On Symmetries of Non-Plane Trees in a Non-Uniform Model
|
|
- Robert Greer
- 5 years ago
- Views:
Transcription
1 On Symmetries of Non-Plane Trees in a Non-Uniform Model Jacek Cichoń Abram Magner Wojciech Spankowski Krystof Turowski October 3, 26 Abstract Binary trees come in two varieties: plane trees, often simply called binary trees, and non-plane trees, in which the order of subtrees does not matter. Nonplane trees find many applications; for example in modeling epidemics, in studying phylogenetic trees, and as models in data compression. While binary trees have been studied very extensively, non-plane trees still pose some challenges. Moreover, in most analyses a uniform probabilistic model is assumed; that is, a tree is selected uniformly from among all trees. Such a model limits significantly applications of the analysis. In this paper we study by analytic techniques non-plane trees in a non-uniform model. In our model, we grow the tree on n leaves by selecting randomly a leaf and appending two children to it. We can show that this is equivalent to an alternative model, also used to analye the averagecase performance of binary search trees, that is more easily amenable to study by recurrences and generating functions. Here, one of the most important questions is the number of symmetries in such trees (i.e., the number of internal nodes with two isomorphic subtrees), or the sies of such symmetric subtrees. We first present a functional-differential equation characteriing tree symmetries, and then analye it. In this conference This work was supported in part by NSF Center for Science of Information (CSoI) Grant CCF-93937, and in addition by NSF Grants CCF-52432, NIH Grant UCA9894-, and the NCN grant UMO-23/9/B/ST6/2258. Jacek Cichoń is with Department of Computer Science Faculty of Fundamental Problems of Technology, Wroclaw University of Science and Technology, Wroclaw, Poland ( jacek.cichon@pwr.edu.pl) Abram Magner is with Coordinated Science Lab at Univ. of Illinois at Urbana-Champaign, Urbana, IL, USA, ( anmagner@illinois.edu). Krystof Turowski is with Dept. of Algorithms and System Modeling, at Gdańsk University of Technology, Gdansk, Poland, ( krturow@pg.gda.pl). W. Spankowski is with the Department of Computer Science, Purdue University, IN 4797, USA ( spa@cs.purdue.edu) paper we focus on the expected number of symmetries, the sie of symmetric subtrees, and the tree entropy. Keywords: Binary trees, non-plane trees, symmetry, Hadamard product, entropy, functional-differential equations. Introduction Binary trees come in two flavors: plane-oriented trees and non-plane or Otter trees. A plane tree, that we shall call just a binary tree, is defined as a rooted tree in which two subtrees of the same parent node are ordered between themselves and represented from left to right; that is, they have a distinguished embedding in the plane. A non-plane tree, also called unordered tree or an Otter tree, is just a rooted tree in the graph theoretic sense, so that there is no order between subtrees. Non-plane trees are harder to analye and less attention in literature has been devoted to these kind of trees. Nevertheless, non-plane trees find many important applications from data compression to biology. For example, in a phylogenetic tree describing n species there are n leaves representing extant species and n internal nodes. By design there is no specific order between the two children of a binary node. In combinatorics both trees have been studied [5, but only in a uniform probability model in which trees are selected uniformly from a collection of all distinct trees. However, such a model is often too simple to capture nuances of various applications. Therefore in this paper we study non-plane (and the corresponding plane) trees under a non-uniform model that we describe below. There are two equivalent models that are useful in applications such as data compression [9. Let T be the set of all binary rooted plane trees having finitely many vertices and, for each positive integer n, let T n be the subset of T consisting of all trees with exactly n leaves. Similarly, let S and S n be the set of all binary
2 rooted non-plane trees with finitely many vertices and exactly n leaves, respectively. In the first model to grow a tree built on n leaves we pick up randomly a leaf v, and then append two children to it, say v L and v R. Our second model (also known as the binary search tree model), is ubiquitous in the computer science literature, arising for example in the context of binary search trees formed by inserting a random permutation of [n into a binary search tree [, 6. Under this model we generate a random tree T n as follows: at first, t is equal to the unique tree in T and we associate a number n with its single vertex. Then, in each recursive step, let v, v 2,..., v k be the leaves of t, and let integers n, n 2,..., n k be the values assigned to these leaves, respectively. For each leaf v i with value n i >, randomly select integer s i from the set {,..., n i } with probability n i (independently of all other such leaves), and then grow two edges from v i with left edge terminating at a leaf of the extended tree with value s i and right edge terminating at a leaf of the extended tree with value n i s i. The extended tree is the result of the current recursive step. Clearly, the recursion terminates with a binary tree having exactly n leaves, in which each leaf has assigned value ; this tree is T n. In [9, 3 it was proved that both models are probabilistically equivalent. In data compression and other applications symmetries of plane and non-plane trees are of interest. In particular, for compression one needs to know the number of internal nodes that have two isomorphic subtrees, the sie of such isomorphic trees, and the entropy of trees. In this conference paper we set the stage to analye these quantities for non-plane (and the corresponding plane) trees. We derive a functional-differential equation for the bivariate generating function from which we compute the average number of nodes with two isomorphic subtrees as well as the entropy of non-plane trees (see also the recent paper [9). There are a few scattered results for non-plane trees in a uniform model [2, 5,. The non-plane trees in the binary search tree-like model were studied by analytic tools in [, 6 in a different context, and by a different method in [9. In this work we use analytic combinatorics to initiate systematic studies of non-plane trees. 2 Main Results Let S be the set of all binary rooted non-plane trees having finitely many vertices. Such trees are often called Otter trees. Let S n be the subset of S consisting of all trees with exactly n leaves. We also denote by T the set of all binary rooted plane trees having finitely many vertices. Let T n be the subset of T consisting of all trees with exactly n leaves. For any s S and t T let t s mean that the plane tree t is isomorphic to the non-plane tree s. Furthermore, we define [s = {t T : t s} as a collection of all plane trees t having the same non-plane tree s. In this paper we denote by t the number of leaves of a tree t. The probability of a tree t T n in our non-uniform model is [9 P (T n = t) = v t o ( (v) ), where t o is the set of internal nodes of t and (v) is the number of leaves of a tree rooted at v. These probabilities satisfies the following recurrence P (T n = t) = n P (T (t ) = t )P (T (t2) = t 2 ), where t, t 2 are the two subtrees of tree t whose roots are the two children of the root of t. The recursion starts with the unique tree t from T, when we have P (T = t ) =. It should be noted that this recursion resembles a recurrence for binary search trees which was studied in [, 6. For any t, t 2 T n such that t s and t 2 s it holds that P (T n = t ) = P (T n = t 2 ). By definition, s corresponds to [s isomorphic plane trees, so for any t [s it holds that (2.) P (S n = s) = [s P (T n = t), t [s. In other words, we put Furthermore, (2.2) P (S n = s) = t s P (T n = t). P (T n = t S n = s) = [s. Let sym(t) be the the number of non-leaf (internal) nodes v of tree t such that the two subtrees stemming We use T n to denote a random variable representing a random tree in T n; however, we often abuse notation and write T n for both the set of trees and the random variable.
