On Codings of Traces

Size: px
Start display at page:

Download "On Codings of Traces"

Transcription

1 On Codings of Traces Extended Abstract Volker Diekert Anca Muscholl Klaus Reinhardt Institut für Inforatik, Universität Stuttgart Breitwiesenstr , D Stuttgart e-ail: Abstract. The paper solves the ain open proble of [BFG94]. We show that given two dependence alphabets (Σ, D) and (Σ, D ), it is decidable whether there exists a strong coding h : M(Σ, D) M(Σ, D ) between the associated trace onoids. In fact, we show that the proble is NP-coplete. (A coding is an injective hooorphis, it is strong if independent letters are apped to independent traces.) We exhibit an exaple of trace onoids where a coding between the exists, but no strong coding. The decidability of codings reains open, in general. We have a lower and an upper bound, which show both to be strict. We further discuss encodings of free products of trace onoids and give alost optial constructions. In the final section, we state that the coding property is undecidable in a naturally arising class of hooorphiss. Topics: Foral languages, concurrency. 1 Introduction The theory of traces has been recognized as an iportant tool for investigations about concurrent systes, see [DR95]. The origins of the theory go back to the work of Mazurkiewicz (trace theory), Karp/Miller, Keller (parallel progra scheata), and Cartier/Foata (cobinatorics), see [Maz87, Kel73, CF69]. Traces are of particular interest for a description of concurrent processes, since for any algoriths one can obtain coplexity bounds, which are close to the corresponding algoriths on words, e.g. test of equality [AG91], pattern atching [HY92], or word probles [Die89, Die90]. A convenient data structure for these algoriths is a representation of traces as a tuple of words. This is nothing but a coding of a trace onoid in a direct product of free onoids and leads to the general proble to find codings between trace onoids. This question has been raised by Ochański in [Och88] and reconsidered recently by Bruyère et al. in [BFG94] (see also [BF95] in this volue). A natural class of codings of trace onoids is given by strong codings. These are injective hooorphiss This research has been supported by the ESPRIT Basic Research Action No ASMICS 2, Algebraic and Syntactic Methods In Coputer Science.

2 such that independent letters are apped to independent traces (siilar to a refineent of actions in a concurrent syste). The ain result of [BFG94] is the decidability of the existence of a strong coding for two large failies of trace onoids, but the authors left open the general proble: given two trace onoids M(Σ, D) and M(Σ, D ), is it decidable whether there exists a strong coding of one into the other. The ain result of the present paper solves this proble. We give a graph theoretical criterion for the existence of a strong coding thereby showing its NP-copleteness, see Th. 9. The paper contains several other results. As entioned above, fro the viewpoint of applications, the ost iportant codings are those into a direct product of free onoids. Again, there is a characterization for strong codings, which is directly related to a covering by cliques and which shows the NP-copleteness of this restricted proble, too. Much less is known if we consider codings (i.e., injective hooorphiss), instead of strong codings. For certain dependence alphabets we are able to copute the least k for the existence of an encoding of the trace onoid into a k-fold direct product (e.g., the path and the cycle of n vertices). We show that if the dependence alphabet is a cycle of four vertices, then the associated trace onoid has a coding into a direct product of free onoids with two coponents, whereas at least four are needed for a strong coding. The existence of a coding between trace onoids is NP-hard, but we even do not know its decidability in the restricted case where the second onoid is a direct product of free onoids. We have a lower bound for the inial nuber of coponents we need by the size of a axial independent set and an upper bound by the nuber of cliques which are needed to cover all vertices and edges. The exact value reains unknown. We give an exaple of a dependence alphabet (which is in fact a cograph), where both the lower and the upper bounds are strict. Finally, we give alost optial constructions for encoding free products of trace onoids into direct products of free onoids. The results can be used for encoding efficiently trace onoids with a cograph dependence alphabet. In the final section we reconsider the well-known result on the undecidability of whether a given hooorphis of trace onoids is a coding. The proof [HC72, CR87] uses a reduction of the Post correspondence proble, and it does not apply to restricted classes of hooorphiss. In this paper we start with a so-called strict orphis between independence alphabets. These orphiss induce in a canonical way hooorphiss between the associated trace onoids. (The hooorphis of the Projection Lea is of this kind.) Th. 22 states that the coding property for this natural class of hooorphiss is undecidable. 2 Notations and Preliinaries A dependence alphabet is a pair (Σ, D), where Σ is a finite alphabet and D Σ Σ is a reflexive and syetric relation, called dependence relation. The copleent I = (Σ Σ) \ D is called independence relation; it is irreflexive and syetric. The pair (Σ, I) is denoted independence alphabet. We view

3 both (Σ, D) and (Σ, I) as undirected graphs. The difference is that (Σ, D) has self-loops (which however will be oitted in pictures). An undirected graph is siply a pair (V, E), where E V V is a syetric relation. We use the following basic operations on graphs: copleentation (V, E) = (V, (V V )\E), disjoint union (V 1, E 1 ) (V 2, E 2 ) = (V 1 V2, E 1 E2 ), and coplex product (V 1, E 1 ) (V 2, E 2 ) = (V 1 V2, E 1 E2 (V1 V 2 ) (V 2 V 1 )). (The sallest faily of graphs containing the one-point graphs which is closed under these operations is the faily of cographs, see e.g. [CLB81, CPS85].) Given a dependence alphabet (Σ, D) (or an independence alphabet (Σ, I) resp.) we associate the trace onoid M(Σ, D). This is the quotient onoid Σ /{ab = ba (a, b) I}; an eleent t M(Σ, D) is called a trace, the length t of a trace t is given by the length of any representing word. By alph(t) we denote the alphabet of a trace t, which is the set of letters occurring in t. The initial alphabet of t is the set in(t) = {x Σ t : t = xt }. By 1 we denote both the epty word and the epty trace. Traces s, t M(Σ, D) are called independent, if alph(s) alph(t) I. We siply write (s, t) I in this case. A trace t 1 is called a root, if t = u n iplies n = 1, for every u. A trace t is called connected, if alph(t) induces a connected subgraph of the dependence alphabet (Σ, D). The constructions disjoint union and coplex product resp., on dependence alphabets correspond to the direct product and the free product (= direct su in the category of onoids) resp., for the associated trace onoids. Thus, we have M((Σ 1, D 1 ) (Σ 2, D 2 )) = M(Σ 1, D 1 ) M(Σ 2, D 2 ) and M((Σ 1, D 1 ) (Σ 2, D 2 )) = M(Σ 1, D 1 ) M(Σ 2, D 2 ). The situation for independence alphabets is dual. Let Σ Σ be a subalphabet and D = (Σ Σ ) D the induced dependence relation. The canonical projection π Σ : M(Σ, D) M(Σ, D ) is induced by π Σ (a) = a, if a Σ and π Σ (a) = 1 otherwise. Consider (Σ, D) written as a union of cliques, i.e., (Σ, D) = ( k i=1 Σ i, k i=1 Σ i Σ i ). Then we have the following well-known Projection Lea: Proposition 1 [CL85, CP85]. Let (Σ, D) = ( k i=1 Σ i, k i=1 Σ i Σ i ). Then the canonical hooorphis is injective. k π : M(Σ, D) Σ i, i=1 t (π Σi (t)) 1 i k In the following a hooorphis h : M(Σ, D) M(Σ, D ) is called a coding, if it is injective. It is called a strong hooorphis, if independent letters are apped to independent traces, i.e., if (a, b) I iplies (h(a), h(b)) I for all a, b Σ. Of particular interest are strong codings, a notion which has been introduced in [BFG94]. The next proposition belongs probably to folklore: Proposition 2. Let (Σ, D) be a dependence alphabet and k 1. The following assertions are equivalent:

4 1. The dependence alphabet (Σ, D) contains an independent set of size k. 2. There exists a strong coding h : IN k M(Σ, D). 3. There exists a coding h : IN k M(Σ, D). Proof. Since the iplications 1) 2) 3) are obvious, we show 3) 1). Let {a 1,..., a k } be a set of generators of IN k and let t i = h(a i ), 1 i k. By a result of Duboc [Dub86] the equations t i t j = t j t i (1 i j k) yield the existence of pairwise independent, connected roots x 1,..., x l, together with nonnegative integers n ij (1 i k, 1 j l) such that t i = x n i1 1 x n il l for 1 i k. The set of roots {x 1,..., x l } generates a coutative subonoid of M(Σ, D), and the coding factorizes as h : IN k IN l M(Σ, D). With h being injective we have k l by linear algebra. Finally, it suffices to choose soe letter b i alph(x i ), 1 i l, in order to establish the result. Corollary 3. It is NP-coplete to decide whether there exists a (strong) coding of IN k into M(Σ, D). Therefore, the proble whether there exists a (strong) coding between two given trace onoids is (at least) NP-hard. 3 Characterization of the existence of strong codings Strong codings between trace onoids are closely related to orphiss of (in-) dependence alphabets. Definition 4. Let (V, E) and (V, E ) be undirected graphs. A orphis H : (V, E) (V, E ) is a relation between vertices H V V such that (a, b) E iplies H(a) H(b) E for all a, b V. (By H(a) we ean the set {α V (a, α) H} for a V.) Obviously, undirected graphs with these orphiss for a category. For H V V we denote by H 1 the inverse relation H 1 = {(α, a) V V (a, α) H}. A relation H V V is a orphis H : (V, E) (V, E ) if and only if H 1 : (V, E ) (V, E) is a orphis on the copleent graphs in the opposite direction. Hence, copleentation yields a duality of the category. The basic relation between strong hooorphiss of trace onoids and orphiss of undirected graphs is given by the next lea, which follows directly fro the above definitions. Lea 5. Let h : M(Σ, D) M(Σ, D ) be a hooorphis of trace onoids. Define H Σ Σ as The following assertions are equivalent: H = {(a, α) Σ Σ α alph(h(a))}. 1. h : M(Σ, D) M(Σ, D ) is a strong hooorphis. 2. H : (Σ, I) (Σ, I ) is a orphis of independence alphabets. 3. H 1 : (Σ, D ) (Σ, D) is a orphis of dependence alphabets.

5 Definition 6. A orphis G : (Σ, D ) (Σ, D) of dependence alphabets is called covering, if for all a Σ there exists α Σ with a G(α) and if for all (a, b) D, a b there exists (α, β) D, α β with (a, b) G(α) G(β). The following lea is stated with a different notation in [BFG94]. Lea 7. Let h : M(Σ, D) M(Σ, D ) be a strong coding. Define H = {(a, α) Σ Σ α alph(h(a))}. Then H 1 : (Σ, D ) (Σ, D) is a covering of dependence alphabets. Proof. By Le. 5 the relation H 1 is a orphis. Let a Σ, then h(a) 1, since h is a coding. Hence a H 1 (α) for soe α Σ. Now, let (a, b) D, a b. Since h(ab) h(ba) we find by Prop. 1 a pair (α, β) D, α β such that π α,β h(ab) π α,β h(ba). Thus, either (a, b) H 1 (α) H 1 (β) or (a, b) H 1 (β) H 1 (α) holds. In any case H 1 is a covering. Lea 8. Let H Σ Σ be a relation such that H 1 : (Σ, D ) (Σ, D) is a covering of dependence alphabets. Then there exists a strong coding h : M(Σ, D) M(Σ, D ) such that H = {(a, α) Σ Σ α alph(h(a))}. Proof. Let Σ = {a 1, a 2,...} and Σ = {α 1, α 2,...}. For each i define H(a i ) = α i1 α ik and H(a i ) = α ik α i1, where H(a i ) = {α i1,..., α ik } and i 1 < < i k. For i = 1, 2,... let h(a i ) = ( H(a i ) ) i H(a i ). Le. 5 states that h is a strong hooorphis. We have to show that h is injective, only. First note that h(a) 1 for all a Σ. Assue by contradiction that h(x) = h(y) for soe x y. Let x be of inial length with this property. Then x = ax for soe a Σ, x M(Σ, D). Since h is strong and h(x) = h(y), there is soe b alph(y) with (a, b) D. Hence we can write y = zby for soe b Σ, y, z M(Σ, D) such that (a, z) I and (a, b) D. We have a b since x is of inial length. Since H 1 is a covering, we find (α, β) D, α β such that α alph(h(a)) and β alph(h(b)). For the contradiction it is enough to show π α,β h(x) π α,β h(y). Since h is strong, we have π α,β h(z) = 1. We ay assue that α coes before β in Σ. Let a = a i and b = a j (i j). We have π α,β h(a) = (αβ ɛ ) i (β ɛ α) and π α,β h(b) = (α δ β) j (βα δ ) for soe δ, ɛ {0, 1}. It follows that neither π α,β h(a) is a prefix of π α,β h(y) nor π α,β h(zb) is a prefix of π α,β h(x). Hence h(x) = h(y) is ipossible. The following result solves the ain open proble of [BFG94]. It follows by the conjunction of Le. 7 and Le. 8. Theore 9. Let (Σ, D) and (Σ, D ) be dependence alphabets. The following assertions are equivalent: 1. There exists a strong coding h : M(Σ, D) M(Σ, D ).

