TRANSPOSE ON VERTEX SYMMETRIC DIGRAPHS
|
|
- Grant Owen
- 5 years ago
- Views:
Transcription
1 TRANSPOSE ON VERTEX SYMMETRIC DIGRAPHS Vance Faber Center for Computng Scences, Insttute for Defense Analyses Abstract. In [] (and earler n [3]), we defned several global communcaton tasks (unversal exchange, unversal broadcast, unversal summaton) on drected or vertex symmetrc networks. In that paper, we manly focused on unversal broadcast. In [4], we dscussed unversal sum. Here we contnue ths work and focus on unversal exchange (transpose) n drected vertex symmetrc graphs. Introducton. In unversal exchange, processor has a vector of data a j, where the element a j s a packet needed by processor j. Thus we start wth a matrx A where each processor has a separate row and we end the task wth each processor havng a separate column, n other words, we are computng the transpose. Ths gves rse to two fundamental questons: Gven a drected vertex symmetrc graph G (or any drected graph for that matter), how many tme steps τ (G) does t take to perform a transpose? Gven two drected vertex symmetrc graphs (or general drected graphs for that matter), how do we compare them wth respect to ther ablty to perform a transpose? Graph symmetres. One mportant property of vertex symmetrc graphs s that the number of edges drected nto and out of a gven vertex s a constant d. In our model of communcaton, we assume that on every tme step all the edges n the graph can be used smultaneously, that s, each processor can smultaneously exchange a sngle packet of data wth all of ts neghbors. From here on out, we consder only drected Cayley coset graphs (equvalently, drected vertex symmetrc graphs) G = ( Γ,, H ). Brefly, a Cayley coset graph G has P = [ Γ : H ] cosets of the subgroup H n the group Γ as vertces and degree d = where s a collecton of elements n Γ and H generates Γ. (Note that we allow mult-edges here but we nsst that the graph be connected.) The edges are gven by ( gh, gδ H ) for δ. A necessary and 1
2 suffcent condton for the edges to be well-defned between cosets n ths way s that the unon of the left and rght cosets H = H. In the case where H s the dentty subgroup, G s a drected Cayley graph. Let the number of vertces of dstance k from a gven vertex be n k. A smple fundamental lower bound on τ (G) s gven by the followng lemma. Lemma 1. The tme for transpose s at least as great as the average dameter of the graph: θ (G) Proof. Each element ( ) θ ( G) = τ G knk / d. (Equaton 1) a j travels on a path (task graph) j T from to j. Snce the graph s vertex symmetrc, the total length of these paths from a sngle vertex s at least k n k and that means that all these transfers occupy at least P knk edges. If we could use all Pd edges at once on each tme step, we would acheve a tme equal to θ (G). Problems achevng the optmum value. In order to gve an actual value for the transpose, we have to produce a communcaton graph, a schedule that lsts for each tme whch edges transfer whch data. Ths was dscussed n [, Defntons. and.13]. In the case of transpose, ths s a collecton of drected paths T j n G for each ordered par of vertces wth the propertes that the tmes ncrease on each T j and no edge s labeled twce wth the same tme. (Note that ths can also be thought of as embeddng the complete drected graph nto G.) If we want to acheve θ (G), the paths T j must be nearly the shortest paths from to j. (There s a bt of leeway n the case where θ (G) has been rounded up.) One problem s that any collecton of shortest paths mght have some edges represented more often than others. Another problem s that shortest paths from one vertex mght conflct wth shortest paths from another vertex. We dscuss these problems one at a tme. Paths wthout conflcts. Suppose that G ( Γ,, H ) = s a Cayley graph ( H s the dentty subgroup.) Suppose we express each element g n G by a word w(g) n (n other words, a product of) the members of. Then w dentfes a path from the dentty e to the element g n G. Each entry n w can be thought of as a sngle drected edge n G. Let δ ( j) be the generator n entry j of ths path.
3 Theorem. Suppose we label the edges of the paths w (g) wth ncreasng tmes so that no generator appears more than once wth a gven tme. Then the collecton of paths hw (g) for all h n G s a communcaton graph for transpose on G where the labels on the edges of the hw (g) are dentcal to the labels on w. (g) Proof. We have to show that no edge has the same tme twce. Suppose the same edge appears n h 1 w( g 1 ) and h w( g ) wth the same tme. Thus ths edge can be represented n two ways: ( 1 1 j h g, h gδ ( )) and h h, h hδ ( )). So we must have h1 g = hh and h1 gδ ( j) = hhδ ( k) ( k for some group elements g and h. Ths mples δ ( j ) = δ ( k) = δ. Now the tmes on the edge h g, h g ) n the path h w ) and the edge h h, h h ) n ( 1 1 δ 1 ( g 1 ( δ the path h w( g ) are the same as the tmes on the edge ( g, gδ ) n the word w ( g 1 ) and the edge ( h, hδ ) n the word w ( g ), respectvely, by constructon. Unless g = h and w ( g1) = w( g ), ths volates our assumpton that no two edges wth the same generator n the set of paths can have the same tme. Ths theorem allows us to schedule a transpose on G by creatng a consstent set of tmes on the paths from the dentty to the other elements. Once we have chosen a set of such paths (words) W, we can calculate a lower bound on τ (G) wth respect to these paths. Defnton 1. We let the regular bound on transpose be { δ : δ ( j) W, δ ( = δ } ψ ( G) = mn max j) W δ Remark. Snce we have forced each occurrence of the generator δ to have a dfferent tme, the tme that we obtan for transpose n ths way s at least as great as ψ (G). Also. 3
