On Symmetries of Non-Plane Trees in a Non-Uniform Model

Size: px
Start display at page:

Download "On Symmetries of Non-Plane Trees in a Non-Uniform Model"

Transcription

1 On Symmetries of Non-Plane Trees in a Non-Uniform Model Jacek Cichoń Abram Magner Wojciech Spankowski Krystof Turowski October 3, 26 Abstract Binary trees come in two varieties: plane trees, often simply called binary trees, and non-plane trees, in which the order of subtrees does not matter. Nonplane trees find many applications; for example in modeling epidemics, in studying phylogenetic trees, and as models in data compression. While binary trees have been studied very extensively, non-plane trees still pose some challenges. Moreover, in most analyses a uniform probabilistic model is assumed; that is, a tree is selected uniformly from among all trees. Such a model limits significantly applications of the analysis. In this paper we study by analytic techniques non-plane trees in a non-uniform model. In our model, we grow the tree on n leaves by selecting randomly a leaf and appending two children to it. We can show that this is equivalent to an alternative model, also used to analye the averagecase performance of binary search trees, that is more easily amenable to study by recurrences and generating functions. Here, one of the most important questions is the number of symmetries in such trees (i.e., the number of internal nodes with two isomorphic subtrees), or the sies of such symmetric subtrees. We first present a functional-differential equation characteriing tree symmetries, and then analye it. In this conference This work was supported in part by NSF Center for Science of Information (CSoI) Grant CCF-93937, and in addition by NSF Grants CCF-52432, NIH Grant UCA9894-, and the NCN grant UMO-23/9/B/ST6/2258. Jacek Cichoń is with Department of Computer Science Faculty of Fundamental Problems of Technology, Wroclaw University of Science and Technology, Wroclaw, Poland ( jacek.cichon@pwr.edu.pl) Abram Magner is with Coordinated Science Lab at Univ. of Illinois at Urbana-Champaign, Urbana, IL, USA, ( anmagner@illinois.edu). Krystof Turowski is with Dept. of Algorithms and System Modeling, at Gdańsk University of Technology, Gdansk, Poland, ( krturow@pg.gda.pl). W. Spankowski is with the Department of Computer Science, Purdue University, IN 4797, USA ( spa@cs.purdue.edu) paper we focus on the expected number of symmetries, the sie of symmetric subtrees, and the tree entropy. Keywords: Binary trees, non-plane trees, symmetry, Hadamard product, entropy, functional-differential equations. Introduction Binary trees come in two flavors: plane-oriented trees and non-plane or Otter trees. A plane tree, that we shall call just a binary tree, is defined as a rooted tree in which two subtrees of the same parent node are ordered between themselves and represented from left to right; that is, they have a distinguished embedding in the plane. A non-plane tree, also called unordered tree or an Otter tree, is just a rooted tree in the graph theoretic sense, so that there is no order between subtrees. Non-plane trees are harder to analye and less attention in literature has been devoted to these kind of trees. Nevertheless, non-plane trees find many important applications from data compression to biology. For example, in a phylogenetic tree describing n species there are n leaves representing extant species and n internal nodes. By design there is no specific order between the two children of a binary node. In combinatorics both trees have been studied [5, but only in a uniform probability model in which trees are selected uniformly from a collection of all distinct trees. However, such a model is often too simple to capture nuances of various applications. Therefore in this paper we study non-plane (and the corresponding plane) trees under a non-uniform model that we describe below. There are two equivalent models that are useful in applications such as data compression [9. Let T be the set of all binary rooted plane trees having finitely many vertices and, for each positive integer n, let T n be the subset of T consisting of all trees with exactly n leaves. Similarly, let S and S n be the set of all binary

2 rooted non-plane trees with finitely many vertices and exactly n leaves, respectively. In the first model to grow a tree built on n leaves we pick up randomly a leaf v, and then append two children to it, say v L and v R. Our second model (also known as the binary search tree model), is ubiquitous in the computer science literature, arising for example in the context of binary search trees formed by inserting a random permutation of [n into a binary search tree [, 6. Under this model we generate a random tree T n as follows: at first, t is equal to the unique tree in T and we associate a number n with its single vertex. Then, in each recursive step, let v, v 2,..., v k be the leaves of t, and let integers n, n 2,..., n k be the values assigned to these leaves, respectively. For each leaf v i with value n i >, randomly select integer s i from the set {,..., n i } with probability n i (independently of all other such leaves), and then grow two edges from v i with left edge terminating at a leaf of the extended tree with value s i and right edge terminating at a leaf of the extended tree with value n i s i. The extended tree is the result of the current recursive step. Clearly, the recursion terminates with a binary tree having exactly n leaves, in which each leaf has assigned value ; this tree is T n. In [9, 3 it was proved that both models are probabilistically equivalent. In data compression and other applications symmetries of plane and non-plane trees are of interest. In particular, for compression one needs to know the number of internal nodes that have two isomorphic subtrees, the sie of such isomorphic trees, and the entropy of trees. In this conference paper we set the stage to analye these quantities for non-plane (and the corresponding plane) trees. We derive a functional-differential equation for the bivariate generating function from which we compute the average number of nodes with two isomorphic subtrees as well as the entropy of non-plane trees (see also the recent paper [9). There are a few scattered results for non-plane trees in a uniform model [2, 5,. The non-plane trees in the binary search tree-like model were studied by analytic tools in [, 6 in a different context, and by a different method in [9. In this work we use analytic combinatorics to initiate systematic studies of non-plane trees. 2 Main Results Let S be the set of all binary rooted non-plane trees having finitely many vertices. Such trees are often called Otter trees. Let S n be the subset of S consisting of all trees with exactly n leaves. We also denote by T the set of all binary rooted plane trees having finitely many vertices. Let T n be the subset of T consisting of all trees with exactly n leaves. For any s S and t T let t s mean that the plane tree t is isomorphic to the non-plane tree s. Furthermore, we define [s = {t T : t s} as a collection of all plane trees t having the same non-plane tree s. In this paper we denote by t the number of leaves of a tree t. The probability of a tree t T n in our non-uniform model is [9 P (T n = t) = v t o ( (v) ), where t o is the set of internal nodes of t and (v) is the number of leaves of a tree rooted at v. These probabilities satisfies the following recurrence P (T n = t) = n P (T (t ) = t )P (T (t2) = t 2 ), where t, t 2 are the two subtrees of tree t whose roots are the two children of the root of t. The recursion starts with the unique tree t from T, when we have P (T = t ) =. It should be noted that this recursion resembles a recurrence for binary search trees which was studied in [, 6. For any t, t 2 T n such that t s and t 2 s it holds that P (T n = t ) = P (T n = t 2 ). By definition, s corresponds to [s isomorphic plane trees, so for any t [s it holds that (2.) P (S n = s) = [s P (T n = t), t [s. In other words, we put Furthermore, (2.2) P (S n = s) = t s P (T n = t). P (T n = t S n = s) = [s. Let sym(t) be the the number of non-leaf (internal) nodes v of tree t such that the two subtrees stemming We use T n to denote a random variable representing a random tree in T n; however, we often abuse notation and write T n for both the set of trees and the random variable.