6 2. There exists a covering G : (Σ, D ) (Σ, D) of dependence alphabets. Furtherore there are effective constructions between h and G such that G = H 1 and H = {(a, α) Σ Σ α alph(h(a))}. Corollary 10. The following proble is NP-coplete: Input: Dependence alphabets (Σ, D), (Σ, D ). Question: Does there exist a strong coding fro M(Σ, D) into M(Σ, D )? 4 Codings into direct products of free onoids In this section we investigate codings of a trace onoid into a k-fold direct product of free onoids. We are interested in the sallest possible value of k. For strong codings the situation is clear, as stated in Prop. 12 below. (This result follows also fro [BFG94].) Lea 11. Let h : M(Σ, D) k i=1 Σ i be a strong coding into a k-fold direct product of free onoids. Let π i = π Σi denote the canonical projection onto the i-th coponent and C i = {a Σ π i h(a) 1}, i = 1,..., k. Then C i is a (dependence) clique for all i = 1,..., k and (Σ, D) = ( k i=1 C i, k i=1 C i C i ). Proof. Since h is injective, each (a, b) D is contained in soe C i C i. The set C i is a clique, i = 1,..., k, since h is strong. Proposition 12. Let (Σ, D) be a dependence alphabet and Σ i 2 for i = 1,..., k. Then there exists a strong coding h : M(Σ, D) k i=1 Σ i if and only if (Σ, D) allows a covering by k cliques. In particular, deciding the existence of strong codings into k-fold direct product of free onoids is NP-coplete. Proof. One direction is Le. 11, the other follows fro the Projection Lea, Prop. 1. The question, whether the vertices and edges of a given graph can be covered by k cliques, is NP-coplete, see [GJ78] for details. 4.1 A lower bound We now turn to the proble of codings into direct products without the property of being a strong hooorphis. The following exaple shows a dependence alphabet where the existence of a coding into a k-fold direct product of free onoids also requires a covering by k cliques. Hence, in the exaple, the bound of Prop. 12 is optial for codings, too. Exaple 1. Let (Σ, D) = P n be the path of length n 1, i.e., Σ = {a 1,..., a n } with D = {(a p, a q ) 1 p, q n, p q 1}. Suppose h : M(Σ, D) k i=1 Σ i is a coding. Then we have k n 1. Proof. Assue by contradiction that there is an ebedding h into a k-fold direct product, k n 2. For 1 < n let A = {i 1 i k, h i (a a +1 )

7 h i (a +1 a )}, with h i = π i h. Clearly, A and n 1 =1 A n 2. Moreover, for every 1 l < < n with l + 2 we have A A l = (since {a +1 } {a l, a l+1 } I and thus h i (a +1 ) = 1 for i A l ). Now, let 1 p < q n with q p inial such that q 1 =p A q p 1. Then A A +1 for every p < q 1 follows by the iniality of q p, together with the above observation. Furtherore, we have A A +1 2 (otherwise, it is easy to see that nonnegative integers r, s 1 exist, such that h(a r a +1 a s +2) = h(a s +2a +1 a r )). We can now deduce that after renubering we have A p = {p}, A = { 1, } (p < < q 1) and A q 1 = {q 2}. The final step is to show the existence of integers k i 1 (p i q) with h(a k p p a k q q ) = h(a k q q a k p p ) (note q > p), which yields the contradiction. For this, write h (a ) = r s and h (a +2 ) = r t, for soe words r and integers s, t 1, p q 2. The claied k i, p i q, are now chosen as a (positive) solution of the syste of (q p 2) equations s k = t k +2. Reark. It is interesting to note that if (Σ, D) corresponds to C n (the cycle of length n) and n 5, then the optial k for encoding M(Σ, D) into a k-fold direct product of free onoids is again k = n 1. The lower bound can be seen using the above result on n 1 =1 A. For C 4 we can do better, see Ex. 2 below. In the following we denote by α(σ, D) the size of a axial independent set of (Σ, D). Le. 11 yields the following obvious lower bound. Proposition 13. Let h : M(Σ, D) k i=1 Σ i be a coding. Then we have α(σ, D) k. Proof. IN α(σ,d) is a subonoid of M(Σ, D). 4.2 Inductive ethods The following exaple (also used in [BF95]) provides two observations: For soe codings we can achieve the lower bound α(σ, D) of Prop. 13, and we ay find a coding into a k-fold direct product, where no strong coding exists. Exaple 2. Let (Σ, D) be a C 4, i.e., a cycle with four letters. (Σ, D) = a d b c Then there is a coding h : M(Σ, D) {a, b} {c, d}. Thus for a coding a 2-fold (2 = α(σ, D)) direct product of free onoids is enough, whereas for a strong coding we need four coponents by Prop. 12.

8 ( Proof. Choose ) any nonnegative integers 1, 2, n 1, n 2 > 0 such that the atrix 1 n 1 is non-singular. Define h : M(Σ, D) {a, b} 2 n {c, d} by 2 h(a) = (a 1, c n 1 ), h(b) = (b 1, d n 1 ), h(c) = (a 2, c n 2 ), h(d) = (b 2, d n 2 ). It is easily seen that h is injective. The basic observation is that M(Σ, D) has the algebraic structure of a free product of IN 2 by IN 2. In fact, Ex. 2 reveals a ore general principle. Proposition 14. Let h j : M(Σ j, D j ) k i=1 Γ i be codings such that Γ i 2 and π i h j (a) 1 for all a Σ j, i = 1,..., k, j = 1,...,. Then there exists a coding h : M(Σ j, D j ) k i=1 Γ i, where M(Σ j, D j ) denotes the -fold free product. Furtherore, we find h such that π i h(a) 1 for all a Σ j and i = 1,..., k. Proof. (Sketch) For each j replace Γ i by soe Γ ij such that the alphabets becoe disjoint for different j. The codings h j define a canonical hooorphis h : M(Σ j, D j ) k i=1 ( Γ ij). Since π i h j (a) 1 it is easy to see that h is a coding. Furtherore, we have π i h(a) 1 for all a Σ j. Finally, since Γ i 2 for all i = 1,..., k, we can code ( Γ ij) into Γ i. Corollary 15. Let k, 1 and a, b different letters, a b. Then there exists a coding h : i=1 INk k i=1 {a, b}. Unfortunately, the hypothesis π i h j (a) 1 of Prop. 14 is very strong. As soon as (Σ, D) contains three letters a, b, c such that (a, b) D, (a, c) I, and (b, c) I it cannot be satisfied anyore. Even for cographs (Σ, D) the nuber k = α(σ, D) is, in general, not large enough in order to allow a coding of M(Σ, D) into a k- fold direct product of free onoids. We have the following exaple showing the strictness of our lower and upper bounds: Exaple 3. Let the dependence alphabet be the following cograph: (Σ, D) = a b c d p q r s, i.e., (Σ, I) = a d p s c b r q Then we have α(σ, D) = 2 and M(Σ, D) = ({a, b} {c, d} ) ({p, q} {r, s} ). The least k such that a coding h : M(Σ, D) 1 i k Σ i exists is k = 3. Proof. (Sketch) First assue h : M(Σ, D) Σ 1 Σ 2 would be a coding. A cobinatorial arguent yields the existence of letters x {a, b, c, d} and y