4 so ( G) ψ ( G) kn k { δ : δ ( j) W, δ ( j) = δ } / d ψ ( ) / d = mn G W δ θ. What s not clear s whether there s any provable relatonshp between the regular bound and the optmal transpose. The deal stuaton would be f each generator appears roughly the same number of tmes n the optmal W but often that cannot be arranged wthout ncreasng the average sze of the words n W beyond the average dameter. There s no obvous reason why the regular bound s a lower bound on the tme for a transpose on G because there s no necessty for tmes to be consstently assocated wth generators throughout the graph so the same tme could appear twce on the same generator n the paths from a fxed vertex to the other vertces. In addton, for ψ (G) to be the maxmum tme n the labelng, every tme must be assgned to one of the occurrences of the generator that appears most often. Ths mght not be possble. Queston 1. Is ( G) ψ ( G) τ =? Spannng factorzatons. The dffculty n routng on vertex symmetrc graphs that are not Cayley graphs s the falure to be able to label edges wth specfc generators. As an example, the problem s seen n the Petersen graph [7] that s vertex symmetrc but cannot be represented as a Cayley graph. The Petersen graph s the complement of the lne graph of K 5 ; the vertces can be represented as -element subsets and { u, v} and { x, y} are connected f they are dsjont. The automorphsm group s somorphc to S 5 ; each automorphsm α s a derved permutaton of vertces of K 5. (That s, gven an automorphsm α t s a map α { u, v} = { ˆ( α u), ˆ( α v)} for a permutaton αˆ.) The stablzer subgroup B of the vertex { 1,} s thus the set of twelve derved permutatons that fx the set { 1,}. One set of generators conssts of the permutatons δ 1, δ, δ derved from ( 13)(4), ( 13)(5), ( 14)(5). Let x = (34)(15). Then 3 xb B are two dstnct vertces of G. Also ( δ 1) xδ1 = (1)(345) B so xδ 1B = δ1b. Ths means that there are two dstnct edges gong out from the xδ 1B = δ1b, one to xb and the other to B, that can be thought to have δ δ. vertex the label δ 1 dependng on whch coset representatve s used, x 1 or 1 We now dscuss a possble soluton to ths problem. Ths secton s taken from [1]. A 1-factor of a drected graph G s a subgraph wth both n-degree and out-degree equal to 1. (Some authors have called ths a -factor. Our defnton seems more consstent wth the notaton n undrected graphs. For example, f the edges are all b-drectonal and the factor s a unon of -cycles, then ths 1 4
5 would be an ordnary 1-factor n an undrected graph.) It s known (Petersen 1891, see [7]) that every regular drected graph wth n-degree and out-degree d has a 1-factorng wth d 1-factors. For completeness, we gve the proof here. Fact 1. Every drected graph G where the n-degree and out-degree of every vertex s d has a edge dsjont decomposton nto d 1-factors. Proof. Form an auxlary graph B wth two new vertces u and u for each vertex u. The edges of B are the pars ( u, v ) where ( u, v) s a drected edge n G. The undrected graph B s bpartte and regular wth degree d so t can be decomposed nto d 1-factors. Each of these 1-factors corresponds to a drected 1-factor n G. In order to create global routng schemes on G, we consder regular graphs wth factorzatons wth addtonal propertes. Defnton. Let F 1, F, K, F d be the factors n a 1-factorng of G. We call a fnte strng of symbols from the set { F } a word. If v s a vertex and ω s a word, then v ω denotes the drected path (and ts endpont) n G startng at v and proceedng along the unque edge correspondng to each consecutve factor represented n the word ω. If G s a graph wth n vertces, we say that a 1- factorng and a set of n words W ω, ω, ω, K, ω }, ω =, s a = { 0 1 n 1 spannng factorzaton of G (wth word lst W ) f for every vertex v, the vertces vω are dstnct. Schedules. A schedule assocated wth a factorzaton s an assgnment of a tme (a label) to each occurrence of each factor n the words of W such that no tme s assgned more than once to a partcular factor and tmes assgned to the factors n a sngle word are ncreasng. The tme of a schedule s the largest tme assgned to any of the factors. If T s the total tme, the schedule can be thought of as a d T array where each row corresponds to a factor and an entry n that row ndcates whch occurrence of that factor has been assgned the correspondng tme. An entry n a row n the array can be empty ndcatng no occurrence of that factor has been assgned the gven tme. The power of a spannng factorzaton les n the fact that a schedule can be used to descrbe an algorthm for conflct free global exchange of nformaton between the vertces of the graph. Theorem 3. Suppose we have a schedule for a factorzaton of the graph G. Then the collecton of drected label-ncreasng paths vω for all v and nonempty ω have the property that no edge n the graph s assgned the same tme 0 5
6 twce. A schedule for a spannng factorzaton yelds a tme labeled drected path between every two vertces so that no edge s labeled wth the same tme twce. Proof. Each edge n the graph s assgned to a sngle one factor. Assume there s an edge n the one factor F that has been assgned the same tme twce. Snce every occurrence of F n the words n W has been assgned a unque tme, ths can only mean that there are two dfferent vertces u and v and an ntal subword ω of a word n W such that the edges ( uω, uω F) and ( vω, vω F) are the same edge. Then u ω and v ω must be the same vertex. Let us assume that ths s the shortest ω for whch ths happens. The word ω cannot be empty snce u and v are dfferent. But then the last factor n ω must also be the same edge, a contradcton. If we start wth a spannng factorzaton, then all the non-empty paths from v are unque, there are n 1 of them and none of them can return to v so they must reach to every other vertex n the graph. There are some addtonal propertes that a spannng factorzaton mght have. Defnton. We say a spannng factorzaton s balanced f each factor appears nearly as often n the schedule as any other. We say the factorzaton s short f the average number of tmes a factor appears s the same as the theoretcal lower bound θ based on the average dstance between any two vertces and the number of edges. We say the factorzaton s optmal f t s short and balanced. A schedule Σ s mnmum for a spannng factorzaton, f t has tme τ (Σ) equal to the theoretcal mnmum tme for the factorzaton based on maxmum number of tmes a factor appears. In mathematcal terms, we can wrte () balanced f max{ F : F W} = d = 1 { F : F W} / d ; () short f here s the dameter; d = 1 W} / d = kn D k { F : F, k= 1 nd N k s the number of tmes the dstance between two vertces s k and D () optmal f 6