3 from v are isomorphic. Observe that S = S 2 = S 3 =, and that S 4 = 2. If t S, then clearly sym(t) =. If t S 2 or t S 3 then sym(t) =. Notice that (see [2) if t and t 2 are the two subtrees of a tree t whose roots are the two children of the root of t, then { sym(t ) + sym(t 2 ) + if t = t 2 sym(t) = sym(t ) + sym(t 2 ) if t t 2. Observe also that sym(s) = sym(t) Furthermore, and more interestingly (2.3) [s = 2 n sym(s). t t [s. Indeed, we can form a new tree by rotating both subtrees of a plane tree at every internal node that is not symmetric, that is, for those nodes whose subtrees are not isomorphic. Our goal is to evaluate the average E[sym(S n ) for non-plane trees. We shall accomplish it through generating function approach. We first derive a differential equation for the following bivariate generating function Define also B(u, ) = t T F (u, ) = t T = n= P (T = t)u sym(t) t t T n P (T n = t)u sym(t) t. P 2 (T = t)u sym(t) t t T p 2 (t)u sym(t) t where we write p(t) = P (T = t) to simplify our notation. In the next section we prove the following lemma characteriing F (u, ). Lemma 2.. Let f(u, ) = F (u,). Then it satisfies the following Riccati differential equation (2.4) f(u, ) Furthermore after the substitution = f(u, ) 2 + (u )B(u 2, 2 ). g(u,) f(u, ) = g(u, ) equation (2.4) becomes (2.5) 2 g(u, ) 2 + (u )B(u 2, 2 )g(u, ) = which is a second order linear equation assuming B(u, ) is known. Remark (i) We should point out differences between our non-uniform model and uniform model. For the uniform model, following Bóna and Flajolet [2 the bivariate generating function F (u, ) = s S u sym(s) s satisfies the following functional equation F (u, ) = + 2 F (u, ) 2 + (u 2 ) F (u 2, 2 ). (ii) Furthermore, we observe that (2.4) could be viewed as a functional-differential equation. Indeed, let us introduce a special Hadamard product of two generating functions A(u, ), B(u, ) defined by A(u, ) = t T B(u, ) = t T c A (t)u r(t) s(t), c B (t)u r(t) s(t), where r(t) and s(t) map combinatorial objects t T to the non-negative integers. We then define a Hadamard product A(u, ) B(u, ) by A(u, ) B(u, ) = t T c A (t)c B (t)u r(t) s(t). We contrast this with the standard bivariate Hadamard product, defined by A(u, ) B(u, ) = n,m= t : r(t)=m,s(t)=n t : r(t)=m,s(t)=n c A (t) c B (t) u m n. Note that A(u, ) B(u, ) is in general not equal to A(u, ) B(u, ), unless r(t) and s(t) uniquely determine t. With this definition in mind we can rewrite (2.4) as (2.6) f (u, ) = f(u, ) 2 + (u )(f(u 2, 2 ) f(u 2, 2 ))
4 which is a functional-differential equation. Our first goal is to understand probabilistic behavior of sym(s n ) = sym(t n ). In this preliminary conference paper we focus on the average E[sym(S n ). We start with a definition E() = E[sym(S n ) n. n= Using Lemma 2. in the next section we show that it satisfies the following ODE (2.7) E () = 2E() ( ) + B(2 ) with E() =. Here we define B() = t T = = n= n p 2 (t) t p 2 (t n ) t n T n b n n n= where b n = [ n B() = t n T n p 2 (t n ) for n. It is easy to compute b n for a few small values of n, namely (2.8) b = b 2 =, b 3 = 2, b 4 = 2 9, b 5 = 3 44, b 6 = 7 2. Actually, to compute precisely b n for all values of n we need a better approach. Define C() = B() and notice that b n = [ n C() = [ n B(). We will derive a differential equation for C(), from which a recurrence for b n will follow. It is easy to notice that C() satisfies the following C() = + Furthermore, and B () = u,v T u,v T ( v + u ) 2 p2 (u)p 2 (v) u + v. ( v + u ) p2 (u)p 2 (v) u + v 2 C 2 () = u,v T p(u)p(v) u + v. Combining all of these, we arrive at the following differential equation (2.9) C() C () + 2 C () = C 2 (). By standard tools we can extract from the above a recurrence for b n = [ n C(). Indeed, for n 2 we have (2.) b n = n (n ) 2 b j b n j j= with b =. In passing we should point out that asymptotic growth of b n satisfying the above recurrence can be found in [3. We come back to this issue later in this paper. Remark. We can write (2.7) as a functional-differential equation using a different special Hadamard product defined as follows. For generating functions A() = t T c A (t) s(t), we define A() B() by Define now Then (A() A()) and (2.7) becomes A() B() = t T A() = t T 2 B() = t T c A (t)c B (t) s(t). p(t) 2 t. = p(t) 2 2( t ) t T [ = (f(, ) f(, )) c B (t) s(t), (u 2, 2 ) E () = 2E() ( ) + (A(2 ) A( 2 )), which is functional-differential equation. In the next section we solve the ODE (2.7) leading to our second main result. Theorem 2.. Consider a binary plane tree and its corresponding non-plane tree. The expected number of,
5 internal nodes with two isomorphic subtrees is (2.) E[sym(S n ) (n+)/2 b l = n (2l )l(2l + ) + ( )n+ b (n+)/2 l= n (.3725 ± 4 ) where, we recall, b l = t l p 2 (t l ). Remark. Observe that we can use just computed E[sym(S n ) to evaluate certain compression algorithms on non-plane (and plane) trees. Indeed, for every internal node with two isomorphic subtrees we can replace the second identical subtree with a pointer to the first subtrees. We need about n (.3725 ± 4 ) bits to accomplish it. On the other hand, if we do this, we can save some storage on the replaced subtree. How much? Let us, as a preliminary assessment, compute the total sie, sie(s n ), of the saved isomorphic subtrees. Similar computations as above lead to (n+)/2 b k E[sie(S n ) = n (2k )(2k + ) n.49. k= This result can also be recovered from [6. Finally we deal with the entropy of the non-plane tree H(S n ) and its rate h(s) = lim n H(S n )/n. Observe that H(S n ) = H(T n ) H(T n S n ). In [8, 9 it was proved that n (2.2) H(T n ) = log 2 (n ) + 2n k=2 Remark. We know that (see also [8) 2 n k=2 log 2 (k ) k(k + ).736 log 2 (k ) k(k + ). for large n (we took n = 6 ). The above series converges slowly at the rate O(log n/n). Therefore one would prefer a more explicit formula for large n. We approximate the sum using the Euler-Maclaurin formula [4 by the integral where n 2 log k n 2 (k + )(k + 2) k= ( = Li 2 n ) 2 + Li 2 (2 n) + log ( + Li 2 ) + π2 2 2 Li 2 (x) = log(x) (x + )(x + 2) dx ( 2 2 ) log(n 2) n x log t t dt is the dilogarithmic integral. For large x the following holds [7 Li 2 (x) = 2 log2 x π2 6 + O(log x/x). In fact, to get a better approximation of the sum we need two extra terms in the Euler-Maclaurin formula which leads to the following approximation n 2 k= log k (k + )(k + 2) Li 2 (3/2) + 2 π2 + 2 log2 (2) = which matches the first three digits of the sum. To complete our analysis we now evaluate H(T n S n ). From (2.3) we conclude H(T n S n ) = t T n,s S n P (T n = t, S n = s) log P (T n = t S n = s) = s S n P (S n = s) log [s = t T n P (T n = t)(n sym(t)) = n E[sym(S n ) = n E[sym(T n ) Thus from Theorem 2. we derive our third main result (see also [9). Theorem 2.2. The entropy rate h(s) = lim n H(S n )/n of the non-plane trees is h(s) = h(t) h(t s).9...