3 from v are isomorphic. Observe that S = S 2 = S 3 =, and that S 4 = 2. If t S, then clearly sym(t) =. If t S 2 or t S 3 then sym(t) =. Notice that (see [2) if t and t 2 are the two subtrees of a tree t whose roots are the two children of the root of t, then { sym(t ) + sym(t 2 ) + if t = t 2 sym(t) = sym(t ) + sym(t 2 ) if t t 2. Observe also that sym(s) = sym(t) Furthermore, and more interestingly (2.3) [s = 2 n sym(s). t t [s. Indeed, we can form a new tree by rotating both subtrees of a plane tree at every internal node that is not symmetric, that is, for those nodes whose subtrees are not isomorphic. Our goal is to evaluate the average E[sym(S n ) for non-plane trees. We shall accomplish it through generating function approach. We first derive a differential equation for the following bivariate generating function Define also B(u, ) = t T F (u, ) = t T = n= P (T = t)u sym(t) t t T n P (T n = t)u sym(t) t. P 2 (T = t)u sym(t) t t T p 2 (t)u sym(t) t where we write p(t) = P (T = t) to simplify our notation. In the next section we prove the following lemma characteriing F (u, ). Lemma 2.. Let f(u, ) = F (u,). Then it satisfies the following Riccati differential equation (2.4) f(u, ) Furthermore after the substitution = f(u, ) 2 + (u )B(u 2, 2 ). g(u,) f(u, ) = g(u, ) equation (2.4) becomes (2.5) 2 g(u, ) 2 + (u )B(u 2, 2 )g(u, ) = which is a second order linear equation assuming B(u, ) is known. Remark (i) We should point out differences between our non-uniform model and uniform model. For the uniform model, following Bóna and Flajolet [2 the bivariate generating function F (u, ) = s S u sym(s) s satisfies the following functional equation F (u, ) = + 2 F (u, ) 2 + (u 2 ) F (u 2, 2 ). (ii) Furthermore, we observe that (2.4) could be viewed as a functional-differential equation. Indeed, let us introduce a special Hadamard product of two generating functions A(u, ), B(u, ) defined by A(u, ) = t T B(u, ) = t T c A (t)u r(t) s(t), c B (t)u r(t) s(t), where r(t) and s(t) map combinatorial objects t T to the non-negative integers. We then define a Hadamard product A(u, ) B(u, ) by A(u, ) B(u, ) = t T c A (t)c B (t)u r(t) s(t). We contrast this with the standard bivariate Hadamard product, defined by A(u, ) B(u, ) = n,m= t : r(t)=m,s(t)=n t : r(t)=m,s(t)=n c A (t) c B (t) u m n. Note that A(u, ) B(u, ) is in general not equal to A(u, ) B(u, ), unless r(t) and s(t) uniquely determine t. With this definition in mind we can rewrite (2.4) as (2.6) f (u, ) = f(u, ) 2 + (u )(f(u 2, 2 ) f(u 2, 2 ))

4 which is a functional-differential equation. Our first goal is to understand probabilistic behavior of sym(s n ) = sym(t n ). In this preliminary conference paper we focus on the average E[sym(S n ). We start with a definition E() = E[sym(S n ) n. n= Using Lemma 2. in the next section we show that it satisfies the following ODE (2.7) E () = 2E() ( ) + B(2 ) with E() =. Here we define B() = t T = = n= n p 2 (t) t p 2 (t n ) t n T n b n n n= where b n = [ n B() = t n T n p 2 (t n ) for n. It is easy to compute b n for a few small values of n, namely (2.8) b = b 2 =, b 3 = 2, b 4 = 2 9, b 5 = 3 44, b 6 = 7 2. Actually, to compute precisely b n for all values of n we need a better approach. Define C() = B() and notice that b n = [ n C() = [ n B(). We will derive a differential equation for C(), from which a recurrence for b n will follow. It is easy to notice that C() satisfies the following C() = + Furthermore, and B () = u,v T u,v T ( v + u ) 2 p2 (u)p 2 (v) u + v. ( v + u ) p2 (u)p 2 (v) u + v 2 C 2 () = u,v T p(u)p(v) u + v. Combining all of these, we arrive at the following differential equation (2.9) C() C () + 2 C () = C 2 (). By standard tools we can extract from the above a recurrence for b n = [ n C(). Indeed, for n 2 we have (2.) b n = n (n ) 2 b j b n j j= with b =. In passing we should point out that asymptotic growth of b n satisfying the above recurrence can be found in [3. We come back to this issue later in this paper. Remark. We can write (2.7) as a functional-differential equation using a different special Hadamard product defined as follows. For generating functions A() = t T c A (t) s(t), we define A() B() by Define now Then (A() A()) and (2.7) becomes A() B() = t T A() = t T 2 B() = t T c A (t)c B (t) s(t). p(t) 2 t. = p(t) 2 2( t ) t T [ = (f(, ) f(, )) c B (t) s(t), (u 2, 2 ) E () = 2E() ( ) + (A(2 ) A( 2 )), which is functional-differential equation. In the next section we solve the ODE (2.7) leading to our second main result. Theorem 2.. Consider a binary plane tree and its corresponding non-plane tree. The expected number of,

5 internal nodes with two isomorphic subtrees is (2.) E[sym(S n ) (n+)/2 b l = n (2l )l(2l + ) + ( )n+ b (n+)/2 l= n (.3725 ± 4 ) where, we recall, b l = t l p 2 (t l ). Remark. Observe that we can use just computed E[sym(S n ) to evaluate certain compression algorithms on non-plane (and plane) trees. Indeed, for every internal node with two isomorphic subtrees we can replace the second identical subtree with a pointer to the first subtrees. We need about n (.3725 ± 4 ) bits to accomplish it. On the other hand, if we do this, we can save some storage on the replaced subtree. How much? Let us, as a preliminary assessment, compute the total sie, sie(s n ), of the saved isomorphic subtrees. Similar computations as above lead to (n+)/2 b k E[sie(S n ) = n (2k )(2k + ) n.49. k= This result can also be recovered from [6. Finally we deal with the entropy of the non-plane tree H(S n ) and its rate h(s) = lim n H(S n )/n. Observe that H(S n ) = H(T n ) H(T n S n ). In [8, 9 it was proved that n (2.2) H(T n ) = log 2 (n ) + 2n k=2 Remark. We know that (see also [8) 2 n k=2 log 2 (k ) k(k + ).736 log 2 (k ) k(k + ). for large n (we took n = 6 ). The above series converges slowly at the rate O(log n/n). Therefore one would prefer a more explicit formula for large n. We approximate the sum using the Euler-Maclaurin formula [4 by the integral where n 2 log k n 2 (k + )(k + 2) k= ( = Li 2 n ) 2 + Li 2 (2 n) + log ( + Li 2 ) + π2 2 2 Li 2 (x) = log(x) (x + )(x + 2) dx ( 2 2 ) log(n 2) n x log t t dt is the dilogarithmic integral. For large x the following holds [7 Li 2 (x) = 2 log2 x π2 6 + O(log x/x). In fact, to get a better approximation of the sum we need two extra terms in the Euler-Maclaurin formula which leads to the following approximation n 2 k= log k (k + )(k + 2) Li 2 (3/2) + 2 π2 + 2 log2 (2) = which matches the first three digits of the sum. To complete our analysis we now evaluate H(T n S n ). From (2.3) we conclude H(T n S n ) = t T n,s S n P (T n = t, S n = s) log P (T n = t S n = s) = s S n P (S n = s) log [s = t T n P (T n = t)(n sym(t)) = n E[sym(S n ) = n E[sym(T n ) Thus from Theorem 2. we derive our third main result (see also [9). Theorem 2.2. The entropy rate h(s) = lim n H(S n )/n of the non-plane trees is h(s) = h(t) h(t s).9...