7 D knk max { F : F W} = ; k= 1 nd (v) mnmum f Note that these parameters are ordered D k= 1 kn nd k d = 1 ( Σ) = max{ F : F W} τ. { F : F W} / d max{ F : F W} τ ( Σ) Creaton of schedules for spannng factorzatons are dscussed n [6], where the followng s proven. Fact. Every dameter two spannng factorzaton has a mnmum schedule unless the max belongs to a factor F whch s not n a word of length one and s entrely absent n words of length two n one poston, ether frst or second. In that case, the shortest tme for any schedule s one more than the theoretcal mnmum. Theorem 4. Every Cayley graph has a short factorzaton. Proof. Ths s a sketch. Take a tree T 1 of shortest paths from the dentty of the group. The factors consst of all the edges labeled wth a specfc generator. The words are just the paths n T 1, so the factorzaton s short. Queston. Does every vertex symmetrc graph have a factorzaton or even a short factorzaton? Graphs of dameter wth a spannng factorzaton. There s one type of graph for whch we can always construct an optmal transpose. Defnton. If G s a drected graph and v s a vertex n G, then for any postve nteger r, S r (v) s the set of all vertces u n G for whch there s a drected path from v to u of length less than or equal to r. Defnton 3. We call L S ( e) S 1( e) r = the r layer. r r. 7
8 Theorem 5. Let be a graph of dameter wth a spannng factorzaton and the elements of the layer can be represented by words x y n the generators. Let M (δ ) be the number of tmes that the generator δ appears as an x and N(δ ) be the number of tmes that the generator δ appears as a y. If M ( ) + N( ) ( G) 1 ( G) = ( G) ( G. δ δ θ for all δ, then τ θ = ψ ) Proof. To prove ths theorem, we need to show that we can fnd a schedule wth θ (G) columns. Frst note that f n s the number of vertces n the layer, then δ ( M ( ) + N( δ )) = n δ. Snce θ G) = ( d + n ) / d = n / d 1 ( + δ, then ( M ( δ ) + N( δ ))/ d = θ ( G) 1 and the hypothess says that the total number of tmes any generator appears s as close to the average as possble. In order to construct the schedule, we appeal to Corollary 4 n [6]. Here a generator s called a machne and a word s called a job and each generator appearng as an x s called a type 1 step and each generator appearng as a y s called a type step. Corollary 4 (from [6]). Gven s 1 jobs wth one step and s jobs wth two steps, T = s s )/ d ) f and only f there exsts an optmal schedule (n tme ( 1 + each machne s assgned at most T steps and no machne s assgned exclusvely steps of one type, ether type 1 or type from jobs wth steps. In our case, we have s = d 1 and the machne (generator) δ s assgned M ( δ ) + N( δ ) + 1 θ ( G ) = T steps whch by hypothess s at most. Snce every machne s assgned one job wth a sngle step (the members of the 1 layer), the exclusvty condton s satsfed so the hypotheses hold and the theorem guarantees the exstence of the requred schedule. In addton, a ccorollary of Theorem 1 n [6] yelds a more general statement. 8
9 Corollary 6. Let be a graph of dameter wth a spannng factorzaton and the elements of the layer can be represented by words x y n the generators. Let M (δ ) be the number of tmes that the generator δ appears as an x and y. Then N(δ ) be the number of tmes that the generator δ appears as a τ ( G ) 1 + max( M ( δ ) + N( δ )). δ Comparng transpose on two networks wth dfferent parameters. For ths comparson, we need to make some model assumptons. We nvestgated ths prevously n [5] wth dfferent model assumptons. Here we create a smple model problem utlzng a transpose. The dea s that we want to compare dfferent network archtectures wth the same overall cost and use the runnng tme of a model algorthm as a way to evaluate the archtecture. Frst, we examne the costs. We make the smplfyng assumpton that memory costs are the same between archtectures and only depend on the problem sze. We consder only two costs, one for the processors and one for the network. We let the cost of a processor be C. For the network, we assume that cost does p not depend upon how many wres are connected to a processng node but only to the overall number of wres n the network. We let the cost of one wre be C w. Then n ths model, the cost s C = PC + PdC = P( C + dcw ). C C p We can wrte ths as γ = = P + d. Cw Cw p w To descrbe the model algorthm, we start wth an N N matrx A wth column vectors v 1, v, L, vn. Our algorthm also uses a gven complcated functon f N N mappng R to R. Let F be the functon that maps the matrx A to the matrx F (A) wth columns f v ), f ( v ), L, f ( v ). Our algorthm s then the ( 1 N teratve algorthm wth M teratons gven by T j+ 1 A j ). A = F( We assume that the CPU tme for ths algorthm has the form NMα (N) for some functon α that represents the runnng tme of f. We make a smple p 9
10 assumpton that the CPU tme scales wth the number of processors so that the CPU tme wth P processors s then NMα( N) T p P =. Gven the P processors and a network G, we dstrbute the columns of A wth N / P columns n each processor. To form the transpose, each processor must send N / P rows from these columns to every other processor. Ths means the network must send ( / P) N peces of nformaton to every other processor. The total communcaton tme for the algorthm s then gven by T c N = M τ ( G). P We can optmstcally estmate τ by usng deal numbers. In the dscusson, we can assume that D s the average dameter of the network, that s, the sum. If the network has as many processors as possble for a certan kn k / P degree and dameter, t wll have about the transpose s able to use all the avalable band wdth on every transpose step, then each processor has to use D wres for each of the P 1 messages t has to transmt so the total band wdth requrement s approxmately N D M Pd =. T c If we assume that algorthm s T D P = d processors. If we assume that DP. Ths yelds aτ that s DP / d and a total communcaton tme of D = D+ d >> C p / C, then d D = Pd ~ γ T T NMα ( N) λ 1 P + c = + DN where λ = 1 / γ < 1. w λ + 1 so the total tme for the The term α (N) s proportonal to the number of operatons n the functon f. If f were a matrx multply, ths could be anywhere from N to N. Let us examne a regme where the two terms are of comparable order n N. We let ( N) N. Then we have to mnmze α = β 10
