-CNF-SAT solver when there are many solutions (~2025?). Exploiting the fact it is known that there are many solutions to a 3-CNF-SAT expression, finding one should be faster than in the general case.

o    Completed: Towards Solving NP-Complete and Other Hard Problems Efficiently in Practice (2019 November). Introduced the field of Finite Algorithmics: reasoning about problem difficulties for bounded inputs. Offered ideas and approaches for automatic and computer-aided discovery of algorithms for hard problems, on the finite case. Presented concrete directions for solving 3-CNF-SAT, Kolmogorov Complexity and Prime Factorization. See the Research Page for links. The full text is also available on the Downloads Page.

o    Completed: Nondecidability of Halting Problem – a Personal Proof (2013 September). Constructed a paradoxical computer program proving that there is no general-case solution for the Halting Problem. See here.

o    Existing Topics Known: Finite Automata, Push Down Automata, Theory of Computing, Amortized Analysis, Master Theorem, Akka-Bazzi method, Intractability, Complexity Classes, NP-Completeness, Arithmetical Hierarchy, Quantum Computing, P-Spiking Systems, Bioinformatics (wrt Computability), Random Turing Machines, etc.

·         Game Theory.

o    In pipeline: Collusion with Binary Objectives in the Stable Marriage Problem (~2027). Continues the exploration of the 2021 paper, with a slightly modified objective function: the boys can either get a particular match or better or otherwise they are fully indifferent as to their individual outcome. Ideas for the paper have been almost fully developed.

o    In pipeline: Resiliency by Design: Using Game Theory to structure organizations to withstand infiltration and treason (~2026). Addresses how to structure organizations into groups and loyalty thresholds based on individual outcome and trust in order to withstand poaching and infiltration. Idea is in development.

o    In pipeline: War Games: Withstanding and Winning Protracted Conflicts using Game Theory (~2026). Deals with the concept of balancing production and spending with active military operations in order to withstand and win conflicts spanning a long period of time (such that war material is constantly being produced and churned). Idea is in development.

o    In pipeline: Mosquito Drone Strike: Attack and Defense versus a Swarm of Drones (~2026). Expands upon the paper below to deal with the case where missiles can travel backwards in space. Idea is in development.

o    In pipeline: Hold the Line: Missile versus Interceptor duels and the k-servers problem (~2026). Deals with identifying the best strategy for a massive missile attack and the corresponding best response on the defense side. Idea is in development.

o    In pipeline: Survival and Prosperity: Multi-Currency Investment Strategy with forced spending (~2026). Deals with determining the optimal strategy for reaching an objective over a period of time starting with an initial capital across multiple currencies and choosing the most adequate investments for this purpose. Idea is in development.

o    In pipeline: Threats and Bribes in the Stable Marriage Problem (~2026). Expands upon the 2019 and 2016 papers to the case where boys are willing to take risks of a worse outcome in order to issue ultimatums to one-another before game play so as to obtain a better match in case their threats work. Paper discusses the general structure of this new ultimatum problem and proposes an algorithm for identifying a reasonable strategy under a specific model. Ideas for this paper have been fully developed.

o    In pipeline: Applications of the Stable Marriage Problem (~2026). Introduces a series of problems which can be formulated appropriately in terms of Stable Marriage Problem, including the likes of Vendor versus Contracting Authority, where an oligopoly of vendors colludes to get the best prices and projects from a number of accepting customers. Ideas for this paper have been fully developed.

o    Completed: Weakening Nuclear Posture can result in added security (2019 Feb). Brief note on how certain combinations of doctrines lead to war, while weakening that of just one actor can result in peace. See here (in Romanian).

o    Completed, peer-reviewed: Farsighted Collusion in Stable Marriage Problem (2019 May, 2022). Presented an efficient algorithm for computing the unique farsightedly stable boy-optimal matching in the Stable Marriage Problem. Also criticized earlier work pertaining to the subject and presented a few connected interesting results. The large body of the work is an independent rediscovery of results by Jun Wako (2010), adding upon them further details (a full implementation) of the efficient algorithm and structuring the proofs in a language more attuned for computer scientists (versus mathematicians), requiring fewer theoretical prerequisites. Completed and peer-reviewed in 2022. See the Research Page for links. The full text is also available on the Downloads Page.