6 where have h(t s) = h(t) = 2 k= with b n = t n T n p 2 (t n ). k= b k (2k )k(2k + ), log 2 (k) (k + )(k + 2) Remark 4. The entropy h(s) is related to the Rényi entropy h (t) of order of non-plane trees. We define h (t) as follows, if it exists: (2.3) h (t) = lim n log E[p(T n ) n = lim n From the above we conclude that for large n b n = t n T n p 2 (t n ) exp( nh (t)). But appealing to (2.9)-(2.) and applying the method discussed in [3 we observe that b n = ρ (6n n 22 ) 5 + O(n 5 ) F (u, ) = + s + t p(s)p(t)usym(s)+sym(t)+[ s=t s + t = + = + s + t p(s)p(t)usym(s)+sym(t) s + t t T + t T 2 t p2 (t)u 2sym(t) 2 t 2 t p2 (t)u 2sym(t)+ 2 t s + t p(s)p(t)usym(s)+sym(t) s + t +(u ) log 2 t p2 (t)u 2sym(t) 2 t. t n T n p 2 t T (t n ). n Notice that, from the original definition of F (u, ), therefore, F (u, ) 2 = = Recall that p(s)p(t)u sym(s)+sym(t) s + t ; F (u, w) 2 w 2 dw s + t p(s)p(t)usym(s)+sym(t) s + t. B(u, ) = t T p 2 (t)u sym(t) t. where ρ = Thus h (t) = log(ρ). 3 Analysis and Proofs In this section we prove our main results. 3. Proof of Lemma 2. Observe that F (u, ) = P (T n = t)u sym(t) t n= t T n = + P (T n = t)u sym(t) t. n 2 t T n Recall that we write p(t) = P (T = t). Since every tree t T n for n 2 can be divided into two trees, we Notice that Hence F (u, ) = + B(u 2, w 2 )dw = t T F (u, w) 2 2 t p2 (t)u 2sym(t) 2 t. w 2 dw + (u ) B(u 2, w 2 )dw. Let f(u, ) = F (u,). From the last equation we get f(u, ) This proves Lemma 2.. = f(u, ) 2 + (u )B(u 2, 2 ).
7 3.2 Average Symmetry: Proof of Theorem 2. We now compute E[sym(T n ) = E[sym(S n ) using generating function φ n (u) = [ n F (u, ) = [ n f(u, ) defined above. We observe that E[sym(T n ) = dφ n(u) du. u= Moreover, we have that taking the coefficient (actually an integral) commutes with taking the derivative with respect to u: d[ n f(u, ) du = [ n f u (u, ). Thus, taking the derivative with respect to u in (2.4) gives (using (2.6)) (3.4) f,u (u, ) = 2f(u, )f u (u, ) [ + (u ) (f(u, ) f(u, )) u [ + (f(u, ) f(u, )), and setting u = results in (u2, 2 ) f,u (, ) = 2f(, )f u (, ) [ + (f(, ) f(, )). (u 2, 2 ) (u2, 2 ) Now, we use the fact that φ n () = for n implies f(, ) = ( ). We also recall the definition of the almost-ogf of E[sym(T n ): and note that E() = E[sym(T n ) n n= f u (, ) = n= E[sym(T n ) n = E(). With the notation as in the Remark above Theorem 2. we find (3.5) E () = 2E() ( ) + (A() A()) 2 = 2E() ( ) + B(2 ), with E() =, as needed. We now solve (3.5). It is easy to see that ( ) E() = ( ) 2 B(x 2 )( x) 2 dx + C. But E() = implies C =. Thus E[sym(T n ) = [ n E() Define = [ n ( ) 2 B(x 2 )( x) 2 dx. We first observe, after some algebra, that ( ) 2 B(x 2 )( x) 2 dx ( bn + b n+ = + 2n + 2n+ b ) n n 2n. n= (3.6) c k = Then k =, k =, E[sym(T n ) = [ n ( ) 2 But it is easy to see that n k= b l l k = 2l, l, b l +b l+ 2l+ k = 2l +, l. c k k = k= n c k (n k). k= n/2 kc k = + (b l+ b l ) l= = b + b n/2 + = ( ) n+ b (n+)/2. This leads to the final formula n (3.7) E[sym(T n ) = n c k + ( ) n+ b (n+)/2. k= We can further simply this expression by computing k c k. Some algebra is needed to show that k c k = 2 3 b + (n+)/2 l=2 ( b l 2l l + ) 2l + + b (n+)/2 ( I(n 2l + ) 2l + I(n 2l + ) l ).