11 1 +1 β γ D + D. Clearly then, n ths regme we want D to be as large as possble because that allows more processors. However, f D gets too large, then d wll become small and the assumpton that d >> C p / C wll become nvald. In case the growth rate of α (N) s larger than N, then the P strongly and agan, we wll want D as large as possble. w T term domnates even more We can use these results to compare two dfferent networks wth a constraned cost. Frst, we see that constranng cost means constranng the number of wres, that s, C Pd < γ =. Assumng both networks satsfy ths constrant, the C w one wth the largest number of processors s the better one. Summary. We have dscussed transpose on vertex symmetrc networks. We have provded a method to compare the effcency of transpose schemes on two dfferent networks wth a cost functon based on the number processors and wres needed to complete a gven algorthm n a gven tme. REFERENCES 1. Randall Dougherty and Vance Faber, Network routng on regular drected graphs from spannng factorzatons, preprnt.. Vance Faber, "Global communcaton algorthms for Cayley graphs", Arxv.org: Vance Faber, "Global communcaton algorthms for hypercubes and other Cayley coset graphs," Techncal Report, LA-UR , Los Alamos Natonal Laboratory (1987). 4. Vance Faber, "Global sum on symmetrc networks," Arxv.org: Vance Faber, Latency and dameter n sparsely populated processor nterconnecton networks: a tme and space analyss, Techncal Report, LA-UR , Los Alamos Natonal Laboratory (1987). 6. Vance Faber, Amanda Streb and Noah Streb, Ideal unt-tme job shop schedulng, preprnt. 11
12 7. Wkpeda, en.wkpeda.org/wk/petersen_graph. 1
Module 9. Lecture 6. Duality in Assignment Problems
Module 9 1 Lecture 6 Dualty n Assgnment Problems In ths lecture we attempt to answer few other mportant questons posed n earler lecture for (AP) and see how some of them can be explaned through the concept
More informationMaximizing the number of nonnegative subsets
Maxmzng the number of nonnegatve subsets Noga Alon Hao Huang December 1, 213 Abstract Gven a set of n real numbers, f the sum of elements of every subset of sze larger than k s negatve, what s the maxmum
More informationNP-Completeness : Proofs
NP-Completeness : Proofs Proof Methods A method to show a decson problem Π NP-complete s as follows. (1) Show Π NP. (2) Choose an NP-complete problem Π. (3) Show Π Π. A method to show an optmzaton problem
More informationComplete subgraphs in multipartite graphs
Complete subgraphs n multpartte graphs FLORIAN PFENDER Unverstät Rostock, Insttut für Mathematk D-18057 Rostock, Germany Floran.Pfender@un-rostock.de Abstract Turán s Theorem states that every graph G
More informationProblem Set 9 Solutions
Desgn and Analyss of Algorthms May 4, 2015 Massachusetts Insttute of Technology 6.046J/18.410J Profs. Erk Demane, Srn Devadas, and Nancy Lynch Problem Set 9 Solutons Problem Set 9 Solutons Ths problem
More informationThe L(2, 1)-Labeling on -Product of Graphs
Annals of Pure and Appled Mathematcs Vol 0, No, 05, 9-39 ISSN: 79-087X (P, 79-0888(onlne Publshed on 7 Aprl 05 wwwresearchmathscorg Annals of The L(, -Labelng on -Product of Graphs P Pradhan and Kamesh
More informationLecture 3. Ax x i a i. i i
18.409 The Behavor of Algorthms n Practce 2/14/2 Lecturer: Dan Spelman Lecture 3 Scrbe: Arvnd Sankar 1 Largest sngular value In order to bound the condton number, we need an upper bound on the largest
More informationAPPENDIX A Some Linear Algebra
APPENDIX A Some Lnear Algebra The collecton of m, n matrces A.1 Matrces a 1,1,..., a 1,n A = a m,1,..., a m,n wth real elements a,j s denoted by R m,n. If n = 1 then A s called a column vector. Smlarly,
More informationFACTORIZATION IN KRULL MONOIDS WITH INFINITE CLASS GROUP
C O L L O Q U I U M M A T H E M A T I C U M VOL. 80 1999 NO. 1 FACTORIZATION IN KRULL MONOIDS WITH INFINITE CLASS GROUP BY FLORIAN K A I N R A T H (GRAZ) Abstract. Let H be a Krull monod wth nfnte class
More informationFinding Dense Subgraphs in G(n, 1/2)
Fndng Dense Subgraphs n Gn, 1/ Atsh Das Sarma 1, Amt Deshpande, and Rav Kannan 1 Georga Insttute of Technology,atsh@cc.gatech.edu Mcrosoft Research-Bangalore,amtdesh,annan@mcrosoft.com Abstract. Fndng
More informationCollege of Computer & Information Science Fall 2009 Northeastern University 20 October 2009
College of Computer & Informaton Scence Fall 2009 Northeastern Unversty 20 October 2009 CS7880: Algorthmc Power Tools Scrbe: Jan Wen and Laura Poplawsk Lecture Outlne: Prmal-dual schema Network Desgn:
More informationGraph Reconstruction by Permutations
Graph Reconstructon by Permutatons Perre Ille and Wllam Kocay* Insttut de Mathémathques de Lumny CNRS UMR 6206 163 avenue de Lumny, Case 907 13288 Marselle Cedex 9, France e-mal: lle@ml.unv-mrs.fr Computer
More informationIntroductory Cardinality Theory Alan Kaylor Cline
Introductory Cardnalty Theory lan Kaylor Clne lthough by name the theory of set cardnalty may seem to be an offshoot of combnatorcs, the central nterest s actually nfnte sets. Combnatorcs deals wth fnte
More informationOutline. Communication. Bellman Ford Algorithm. Bellman Ford Example. Bellman Ford Shortest Path [1]
DYNAMIC SHORTEST PATH SEARCH AND SYNCHRONIZED TASK SWITCHING Jay Wagenpfel, Adran Trachte 2 Outlne Shortest Communcaton Path Searchng Bellmann Ford algorthm Algorthm for dynamc case Modfcatons to our algorthm
More informationfind (x): given element x, return the canonical element of the set containing x;
COS 43 Sprng, 009 Dsjont Set Unon Problem: Mantan a collecton of dsjont sets. Two operatons: fnd the set contanng a gven element; unte two sets nto one (destructvely). Approach: Canoncal element method:
More informationThe Multiple Classical Linear Regression Model (CLRM): Specification and Assumptions. 1. Introduction
ECONOMICS 5* -- NOTE (Summary) ECON 5* -- NOTE The Multple Classcal Lnear Regresson Model (CLRM): Specfcaton and Assumptons. Introducton CLRM stands for the Classcal Lnear Regresson Model. The CLRM s also
More informationLectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix
Lectures - Week 4 Matrx norms, Condtonng, Vector Spaces, Lnear Independence, Spannng sets and Bass, Null space and Range of a Matrx Matrx Norms Now we turn to assocatng a number to each matrx. We could
More informationModule 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:
More informationChapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems
Numercal Analyss by Dr. Anta Pal Assstant Professor Department of Mathematcs Natonal Insttute of Technology Durgapur Durgapur-713209 emal: anta.bue@gmal.com 1 . Chapter 5 Soluton of System of Lnear Equatons
More informationHMMT February 2016 February 20, 2016
HMMT February 016 February 0, 016 Combnatorcs 1. For postve ntegers n, let S n be the set of ntegers x such that n dstnct lnes, no three concurrent, can dvde a plane nto x regons (for example, S = {3,
More informationProblem Do any of the following determine homomorphisms from GL n (C) to GL n (C)?