6 where have h(t s) = h(t) = 2 k= with b n = t n T n p 2 (t n ). k= b k (2k )k(2k + ), log 2 (k) (k + )(k + 2) Remark 4. The entropy h(s) is related to the Rényi entropy h (t) of order of non-plane trees. We define h (t) as follows, if it exists: (2.3) h (t) = lim n log E[p(T n ) n = lim n From the above we conclude that for large n b n = t n T n p 2 (t n ) exp( nh (t)). But appealing to (2.9)-(2.) and applying the method discussed in [3 we observe that b n = ρ (6n n 22 ) 5 + O(n 5 ) F (u, ) = + s + t p(s)p(t)usym(s)+sym(t)+[ s=t s + t = + = + s + t p(s)p(t)usym(s)+sym(t) s + t t T + t T 2 t p2 (t)u 2sym(t) 2 t 2 t p2 (t)u 2sym(t)+ 2 t s + t p(s)p(t)usym(s)+sym(t) s + t +(u ) log 2 t p2 (t)u 2sym(t) 2 t. t n T n p 2 t T (t n ). n Notice that, from the original definition of F (u, ), therefore, F (u, ) 2 = = Recall that p(s)p(t)u sym(s)+sym(t) s + t ; F (u, w) 2 w 2 dw s + t p(s)p(t)usym(s)+sym(t) s + t. B(u, ) = t T p 2 (t)u sym(t) t. where ρ = Thus h (t) = log(ρ). 3 Analysis and Proofs In this section we prove our main results. 3. Proof of Lemma 2. Observe that F (u, ) = P (T n = t)u sym(t) t n= t T n = + P (T n = t)u sym(t) t. n 2 t T n Recall that we write p(t) = P (T = t). Since every tree t T n for n 2 can be divided into two trees, we Notice that Hence F (u, ) = + B(u 2, w 2 )dw = t T F (u, w) 2 2 t p2 (t)u 2sym(t) 2 t. w 2 dw + (u ) B(u 2, w 2 )dw. Let f(u, ) = F (u,). From the last equation we get f(u, ) This proves Lemma 2.. = f(u, ) 2 + (u )B(u 2, 2 ).

7 3.2 Average Symmetry: Proof of Theorem 2. We now compute E[sym(T n ) = E[sym(S n ) using generating function φ n (u) = [ n F (u, ) = [ n f(u, ) defined above. We observe that E[sym(T n ) = dφ n(u) du. u= Moreover, we have that taking the coefficient (actually an integral) commutes with taking the derivative with respect to u: d[ n f(u, ) du = [ n f u (u, ). Thus, taking the derivative with respect to u in (2.4) gives (using (2.6)) (3.4) f,u (u, ) = 2f(u, )f u (u, ) [ + (u ) (f(u, ) f(u, )) u [ + (f(u, ) f(u, )), and setting u = results in (u2, 2 ) f,u (, ) = 2f(, )f u (, ) [ + (f(, ) f(, )). (u 2, 2 ) (u2, 2 ) Now, we use the fact that φ n () = for n implies f(, ) = ( ). We also recall the definition of the almost-ogf of E[sym(T n ): and note that E() = E[sym(T n ) n n= f u (, ) = n= E[sym(T n ) n = E(). With the notation as in the Remark above Theorem 2. we find (3.5) E () = 2E() ( ) + (A() A()) 2 = 2E() ( ) + B(2 ), with E() =, as needed. We now solve (3.5). It is easy to see that ( ) E() = ( ) 2 B(x 2 )( x) 2 dx + C. But E() = implies C =. Thus E[sym(T n ) = [ n E() Define = [ n ( ) 2 B(x 2 )( x) 2 dx. We first observe, after some algebra, that ( ) 2 B(x 2 )( x) 2 dx ( bn + b n+ = + 2n + 2n+ b ) n n 2n. n= (3.6) c k = Then k =, k =, E[sym(T n ) = [ n ( ) 2 But it is easy to see that n k= b l l k = 2l, l, b l +b l+ 2l+ k = 2l +, l. c k k = k= n c k (n k). k= n/2 kc k = + (b l+ b l ) l= = b + b n/2 + = ( ) n+ b (n+)/2. This leads to the final formula n (3.7) E[sym(T n ) = n c k + ( ) n+ b (n+)/2. k= We can further simply this expression by computing k c k. Some algebra is needed to show that k c k = 2 3 b + (n+)/2 l=2 ( b l 2l l + ) 2l + + b (n+)/2 ( I(n 2l + ) 2l + I(n 2l + ) l ).

8 The last term is O(/n), because b (n+)/2 = O() and the indicators ensure that the only nonero contributions of this term happen when l (n )/2, so that l = Ω(n) and there are only O() such terms. We thus get the following formula: (3.8) k (3.9) c k = (n+)/2 3 + = l=2 (n+)/2 l= In summary, we have (3.2) b l (2l )l(2l + ) + O(n ) b l (2l )l(2l + ) + O(n ). (n+)/2 b l E[sym(T n ) = n (2l )l(2l + ) + O() (3.2) l= + ( ) n+ b (n+)/2 := nh(t s) + O(), [9 A. Magner, K. Turowski, W. Spankowski, Lossless Compression of Binary Trees with Correlated Vertex Names, ISIT, Barcelona, 26 [ M. Mohri, M. Riley, A. T. Suresh, Automata and graph compression. ISIT 25, pp [ P. Flajolet and R. Sedgewick, Analytic Combinatorics, Cambridge University Press, Cambridge, 29. [2 M. Steel, A. McKenie, Distributions of cherries for two models of trees. Mathematical Biosciences, 2, 64:8-92. [3 M. Steel, A. McKenie, Properties of phylogenetic trees generated by Yule-type speciation models. Mathematical Biosciences, 2, 7():9-2. [4 W. Spankowski, Average Case Analysis of Algorithms on Sequences. John Wiley & Sons, Inc., New York, NY, 2. [5 J. Zhang, E.-H. Yang, J. C. Kieffer, A Universal Grammar-Based Code for Lossless Compression of Binary Trees. IEEE Transactions on Information Theory, 24, 6(3): This proves Theo- where, we recall, b l = t l p 2 (t l ). rem 2.. References [ R. Baea-Yates, R. Casas, J. Dia, C. Martine, On the average sie of the intersection of binary trees, SIAM J. Computing, 2, 24-32, 992 [2 M. Bona, P. Flajolet, Isomorphism and symmetries in random phylogenetic trees, Journal of Applied Probability 46(4):5-9. [3 H-H Chern, M. Fernánde-Camacho, H-K. Hwang, and C. Martine, Psi-series method for equality of random trees and quadratic convolution recurrences, Random Structures & Algorithms, 44, 67-8, 22. [4 Yongwook Choi, Wojciech Spankowski: Compression of Graphical Structures: Fundamental Limits, Algorithms, and Experiments. IEEE Transactions on Information Theory, 22, 58(2): [5 M. Drmota, Random Trees: An Interplay between Combinatorics and Probability. Springer Publishing Company, Inc., 29. [6 P. Flajolet, X. Gourdon, and C. Martine, Patterns in random binary search trees, Random Structures & Algorithms,, , 997 [7 M. Hassani, Approximation of the Dilogarithm Function, J. Inequalities in Pure and Applied Mathematics, 8, -7, 27. [8 J. C. Kieffer, E.-H. Yang, W. Spankowski, Structural complexity of random binary trees. ISIT 29, pp

k-protected VERTICES IN BINARY SEARCH TREES

k-protected VERTICES IN BINARY SEARCH TREES k-protected VERTICES IN BINARY SEARCH TREES MIKLÓS BÓNA Abstract. We show that for every k, the probability that a randomly selected vertex of a random binary search tree on n nodes is at distance k from