9 {p, q, r, s} such that h(x) = (u, 1), h(y) = (1, v) for soe u Σ 1, v Σ 2. Then h(xy) = h(yx) = (u, v) contradicting xy yx. Finally, consider the hooorphis h : M(Σ, D) {a, b, p, q} {r, s, e} {c, d, f} given by the following table (where the coluns give h(x), x Σ): h a b c d p q r s {a, b, p, q} a b 1 1 p q 1 1 {r, s, e} e e e e 1 1 r s {c, d, f} 1 1 c d f f f f To check injectivity, note that for t M(Σ, D), h(t) allows to decode the initial alphabet of t: if the 2nd (resp. 3rd) coponent starts in {r, s} (resp. in {c, d}) then the corresponding letter belongs to in(t). Otherwise we have e and f in the last two coponents, which restricts in(t) to the set {a, b, p, q}, which in turn is identified by the first coponent of the encoding. The next results concern the special case of ebedding trace onoids with cograph dependence alphabets into direct products of free onoids. Consider two codings h 1 : M 1 = M(Σ 1, D 1 ) k i=1 Σ i and h 2 : M 2 = M(Σ 2, D 2 ) l Γ j. Whereas the direct product M 1 M 2 can be ebedded into a (k + l)- fold direct product (a tight bound), we are able to obtain a better upper bound for the free product M 1 M 2. The next lea presents an inductive ethod for ebedding free products. Lea 16. Let M 1 = M(Σ 1, D 1 ), M 2 = M(Σ 2, D 2 ) be given trace onoids. Let Σ 1, Σ 2 be pairwise disjoint, let Γ be an alphabet and x / Γ a new letter. Then there exists a coding h : M 1 (M 2 Γ ) (M 1 M 2 ) (Γ {x}). Proof. Consider the hooorphis h : M 1 (M 2 Γ ) (M 1 M 2 ) (Γ {x}) given by (a, x) for a Σ 1 h(a) = (a, 1) for a Σ 2 (1, a) for a Γ Note that h allows the decoding of initial alphabets as follows. The 2nd coponent of an encoded trace h(z), π Γ {x} h(z), starts by a Γ if and only if a belongs to the initial alphabet of z, in(z). Otherwise, a letter b (Σ 1 Σ 2 ) in(z) can be deterined using π Σ1 Σ 2 h(z) = π Σ1 Σ 2 z. Theore 17. Let h 1 : M(Σ 1, D 1 ) k i=1 Σ i and h 2 : M(Σ 2, D 2 ) l Γ j be codings, k, l 1. Then there exists a coding of M(Σ 1, D 1 ) M(Σ 2, D 2 ) into a (k + l 1)-fold direct product of free onoids. Moreover, this bound is optial, in general. Proof. Clearly, for trace onoids M i, N i such that M i can be ebedded into N i (i = 1, 2), we can ebed M 1 M 2 canonically into N 1 N 2. Thus, assue that M 1 = M(Σ 1, D 1 ) = k i=1 Σ i and M 2 = M(Σ 2, D 2 ) = l Γ j holds and let

10 w.l.o.g. l 2. By Le. 16 we can ebed ( k i=1 Σ i ) (( l 1 Γ j ) Γ l ) into the onoid (( k i=1 Σ i ) ( l 1 Γ j )) (Γ l {x}). By induction, the left operand of the outer direct product can be ebedded into a (k + l 2)-fold direct product, which yields the result. The lower bound of this construction is obtained by generalizing Ex. 3 to the onoid ( k i=1 {a, b} ) ( l {p, q} ). We consider in Th. 19 below a nearly optial ethod (with regard to the nuber of coponents) of encoding -fold free products, 3, into direct products of free onoids. Let us start with a technical Lea 18. Let k, 2 and let Σ ij be pairwise disjoint alphabets, i = 1,..., k, j = 1,...,. Then there exists a coding h : ( k i=1 Σ ij ) ( Σ 1,j) ( (IN k i=2 Σ ij )). Proof. Let x j, j = 1,...,, be new letters. We identify {x j } k i=2 Σ ij with IN k i=2 Σ ij. The following hooorphis h is easily seen to be injective: { (a, (xj, 1)) if a Σ h(a) = 1j for soe 1 j (1, (1, a)) if a / Σ 1j The theore below can be applied in conjunction with Le. 16 in order to encode -fold free products efficiently for 3. (Le. 16 is used for reducing the nuber of coponents.) Theore 19. Let h j : M(Σ j, D j ) k i=1 Γ ij be codings, j = 1,...,, and a b. Then there exists a coding h : M(Σ j, D j ) 2k i=1 {a, b}. Proof. Assue Γ ij to be pairwise disjoint. By repeated application of Le. 18 we obtain a coding h : ( k i=1 Γ ij ) k i=1 Θ i ( IN k ), with Θ i = Γ ij for i = 1,..., k. By standard ethods we encode Θ i into {a, b} and, by Cor. 15, INk into 2k i=k+1 {a, b}. The result follows by coposition with the coding of M(Σ j, D j ) into ( k i=1 Γ ij ). Reark. Note that already for = 2 the lower bound forth. 19 is by Th. 17 the value 2k 1. Hence, Th. 19 gives an alost optial construction. 5 Clique-preserving orphiss Throughout this section the notion of clique is eant w.r.t. independence alphabets.