8 The last term is O(/n), because b (n+)/2 = O() and the indicators ensure that the only nonero contributions of this term happen when l (n )/2, so that l = Ω(n) and there are only O() such terms. We thus get the following formula: (3.8) k (3.9) c k = (n+)/2 3 + = l=2 (n+)/2 l= In summary, we have (3.2) b l (2l )l(2l + ) + O(n ) b l (2l )l(2l + ) + O(n ). (n+)/2 b l E[sym(T n ) = n (2l )l(2l + ) + O() (3.2) l= + ( ) n+ b (n+)/2 := nh(t s) + O(), [9 A. Magner, K. Turowski, W. Spankowski, Lossless Compression of Binary Trees with Correlated Vertex Names, ISIT, Barcelona, 26 [ M. Mohri, M. Riley, A. T. Suresh, Automata and graph compression. ISIT 25, pp [ P. Flajolet and R. Sedgewick, Analytic Combinatorics, Cambridge University Press, Cambridge, 29. [2 M. Steel, A. McKenie, Distributions of cherries for two models of trees. Mathematical Biosciences, 2, 64:8-92. [3 M. Steel, A. McKenie, Properties of phylogenetic trees generated by Yule-type speciation models. Mathematical Biosciences, 2, 7():9-2. [4 W. Spankowski, Average Case Analysis of Algorithms on Sequences. John Wiley & Sons, Inc., New York, NY, 2. [5 J. Zhang, E.-H. Yang, J. C. Kieffer, A Universal Grammar-Based Code for Lossless Compression of Binary Trees. IEEE Transactions on Information Theory, 24, 6(3): This proves Theo- where, we recall, b l = t l p 2 (t l ). rem 2.. References [ R. Baea-Yates, R. Casas, J. Dia, C. Martine, On the average sie of the intersection of binary trees, SIAM J. Computing, 2, 24-32, 992 [2 M. Bona, P. Flajolet, Isomorphism and symmetries in random phylogenetic trees, Journal of Applied Probability 46(4):5-9. [3 H-H Chern, M. Fernánde-Camacho, H-K. Hwang, and C. Martine, Psi-series method for equality of random trees and quadratic convolution recurrences, Random Structures & Algorithms, 44, 67-8, 22. [4 Yongwook Choi, Wojciech Spankowski: Compression of Graphical Structures: Fundamental Limits, Algorithms, and Experiments. IEEE Transactions on Information Theory, 22, 58(2): [5 M. Drmota, Random Trees: An Interplay between Combinatorics and Probability. Springer Publishing Company, Inc., 29. [6 P. Flajolet, X. Gourdon, and C. Martine, Patterns in random binary search trees, Random Structures & Algorithms,, , 997 [7 M. Hassani, Approximation of the Dilogarithm Function, J. Inequalities in Pure and Applied Mathematics, 8, -7, 27. [8 J. C. Kieffer, E.-H. Yang, W. Spankowski, Structural complexity of random binary trees. ISIT 29, pp
k-protected VERTICES IN BINARY SEARCH TREES
k-protected VERTICES IN BINARY SEARCH TREES MIKLÓS BÓNA Abstract. We show that for every k, the probability that a randomly selected vertex of a random binary search tree on n nodes is at distance k from
More informationApplications of Analytic Combinatorics in Mathematical Biology (joint with H. Chang, M. Drmota, E. Y. Jin, and Y.-W. Lee)
Applications of Analytic Combinatorics in Mathematical Biology (joint with H. Chang, M. Drmota, E. Y. Jin, and Y.-W. Lee) Michael Fuchs Department of Applied Mathematics National Chiao Tung University
More informationarxiv: v1 [math.co] 29 Nov 2018
ON THE INDUCIBILITY OF SMALL TREES AUDACE A. V. DOSSOU-OLORY AND STEPHAN WAGNER arxiv:1811.1010v1 [math.co] 9 Nov 018 Abstract. The quantity that captures the asymptotic value of the maximum number of
More informationOn the parity of the Wiener index
On the parity of the Wiener index Stephan Wagner Department of Mathematical Sciences, Stellenbosch University, Stellenbosch 7602, South Africa Hua Wang Department of Mathematics, University of Florida,
More informationThe Moments of the Profile in Random Binary Digital Trees
Journal of mathematics and computer science 6(2013)176-190 The Moments of the Profile in Random Binary Digital Trees Ramin Kazemi and Saeid Delavar Department of Statistics, Imam Khomeini International
More informationThe Subtree Size Profile of Plane-oriented Recursive Trees
The Subtree Size Profile of Plane-oriented Recursive Trees Michael Fuchs Department of Applied Mathematics National Chiao Tung University Hsinchu, Taiwan ANALCO11, January 22nd, 2011 Michael Fuchs (NCTU)
More informationExtremal Statistics on Non-Crossing Configurations
Extremal Statistics on Non-Crossing Configurations Michael Drmota Anna de Mier Marc Noy Abstract We analye extremal statistics in non-crossing configurations on the n vertices of a convex polygon. We prove
More informationThe Subtree Size Profile of Bucket Recursive Trees
Iranian Journal of Mathematical Sciences and Informatics Vol., No. (206, pp - DOI: 0.7508/ijmsi.206.0.00 The Subtree Size Profile of Bucket Recursive Trees Ramin Kazemi Department of Statistics, Imam Khomeini
More informationPermutations with Inversions
1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 4 2001, Article 01.2.4 Permutations with Inversions Barbara H. Margolius Cleveland State University Cleveland, Ohio 44115 Email address: b.margolius@csuohio.edu
More informationPROBABILISTIC BEHAVIOR OF ASYMMETRIC LEVEL COMPRESSED TRIES
PROBABILISTIC BEAVIOR OF ASYMMETRIC LEVEL COMPRESSED TRIES Luc Devroye Wojcieh Szpankowski School of Computer Science Department of Computer Sciences McGill University Purdue University 3450 University
More informationDistribution of the Number of Encryptions in Revocation Schemes for Stateless Receivers
Discrete Mathematics and Theoretical Computer Science DMTCS vol. subm., by the authors, 1 1 Distribution of the Number of Encryptions in Revocation Schemes for Stateless Receivers Christopher Eagle 1 and
More informationRandom Boolean expressions
Random Boolean expressions Danièle Gardy PRiSM, Univ. Versailles-Saint Quentin and CNRS UMR 8144. Daniele.Gardy@prism.uvsq.fr We examine how we can define several probability distributions on the set of
More informationPROTECTED NODES AND FRINGE SUBTREES IN SOME RANDOM TREES
PROTECTED NODES AND FRINGE SUBTREES IN SOME RANDOM TREES LUC DEVROYE AND SVANTE JANSON Abstract. We study protected nodes in various classes of random rooted trees by putting them in the general context
More informationCombinatorial Enumeration. Jason Z. Gao Carleton University, Ottawa, Canada
Combinatorial Enumeration Jason Z. Gao Carleton University, Ottawa, Canada Counting Combinatorial Structures We are interested in counting combinatorial (discrete) structures of a given size. For example,
More informationMultiple Choice Tries and Distributed Hash Tables
Multiple Choice Tries and Distributed Hash Tables Luc Devroye and Gabor Lugosi and Gahyun Park and W. Szpankowski January 3, 2007 McGill University, Montreal, Canada U. Pompeu Fabra, Barcelona, Spain U.