More information

Applications of Analytic Combinatorics in Mathematical Biology (joint with H. Chang, M. Drmota, E. Y. Jin, and Y.-W. Lee)

Applications of Analytic Combinatorics in Mathematical Biology (joint with H. Chang, M. Drmota, E. Y. Jin, and Y.-W. Lee) Applications of Analytic Combinatorics in Mathematical Biology (joint with H. Chang, M. Drmota, E. Y. Jin, and Y.-W. Lee) Michael Fuchs Department of Applied Mathematics National Chiao Tung University

More information

arxiv: v1 [math.co] 29 Nov 2018

arxiv: v1 [math.co] 29 Nov 2018 ON THE INDUCIBILITY OF SMALL TREES AUDACE A. V. DOSSOU-OLORY AND STEPHAN WAGNER arxiv:1811.1010v1 [math.co] 9 Nov 018 Abstract. The quantity that captures the asymptotic value of the maximum number of

More information

On the parity of the Wiener index

On the parity of the Wiener index On the parity of the Wiener index Stephan Wagner Department of Mathematical Sciences, Stellenbosch University, Stellenbosch 7602, South Africa Hua Wang Department of Mathematics, University of Florida,

More information

The Moments of the Profile in Random Binary Digital Trees

The Moments of the Profile in Random Binary Digital Trees Journal of mathematics and computer science 6(2013)176-190 The Moments of the Profile in Random Binary Digital Trees Ramin Kazemi and Saeid Delavar Department of Statistics, Imam Khomeini International

More information

The Subtree Size Profile of Plane-oriented Recursive Trees

The Subtree Size Profile of Plane-oriented Recursive Trees The Subtree Size Profile of Plane-oriented Recursive Trees Michael Fuchs Department of Applied Mathematics National Chiao Tung University Hsinchu, Taiwan ANALCO11, January 22nd, 2011 Michael Fuchs (NCTU)

More information

Extremal Statistics on Non-Crossing Configurations

Extremal Statistics on Non-Crossing Configurations Extremal Statistics on Non-Crossing Configurations Michael Drmota Anna de Mier Marc Noy Abstract We analye extremal statistics in non-crossing configurations on the n vertices of a convex polygon. We prove

More information

The Subtree Size Profile of Bucket Recursive Trees

The Subtree Size Profile of Bucket Recursive Trees Iranian Journal of Mathematical Sciences and Informatics Vol., No. (206, pp - DOI: 0.7508/ijmsi.206.0.00 The Subtree Size Profile of Bucket Recursive Trees Ramin Kazemi Department of Statistics, Imam Khomeini

More information

Permutations with Inversions

Permutations with Inversions 1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 4 2001, Article 01.2.4 Permutations with Inversions Barbara H. Margolius Cleveland State University Cleveland, Ohio 44115 Email address: b.margolius@csuohio.edu

More information

PROBABILISTIC BEHAVIOR OF ASYMMETRIC LEVEL COMPRESSED TRIES

PROBABILISTIC BEHAVIOR OF ASYMMETRIC LEVEL COMPRESSED TRIES PROBABILISTIC BEAVIOR OF ASYMMETRIC LEVEL COMPRESSED TRIES Luc Devroye Wojcieh Szpankowski School of Computer Science Department of Computer Sciences McGill University Purdue University 3450 University

More information

Distribution of the Number of Encryptions in Revocation Schemes for Stateless Receivers

Distribution of the Number of Encryptions in Revocation Schemes for Stateless Receivers Discrete Mathematics and Theoretical Computer Science DMTCS vol. subm., by the authors, 1 1 Distribution of the Number of Encryptions in Revocation Schemes for Stateless Receivers Christopher Eagle 1 and

More information

Random Boolean expressions

Random Boolean expressions Random Boolean expressions Danièle Gardy PRiSM, Univ. Versailles-Saint Quentin and CNRS UMR 8144. Daniele.Gardy@prism.uvsq.fr We examine how we can define several probability distributions on the set of

More information

PROTECTED NODES AND FRINGE SUBTREES IN SOME RANDOM TREES

PROTECTED NODES AND FRINGE SUBTREES IN SOME RANDOM TREES PROTECTED NODES AND FRINGE SUBTREES IN SOME RANDOM TREES LUC DEVROYE AND SVANTE JANSON Abstract. We study protected nodes in various classes of random rooted trees by putting them in the general context

More information

Combinatorial Enumeration. Jason Z. Gao Carleton University, Ottawa, Canada

Combinatorial Enumeration. Jason Z. Gao Carleton University, Ottawa, Canada Combinatorial Enumeration Jason Z. Gao Carleton University, Ottawa, Canada Counting Combinatorial Structures We are interested in counting combinatorial (discrete) structures of a given size. For example,

More information

Multiple Choice Tries and Distributed Hash Tables

Multiple Choice Tries and Distributed Hash Tables Multiple Choice Tries and Distributed Hash Tables Luc Devroye and Gabor Lugosi and Gahyun Park and W. Szpankowski January 3, 2007 McGill University, Montreal, Canada U. Pompeu Fabra, Barcelona, Spain U.

More information

Notes on Logarithmic Lower Bounds in the Cell Probe Model

Notes on Logarithmic Lower Bounds in the Cell Probe Model Notes on Logarithmic Lower Bounds in the Cell Probe Model Kevin Zatloukal November 10, 2010 1 Overview Paper is by Mihai Pâtraşcu and Erik Demaine. Both were at MIT at the time. (Mihai is now at AT&T Labs.)

More information

Almost all trees have an even number of independent sets

Almost all trees have an even number of independent sets Almost all trees have an even number of independent sets Stephan G. Wagner Department of Mathematical Sciences Stellenbosch University Private Bag X1, Matieland 7602, South Africa swagner@sun.ac.za Submitted:

More information

Random Boolean expressions

Random Boolean expressions Computational Logic and Applications, CLA 05 DMTCS proc. AF, 2006, 1 36 Random Boolean expressions Danièle Gardy PRiSM, Univ. Versailles-Saint Quentin and CNRS UMR 8144. Daniele.Gardy@prism.uvsq.fr We

More information

LECTURE 7. 2 Simple trees and Lagrange Inversion Restricting the out-degree Lagrange Inversion... 4

LECTURE 7. 2 Simple trees and Lagrange Inversion Restricting the out-degree Lagrange Inversion... 4 Contents 1 Recursive specifications 1 1.1 Binary Trees B............................................ 1 1.1.1 A recursive structure.................................... 1.1. Decomposition........................................