Homework 8 solutons. Problem 16.1. Whch of the followng defne homomomorphsms from C\{0} to C\{0}? Answer. a) f 1 : z z Yes, f 1 s a homomorphsm. We have that z s the complex conjugate of z. If z 1,z 2
More informationStanford University CS359G: Graph Partitioning and Expanders Handout 4 Luca Trevisan January 13, 2011
Stanford Unversty CS359G: Graph Parttonng and Expanders Handout 4 Luca Trevsan January 3, 0 Lecture 4 In whch we prove the dffcult drecton of Cheeger s nequalty. As n the past lectures, consder an undrected
More information1 GSW Iterative Techniques for y = Ax
1 for y = A I m gong to cheat here. here are a lot of teratve technques that can be used to solve the general case of a set of smultaneous equatons (wrtten n the matr form as y = A), but ths chapter sn
More informationEdge Isoperimetric Inequalities
November 7, 2005 Ross M. Rchardson Edge Isopermetrc Inequaltes 1 Four Questons Recall that n the last lecture we looked at the problem of sopermetrc nequaltes n the hypercube, Q n. Our noton of boundary
More informationStructure and Drive Paul A. Jensen Copyright July 20, 2003
Structure and Drve Paul A. Jensen Copyrght July 20, 2003 A system s made up of several operatons wth flow passng between them. The structure of the system descrbes the flow paths from nputs to outputs.
More informationThe Minimum Universal Cost Flow in an Infeasible Flow Network
Journal of Scences, Islamc Republc of Iran 17(2): 175-180 (2006) Unversty of Tehran, ISSN 1016-1104 http://jscencesutacr The Mnmum Unversal Cost Flow n an Infeasble Flow Network H Saleh Fathabad * M Bagheran
More informationInner Product. Euclidean Space. Orthonormal Basis. Orthogonal
Inner Product Defnton 1 () A Eucldean space s a fnte-dmensonal vector space over the reals R, wth an nner product,. Defnton 2 (Inner Product) An nner product, on a real vector space X s a symmetrc, blnear,
More informationErrors for Linear Systems
Errors for Lnear Systems When we solve a lnear system Ax b we often do not know A and b exactly, but have only approxmatons  and ˆb avalable. Then the best thng we can do s to solve ˆx ˆb exactly whch
More informationMore metrics on cartesian products
More metrcs on cartesan products If (X, d ) are metrc spaces for 1 n, then n Secton II4 of the lecture notes we defned three metrcs on X whose underlyng topologes are the product topology The purpose of
More informationStatistical Mechanics and Combinatorics : Lecture III
Statstcal Mechancs and Combnatorcs : Lecture III Dmer Model Dmer defntons Defnton A dmer coverng (perfect matchng) of a fnte graph s a set of edges whch covers every vertex exactly once, e every vertex
More informationAffine transformations and convexity
Affne transformatons and convexty The purpose of ths document s to prove some basc propertes of affne transformatons nvolvng convex sets. Here are a few onlne references for background nformaton: http://math.ucr.edu/
More informationMin Cut, Fast Cut, Polynomial Identities
Randomzed Algorthms, Summer 016 Mn Cut, Fast Cut, Polynomal Identtes Instructor: Thomas Kesselhem and Kurt Mehlhorn 1 Mn Cuts n Graphs Lecture (5 pages) Throughout ths secton, G = (V, E) s a mult-graph.
More informationn ). This is tight for all admissible values of t, k and n. k t + + n t
MAXIMIZING THE NUMBER OF NONNEGATIVE SUBSETS NOGA ALON, HAROUT AYDINIAN, AND HAO HUANG Abstract. Gven a set of n real numbers, f the sum of elements of every subset of sze larger than k s negatve, what
More informationThe Order Relation and Trace Inequalities for. Hermitian Operators
Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence
More informationThe internal structure of natural numbers and one method for the definition of large prime numbers
The nternal structure of natural numbers and one method for the defnton of large prme numbers Emmanul Manousos APM Insttute for the Advancement of Physcs and Mathematcs 3 Poulou str. 53 Athens Greece Abstract
More informationa b a In case b 0, a being divisible by b is the same as to say that
Secton 6.2 Dvsblty among the ntegers An nteger a ε s dvsble by b ε f there s an nteger c ε such that a = bc. Note that s dvsble by any nteger b, snce = b. On the other hand, a s dvsble by only f a = :
More informationTHE CHINESE REMAINDER THEOREM. We should thank the Chinese for their wonderful remainder theorem. Glenn Stevens
THE CHINESE REMAINDER THEOREM KEITH CONRAD We should thank the Chnese for ther wonderful remander theorem. Glenn Stevens 1. Introducton The Chnese remander theorem says we can unquely solve any par of
More informationVolume 18 Figure 1. Notation 1. Notation 2. Observation 1. Remark 1. Remark 2. Remark 3. Remark 4. Remark 5. Remark 6. Theorem A [2]. Theorem B [2].