More informationNotes on Logarithmic Lower Bounds in the Cell Probe Model
Notes on Logarithmic Lower Bounds in the Cell Probe Model Kevin Zatloukal November 10, 2010 1 Overview Paper is by Mihai Pâtraşcu and Erik Demaine. Both were at MIT at the time. (Mihai is now at AT&T Labs.)
More informationAlmost all trees have an even number of independent sets
Almost all trees have an even number of independent sets Stephan G. Wagner Department of Mathematical Sciences Stellenbosch University Private Bag X1, Matieland 7602, South Africa swagner@sun.ac.za Submitted:
More informationRandom Boolean expressions
Computational Logic and Applications, CLA 05 DMTCS proc. AF, 2006, 1 36 Random Boolean expressions Danièle Gardy PRiSM, Univ. Versailles-Saint Quentin and CNRS UMR 8144. Daniele.Gardy@prism.uvsq.fr We
More informationLECTURE 7. 2 Simple trees and Lagrange Inversion Restricting the out-degree Lagrange Inversion... 4
Contents 1 Recursive specifications 1 1.1 Binary Trees B............................................ 1 1.1.1 A recursive structure.................................... 1.1. Decomposition........................................
More informationProbabilities on cladograms: introduction to the alpha model
arxiv:math/0511246v1 [math.pr] 9 Nov 2005 Probabilities on cladograms: introduction to the alpha model Daniel J. Ford Abstract This report introduces the alpha model. The alpha model is a one parameter
More informationGap Embedding for Well-Quasi-Orderings 1
WoLLIC 2003 Preliminary Version Gap Embedding for Well-Quasi-Orderings 1 Nachum Dershowitz 2 and Iddo Tzameret 3 School of Computer Science, Tel-Aviv University, Tel-Aviv 69978, Israel Abstract Given a
More informationA simple branching process approach to the phase transition in G n,p
A simple branching process approach to the phase transition in G n,p Béla Bollobás Department of Pure Mathematics and Mathematical Statistics Wilberforce Road, Cambridge CB3 0WB, UK b.bollobas@dpmms.cam.ac.uk
More informationTree Decomposition of Graphs
Tree Decomposition of Graphs Raphael Yuster Department of Mathematics University of Haifa-ORANIM Tivon 36006, Israel. e-mail: raphy@math.tau.ac.il Abstract Let H be a tree on h 2 vertices. It is shown
More informationFighting Fish: enumerative properties. Enrica Duchi. Veronica Guerrini & Simone Rinaldi DIISM, Università di Siena.
Fighting Fish: enumerative properties Enrica Duchi IRIF, Université Paris Diderot Veronica Guerrini & Simone Rinaldi DIISM, Università di Siena Gilles Schaeffer LIX, CNRS and École Polytechnique Séminaire
More informationMaximum Agreement Subtrees
Maximum Agreement Subtrees Seth Sullivant North Carolina State University March 24, 2018 Seth Sullivant (NCSU) Maximum Agreement Subtrees March 24, 2018 1 / 23 Phylogenetics Problem Given a collection
More informationOn the Turán number of forests
On the Turán number of forests Bernard Lidický Hong Liu Cory Palmer April 13, 01 Abstract The Turán number of a graph H, ex(n, H, is the maximum number of edges in a graph on n vertices which does not
More informationProbabilistic analysis of the asymmetric digital search trees
Int. J. Nonlinear Anal. Appl. 6 2015 No. 2, 161-173 ISSN: 2008-6822 electronic http://dx.doi.org/10.22075/ijnaa.2015.266 Probabilistic analysis of the asymmetric digital search trees R. Kazemi a,, M. Q.
More informationCompact Suffix Trees Resemble Patricia Tries: Limiting Distribution of Depth
Purdue University Purdue e-pubs Department of Computer Science Technical Reports Department of Computer Science 1992 Compact Suffix Trees Resemble Patricia Tries: Limiting Distribution of Depth Philippe
More informationAn Algebraic View of the Relation between Largest Common Subtrees and Smallest Common Supertrees
An Algebraic View of the Relation between Largest Common Subtrees and Smallest Common Supertrees Francesc Rosselló 1, Gabriel Valiente 2 1 Department of Mathematics and Computer Science, Research Institute
More informationLegendre s Equation. PHYS Southern Illinois University. October 18, 2016
Legendre s Equation PHYS 500 - Southern Illinois University October 18, 2016 PHYS 500 - Southern Illinois University Legendre s Equation October 18, 2016 1 / 11 Legendre s Equation Recall We are trying
More informationNotes by Zvi Rosen. Thanks to Alyssa Palfreyman for supplements.
Lecture: Hélène Barcelo Analytic Combinatorics ECCO 202, Bogotá Notes by Zvi Rosen. Thanks to Alyssa Palfreyman for supplements.. Tuesday, June 2, 202 Combinatorics is the study of finite structures that
More informationOptimal computation of symmetric Boolean functions in Tree networks
Optimal computation of symmetric Boolean functions in Tree networks Hemant Kowshik CSL and Department of ECE University of Illinois Urbana-Champaign Email: kowshik2@illinoisedu P R Kumar CSL and Department
More informationAlmost giant clusters for percolation on large trees
for percolation on large trees Institut für Mathematik Universität Zürich Erdős-Rényi random graph model in supercritical regime G n = complete graph with n vertices Bond percolation with parameter p(n)
More informationAnalytic Information Theory: From Shannon to Knuth and Back. Knuth80: Piteaa, Sweden, 2018 Dedicated to Don E. Knuth
Analytic Information Theory: From Shannon to Knuth and Back Wojciech Szpankowski Center for Science of Information Purdue University January 7, 2018 Knuth80: Piteaa, Sweden, 2018 Dedicated to Don E. Knuth
More informationOn the Average Path Length of Complete m-ary Trees
1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 17 2014, Article 14.6.3 On the Average Path Length of Complete m-ary Trees M. A. Nyblom School of Mathematics and Geospatial Science RMIT University
More informationThe space requirement of m-ary search trees: distributional asymptotics for m 27
1 The space requirement of m-ary search trees: distributional asymptotics for m 7 James Allen Fill 1 and Nevin Kapur 1 Applied Mathematics and Statistics, The Johns Hopkins University, 3400 N. Charles
More informationA Note on a Problem Posed by D. E. Knuth on a Satisfiability Recurrence
A Note on a Problem Posed by D. E. Knuth on a Satisfiability Recurrence Dedicated to Philippe Flajolet 1948-2011 July 4, 2013 Philippe Jacquet Charles Knessl 1 Wojciech Szpankowski 2 Bell Labs Dept. Math.