More information

Probabilities on cladograms: introduction to the alpha model

Probabilities on cladograms: introduction to the alpha model arxiv:math/0511246v1 [math.pr] 9 Nov 2005 Probabilities on cladograms: introduction to the alpha model Daniel J. Ford Abstract This report introduces the alpha model. The alpha model is a one parameter

More information

Gap Embedding for Well-Quasi-Orderings 1

Gap Embedding for Well-Quasi-Orderings 1 WoLLIC 2003 Preliminary Version Gap Embedding for Well-Quasi-Orderings 1 Nachum Dershowitz 2 and Iddo Tzameret 3 School of Computer Science, Tel-Aviv University, Tel-Aviv 69978, Israel Abstract Given a

More information

A simple branching process approach to the phase transition in G n,p

A simple branching process approach to the phase transition in G n,p A simple branching process approach to the phase transition in G n,p Béla Bollobás Department of Pure Mathematics and Mathematical Statistics Wilberforce Road, Cambridge CB3 0WB, UK b.bollobas@dpmms.cam.ac.uk

More information

Tree Decomposition of Graphs

Tree Decomposition of Graphs Tree Decomposition of Graphs Raphael Yuster Department of Mathematics University of Haifa-ORANIM Tivon 36006, Israel. e-mail: raphy@math.tau.ac.il Abstract Let H be a tree on h 2 vertices. It is shown

More information

Fighting Fish: enumerative properties. Enrica Duchi. Veronica Guerrini & Simone Rinaldi DIISM, Università di Siena.

Fighting Fish: enumerative properties. Enrica Duchi. Veronica Guerrini & Simone Rinaldi DIISM, Università di Siena. Fighting Fish: enumerative properties Enrica Duchi IRIF, Université Paris Diderot Veronica Guerrini & Simone Rinaldi DIISM, Università di Siena Gilles Schaeffer LIX, CNRS and École Polytechnique Séminaire

More information

Maximum Agreement Subtrees

Maximum Agreement Subtrees Maximum Agreement Subtrees Seth Sullivant North Carolina State University March 24, 2018 Seth Sullivant (NCSU) Maximum Agreement Subtrees March 24, 2018 1 / 23 Phylogenetics Problem Given a collection

More information

On the Turán number of forests

On the Turán number of forests On the Turán number of forests Bernard Lidický Hong Liu Cory Palmer April 13, 01 Abstract The Turán number of a graph H, ex(n, H, is the maximum number of edges in a graph on n vertices which does not

More information

Probabilistic analysis of the asymmetric digital search trees

Probabilistic analysis of the asymmetric digital search trees Int. J. Nonlinear Anal. Appl. 6 2015 No. 2, 161-173 ISSN: 2008-6822 electronic http://dx.doi.org/10.22075/ijnaa.2015.266 Probabilistic analysis of the asymmetric digital search trees R. Kazemi a,, M. Q.

More information

Compact Suffix Trees Resemble Patricia Tries: Limiting Distribution of Depth

Compact Suffix Trees Resemble Patricia Tries: Limiting Distribution of Depth Purdue University Purdue e-pubs Department of Computer Science Technical Reports Department of Computer Science 1992 Compact Suffix Trees Resemble Patricia Tries: Limiting Distribution of Depth Philippe

More information

An Algebraic View of the Relation between Largest Common Subtrees and Smallest Common Supertrees

An Algebraic View of the Relation between Largest Common Subtrees and Smallest Common Supertrees An Algebraic View of the Relation between Largest Common Subtrees and Smallest Common Supertrees Francesc Rosselló 1, Gabriel Valiente 2 1 Department of Mathematics and Computer Science, Research Institute

More information

Legendre s Equation. PHYS Southern Illinois University. October 18, 2016

Legendre s Equation. PHYS Southern Illinois University. October 18, 2016 Legendre s Equation PHYS 500 - Southern Illinois University October 18, 2016 PHYS 500 - Southern Illinois University Legendre s Equation October 18, 2016 1 / 11 Legendre s Equation Recall We are trying

More information

Notes by Zvi Rosen. Thanks to Alyssa Palfreyman for supplements.

Notes by Zvi Rosen. Thanks to Alyssa Palfreyman for supplements. Lecture: Hélène Barcelo Analytic Combinatorics ECCO 202, Bogotá Notes by Zvi Rosen. Thanks to Alyssa Palfreyman for supplements.. Tuesday, June 2, 202 Combinatorics is the study of finite structures that

More information

Optimal computation of symmetric Boolean functions in Tree networks

Optimal computation of symmetric Boolean functions in Tree networks Optimal computation of symmetric Boolean functions in Tree networks Hemant Kowshik CSL and Department of ECE University of Illinois Urbana-Champaign Email: kowshik2@illinoisedu P R Kumar CSL and Department

More information

Almost giant clusters for percolation on large trees

Almost giant clusters for percolation on large trees for percolation on large trees Institut für Mathematik Universität Zürich Erdős-Rényi random graph model in supercritical regime G n = complete graph with n vertices Bond percolation with parameter p(n)

More information

Analytic Information Theory: From Shannon to Knuth and Back. Knuth80: Piteaa, Sweden, 2018 Dedicated to Don E. Knuth

Analytic Information Theory: From Shannon to Knuth and Back. Knuth80: Piteaa, Sweden, 2018 Dedicated to Don E. Knuth Analytic Information Theory: From Shannon to Knuth and Back Wojciech Szpankowski Center for Science of Information Purdue University January 7, 2018 Knuth80: Piteaa, Sweden, 2018 Dedicated to Don E. Knuth

More information

On the Average Path Length of Complete m-ary Trees

On the Average Path Length of Complete m-ary Trees 1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 17 2014, Article 14.6.3 On the Average Path Length of Complete m-ary Trees M. A. Nyblom School of Mathematics and Geospatial Science RMIT University

More information

The space requirement of m-ary search trees: distributional asymptotics for m 27

The space requirement of m-ary search trees: distributional asymptotics for m 27 1 The space requirement of m-ary search trees: distributional asymptotics for m 7 James Allen Fill 1 and Nevin Kapur 1 Applied Mathematics and Statistics, The Johns Hopkins University, 3400 N. Charles

More information

A Note on a Problem Posed by D. E. Knuth on a Satisfiability Recurrence

A Note on a Problem Posed by D. E. Knuth on a Satisfiability Recurrence A Note on a Problem Posed by D. E. Knuth on a Satisfiability Recurrence Dedicated to Philippe Flajolet 1948-2011 July 4, 2013 Philippe Jacquet Charles Knessl 1 Wojciech Szpankowski 2 Bell Labs Dept. Math.

More information

THE NUMBER OF INDEPENDENT DOMINATING SETS OF LABELED TREES. Changwoo Lee. 1. Introduction

THE NUMBER OF INDEPENDENT DOMINATING SETS OF LABELED TREES. Changwoo Lee. 1. Introduction Commun. Korean Math. Soc. 18 (2003), No. 1, pp. 181 192 THE NUMBER OF INDEPENDENT DOMINATING SETS OF LABELED TREES Changwoo Lee Abstract. We count the numbers of independent dominating sets of rooted labeled

More information

Chapter 11. Min Cut Min Cut Problem Definition Some Definitions. By Sariel Har-Peled, December 10, Version: 1.

Chapter 11. Min Cut Min Cut Problem Definition Some Definitions. By Sariel Har-Peled, December 10, Version: 1. Chapter 11 Min Cut By Sariel Har-Peled, December 10, 013 1 Version: 1.0 I built on the sand And it tumbled down, I built on a rock And it tumbled down. Now when I build, I shall begin With the smoke from

More information

q-counting hypercubes in Lucas cubes

q-counting hypercubes in Lucas cubes Turkish Journal of Mathematics http:// journals. tubitak. gov. tr/ math/ Research Article Turk J Math (2018) 42: 190 203 c TÜBİTAK doi:10.3906/mat-1605-2 q-counting hypercubes in Lucas cubes Elif SAYGI

More information

On the number of matchings of a tree.