11 Definition 20. A clique-preserving orphis of independence alphabets H : (Σ, I) (Σ, I ) is a relation H Σ Σ such that H(A) = {α Σ (a, α) H, a A} is a clique of (Σ, I ) whenever A Σ is a clique of (Σ, I). A clique-preserving orphis H Σ Σ yields in a natural way a hooorphis h : M(Σ, D) M(Σ, D ) by letting h(a) = α H(a) α for a Σ. Note that the product is well-defined since H(a) is (by definition) a clique, i.e., a set of couting eleents. (In fact, our construction is a faithful covariant functor fro independence alphabets to trace onoids.) The ost proinent hooorphis of trace onoids arising this way is the coding used in the Projection Lea, Prop. 1. Write (Σ, D) = ( k i=1 Σ i, k i=1 Σ i Σ i ) and let Σ k = i=1 Σ i be the disjoint union. The identity relations id Σi Σ i Σ i induce in a natural way a relation H Σ Σ which by abuse of language can be written as H = k i=1 id Σ i Σ Σ. The associated hooorphis h is exactly the strong coding of Prop. 1, h : M(Σ, D) k i=1 Σ i. Reark. Note that a clique-preserving orphis is not a orphis of undirected graphs as defined in Sect. 3, in general. The reason is that for (a, b) I we ay have H(a) H(b). Therefore the induced hooorphiss of trace onoids are not strong, in general. The following proposition is in ajor contrast to the final result of Th. 22 below. Proposition 21. Let H Σ Σ be a relation such that H(a) is a clique of (Σ, I ) for all a Σ. Then the induced hooorphis h : Σ M(Σ, D ) with h(a) = α H(a) α is injective if and only if for all a, b Σ, a b there exists soe (α, β) D, α β with α H(a), β H(b). It is well-known that it is undecidable whether a hooorphis of trace onoids is injective, see [HC72, CR87]. The following theore sharpens this result in the sense that we show the undecidability for a ore natural class of hooorphis. Theore 22. Given a clique-preserving orphis of independence alphabets H : (Σ, I) (Σ, I ), it is undecidable whether the associated hooorphis h : M(Σ, D) M(Σ, D ), h(a) = α H(a) α for a Σ, is a coding. The proof of Th. 22 is a technical and involved reduction of the halting proble of a two-counter achine. For lack of space we oit the details and refer to the full version of this paper. 6 Conclusion and open probles In this paper we have solved the proble of the existence of strong codings for trace onoids by giving a NP-coplete graph criterion. Whether or not the existence of codings is decidable reains an interesting open question. For

12 strong codings into a k-fold direct product of free onoids we know the sallest possible value of k. For codings, we know a lower and an upper bound for k, only. It is still possible that the sallest k is uncoputable. We have extended a well-known undecidability result to a very natural class of hooorphis. The proof (not included in the present extended abstract) is very coplicated. It would be interesting to find a siple direct proof. References [AG91] C. Àlvarez and J. Gabarró. The parallel coplexity of two probles on concurrency. Inforation Processing Letters, 38:61 70, [BF95] V. Bruyère and C. De Felice. Trace codings. This volue. [BFG94] V. Bruyère, C. De Felice, and G. Guaiana. Coding with traces. In Proc. of STACS 94, LNCS 775, pp Springer, [CF69] P. Cartier and D. Foata. Problèes cobinatoires de coutation et réarrangeents. Lecture Notes in Matheatics 85. Springer, [CL85] M. Clerbout and M. Latteux. Partial coutations and faithful rational transductions. Theoretical Coputer Science, 35: , [CLB81] D. G. Corneil, H. Lerchs, and L. Stewart Burlingha. Copleent reducible graphs. Discrete Appl. Math., 3: , [CP85] R. Cori and D. Perrin. Autoates et coutations partielles. R.A.I.R.O. Inforatique Théorique et Applications, 19:21 32, [CPS85] D. G. Corneil, Y. Pearl, and L. K. Stewart. A linear recognition algorith for cographs. SIAM Journal of Coputing, 14: , [CR87] M. Chrobak and W. Rytter. Unique decipherability for partially coutative alphabets. Fundaenta Inforaticae, X: , [Die89] V. Diekert. Word probles over traces which are solvable in linear tie. Theoretical Coputer Science, 74:3-18, [Die90] V. Diekert. Cobinatorics on Traces. LNCS 454. Springer, [DR95] V. Diekert and G. Rozenberg, eds. The Book of Traces. World Scientific, Singapore, To appear. [Dub86] C. Duboc. On soe equations in free partially coutative onoids. Theoretical Coputer Science, 46: , [GJ78] M. Garey and D. Johnson. Coputers and Intractability: A Guide to the Theory of NP-copleteness. Freean, San Francisco, [HC72] G. Hotz and V. Claus. Autoatentheorie und Forale Sprachen, Band III. Bibliographisches Institut, Mannhei, [HY92] K. Hashiguchi and K. Yaada. String atching probles over free partially [Kel73] coutative onoids. Inforation and Coputation, 101: , R. Keller. Parallel progra scheata and axial parallelis I. Fundaental results. Journal of the ACM, 20: , [Maz87] A. Mazurkiewicz. Trace theory. In Petri Nets, Applications and Relationship to other Models of Concurrency, LNCS 255. Springer, [Och88] E. Ochański. On orphiss of trace onoids. In Proc. of STACS 88, LNCS 294, pp Springer, This article was processed using the L A TEX acro package with the LLNCS docuent class.

G G G G G. Spec k G. G Spec k G G. G G m G. G Spec k. Spec k

G G G G G. Spec k G. G Spec k G G. G G m G. G Spec k. Spec k 12 VICTORIA HOSKINS 3. Algebraic group actions and quotients In this section we consider group actions on algebraic varieties and also describe what type of quotients we would like to have for such group

More information

List Scheduling and LPT Oliver Braun (09/05/2017)

List Scheduling and LPT Oliver Braun (09/05/2017) List Scheduling and LPT Oliver Braun (09/05/207) We investigate the classical scheduling proble P ax where a set of n independent jobs has to be processed on 2 parallel and identical processors (achines)

More information

A note on the realignment criterion

A note on the realignment criterion A note on the realignent criterion Chi-Kwong Li 1, Yiu-Tung Poon and Nung-Sing Sze 3 1 Departent of Matheatics, College of Willia & Mary, Williasburg, VA 3185, USA Departent of Matheatics, Iowa State University,

More information

Handout 7. and Pr [M(x) = χ L (x) M(x) =? ] = 1.

Handout 7. and Pr [M(x) = χ L (x) M(x) =? ] = 1. Notes on Coplexity Theory Last updated: October, 2005 Jonathan Katz Handout 7 1 More on Randoized Coplexity Classes Reinder: so far we have seen RP,coRP, and BPP. We introduce two ore tie-bounded randoized

More information

arxiv: v1 [math.nt] 14 Sep 2014

arxiv: v1 [math.nt] 14 Sep 2014 ROTATION REMAINDERS P. JAMESON GRABER, WASHINGTON AND LEE UNIVERSITY 08 arxiv:1409.411v1 [ath.nt] 14 Sep 014 Abstract. We study properties of an array of nubers, called the triangle, in which each row

More information

S HomR (V, U) 0 Hom R (U, U) op. and Λ =

S HomR (V, U) 0 Hom R (U, U) op. and Λ = DERIVED EQIVALENCE OF PPER TRIANGLAR DIFFERENTIAL GRADED ALGEBRA arxiv:911.2182v1 ath.ra 11 Nov 29 DANIEL MAYCOCK 1. Introduction The question of when two derived categories of rings are equivalent has