More informationTHE NUMBER OF INDEPENDENT DOMINATING SETS OF LABELED TREES. Changwoo Lee. 1. Introduction
Commun. Korean Math. Soc. 18 (2003), No. 1, pp. 181 192 THE NUMBER OF INDEPENDENT DOMINATING SETS OF LABELED TREES Changwoo Lee Abstract. We count the numbers of independent dominating sets of rooted labeled
More informationChapter 11. Min Cut Min Cut Problem Definition Some Definitions. By Sariel Har-Peled, December 10, Version: 1.
Chapter 11 Min Cut By Sariel Har-Peled, December 10, 013 1 Version: 1.0 I built on the sand And it tumbled down, I built on a rock And it tumbled down. Now when I build, I shall begin With the smoke from
More informationq-counting hypercubes in Lucas cubes
Turkish Journal of Mathematics http:// journals. tubitak. gov. tr/ math/ Research Article Turk J Math (2018) 42: 190 203 c TÜBİTAK doi:10.3906/mat-1605-2 q-counting hypercubes in Lucas cubes Elif SAYGI
More informationOn the number of matchings of a tree.
On the number of matchings of a tree. Stephan G. Wagner Department of Mathematics, Graz University of Technology, Steyrergasse 30, A-800 Graz, Austria Abstract In a paper of Klazar, several counting examples
More informationAssignment 5: Solutions
Comp 21: Algorithms and Data Structures Assignment : Solutions 1. Heaps. (a) First we remove the minimum key 1 (which we know is located at the root of the heap). We then replace it by the key in the position
More informationPartitioning Metric Spaces
Partitioning Metric Spaces Computational and Metric Geometry Instructor: Yury Makarychev 1 Multiway Cut Problem 1.1 Preliminaries Definition 1.1. We are given a graph G = (V, E) and a set of terminals
More informationLecture 17: Trees and Merge Sort 10:00 AM, Oct 15, 2018
CS17 Integrated Introduction to Computer Science Klein Contents Lecture 17: Trees and Merge Sort 10:00 AM, Oct 15, 2018 1 Tree definitions 1 2 Analysis of mergesort using a binary tree 1 3 Analysis of
More informationSymmetries in the Entropy Space
Symmetries in the Entropy Space Jayant Apte, Qi Chen, John MacLaren Walsh Abstract This paper investigates when Shannon-type inequalities completely characterize the part of the closure of the entropy
More informationOn the Average Complexity of Brzozowski s Algorithm for Deterministic Automata with a Small Number of Final States
On the Average Complexity of Brzozowski s Algorithm for Deterministic Automata with a Small Number of Final States Sven De Felice 1 and Cyril Nicaud 2 1 LIAFA, Université Paris Diderot - Paris 7 & CNRS
More informationEmbedding the Erdős-Rényi Hypergraph into the Random Regular Hypergraph and Hamiltonicity
Embedding the Erdős-Rényi Hypergraph into the Random Regular Hypergraph and Hamiltonicity ANDRZEJ DUDEK 1 ALAN FRIEZE 2 ANDRZEJ RUCIŃSKI3 MATAS ŠILEIKIS4 1 Department of Mathematics, Western Michigan University,
More informationHow many randomly colored edges make a randomly colored dense graph rainbow hamiltonian or rainbow connected?
How many randomly colored edges make a randomly colored dense graph rainbow hamiltonian or rainbow connected? Michael Anastos and Alan Frieze February 1, 2018 Abstract In this paper we study the randomly
More informationProtected nodes and fringe subtrees in some random trees
Electron. Commun. Probab. 19 (214), no. 6, 1 1. DOI: 1.1214/ECP.v19-348 ISSN: 183-589X ELECTRONIC COMMUNICATIONS in PROBABILITY Protected nodes and fringe subtrees in some random trees Luc Devroye Svante
More information3. Generating Functions
ANALYTIC COMBINATORICS P A R T O N E 3. Generating Functions http://aofa.cs.princeton.edu ANALYTIC COMBINATORICS P A R T O N E 3. Generating Functions OF OGFs Solving recurrences Catalan numbers EGFs Counting
More information1.2. Functions and Their Properties. Copyright 2011 Pearson, Inc.
1.2 Functions and Their Properties Copyright 2011 Pearson, Inc. What you ll learn about Function Definition and Notation Domain and Range Continuity Increasing and Decreasing Functions Boundedness Local
More informationInformation Theory of Random Trees Induced by Stochastic Grammars
Information Theory of Random Trees Induced by Stochastic Grammars A DISSERTATION SUBMITTED TO THE FACULTY OF THE GRADUATE SCHOOL OF THE UNIVERSITY OF MINNESOTA BY Sang youn Oh IN PARTIAL FULFILLMENT OF
More informationPacking and decomposition of graphs with trees
Packing and decomposition of graphs with trees Raphael Yuster Department of Mathematics University of Haifa-ORANIM Tivon 36006, Israel. e-mail: raphy@math.tau.ac.il Abstract Let H be a tree on h 2 vertices.
More informationRandomized Algorithms III Min Cut
Chapter 11 Randomized Algorithms III Min Cut CS 57: Algorithms, Fall 01 October 1, 01 11.1 Min Cut 11.1.1 Problem Definition 11. Min cut 11..0.1 Min cut G = V, E): undirected graph, n vertices, m edges.
More informationCENTRAL LIMIT THEOREMS FOR ADDITIVE TREE PARAMETERS
CENRAL LIMI HEOREMS FOR ADDIIVE REE PARAMEERS SEPHAN WAGNER DEDICAED O HE MEMORY OF PHILIPPE FLAJOLE Abstract. We call a tree parameter additive if it can be determined recursively as the sum of the parameter
More informationGreedy Trees, Caterpillars, and Wiener-Type Graph Invariants
Georgia Southern University Digital Commons@Georgia Southern Mathematical Sciences Faculty Publications Mathematical Sciences, Department of 2012 Greedy Trees, Caterpillars, and Wiener-Type Graph Invariants
More informationThe concentration of the chromatic number of random graphs
The concentration of the chromatic number of random graphs Noga Alon Michael Krivelevich Abstract We prove that for every constant δ > 0 the chromatic number of the random graph G(n, p) with p = n 1/2
More informationA fast algorithm to generate necklaces with xed content
Theoretical Computer Science 301 (003) 477 489 www.elsevier.com/locate/tcs Note A fast algorithm to generate necklaces with xed content Joe Sawada 1 Department of Computer Science, University of Toronto,
More informationLecture 5: February 21, 2017
COMS 6998: Advanced Complexity Spring 2017 Lecture 5: February 21, 2017 Lecturer: Rocco Servedio Scribe: Diana Yin 1 Introduction 1.1 Last Time 1. Established the exact correspondence between communication
More informationare the q-versions of n, n! and . The falling factorial is (x) k = x(x 1)(x 2)... (x k + 1).