On the number of matchings of a tree. On the number of matchings of a tree. Stephan G. Wagner Department of Mathematics, Graz University of Technology, Steyrergasse 30, A-800 Graz, Austria Abstract In a paper of Klazar, several counting examples

More information

Assignment 5: Solutions

Assignment 5: Solutions Comp 21: Algorithms and Data Structures Assignment : Solutions 1. Heaps. (a) First we remove the minimum key 1 (which we know is located at the root of the heap). We then replace it by the key in the position

More information

Partitioning Metric Spaces

Partitioning Metric Spaces Partitioning Metric Spaces Computational and Metric Geometry Instructor: Yury Makarychev 1 Multiway Cut Problem 1.1 Preliminaries Definition 1.1. We are given a graph G = (V, E) and a set of terminals

More information

Lecture 17: Trees and Merge Sort 10:00 AM, Oct 15, 2018

Lecture 17: Trees and Merge Sort 10:00 AM, Oct 15, 2018 CS17 Integrated Introduction to Computer Science Klein Contents Lecture 17: Trees and Merge Sort 10:00 AM, Oct 15, 2018 1 Tree definitions 1 2 Analysis of mergesort using a binary tree 1 3 Analysis of

More information

Symmetries in the Entropy Space

Symmetries in the Entropy Space Symmetries in the Entropy Space Jayant Apte, Qi Chen, John MacLaren Walsh Abstract This paper investigates when Shannon-type inequalities completely characterize the part of the closure of the entropy

More information

On the Average Complexity of Brzozowski s Algorithm for Deterministic Automata with a Small Number of Final States

On the Average Complexity of Brzozowski s Algorithm for Deterministic Automata with a Small Number of Final States On the Average Complexity of Brzozowski s Algorithm for Deterministic Automata with a Small Number of Final States Sven De Felice 1 and Cyril Nicaud 2 1 LIAFA, Université Paris Diderot - Paris 7 & CNRS

More information

Embedding the Erdős-Rényi Hypergraph into the Random Regular Hypergraph and Hamiltonicity

Embedding the Erdős-Rényi Hypergraph into the Random Regular Hypergraph and Hamiltonicity Embedding the Erdős-Rényi Hypergraph into the Random Regular Hypergraph and Hamiltonicity ANDRZEJ DUDEK 1 ALAN FRIEZE 2 ANDRZEJ RUCIŃSKI3 MATAS ŠILEIKIS4 1 Department of Mathematics, Western Michigan University,

More information

How many randomly colored edges make a randomly colored dense graph rainbow hamiltonian or rainbow connected?

How many randomly colored edges make a randomly colored dense graph rainbow hamiltonian or rainbow connected? How many randomly colored edges make a randomly colored dense graph rainbow hamiltonian or rainbow connected? Michael Anastos and Alan Frieze February 1, 2018 Abstract In this paper we study the randomly

More information

Protected nodes and fringe subtrees in some random trees

Protected nodes and fringe subtrees in some random trees Electron. Commun. Probab. 19 (214), no. 6, 1 1. DOI: 1.1214/ECP.v19-348 ISSN: 183-589X ELECTRONIC COMMUNICATIONS in PROBABILITY Protected nodes and fringe subtrees in some random trees Luc Devroye Svante

More information

3. Generating Functions

3. Generating Functions ANALYTIC COMBINATORICS P A R T O N E 3. Generating Functions http://aofa.cs.princeton.edu ANALYTIC COMBINATORICS P A R T O N E 3. Generating Functions OF OGFs Solving recurrences Catalan numbers EGFs Counting

More information

1.2. Functions and Their Properties. Copyright 2011 Pearson, Inc.

1.2. Functions and Their Properties. Copyright 2011 Pearson, Inc. 1.2 Functions and Their Properties Copyright 2011 Pearson, Inc. What you ll learn about Function Definition and Notation Domain and Range Continuity Increasing and Decreasing Functions Boundedness Local

More information

Information Theory of Random Trees Induced by Stochastic Grammars

Information Theory of Random Trees Induced by Stochastic Grammars Information Theory of Random Trees Induced by Stochastic Grammars A DISSERTATION SUBMITTED TO THE FACULTY OF THE GRADUATE SCHOOL OF THE UNIVERSITY OF MINNESOTA BY Sang youn Oh IN PARTIAL FULFILLMENT OF

More information

Packing and decomposition of graphs with trees

Packing and decomposition of graphs with trees Packing and decomposition of graphs with trees Raphael Yuster Department of Mathematics University of Haifa-ORANIM Tivon 36006, Israel. e-mail: raphy@math.tau.ac.il Abstract Let H be a tree on h 2 vertices.

More information

Randomized Algorithms III Min Cut

Randomized Algorithms III Min Cut Chapter 11 Randomized Algorithms III Min Cut CS 57: Algorithms, Fall 01 October 1, 01 11.1 Min Cut 11.1.1 Problem Definition 11. Min cut 11..0.1 Min cut G = V, E): undirected graph, n vertices, m edges.

More information

CENTRAL LIMIT THEOREMS FOR ADDITIVE TREE PARAMETERS

CENTRAL LIMIT THEOREMS FOR ADDITIVE TREE PARAMETERS CENRAL LIMI HEOREMS FOR ADDIIVE REE PARAMEERS SEPHAN WAGNER DEDICAED O HE MEMORY OF PHILIPPE FLAJOLE Abstract. We call a tree parameter additive if it can be determined recursively as the sum of the parameter

More information

Greedy Trees, Caterpillars, and Wiener-Type Graph Invariants

Greedy Trees, Caterpillars, and Wiener-Type Graph Invariants Georgia Southern University Digital Commons@Georgia Southern Mathematical Sciences Faculty Publications Mathematical Sciences, Department of 2012 Greedy Trees, Caterpillars, and Wiener-Type Graph Invariants

More information

The concentration of the chromatic number of random graphs

The concentration of the chromatic number of random graphs The concentration of the chromatic number of random graphs Noga Alon Michael Krivelevich Abstract We prove that for every constant δ > 0 the chromatic number of the random graph G(n, p) with p = n 1/2

More information

A fast algorithm to generate necklaces with xed content

A fast algorithm to generate necklaces with xed content Theoretical Computer Science 301 (003) 477 489 www.elsevier.com/locate/tcs Note A fast algorithm to generate necklaces with xed content Joe Sawada 1 Department of Computer Science, University of Toronto,

More information

Lecture 5: February 21, 2017

Lecture 5: February 21, 2017 COMS 6998: Advanced Complexity Spring 2017 Lecture 5: February 21, 2017 Lecturer: Rocco Servedio Scribe: Diana Yin 1 Introduction 1.1 Last Time 1. Established the exact correspondence between communication

More information

are the q-versions of n, n! and . The falling factorial is (x) k = x(x 1)(x 2)... (x k + 1).

are the q-versions of n, n! and . The falling factorial is (x) k = x(x 1)(x 2)... (x k + 1). Lecture A jacques@ucsd.edu Notation: N, R, Z, F, C naturals, reals, integers, a field, complex numbers. p(n), S n,, b(n), s n, partition numbers, Stirling of the second ind, Bell numbers, Stirling of the