More information

The Fundamental Basis Theorem of Geometry from an algebraic point of view

The Fundamental Basis Theorem of Geometry from an algebraic point of view Journal of Physics: Conference Series PAPER OPEN ACCESS The Fundaental Basis Theore of Geoetry fro an algebraic point of view To cite this article: U Bekbaev 2017 J Phys: Conf Ser 819 012013 View the article

More information

A Note on Scheduling Tall/Small Multiprocessor Tasks with Unit Processing Time to Minimize Maximum Tardiness

A Note on Scheduling Tall/Small Multiprocessor Tasks with Unit Processing Time to Minimize Maximum Tardiness A Note on Scheduling Tall/Sall Multiprocessor Tasks with Unit Processing Tie to Miniize Maxiu Tardiness Philippe Baptiste and Baruch Schieber IBM T.J. Watson Research Center P.O. Box 218, Yorktown Heights,

More information

Bipartite subgraphs and the smallest eigenvalue

Bipartite subgraphs and the smallest eigenvalue Bipartite subgraphs and the sallest eigenvalue Noga Alon Benny Sudaov Abstract Two results dealing with the relation between the sallest eigenvalue of a graph and its bipartite subgraphs are obtained.

More information

The Hilbert Schmidt version of the commutator theorem for zero trace matrices

The Hilbert Schmidt version of the commutator theorem for zero trace matrices The Hilbert Schidt version of the coutator theore for zero trace atrices Oer Angel Gideon Schechtan March 205 Abstract Let A be a coplex atrix with zero trace. Then there are atrices B and C such that

More information

On Certain C-Test Words for Free Groups

On Certain C-Test Words for Free Groups Journal of Algebra 247, 509 540 2002 doi:10.1006 jabr.2001.9001, available online at http: www.idealibrary.co on On Certain C-Test Words for Free Groups Donghi Lee Departent of Matheatics, Uni ersity of

More information

Algebraic Montgomery-Yang problem: the log del Pezzo surface case

Algebraic Montgomery-Yang problem: the log del Pezzo surface case c 2014 The Matheatical Society of Japan J. Math. Soc. Japan Vol. 66, No. 4 (2014) pp. 1073 1089 doi: 10.2969/jsj/06641073 Algebraic Montgoery-Yang proble: the log del Pezzo surface case By DongSeon Hwang

More information

Multi-Dimensional Hegselmann-Krause Dynamics

Multi-Dimensional Hegselmann-Krause Dynamics Multi-Diensional Hegselann-Krause Dynaics A. Nedić Industrial and Enterprise Systes Engineering Dept. University of Illinois Urbana, IL 680 angelia@illinois.edu B. Touri Coordinated Science Laboratory

More information

Polygonal Designs: Existence and Construction

Polygonal Designs: Existence and Construction Polygonal Designs: Existence and Construction John Hegean Departent of Matheatics, Stanford University, Stanford, CA 9405 Jeff Langford Departent of Matheatics, Drake University, Des Moines, IA 5011 G

More information

On the Inapproximability of Vertex Cover on k-partite k-uniform Hypergraphs

On the Inapproximability of Vertex Cover on k-partite k-uniform Hypergraphs On the Inapproxiability of Vertex Cover on k-partite k-unifor Hypergraphs Venkatesan Guruswai and Rishi Saket Coputer Science Departent Carnegie Mellon University Pittsburgh, PA 1513. Abstract. Coputing

More information

NON-COMMUTATIVE GRÖBNER BASES FOR COMMUTATIVE ALGEBRAS

NON-COMMUTATIVE GRÖBNER BASES FOR COMMUTATIVE ALGEBRAS PROCEEDINGS OF THE AMERICAN MATHEMATICAL SOCIETY Volue 126, Nuber 3, March 1998, Pages 687 691 S 0002-9939(98)04229-4 NON-COMMUTATIVE GRÖBNER BASES FOR COMMUTATIVE ALGEBRAS DAVID EISENBUD, IRENA PEEVA,

More information

A note on the multiplication of sparse matrices

A note on the multiplication of sparse matrices Cent. Eur. J. Cop. Sci. 41) 2014 1-11 DOI: 10.2478/s13537-014-0201-x Central European Journal of Coputer Science A note on the ultiplication of sparse atrices Research Article Keivan Borna 12, Sohrab Aboozarkhani

More information

Divisibility of Polynomials over Finite Fields and Combinatorial Applications

Divisibility of Polynomials over Finite Fields and Combinatorial Applications Designs, Codes and Cryptography anuscript No. (will be inserted by the editor) Divisibility of Polynoials over Finite Fields and Cobinatorial Applications Daniel Panario Olga Sosnovski Brett Stevens Qiang

More information

Tight Bounds for Maximal Identifiability of Failure Nodes in Boolean Network Tomography

Tight Bounds for Maximal Identifiability of Failure Nodes in Boolean Network Tomography Tight Bounds for axial Identifiability of Failure Nodes in Boolean Network Toography Nicola Galesi Sapienza Università di Roa nicola.galesi@uniroa1.it Fariba Ranjbar Sapienza Università di Roa fariba.ranjbar@uniroa1.it

More information

THE POLYNOMIAL REPRESENTATION OF THE TYPE A n 1 RATIONAL CHEREDNIK ALGEBRA IN CHARACTERISTIC p n

THE POLYNOMIAL REPRESENTATION OF THE TYPE A n 1 RATIONAL CHEREDNIK ALGEBRA IN CHARACTERISTIC p n THE POLYNOMIAL REPRESENTATION OF THE TYPE A n RATIONAL CHEREDNIK ALGEBRA IN CHARACTERISTIC p n SHEELA DEVADAS AND YI SUN Abstract. We study the polynoial representation of the rational Cherednik algebra

More information

On Poset Merging. 1 Introduction. Peter Chen Guoli Ding Steve Seiden. Keywords: Merging, Partial Order, Lower Bounds. AMS Classification: 68W40

On Poset Merging. 1 Introduction. Peter Chen Guoli Ding Steve Seiden. Keywords: Merging, Partial Order, Lower Bounds. AMS Classification: 68W40 On Poset Merging Peter Chen Guoli Ding Steve Seiden Abstract We consider the follow poset erging proble: Let X and Y be two subsets of a partially ordered set S. Given coplete inforation about the ordering

More information

Block designs and statistics

Block designs and statistics Bloc designs and statistics Notes for Math 447 May 3, 2011 The ain paraeters of a bloc design are nuber of varieties v, bloc size, nuber of blocs b. A design is built on a set of v eleents. Each eleent