Bulletn of Mathematcal Scences and Applcatons Submtted: 016-04-07 ISSN: 78-9634, Vol. 18, pp 1-10 Revsed: 016-09-08 do:10.1805/www.scpress.com/bmsa.18.1 Accepted: 016-10-13 017 ScPress Ltd., Swtzerland
More informationLecture 12: Discrete Laplacian
Lecture 12: Dscrete Laplacan Scrbe: Tanye Lu Our goal s to come up wth a dscrete verson of Laplacan operator for trangulated surfaces, so that we can use t n practce to solve related problems We are mostly
More informationCSci 6974 and ECSE 6966 Math. Tech. for Vision, Graphics and Robotics Lecture 21, April 17, 2006 Estimating A Plane Homography
CSc 6974 and ECSE 6966 Math. Tech. for Vson, Graphcs and Robotcs Lecture 21, Aprl 17, 2006 Estmatng A Plane Homography Overvew We contnue wth a dscusson of the major ssues, usng estmaton of plane projectve
More informationU.C. Berkeley CS294: Spectral Methods and Expanders Handout 8 Luca Trevisan February 17, 2016
U.C. Berkeley CS94: Spectral Methods and Expanders Handout 8 Luca Trevsan February 7, 06 Lecture 8: Spectral Algorthms Wrap-up In whch we talk about even more generalzatons of Cheeger s nequaltes, and
More informationComputing Correlated Equilibria in Multi-Player Games
Computng Correlated Equlbra n Mult-Player Games Chrstos H. Papadmtrou Presented by Zhanxang Huang December 7th, 2005 1 The Author Dr. Chrstos H. Papadmtrou CS professor at UC Berkley (taught at Harvard,
More information2.3 Nilpotent endomorphisms
s a block dagonal matrx, wth A Mat dm U (C) In fact, we can assume that B = B 1 B k, wth B an ordered bass of U, and that A = [f U ] B, where f U : U U s the restrcton of f to U 40 23 Nlpotent endomorphsms
More informationLinear Regression Analysis: Terminology and Notation
ECON 35* -- Secton : Basc Concepts of Regresson Analyss (Page ) Lnear Regresson Analyss: Termnology and Notaton Consder the generc verson of the smple (two-varable) lnear regresson model. It s represented
More informationOutline and Reading. Dynamic Programming. Dynamic Programming revealed. Computing Fibonacci. The General Dynamic Programming Technique
Outlne and Readng Dynamc Programmng The General Technque ( 5.3.2) -1 Knapsac Problem ( 5.3.3) Matrx Chan-Product ( 5.3.1) Dynamc Programmng verson 1.4 1 Dynamc Programmng verson 1.4 2 Dynamc Programmng
More informationEcon107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4)
I. Classcal Assumptons Econ7 Appled Econometrcs Topc 3: Classcal Model (Studenmund, Chapter 4) We have defned OLS and studed some algebrac propertes of OLS. In ths topc we wll study statstcal propertes
More informationIntroduction to Algorithms
Introducton to Algorthms 6.046J/8.40J Lecture 7 Prof. Potr Indyk Data Structures Role of data structures: Encapsulate data Support certan operatons (e.g., INSERT, DELETE, SEARCH) Our focus: effcency of
More information5 The Rational Canonical Form
5 The Ratonal Canoncal Form Here p s a monc rreducble factor of the mnmum polynomal m T and s not necessarly of degree one Let F p denote the feld constructed earler n the course, consstng of all matrces
More informationA New Refinement of Jacobi Method for Solution of Linear System Equations AX=b
Int J Contemp Math Scences, Vol 3, 28, no 17, 819-827 A New Refnement of Jacob Method for Soluton of Lnear System Equatons AX=b F Naem Dafchah Department of Mathematcs, Faculty of Scences Unversty of Gulan,
More informationFirst day August 1, Problems and Solutions
FOURTH INTERNATIONAL COMPETITION FOR UNIVERSITY STUDENTS IN MATHEMATICS July 30 August 4, 997, Plovdv, BULGARIA Frst day August, 997 Problems and Solutons Problem. Let {ε n } n= be a sequence of postve
More informationU.C. Berkeley CS294: Beyond Worst-Case Analysis Luca Trevisan September 5, 2017
U.C. Berkeley CS94: Beyond Worst-Case Analyss Handout 4s Luca Trevsan September 5, 07 Summary of Lecture 4 In whch we ntroduce semdefnte programmng and apply t to Max Cut. Semdefnte Programmng Recall that
More informationFeature Selection: Part 1
CSE 546: Machne Learnng Lecture 5 Feature Selecton: Part 1 Instructor: Sham Kakade 1 Regresson n the hgh dmensonal settng How do we learn when the number of features d s greater than the sample sze n?
More informationFinding Primitive Roots Pseudo-Deterministically
Electronc Colloquum on Computatonal Complexty, Report No 207 (205) Fndng Prmtve Roots Pseudo-Determnstcally Ofer Grossman December 22, 205 Abstract Pseudo-determnstc algorthms are randomzed search algorthms
More informationNumerical Heat and Mass Transfer
Master degree n Mechancal Engneerng Numercal Heat and Mass Transfer 06-Fnte-Dfference Method (One-dmensonal, steady state heat conducton) Fausto Arpno f.arpno@uncas.t Introducton Why we use models and
More informationarxiv: v1 [math.co] 1 Mar 2014
Unon-ntersectng set systems Gyula O.H. Katona and Dánel T. Nagy March 4, 014 arxv:1403.0088v1 [math.co] 1 Mar 014 Abstract Three ntersecton theorems are proved. Frst, we determne the sze of the largest
More informationprinceton univ. F 17 cos 521: Advanced Algorithm Design Lecture 7: LP Duality Lecturer: Matt Weinberg
prnceton unv. F 17 cos 521: Advanced Algorthm Desgn Lecture 7: LP Dualty Lecturer: Matt Wenberg Scrbe: LP Dualty s an extremely useful tool for analyzng structural propertes of lnear programs. Whle there
More informationA new construction of 3-separable matrices via an improved decoding of Macula s construction
Dscrete Optmzaton 5 008 700 704 Contents lsts avalable at ScenceDrect Dscrete Optmzaton journal homepage: wwwelsevercom/locate/dsopt A new constructon of 3-separable matrces va an mproved decodng of Macula
More informationTHE CHVÁTAL-ERDŐS CONDITION AND 2-FACTORS WITH A SPECIFIED NUMBER OF COMPONENTS
Dscussones Mathematcae Graph Theory 27 (2007) 401 407 THE CHVÁTAL-ERDŐS CONDITION AND 2-FACTORS WITH A SPECIFIED NUMBER OF COMPONENTS Guantao Chen Department of Mathematcs and Statstcs Georga State Unversty,
More informationWeek 2. This week, we covered operations on sets and cardinality.
Week 2 Ths week, we covered operatons on sets and cardnalty. Defnton 0.1 (Correspondence). A correspondence between two sets A and B s a set S contaned n A B = {(a, b) a A, b B}. A correspondence from
More informationAssortment Optimization under MNL
Assortment Optmzaton under MNL Haotan Song Aprl 30, 2017 1 Introducton The assortment optmzaton problem ams to fnd the revenue-maxmzng assortment of products to offer when the prces of products are fxed.