More information

PROBABILITY VITTORIA SILVESTRI

PROBABILITY VITTORIA SILVESTRI PROBABILITY VITTORIA SILVESTRI Contents Preface. Introduction 2 2. Combinatorial analysis 5 3. Stirling s formula 8 4. Properties of Probability measures Preface These lecture notes are for the course

More information

arxiv: v1 [math.co] 24 Apr 2014

arxiv: v1 [math.co] 24 Apr 2014 On sets of integers with restrictions on their products Michael Tait, Jacques Verstraëte Department of Mathematics University of California at San Diego 9500 Gilman Drive, La Jolla, California 9093-011,

More information

Unlabelled Structures: Restricted Constructions

Unlabelled Structures: Restricted Constructions Gao & Šana, Combinatorial Enumeration Notes 5 Unlabelled Structures: Restricted Constructions Let SEQ k (B denote the set of sequences of exactly k elements from B, and SEQ k (B denote the set of sequences

More information

HAMILTON CYCLES IN RANDOM REGULAR DIGRAPHS

HAMILTON CYCLES IN RANDOM REGULAR DIGRAPHS HAMILTON CYCLES IN RANDOM REGULAR DIGRAPHS Colin Cooper School of Mathematical Sciences, Polytechnic of North London, London, U.K. and Alan Frieze and Michael Molloy Department of Mathematics, Carnegie-Mellon

More information

Lecture 6. Today we shall use graph entropy to improve the obvious lower bound on good hash functions.

Lecture 6. Today we shall use graph entropy to improve the obvious lower bound on good hash functions. CSE533: Information Theory in Computer Science September 8, 010 Lecturer: Anup Rao Lecture 6 Scribe: Lukas Svec 1 A lower bound for perfect hash functions Today we shall use graph entropy to improve the

More information

List coloring hypergraphs

List coloring hypergraphs List coloring hypergraphs Penny Haxell Jacques Verstraete Department of Combinatorics and Optimization University of Waterloo Waterloo, Ontario, Canada pehaxell@uwaterloo.ca Department of Mathematics University

More information

arxiv: v1 [math.co] 12 Oct 2018

arxiv: v1 [math.co] 12 Oct 2018 Uniform random posets Patryk Kozieł Małgorzata Sulkowska arxiv:1810.05446v1 [math.co] 12 Oct 2018 October 15, 2018 Abstract We propose a simple algorithm generating labelled posets of given size according

More information

COS597D: Information Theory in Computer Science October 5, Lecture 6

COS597D: Information Theory in Computer Science October 5, Lecture 6 COS597D: Information Theory in Computer Science October 5, 2011 Lecture 6 Lecturer: Mark Braverman Scribe: Yonatan Naamad 1 A lower bound for perfect hash families. In the previous lecture, we saw that

More information

GENERATING FUNCTIONS AND CENTRAL LIMIT THEOREMS

GENERATING FUNCTIONS AND CENTRAL LIMIT THEOREMS GENERATING FUNCTIONS AND CENTRAL LIMIT THEOREMS Michael Drmota Institute of Discrete Mathematics and Geometry Vienna University of Technology A 1040 Wien, Austria michael.drmota@tuwien.ac.at http://www.dmg.tuwien.ac.at/drmota/

More information

Radio Number for Square of Cycles

Radio Number for Square of Cycles Radio Number for Square of Cycles Daphne Der-Fen Liu Melanie Xie Department of Mathematics California State University, Los Angeles Los Angeles, CA 9003, USA August 30, 00 Abstract Let G be a connected

More information

Generating Functions

Generating Functions Semester 1, 2004 Generating functions Another means of organising enumeration. Two examples we have seen already. Example 1. Binomial coefficients. Let X = {1, 2,..., n} c k = # k-element subsets of X

More information

The Lefthanded Local Lemma characterizes chordal dependency graphs

The Lefthanded Local Lemma characterizes chordal dependency graphs The Lefthanded Local Lemma characterizes chordal dependency graphs Wesley Pegden March 30, 2012 Abstract Shearer gave a general theorem characterizing the family L of dependency graphs labeled with probabilities

More information

Math 259: Introduction to Analytic Number Theory Functions of finite order: product formula and logarithmic derivative

Math 259: Introduction to Analytic Number Theory Functions of finite order: product formula and logarithmic derivative Math 259: Introduction to Analytic Number Theory Functions of finite order: product formula and logarithmic derivative This chapter is another review of standard material in complex analysis. See for instance

More information

RECOVERING NORMAL NETWORKS FROM SHORTEST INTER-TAXA DISTANCE INFORMATION

RECOVERING NORMAL NETWORKS FROM SHORTEST INTER-TAXA DISTANCE INFORMATION RECOVERING NORMAL NETWORKS FROM SHORTEST INTER-TAXA DISTANCE INFORMATION MAGNUS BORDEWICH, KATHARINA T. HUBER, VINCENT MOULTON, AND CHARLES SEMPLE Abstract. Phylogenetic networks are a type of leaf-labelled,

More information

Counting Markov Types

Counting Markov Types Counting Markov Types Philippe Jacquet, Charles Knessl, Wojciech Szpankowski To cite this version: Philippe Jacquet, Charles Knessl, Wojciech Szpankowski. Counting Markov Types. Drmota, Michael and Gittenberger,

More information

Finite Metric Spaces & Their Embeddings: Introduction and Basic Tools

Finite Metric Spaces & Their Embeddings: Introduction and Basic Tools Finite Metric Spaces & Their Embeddings: Introduction and Basic Tools Manor Mendel, CMI, Caltech 1 Finite Metric Spaces Definition of (semi) metric. (M, ρ): M a (finite) set of points. ρ a distance function

More information

Free Energy Rates for Parameter Rich Optimization Problems

Free Energy Rates for Parameter Rich Optimization Problems Free Energy Rates for Parameter Rich Optimization Problems Joachim M. Buhmann 1, Julien Dumazert 1, Alexey Gronskiy 1, Wojciech Szpankowski 2 1 ETH Zurich, {jbuhmann, alexeygr}@inf.ethz.ch, julien.dumazert@gmail.com,

More information

Lecture 20: Lagrange Interpolation and Neville s Algorithm. for I will pass through thee, saith the LORD. Amos 5:17

Lecture 20: Lagrange Interpolation and Neville s Algorithm. for I will pass through thee, saith the LORD. Amos 5:17 Lecture 20: Lagrange Interpolation and Neville s Algorithm for I will pass through thee, saith the LORD. Amos 5:17 1. Introduction Perhaps the easiest way to describe a shape is to select some points on

More information

Average Case Analysis of QuickSort and Insertion Tree Height using Incompressibility

Average Case Analysis of QuickSort and Insertion Tree Height using Incompressibility Average Case Analysis of QuickSort and Insertion Tree Height using Incompressibility Tao Jiang, Ming Li, Brendan Lucier September 26, 2005 Abstract In this paper we study the Kolmogorov Complexity of a

More information

Excluded permutation matrices and the Stanley Wilf conjecture

Excluded permutation matrices and the Stanley Wilf conjecture Excluded permutation matrices and the Stanley Wilf conjecture Adam Marcus Gábor Tardos November 2003 Abstract This paper examines the extremal problem of how many 1-entries an n n 0 1 matrix can have that