More information

ON THE TWO-LEVEL PRECONDITIONING IN LEAST SQUARES METHOD

ON THE TWO-LEVEL PRECONDITIONING IN LEAST SQUARES METHOD PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY Physical and Matheatical Sciences 04,, p. 7 5 ON THE TWO-LEVEL PRECONDITIONING IN LEAST SQUARES METHOD M a t h e a t i c s Yu. A. HAKOPIAN, R. Z. HOVHANNISYAN

More information

Chapter 6 1-D Continuous Groups

Chapter 6 1-D Continuous Groups Chapter 6 1-D Continuous Groups Continuous groups consist of group eleents labelled by one or ore continuous variables, say a 1, a 2,, a r, where each variable has a well- defined range. This chapter explores:

More information

Lecture 21. Interior Point Methods Setup and Algorithm

Lecture 21. Interior Point Methods Setup and Algorithm Lecture 21 Interior Point Methods In 1984, Kararkar introduced a new weakly polynoial tie algorith for solving LPs [Kar84a], [Kar84b]. His algorith was theoretically faster than the ellipsoid ethod and

More information

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices CS71 Randoness & Coputation Spring 018 Instructor: Alistair Sinclair Lecture 13: February 7 Disclaier: These notes have not been subjected to the usual scrutiny accorded to foral publications. They ay

More information

3.8 Three Types of Convergence

3.8 Three Types of Convergence 3.8 Three Types of Convergence 3.8 Three Types of Convergence 93 Suppose that we are given a sequence functions {f k } k N on a set X and another function f on X. What does it ean for f k to converge to

More information

Reed-Muller Codes. m r inductive definition. Later, we shall explain how to construct Reed-Muller codes using the Kronecker product.

Reed-Muller Codes. m r inductive definition. Later, we shall explain how to construct Reed-Muller codes using the Kronecker product. Coding Theory Massoud Malek Reed-Muller Codes An iportant class of linear block codes rich in algebraic and geoetric structure is the class of Reed-Muller codes, which includes the Extended Haing code.

More information

Math Reviews classifications (2000): Primary 54F05; Secondary 54D20, 54D65

Math Reviews classifications (2000): Primary 54F05; Secondary 54D20, 54D65 The Monotone Lindelöf Property and Separability in Ordered Spaces by H. Bennett, Texas Tech University, Lubbock, TX 79409 D. Lutzer, College of Willia and Mary, Williasburg, VA 23187-8795 M. Matveev, Irvine,

More information

Algorithms for parallel processor scheduling with distinct due windows and unit-time jobs

Algorithms for parallel processor scheduling with distinct due windows and unit-time jobs BULLETIN OF THE POLISH ACADEMY OF SCIENCES TECHNICAL SCIENCES Vol. 57, No. 3, 2009 Algoriths for parallel processor scheduling with distinct due windows and unit-tie obs A. JANIAK 1, W.A. JANIAK 2, and

More information

Note on generating all subsets of a finite set with disjoint unions

Note on generating all subsets of a finite set with disjoint unions Note on generating all subsets of a finite set with disjoint unions David Ellis e-ail: dce27@ca.ac.uk Subitted: Dec 2, 2008; Accepted: May 12, 2009; Published: May 20, 2009 Matheatics Subject Classification:

More information

Lecture 9 November 23, 2015

Lecture 9 November 23, 2015 CSC244: Discrepancy Theory in Coputer Science Fall 25 Aleksandar Nikolov Lecture 9 Noveber 23, 25 Scribe: Nick Spooner Properties of γ 2 Recall that γ 2 (A) is defined for A R n as follows: γ 2 (A) = in{r(u)

More information

A Note on Online Scheduling for Jobs with Arbitrary Release Times

A Note on Online Scheduling for Jobs with Arbitrary Release Times A Note on Online Scheduling for Jobs with Arbitrary Release Ties Jihuan Ding, and Guochuan Zhang College of Operations Research and Manageent Science, Qufu Noral University, Rizhao 7686, China dingjihuan@hotail.co

More information

PERMANENT WEAK AMENABILITY OF GROUP ALGEBRAS OF FREE GROUPS

PERMANENT WEAK AMENABILITY OF GROUP ALGEBRAS OF FREE GROUPS PERMANENT WEAK AMENABILITY OF GROUP ALGEBRAS OF FREE GROUPS B. E. JOHNSON ABSTRACT We show that all derivations fro the group algebra (G) of a free group into its nth dual, where n is a positive even integer,

More information

A Quantum Observable for the Graph Isomorphism Problem

A Quantum Observable for the Graph Isomorphism Problem A Quantu Observable for the Graph Isoorphis Proble Mark Ettinger Los Alaos National Laboratory Peter Høyer BRICS Abstract Suppose we are given two graphs on n vertices. We define an observable in the Hilbert

More information

arxiv: v2 [math.kt] 3 Apr 2018

arxiv: v2 [math.kt] 3 Apr 2018 EQUIVARIANT K-HOMOLOGY FOR HYPERBOLIC REFLECTION GROUPS arxiv:170705133v [athkt] 3 Apr 018 JEAN-FRANÇOIS LAFONT, IVONNE J ORTIZ, ALEXANDER D RAHM, AND RUBÉN J SÁNCHEZ-GARCÍA Abstract We copute the equivariant

More information

Homework 3 Solutions CSE 101 Summer 2017

Homework 3 Solutions CSE 101 Summer 2017 Hoework 3 Solutions CSE 0 Suer 207. Scheduling algoriths The following n = 2 jobs with given processing ties have to be scheduled on = 3 parallel and identical processors with the objective of iniizing

More information

On Process Complexity

On Process Complexity On Process Coplexity Ada R. Day School of Matheatics, Statistics and Coputer Science, Victoria University of Wellington, PO Box 600, Wellington 6140, New Zealand, Eail: ada.day@cs.vuw.ac.nz Abstract Process

More information

Introduction to Optimization Techniques. Nonlinear Programming

Introduction to Optimization Techniques. Nonlinear Programming Introduction to Optiization echniques Nonlinear Prograing Optial Solutions Consider the optiization proble in f ( x) where F R n xf Definition : x F is optial (global iniu) for this proble, if f( x ) f(

More information

DSPACE(n)? = NSPACE(n): A Degree Theoretic Characterization

DSPACE(n)? = NSPACE(n): A Degree Theoretic Characterization DSPACE(n)? = NSPACE(n): A Degree Theoretic Characterization Manindra Agrawal Departent of Coputer Science and Engineering Indian Institute of Technology, Kanpur 208016, INDIA eail: anindra@iitk.ernet.in

More information

An EGZ generalization for 5 colors

An EGZ generalization for 5 colors An EGZ generalization for 5 colors David Grynkiewicz and Andrew Schultz July 6, 00 Abstract Let g zs(, k) (g zs(, k + 1)) be the inial integer such that any coloring of the integers fro U U k 1,..., g