Lecture A jacques@ucsd.edu Notation: N, R, Z, F, C naturals, reals, integers, a field, complex numbers. p(n), S n,, b(n), s n, partition numbers, Stirling of the second ind, Bell numbers, Stirling of the
More informationPROBABILITY VITTORIA SILVESTRI
PROBABILITY VITTORIA SILVESTRI Contents Preface. Introduction 2 2. Combinatorial analysis 5 3. Stirling s formula 8 4. Properties of Probability measures Preface These lecture notes are for the course
More informationarxiv: v1 [math.co] 24 Apr 2014
On sets of integers with restrictions on their products Michael Tait, Jacques Verstraëte Department of Mathematics University of California at San Diego 9500 Gilman Drive, La Jolla, California 9093-011,
More informationUnlabelled Structures: Restricted Constructions
Gao & Šana, Combinatorial Enumeration Notes 5 Unlabelled Structures: Restricted Constructions Let SEQ k (B denote the set of sequences of exactly k elements from B, and SEQ k (B denote the set of sequences
More informationHAMILTON CYCLES IN RANDOM REGULAR DIGRAPHS
HAMILTON CYCLES IN RANDOM REGULAR DIGRAPHS Colin Cooper School of Mathematical Sciences, Polytechnic of North London, London, U.K. and Alan Frieze and Michael Molloy Department of Mathematics, Carnegie-Mellon
More informationLecture 6. Today we shall use graph entropy to improve the obvious lower bound on good hash functions.
CSE533: Information Theory in Computer Science September 8, 010 Lecturer: Anup Rao Lecture 6 Scribe: Lukas Svec 1 A lower bound for perfect hash functions Today we shall use graph entropy to improve the
More informationList coloring hypergraphs
List coloring hypergraphs Penny Haxell Jacques Verstraete Department of Combinatorics and Optimization University of Waterloo Waterloo, Ontario, Canada pehaxell@uwaterloo.ca Department of Mathematics University
More informationarxiv: v1 [math.co] 12 Oct 2018
Uniform random posets Patryk Kozieł Małgorzata Sulkowska arxiv:1810.05446v1 [math.co] 12 Oct 2018 October 15, 2018 Abstract We propose a simple algorithm generating labelled posets of given size according
More informationCOS597D: Information Theory in Computer Science October 5, Lecture 6
COS597D: Information Theory in Computer Science October 5, 2011 Lecture 6 Lecturer: Mark Braverman Scribe: Yonatan Naamad 1 A lower bound for perfect hash families. In the previous lecture, we saw that
More informationGENERATING FUNCTIONS AND CENTRAL LIMIT THEOREMS
GENERATING FUNCTIONS AND CENTRAL LIMIT THEOREMS Michael Drmota Institute of Discrete Mathematics and Geometry Vienna University of Technology A 1040 Wien, Austria michael.drmota@tuwien.ac.at http://www.dmg.tuwien.ac.at/drmota/
More informationRadio Number for Square of Cycles
Radio Number for Square of Cycles Daphne Der-Fen Liu Melanie Xie Department of Mathematics California State University, Los Angeles Los Angeles, CA 9003, USA August 30, 00 Abstract Let G be a connected
More informationGenerating Functions
Semester 1, 2004 Generating functions Another means of organising enumeration. Two examples we have seen already. Example 1. Binomial coefficients. Let X = {1, 2,..., n} c k = # k-element subsets of X
More informationThe Lefthanded Local Lemma characterizes chordal dependency graphs
The Lefthanded Local Lemma characterizes chordal dependency graphs Wesley Pegden March 30, 2012 Abstract Shearer gave a general theorem characterizing the family L of dependency graphs labeled with probabilities
More informationMath 259: Introduction to Analytic Number Theory Functions of finite order: product formula and logarithmic derivative
Math 259: Introduction to Analytic Number Theory Functions of finite order: product formula and logarithmic derivative This chapter is another review of standard material in complex analysis. See for instance
More informationRECOVERING NORMAL NETWORKS FROM SHORTEST INTER-TAXA DISTANCE INFORMATION
RECOVERING NORMAL NETWORKS FROM SHORTEST INTER-TAXA DISTANCE INFORMATION MAGNUS BORDEWICH, KATHARINA T. HUBER, VINCENT MOULTON, AND CHARLES SEMPLE Abstract. Phylogenetic networks are a type of leaf-labelled,
More informationCounting Markov Types
Counting Markov Types Philippe Jacquet, Charles Knessl, Wojciech Szpankowski To cite this version: Philippe Jacquet, Charles Knessl, Wojciech Szpankowski. Counting Markov Types. Drmota, Michael and Gittenberger,
More informationFinite Metric Spaces & Their Embeddings: Introduction and Basic Tools
Finite Metric Spaces & Their Embeddings: Introduction and Basic Tools Manor Mendel, CMI, Caltech 1 Finite Metric Spaces Definition of (semi) metric. (M, ρ): M a (finite) set of points. ρ a distance function
More informationFree Energy Rates for Parameter Rich Optimization Problems
Free Energy Rates for Parameter Rich Optimization Problems Joachim M. Buhmann 1, Julien Dumazert 1, Alexey Gronskiy 1, Wojciech Szpankowski 2 1 ETH Zurich, {jbuhmann, alexeygr}@inf.ethz.ch, julien.dumazert@gmail.com,
More informationLecture 20: Lagrange Interpolation and Neville s Algorithm. for I will pass through thee, saith the LORD. Amos 5:17
Lecture 20: Lagrange Interpolation and Neville s Algorithm for I will pass through thee, saith the LORD. Amos 5:17 1. Introduction Perhaps the easiest way to describe a shape is to select some points on
More informationAverage Case Analysis of QuickSort and Insertion Tree Height using Incompressibility
Average Case Analysis of QuickSort and Insertion Tree Height using Incompressibility Tao Jiang, Ming Li, Brendan Lucier September 26, 2005 Abstract In this paper we study the Kolmogorov Complexity of a
More informationExcluded permutation matrices and the Stanley Wilf conjecture