o    Completed: Strategic Play in Stable Marriage Problem (2016 Aug). See the Research Page for links. The full text is also available on the Downloads Page. Discussed in a very rough form a host of results pertaining to the Stable Marriage Problem, including applications thereof.

o    Completed: Dealing it multiple times does not change the expected value (2015 May). Discusses how the common practice of dealing the turn and/or river multiple times in holdem poker games does not change the player’s expected value. Implies that random samplings of this type can be performed without substitution (applicable in A/B tests). The proof involved two innovative steps. See the Research Page for links. The full text is also available on the Downloads Page..

o    Completed: Project: Success Probability Calculator (2015 April). Presents the implementation of an O(n*m) method for identifying the optimal investment strategy to achieve a target single-currency bankroll starting with some capital, choosing one of m investment options over n time periods. The project involved using of some more advanced data structures such as an efficient LRU cache implementation and a Space vs. Time Tradeoff Structure. See the Research Page for links. The progam and source code are also available on the Downloads Page.

o    Completed: Choosing a Gamble with Best Expected Value is often a bad strategy in Stochastic Games (2014 Aug). Argued by example that this is the case. See details here (in Romanian).

o    Completed: A Game of Ultimatum – Surprising Results of Rational Play (2013 Dec). Inspired by a 2013 lecture by negotiation expert Moty from Moscow School of Management SKOLKOVO, a particular 3-player general-sum game of ultimatum was examined, leading to surprising results. See details here (in Romanian).

o    Existing Topics Known: Two/Many Player Zero-Sum Games, General Sum Games, Kernel of a Game, Nash Equilibrium, Discrete Stochastic Games, Sprague-Grundy Numbers, some intractability results, etc.

·         Algorithms and Data Structures.

o    In pipeline: Adaptive Topology in Distributed Solving of Sorting Problems (~2027). Introduces a O(m*log n) network time + O(n*log^2 n) external time method for distributed sorting, involving a dynamic, adaptive network topology. While the O(m*log n) bound is matched much simply by the MM algorithm using sorting networks, the approach of adaptive topology is judged to be of general interest and the method is presented as an inspiration for other researchers to examine this kind of approach. Ideas for this paper have been fully developed.

o    In pipeline: Sub-linear Time Routing in Urban Networks (~2027). Introduces an efficient method, based on smart precomputation to support queries of the form “shortest path from A to B” in graphs representing Urban Networks, which should run much faster than Dial’s algorithm and A*.

o    In pipeline: Memory Efficient Van Emde Boas Data Structure (~2023). Combines a vEM Tree with a Universal Perfect Hashing scheme to obtain an expected time O(log log U) INSERT / DELETE / FIND / UPDATE / MIN / MAX / PREDECESOR / SUCCESOR data structure with only O(n) memory for n queries of keys in the universe 0..U. This improves on vEM Trees in terms of memory consumption from O(U) to O(n).

o    Completed, peer-reviewed: Shortest Path in a Weighted Graph with Small Edge Costs (2003, GInfo). An independent rediscovery of Dial’s algorithm O(V+E*C) and the brief presentation of a method to further reduce complexity to O(V+E*log log C) using a vEM Tree. Neither Mircea Digulescu, nor the reviewer from GInfo, were aware of Dial’s algorithm at the time (which is so obscure in literature that finding it on Google Scholar is still unsuccessful as of Feb 2021).See the Research Page for links. The full text is also available on the Downloads Page.

o    Completed: Kirkpatrick’s Algorithm (2003, Ginfo, with Andrei Matei coauthor). Presented the famous Kirkpatrick Algorithm and Data Structure for efficient point location in the plan using successive triangulations. See the Research Page for links. The full text is also available on the Downloads Page.

o    Other independent rediscoveries: Kosaraju’s Algorithm, Fisher Yates Shuffling Algorithm.