More informationSpectral Graph Theory and its Applications September 16, Lecture 5
Spectral Graph Theory and ts Applcatons September 16, 2004 Lecturer: Danel A. Spelman Lecture 5 5.1 Introducton In ths lecture, we wll prove the followng theorem: Theorem 5.1.1. Let G be a planar graph
More informationLecture 4: November 17, Part 1 Single Buffer Management
Lecturer: Ad Rosén Algorthms for the anagement of Networs Fall 2003-2004 Lecture 4: November 7, 2003 Scrbe: Guy Grebla Part Sngle Buffer anagement In the prevous lecture we taled about the Combned Input
More informationCOMPLEX NUMBERS AND QUADRATIC EQUATIONS
COMPLEX NUMBERS AND QUADRATIC EQUATIONS INTRODUCTION We know that x 0 for all x R e the square of a real number (whether postve, negatve or ero) s non-negatve Hence the equatons x, x, x + 7 0 etc are not
More informationComplement of Type-2 Fuzzy Shortest Path Using Possibility Measure
Intern. J. Fuzzy Mathematcal rchve Vol. 5, No., 04, 9-7 ISSN: 30 34 (P, 30 350 (onlne Publshed on 5 November 04 www.researchmathsc.org Internatonal Journal of Complement of Type- Fuzzy Shortest Path Usng
More informationU.C. Berkeley CS294: Beyond Worst-Case Analysis Handout 6 Luca Trevisan September 12, 2017
U.C. Berkeley CS94: Beyond Worst-Case Analyss Handout 6 Luca Trevsan September, 07 Scrbed by Theo McKenze Lecture 6 In whch we study the spectrum of random graphs. Overvew When attemptng to fnd n polynomal
More informationFoundations of Arithmetic
Foundatons of Arthmetc Notaton We shall denote the sum and product of numbers n the usual notaton as a 2 + a 2 + a 3 + + a = a, a 1 a 2 a 3 a = a The notaton a b means a dvdes b,.e. ac = b where c s an
More information= z 20 z n. (k 20) + 4 z k = 4
Problem Set #7 solutons 7.2.. (a Fnd the coeffcent of z k n (z + z 5 + z 6 + z 7 + 5, k 20. We use the known seres expanson ( n+l ( z l l z n below: (z + z 5 + z 6 + z 7 + 5 (z 5 ( + z + z 2 + z + 5 5
More informationSupplement: Proofs and Technical Details for The Solution Path of the Generalized Lasso
Supplement: Proofs and Techncal Detals for The Soluton Path of the Generalzed Lasso Ryan J. Tbshran Jonathan Taylor In ths document we gve supplementary detals to the paper The Soluton Path of the Generalzed
More informationPsychology 282 Lecture #24 Outline Regression Diagnostics: Outliers
Psychology 282 Lecture #24 Outlne Regresson Dagnostcs: Outlers In an earler lecture we studed the statstcal assumptons underlyng the regresson model, ncludng the followng ponts: Formal statement of assumptons.
More informationDeriving the X-Z Identity from Auxiliary Space Method
Dervng the X-Z Identty from Auxlary Space Method Long Chen Department of Mathematcs, Unversty of Calforna at Irvne, Irvne, CA 92697 chenlong@math.uc.edu 1 Iteratve Methods In ths paper we dscuss teratve
More informationSociété de Calcul Mathématique SA
Socété de Calcul Mathématque SA Outls d'ade à la décson Tools for decson help Probablstc Studes: Normalzng the Hstograms Bernard Beauzamy December, 202 I. General constructon of the hstogram Any probablstc
More informationLecture 4. Instructor: Haipeng Luo
Lecture 4 Instructor: Hapeng Luo In the followng lectures, we focus on the expert problem and study more adaptve algorthms. Although Hedge s proven to be worst-case optmal, one may wonder how well t would
More informationTornado and Luby Transform Codes. Ashish Khisti Presentation October 22, 2003
Tornado and Luby Transform Codes Ashsh Khst 6.454 Presentaton October 22, 2003 Background: Erasure Channel Elas[956] studed the Erasure Channel β x x β β x 2 m x 2 k? Capacty of Noseless Erasure Channel
More informationSimultaneous Optimization of Berth Allocation, Quay Crane Assignment and Quay Crane Scheduling Problems in Container Terminals
Smultaneous Optmzaton of Berth Allocaton, Quay Crane Assgnment and Quay Crane Schedulng Problems n Contaner Termnals Necat Aras, Yavuz Türkoğulları, Z. Caner Taşkın, Kuban Altınel Abstract In ths work,
More informationRandić Energy and Randić Estrada Index of a Graph
EUROPEAN JOURNAL OF PURE AND APPLIED MATHEMATICS Vol. 5, No., 202, 88-96 ISSN 307-5543 www.ejpam.com SPECIAL ISSUE FOR THE INTERNATIONAL CONFERENCE ON APPLIED ANALYSIS AND ALGEBRA 29 JUNE -02JULY 20, ISTANBUL
More informationEigenvalues of Random Graphs
Spectral Graph Theory Lecture 2 Egenvalues of Random Graphs Danel A. Spelman November 4, 202 2. Introducton In ths lecture, we consder a random graph on n vertces n whch each edge s chosen to be n the
More informationThe optimal delay of the second test is therefore approximately 210 hours earlier than =2.
THE IEC 61508 FORMULAS 223 The optmal delay of the second test s therefore approxmately 210 hours earler than =2. 8.4 The IEC 61508 Formulas IEC 61508-6 provdes approxmaton formulas for the PF for smple
More informationGames of Threats. Elon Kohlberg Abraham Neyman. Working Paper
Games of Threats Elon Kohlberg Abraham Neyman Workng Paper 18-023 Games of Threats Elon Kohlberg Harvard Busness School Abraham Neyman The Hebrew Unversty of Jerusalem Workng Paper 18-023 Copyrght 2017
More informationDiscussion 11 Summary 11/20/2018
Dscusson 11 Summary 11/20/2018 1 Quz 8 1. Prove for any sets A, B that A = A B ff B A. Soluton: There are two drectons we need to prove: (a) A = A B B A, (b) B A A = A B. (a) Frst, we prove A = A B B A.