Excluded permutation matrices and the Stanley Wilf conjecture Adam Marcus Gábor Tardos November 2003 Abstract This paper examines the extremal problem of how many 1-entries an n n 0 1 matrix can have that
More informationAsymmetry and Structural Information in Preferential Attachment Graphs
Asymmetry and Structural Information in Preferential Attachment Graphs May 31, 2017 Tomasz Luczak Abram Magner Wojciech Szpankowski Faculty of Math. & Comp. Sci. Coordinated Science Lab Dept.Computer Science
More informationRemarks on a Ramsey theory for trees
Remarks on a Ramsey theory for trees János Pach EPFL, Lausanne and Rényi Institute, Budapest József Solymosi University of British Columbia, Vancouver Gábor Tardos Simon Fraser University and Rényi Institute,
More informationModule 4: Equations and Inequalities in One Variable
Module 1: Relationships between quantities Precision- The level of detail of a measurement, determined by the unit of measure. Dimensional Analysis- A process that uses rates to convert measurements from
More informationMAXIMAL CLADES IN RANDOM BINARY SEARCH TREES
MAXIMAL CLADES IN RANDOM BINARY SEARCH TREES SVANTE JANSON Abstract. We study maximal clades in random phylogenetic trees with the Yule Harding model or, equivalently, in binary search trees. We use probabilistic
More informationTHE DEGREE DISTRIBUTION OF RANDOM PLANAR GRAPHS
THE DEGREE DISTRIBUTION OF RANDOM PLANAR GRAPHS Michael Drmota joint work with Omer Giménez and Marc Noy Institut für Diskrete Mathematik und Geometrie TU Wien michael.drmota@tuwien.ac.at http://www.dmg.tuwien.ac.at/drmota/
More informationarxiv: v1 [cs.cc] 9 Oct 2014
Satisfying ternary permutation constraints by multiple linear orders or phylogenetic trees Leo van Iersel, Steven Kelk, Nela Lekić, Simone Linz May 7, 08 arxiv:40.7v [cs.cc] 9 Oct 04 Abstract A ternary
More informationAn alternative proof of the Barker, Berman, Plemmons (BBP) result on diagonal stability and extensions - Corrected Version
1 An alternative proof of the Barker, Berman, Plemmons (BBP) result on diagonal stability and extensions - Corrected Version Robert Shorten 1, Oliver Mason 1 and Christopher King 2 Abstract The original
More informationThe memory centre IMUJ PREPRINT 2012/03. P. Spurek
The memory centre IMUJ PREPRINT 202/03 P. Spurek Faculty of Mathematics and Computer Science, Jagiellonian University, Łojasiewicza 6, 30-348 Kraków, Poland J. Tabor Faculty of Mathematics and Computer
More informationCS383, Algorithms Spring 2009 HW1 Solutions
Prof. Sergio A. Alvarez http://www.cs.bc.edu/ alvarez/ 21 Campanella Way, room 569 alvarez@cs.bc.edu Computer Science Department voice: (617) 552-4333 Boston College fax: (617) 552-6790 Chestnut Hill,
More informationNetwork Augmentation and the Multigraph Conjecture
Network Augmentation and the Multigraph Conjecture Nathan Kahl Department of Mathematical Sciences Stevens Institute of Technology Hoboken, NJ 07030 e-mail: nkahl@stevens-tech.edu Abstract Let Γ(n, m)
More informationAn Improved Approximation Algorithm for Requirement Cut
An Improved Approximation Algorithm for Requirement Cut Anupam Gupta Viswanath Nagarajan R. Ravi Abstract This note presents improved approximation guarantees for the requirement cut problem: given an
More informationarxiv: v1 [q-bio.pe] 1 Jun 2014
THE MOST PARSIMONIOUS TREE FOR RANDOM DATA MAREIKE FISCHER, MICHELLE GALLA, LINA HERBST AND MIKE STEEL arxiv:46.27v [q-bio.pe] Jun 24 Abstract. Applying a method to reconstruct a phylogenetic tree from
More informationThe Generalization of Quicksort
The Generalization of Quicksort Shyue-Horng Shiau Chang-Biau Yang Ý Department of Computer Science and Engineering National Sun Yat-Sen University Kaohsiung, Taiwan 804, Republic of China shiaush@cse.nsysu.edu.tw
More informationRandom trees and branching processes
Random trees and branching processes Svante Janson IMS Medallion Lecture 12 th Vilnius Conference and 2018 IMS Annual Meeting Vilnius, 5 July, 2018 Part I. Galton Watson trees Let ξ be a random variable
More informationAnalysis of Algorithm Efficiency. Dr. Yingwu Zhu
Analysis of Algorithm Efficiency Dr. Yingwu Zhu Measure Algorithm Efficiency Time efficiency How fast the algorithm runs; amount of time required to accomplish the task Our focus! Space efficiency Amount
More informationThe Number of Guillotine Partitions in d Dimensions
The Number of Guillotine Partitions in d Dimensions Eyal Ackerman Gill Barequet Ron Y. Pinter Dan Romik Abstract Guillotine partitions play an important role in many research areas and application domains,
More informationAsymptotically Optimal Tree-based Group Key Management Schemes
Asymptotically Optimal Tree-based Group Key Management chemes Hideyuki akai Hitachi, Ltd., ystems Development Laboratory Asao-ku, Kawasaki-shi, Kanagawa 215 0013, Japan ariv:cs/0507001v1 [cs.it] 1 Jul
More informationarxiv: v2 [cs.ds] 3 Oct 2017
Orthogonal Vectors Indexing Isaac Goldstein 1, Moshe Lewenstein 1, and Ely Porat 1 1 Bar-Ilan University, Ramat Gan, Israel {goldshi,moshe,porately}@cs.biu.ac.il arxiv:1710.00586v2 [cs.ds] 3 Oct 2017 Abstract
More informationA Master Theorem for Discrete Divide and Conquer Recurrences
A Master Theorem for Discrete Divide and Conquer Recurrences MICHAEL DRMOTA and WOJCIECH SZPANKOWSKI TU Wien and Purdue University Divide-and-conquer recurrences are one of the most studied equations in
More informationACO Comprehensive Exam 19 March Graph Theory
1. Graph Theory Let G be a connected simple graph that is not a cycle and is not complete. Prove that there exist distinct non-adjacent vertices u, v V (G) such that the graph obtained from G by deleting
More information