o    Existing Topics Known: Mircea Digulescu is a recognized as an expert on Algorithms and Data Structures. He is familiar with the following: AVLs, KD-trees, Interval and Segment Trees, B-trees, AB-trees, Orthogonal Range Queries with Fractional Cascading, RMQ, LCA, Binary Heaps, Binomial Heaps, Fibonacci Heaps, Universal Perfect Hashing, Disjoint Sets, KMP, Rabin Karp, Dijkstra, A*, Bellman-Ford-Moore, Floyd-Warshall, Dial, Egg Dropping, Network Flow – Floyd-Fulkerson and Lift to Front, Paxos and many, many others. Also, besides knowing and understanding these algorithms (some of which he independently discovered while reading Cormen CLRS when he was 15-17 yo), he is well apt to apply them, with a vast industry experience and over 320 problems solved on Codeforces.com, where he is a Div1 coder: mircea85. Additionally he solved many non-research problems from the Cormen CLRS and Knuth TAOCP computer science books.

Besides being interested in obtaining financing to continue research as per his interests above, Mircea Digulescu is also interested in partnering with someone for coauthorship publication (in recognized peer-reviewed journals), Translation of results in another language and Dissemination of said to appropriate recipients, with proper attribution.

Mircea Digulescu is also apt to teach or train on topics including advanced Computer Science, both based on his own research interests and results, as well as at the Master’s (for example covering the material of MIT Advanced Data Structures) and at the Bachelors’ levels (for example covering MIT Introduction to Algorithms or the entirety of Cormen CLRS book, including exercises). Additionally he can teach or train on Software Engineering, including writing clean and maintainable code, fundamental DevOps, code reviews, architectural and design patterns and building or using Cloud services, like AWS SQS or Redis.

Mircea Digulescu’s computer science and education credentials include:

·         Div1 coder on www.codeforces.com  roughly in Top 0.3% best of the best coders of all time world wide - http://codeforces.com/profile/mircea85 - highest score 2022, candidate master, with over 320 problems solved (NB: I continue training here, so current rating can vary).

·         Codility Golden Award for the Calcium 2015 Challenge2015 – see here.

·         10th place at the ACM ICPC Southeastern Regional Contest - 2005

·         4th place at the ACM ICPC Southeastern Regional Contest – 2004

·         1 Bronze Medal at European International Olympiads in Computer Science (CEOI) - 2004

·         1 H. Mention at European International Olympiads in Computer Science (CEOI) - 2003

·         3rd prize at the Romanian National Computer Science Olympiad – 2004

·         3rd prize at the Romanian National Computer Science Olympiad - 2003

·         Multiple prizes at other lower-level Computer Science and Mathematics Olympiads and contests

Teaching Experience and Education:

·         University of Bucharest - Faculty of Mathematics and Computer Science – Doctoral Studies in Applied Computer Science – 2014 - 2019 PhD (ABD) completed. Main contributions related to Stable Marriage Problem and to Distributed Sorting. I encountered heavy resistance at getting my work published in indexed peer-reviewed journals – for matters of form - not lack of correctness or relevance, which lead to delays. Finally, in summer of 2019, after completing all work except dissertation, I withdrew from the PhD program in order to get my diplomas. I thus graduated ABD – all but dissertation (for which indexed publications were required).

·         Trainer at Academia Credis (IT Training) –Java Basic (2017): I taught the Java Basic course to a class of about 15 adult students as a side job, more out of passion and my desire to learn Java as well. This was an on-site, in person project, during evenings. I earned 1000 EUR for the month-long course.

·         Assistant Professor at University of Bucharest - Faculty of Mathematics and Computer Science ( Romania’s top University - http://fmi.unibuc.ro/) (2014): I taught Object Oriented Programming (OOP, C++) and Formal Languages and Automata (LFA) courses, holding lectures, providing hands-on assistance, creating and handing-out workouts, providing written and oral feedback and generally developing specified aptitudes. I had a great time and all of my students got excellent industry positions later on. I had a great time teaching. I earned about 350 Euros / month while working here.

·         Train of Trainers Course (2014) at Frends. Completed this program at the invitation of a friend at the time. Frends is a volunteering non-profit, associated with University student groups and student life.

·         National Students’ Congress (2013) – Palace of Parliament (Bucharest) – Speaker. I blabbered a bit about some irrelevant educational topics. Was invited there by surprise.