More informationCONJUGACY IN THOMPSON S GROUP F. 1. Introduction
CONJUGACY IN THOMPSON S GROUP F NICK GILL AND IAN SHORT Abstract. We complete the program begun by Brn and Squer of charactersng conjugacy n Thompson s group F usng the standard acton of F as a group of
More informationDr. Shalabh Department of Mathematics and Statistics Indian Institute of Technology Kanpur
Analyss of Varance and Desgn of Exerments-I MODULE III LECTURE - 2 EXPERIMENTAL DESIGN MODELS Dr. Shalabh Deartment of Mathematcs and Statstcs Indan Insttute of Technology Kanur 2 We consder the models
More informationMASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.265/15.070J Fall 2013 Lecture 12 10/21/2013. Martingale Concentration Inequalities and Applications
MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.65/15.070J Fall 013 Lecture 1 10/1/013 Martngale Concentraton Inequaltes and Applcatons Content. 1. Exponental concentraton for martngales wth bounded ncrements.
More informationLINEAR REGRESSION ANALYSIS. MODULE IX Lecture Multicollinearity
LINEAR REGRESSION ANALYSIS MODULE IX Lecture - 30 Multcollnearty Dr. Shalabh Department of Mathematcs and Statstcs Indan Insttute of Technology Kanpur 2 Remedes for multcollnearty Varous technques have
More informationDesign and Optimization of Fuzzy Controller for Inverse Pendulum System Using Genetic Algorithm
Desgn and Optmzaton of Fuzzy Controller for Inverse Pendulum System Usng Genetc Algorthm H. Mehraban A. Ashoor Unversty of Tehran Unversty of Tehran h.mehraban@ece.ut.ac.r a.ashoor@ece.ut.ac.r Abstract:
More informationOn the Interval Zoro Symmetric Single-step Procedure for Simultaneous Finding of Polynomial Zeros
Appled Mathematcal Scences, Vol. 5, 2011, no. 75, 3693-3706 On the Interval Zoro Symmetrc Sngle-step Procedure for Smultaneous Fndng of Polynomal Zeros S. F. M. Rusl, M. Mons, M. A. Hassan and W. J. Leong
More informationLecture 3: Shannon s Theorem
CSE 533: Error-Correctng Codes (Autumn 006 Lecture 3: Shannon s Theorem October 9, 006 Lecturer: Venkatesan Guruswam Scrbe: Wdad Machmouch 1 Communcaton Model The communcaton model we are usng conssts
More informationResource Allocation with a Budget Constraint for Computing Independent Tasks in the Cloud
Resource Allocaton wth a Budget Constrant for Computng Independent Tasks n the Cloud Wemng Sh and Bo Hong School of Electrcal and Computer Engneerng Georga Insttute of Technology, USA 2nd IEEE Internatonal
More informationA 2D Bounded Linear Program (H,c) 2D Linear Programming
A 2D Bounded Lnear Program (H,c) h 3 v h 8 h 5 c h 4 h h 6 h 7 h 2 2D Lnear Programmng C s a polygonal regon, the ntersecton of n halfplanes. (H, c) s nfeasble, as C s empty. Feasble regon C s unbounded
More informationA combinatorial problem associated with nonograms
A combnatoral problem assocated wth nonograms Jessca Benton Ron Snow Nolan Wallach March 21, 2005 1 Introducton. Ths work was motvated by a queston posed by the second named author to the frst named author
More informationRandom Walks on Digraphs
Random Walks on Dgraphs J. J. P. Veerman October 23, 27 Introducton Let V = {, n} be a vertex set and S a non-negatve row-stochastc matrx (.e. rows sum to ). V and S defne a dgraph G = G(V, S) and a drected
More informationCOS 521: Advanced Algorithms Game Theory and Linear Programming
COS 521: Advanced Algorthms Game Theory and Lnear Programmng Moses Charkar February 27, 2013 In these notes, we ntroduce some basc concepts n game theory and lnear programmng (LP). We show a connecton
More informationSolutions to exam in SF1811 Optimization, Jan 14, 2015
Solutons to exam n SF8 Optmzaton, Jan 4, 25 3 3 O------O -4 \ / \ / The network: \/ where all lnks go from left to rght. /\ / \ / \ 6 O------O -5 2 4.(a) Let x = ( x 3, x 4, x 23, x 24 ) T, where the varable
More informationECE559VV Project Report
ECE559VV Project Report (Supplementary Notes Loc Xuan Bu I. MAX SUM-RATE SCHEDULING: THE UPLINK CASE We have seen (n the presentaton that, for downlnk (broadcast channels, the strategy maxmzng the sum-rate
More informationLecture 12: Classification
Lecture : Classfcaton g Dscrmnant functons g The optmal Bayes classfer g Quadratc classfers g Eucldean and Mahalanobs metrcs g K Nearest Neghbor Classfers Intellgent Sensor Systems Rcardo Guterrez-Osuna
More informationThe Second Anti-Mathima on Game Theory
The Second Ant-Mathma on Game Theory Ath. Kehagas December 1 2006 1 Introducton In ths note we wll examne the noton of game equlbrum for three types of games 1. 2-player 2-acton zero-sum games 2. 2-player
More information3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X
Statstcs 1: Probablty Theory II 37 3 EPECTATION OF SEVERAL RANDOM VARIABLES As n Probablty Theory I, the nterest n most stuatons les not on the actual dstrbuton of a random vector, but rather on a number
More informationVQ widely used in coding speech, image, and video
at Scalar quantzers are specal cases of vector quantzers (VQ): they are constraned to look at one sample at a tme (memoryless) VQ does not have such constrant better RD perfomance expected Source codng
More informationU.C. Berkeley CS278: Computational Complexity Professor Luca Trevisan 2/21/2008. Notes for Lecture 8
U.C. Berkeley CS278: Computatonal Complexty Handout N8 Professor Luca Trevsan 2/21/2008 Notes for Lecture 8 1 Undrected Connectvty In the undrected s t connectvty problem (abbrevated ST-UCONN) we are gven
More informationCHAPTER III Neural Networks as Associative Memory
CHAPTER III Neural Networs as Assocatve Memory Introducton One of the prmary functons of the bran s assocatve memory. We assocate the faces wth names, letters wth sounds, or we can recognze the people
More informationDifference Equations
Dfference Equatons c Jan Vrbk 1 Bascs Suppose a sequence of numbers, say a 0,a 1,a,a 3,... s defned by a certan general relatonshp between, say, three consecutve values of the sequence, e.g. a + +3a +1
More information