More information

Asymmetry and Structural Information in Preferential Attachment Graphs

Asymmetry and Structural Information in Preferential Attachment Graphs Asymmetry and Structural Information in Preferential Attachment Graphs May 31, 2017 Tomasz Luczak Abram Magner Wojciech Szpankowski Faculty of Math. & Comp. Sci. Coordinated Science Lab Dept.Computer Science

More information

Remarks on a Ramsey theory for trees

Remarks on a Ramsey theory for trees Remarks on a Ramsey theory for trees János Pach EPFL, Lausanne and Rényi Institute, Budapest József Solymosi University of British Columbia, Vancouver Gábor Tardos Simon Fraser University and Rényi Institute,

More information

Module 4: Equations and Inequalities in One Variable

Module 4: Equations and Inequalities in One Variable Module 1: Relationships between quantities Precision- The level of detail of a measurement, determined by the unit of measure. Dimensional Analysis- A process that uses rates to convert measurements from

More information

MAXIMAL CLADES IN RANDOM BINARY SEARCH TREES

MAXIMAL CLADES IN RANDOM BINARY SEARCH TREES MAXIMAL CLADES IN RANDOM BINARY SEARCH TREES SVANTE JANSON Abstract. We study maximal clades in random phylogenetic trees with the Yule Harding model or, equivalently, in binary search trees. We use probabilistic

More information

THE DEGREE DISTRIBUTION OF RANDOM PLANAR GRAPHS

THE DEGREE DISTRIBUTION OF RANDOM PLANAR GRAPHS THE DEGREE DISTRIBUTION OF RANDOM PLANAR GRAPHS Michael Drmota joint work with Omer Giménez and Marc Noy Institut für Diskrete Mathematik und Geometrie TU Wien michael.drmota@tuwien.ac.at http://www.dmg.tuwien.ac.at/drmota/

More information

arxiv: v1 [cs.cc] 9 Oct 2014

arxiv: v1 [cs.cc] 9 Oct 2014 Satisfying ternary permutation constraints by multiple linear orders or phylogenetic trees Leo van Iersel, Steven Kelk, Nela Lekić, Simone Linz May 7, 08 arxiv:40.7v [cs.cc] 9 Oct 04 Abstract A ternary

More information

An alternative proof of the Barker, Berman, Plemmons (BBP) result on diagonal stability and extensions - Corrected Version

An alternative proof of the Barker, Berman, Plemmons (BBP) result on diagonal stability and extensions - Corrected Version 1 An alternative proof of the Barker, Berman, Plemmons (BBP) result on diagonal stability and extensions - Corrected Version Robert Shorten 1, Oliver Mason 1 and Christopher King 2 Abstract The original

More information

The memory centre IMUJ PREPRINT 2012/03. P. Spurek

The memory centre IMUJ PREPRINT 2012/03. P. Spurek The memory centre IMUJ PREPRINT 202/03 P. Spurek Faculty of Mathematics and Computer Science, Jagiellonian University, Łojasiewicza 6, 30-348 Kraków, Poland J. Tabor Faculty of Mathematics and Computer

More information

CS383, Algorithms Spring 2009 HW1 Solutions

CS383, Algorithms Spring 2009 HW1 Solutions Prof. Sergio A. Alvarez http://www.cs.bc.edu/ alvarez/ 21 Campanella Way, room 569 alvarez@cs.bc.edu Computer Science Department voice: (617) 552-4333 Boston College fax: (617) 552-6790 Chestnut Hill,

More information

Network Augmentation and the Multigraph Conjecture

Network Augmentation and the Multigraph Conjecture Network Augmentation and the Multigraph Conjecture Nathan Kahl Department of Mathematical Sciences Stevens Institute of Technology Hoboken, NJ 07030 e-mail: nkahl@stevens-tech.edu Abstract Let Γ(n, m)

More information

An Improved Approximation Algorithm for Requirement Cut

An Improved Approximation Algorithm for Requirement Cut An Improved Approximation Algorithm for Requirement Cut Anupam Gupta Viswanath Nagarajan R. Ravi Abstract This note presents improved approximation guarantees for the requirement cut problem: given an

More information

arxiv: v1 [q-bio.pe] 1 Jun 2014

arxiv: v1 [q-bio.pe] 1 Jun 2014 THE MOST PARSIMONIOUS TREE FOR RANDOM DATA MAREIKE FISCHER, MICHELLE GALLA, LINA HERBST AND MIKE STEEL arxiv:46.27v [q-bio.pe] Jun 24 Abstract. Applying a method to reconstruct a phylogenetic tree from

More information

The Generalization of Quicksort

The Generalization of Quicksort The Generalization of Quicksort Shyue-Horng Shiau Chang-Biau Yang Ý Department of Computer Science and Engineering National Sun Yat-Sen University Kaohsiung, Taiwan 804, Republic of China shiaush@cse.nsysu.edu.tw

More information

Random trees and branching processes

Random trees and branching processes Random trees and branching processes Svante Janson IMS Medallion Lecture 12 th Vilnius Conference and 2018 IMS Annual Meeting Vilnius, 5 July, 2018 Part I. Galton Watson trees Let ξ be a random variable

More information

Analysis of Algorithm Efficiency. Dr. Yingwu Zhu

Analysis of Algorithm Efficiency. Dr. Yingwu Zhu Analysis of Algorithm Efficiency Dr. Yingwu Zhu Measure Algorithm Efficiency Time efficiency How fast the algorithm runs; amount of time required to accomplish the task Our focus! Space efficiency Amount

More information

The Number of Guillotine Partitions in d Dimensions

The Number of Guillotine Partitions in d Dimensions The Number of Guillotine Partitions in d Dimensions Eyal Ackerman Gill Barequet Ron Y. Pinter Dan Romik Abstract Guillotine partitions play an important role in many research areas and application domains,

More information

Asymptotically Optimal Tree-based Group Key Management Schemes

Asymptotically Optimal Tree-based Group Key Management Schemes Asymptotically Optimal Tree-based Group Key Management chemes Hideyuki akai Hitachi, Ltd., ystems Development Laboratory Asao-ku, Kawasaki-shi, Kanagawa 215 0013, Japan ariv:cs/0507001v1 [cs.it] 1 Jul

More information

arxiv: v2 [cs.ds] 3 Oct 2017

arxiv: v2 [cs.ds] 3 Oct 2017 Orthogonal Vectors Indexing Isaac Goldstein 1, Moshe Lewenstein 1, and Ely Porat 1 1 Bar-Ilan University, Ramat Gan, Israel {goldshi,moshe,porately}@cs.biu.ac.il arxiv:1710.00586v2 [cs.ds] 3 Oct 2017 Abstract

More information

A Master Theorem for Discrete Divide and Conquer Recurrences

A Master Theorem for Discrete Divide and Conquer Recurrences A Master Theorem for Discrete Divide and Conquer Recurrences MICHAEL DRMOTA and WOJCIECH SZPANKOWSKI TU Wien and Purdue University Divide-and-conquer recurrences are one of the most studied equations in

More information

ACO Comprehensive Exam 19 March Graph Theory

ACO Comprehensive Exam 19 March Graph Theory 1. Graph Theory Let G be a connected simple graph that is not a cycle and is not complete. Prove that there exist distinct non-adjacent vertices u, v V (G) such that the graph obtained from G by deleting

More information