·         Softbinator Tracing the Roadmap Conference (2012) – Romanian National Library (Bucharest) – Speaker. I spoke on topics of Entrepreneurship and explained the value in having a vast number of autonomous economic actors, versus dealing with an oligopoly.

·         University of Bucharest - Faculty of Mathematics and Computer Science – Master’s Degree Software Engineering (2008-2010). Dissertation thesis “Resource Sharing in a multi-process, multi-transaction environment”, Merit scholarship during 1st year.

·         University of Bucharest - Faculty of Mathematics and Computer Science Bachelor’s Degree Computer Science (2004 – 2008). License thesis “CryptoSafe” – a WinRar desktop application which encrypts data with AES instead of compressing it. Merit scholarship during 1st year.

·          National Computer Science High-school “Tudor Vianu” Baccalaureate, High-school Degree – (2000 – 2004). During high school I joined fashion of taking SAT tests (1400 SAT1, 1800 SAT2 Math IIC, 1730 SAT2 Physics) and applying to US University, and I was offered admission at Cornell University but never joined - declined eventually due to financials mainly.




See Mircea Digulescu’s publications on the Research Page, including links to peer-reviewed versions.

Mircea Digulescu also has the competence to teach or train on topics of Leadership, Strategy, Intelligence, Business Administration, Organizational Architecture, as well as others.

Mircea Digulescu's entire life and activity serve as credentials to his entreprenorial mindset and competence.

Further details about Mircea can be found by exploring the presentation documents available on the right-hand menu (right and above), downloading the relevant bundle from the Downloads Page and checking out his credentials for Intelligence and Strategy Services and Leadership Services.

Just for reference, so far, Mircea has, in the past, founded and operated his MAT SOFT TECHNOLOGY startup (2009-2014) and has set up and operated individual entrepreneurships in Romania, Armenia and Russia.


top


Call for Action


Contact Mircea Digulescu at mircea.digulescu@mail.ru (preferred) or at mircea.digulescu@gmail.com or via Telegram/WhatsApp/Viber at +40736.617.391 to interact with him regarding his research. Additional contact details may be available on the Contact Page.

If you liked the topis or content of his writings, please consider Donating to support further research. Given his political activity, Mircea Digulescu is yet to be granted a grant or such by any body. So, instead of boot-strapping, if you support his scientific activity, Contact Mircea to donate: BTC and fiat transfers in RON or RUB are accepted.

Please consider Donating. It will be great if, instead of boot-strapping, support from smart donations such as by yourself could be leveraged. Please see Contact Mircea to donate: BTC and fiat transfers in RUB are accepted. A BTC donation of 100-200 USD will mean a lot to him and his activism. Especially if you were able to repeat the gesture once in a while.

To donate in use the following BTC address: bc1qtgt8ctz3ffd95dwxux3wed6nlq3r5mhhzg98zp.



To donate in RUB use the following MIR card number: 2202 2023 9828 3287.

To donate in any other currency, please use an online service such as Telegram Wallet, Binance or others or make use of an offline exchange or BTC ATM machine, like for example cryptoatm.ro to donate in BTC to the address above.

Please see the Contact Page for additional details, including how to donate in BTC. Note that the above adddreses and card numbers will change once in a while. Make sure you ar visiting the latest version of this page or of the Contact Page.


top
Documente
Contact Mircea for buying, supporting or investing in any of these products using the coordinates on the Contact Page.


Download the freely available Personal-Use-Only licensed Products using Downloads Page.


See the Crytology, Game Theory and Complexity Theory papers published by Mircea Digulescu on the Research Page.


Download the following relevant documents:


Download the following relevant documents:






top
Please consider donating. It will be great if, instead of boot-strapping, support from smart donations such as by yourself could be leveraged. Please see Contact Page to donate.

BTC (Bitcoin) and fiat transfers in RUB are accepted. A BTC donation of 150-300 USD will mean a lot to Mircea and his activity. Some reasons for donating: You appreciate Mircea's stances, the content of published document, the products and services he brings to the market, his activities, or, simply you appreciate Mircea himself as a person, are curious "just to see what happens next", or choose to donate "just because".

Donate now: Contact Page.



top