More information

ORIGAMI CONSTRUCTIONS OF RINGS OF INTEGERS OF IMAGINARY QUADRATIC FIELDS

ORIGAMI CONSTRUCTIONS OF RINGS OF INTEGERS OF IMAGINARY QUADRATIC FIELDS #A34 INTEGERS 17 (017) ORIGAMI CONSTRUCTIONS OF RINGS OF INTEGERS OF IMAGINARY QUADRATIC FIELDS Jürgen Kritschgau Departent of Matheatics, Iowa State University, Aes, Iowa jkritsch@iastateedu Adriana Salerno

More information

Introduction to Discrete Optimization

Introduction to Discrete Optimization Prof. Friedrich Eisenbrand Martin Nieeier Due Date: March 9 9 Discussions: March 9 Introduction to Discrete Optiization Spring 9 s Exercise Consider a school district with I neighborhoods J schools and

More information

Lazy Graph Transformation

Lazy Graph Transformation Fundaenta Inforaticae XXI (2001) 1001 1032 1001 IOS Press Lazy raph Transforation Fernando Orejas Universitat Politècnica de Catalunya, Spain orejas@lsi.upc.edu Leen Labers Hasso Plattner Institut, Universität

More information

#A52 INTEGERS 10 (2010), COMBINATORIAL INTERPRETATIONS OF BINOMIAL COEFFICIENT ANALOGUES RELATED TO LUCAS SEQUENCES

#A52 INTEGERS 10 (2010), COMBINATORIAL INTERPRETATIONS OF BINOMIAL COEFFICIENT ANALOGUES RELATED TO LUCAS SEQUENCES #A5 INTEGERS 10 (010), 697-703 COMBINATORIAL INTERPRETATIONS OF BINOMIAL COEFFICIENT ANALOGUES RELATED TO LUCAS SEQUENCES Bruce E Sagan 1 Departent of Matheatics, Michigan State University, East Lansing,

More information

arxiv: v1 [math.co] 19 Apr 2017

arxiv: v1 [math.co] 19 Apr 2017 PROOF OF CHAPOTON S CONJECTURE ON NEWTON POLYTOPES OF q-ehrhart POLYNOMIALS arxiv:1704.0561v1 [ath.co] 19 Apr 017 JANG SOO KIM AND U-KEUN SONG Abstract. Recently, Chapoton found a q-analog of Ehrhart polynoials,

More information

A NOTE ON HILBERT SCHEMES OF NODAL CURVES. Ziv Ran

A NOTE ON HILBERT SCHEMES OF NODAL CURVES. Ziv Ran A NOTE ON HILBERT SCHEMES OF NODAL CURVES Ziv Ran Abstract. We study the Hilbert schee and punctual Hilbert schee of a nodal curve, and the relative Hilbert schee of a faily of curves acquiring a node.

More information

Poly-Bernoulli Numbers and Eulerian Numbers

Poly-Bernoulli Numbers and Eulerian Numbers 1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 21 (2018, Article 18.6.1 Poly-Bernoulli Nubers and Eulerian Nubers Beáta Bényi Faculty of Water Sciences National University of Public Service H-1441

More information

arxiv: v1 [cs.ds] 3 Feb 2014

arxiv: v1 [cs.ds] 3 Feb 2014 arxiv:40.043v [cs.ds] 3 Feb 04 A Bound on the Expected Optiality of Rando Feasible Solutions to Cobinatorial Optiization Probles Evan A. Sultani The Johns Hopins University APL evan@sultani.co http://www.sultani.co/

More information

The Simplex Method is Strongly Polynomial for the Markov Decision Problem with a Fixed Discount Rate

The Simplex Method is Strongly Polynomial for the Markov Decision Problem with a Fixed Discount Rate The Siplex Method is Strongly Polynoial for the Markov Decision Proble with a Fixed Discount Rate Yinyu Ye April 20, 2010 Abstract In this note we prove that the classic siplex ethod with the ost-negativereduced-cost

More information

A1. Find all ordered pairs (a, b) of positive integers for which 1 a + 1 b = 3

A1. Find all ordered pairs (a, b) of positive integers for which 1 a + 1 b = 3 A. Find all ordered pairs a, b) of positive integers for which a + b = 3 08. Answer. The six ordered pairs are 009, 08), 08, 009), 009 337, 674) = 35043, 674), 009 346, 673) = 3584, 673), 674, 009 337)

More information

A Bernstein-Markov Theorem for Normed Spaces

A Bernstein-Markov Theorem for Normed Spaces A Bernstein-Markov Theore for Nored Spaces Lawrence A. Harris Departent of Matheatics, University of Kentucky Lexington, Kentucky 40506-0027 Abstract Let X and Y be real nored linear spaces and let φ :

More information

Solutions of some selected problems of Homework 4

Solutions of some selected problems of Homework 4 Solutions of soe selected probles of Hoework 4 Sangchul Lee May 7, 2018 Proble 1 Let there be light A professor has two light bulbs in his garage. When both are burned out, they are replaced, and the next

More information

A := A i : {A i } S. is an algebra. The same object is obtained when the union in required to be disjoint.

A := A i : {A i } S. is an algebra. The same object is obtained when the union in required to be disjoint. 59 6. ABSTRACT MEASURE THEORY Having developed the Lebesgue integral with respect to the general easures, we now have a general concept with few specific exaples to actually test it on. Indeed, so far

More information

ADVANCES ON THE BESSIS- MOUSSA-VILLANI TRACE CONJECTURE

ADVANCES ON THE BESSIS- MOUSSA-VILLANI TRACE CONJECTURE ADVANCES ON THE BESSIS- MOUSSA-VILLANI TRACE CONJECTURE CHRISTOPHER J. HILLAR Abstract. A long-standing conjecture asserts that the polynoial p(t = Tr(A + tb ] has nonnegative coefficients whenever is

More information

Constant-Space String-Matching. in Sublinear Average Time. (Extended Abstract) Wojciech Rytter z. Warsaw University. and. University of Liverpool

Constant-Space String-Matching. in Sublinear Average Time. (Extended Abstract) Wojciech Rytter z. Warsaw University. and. University of Liverpool Constant-Space String-Matching in Sublinear Average Tie (Extended Abstract) Maxie Crocheore Universite de Marne-la-Vallee Leszek Gasieniec y Max-Planck Institut fur Inforatik Wojciech Rytter z Warsaw University

More information

MANY physical structures can conveniently be modelled

MANY physical structures can conveniently be modelled Proceedings of the World Congress on Engineering Coputer Science 2017 Vol II Roly r-orthogonal (g, f)-factorizations in Networks Sizhong Zhou Abstract Let G (V (G), E(G)) be a graph, where V (G) E(G) denote

More information

The Frequent Paucity of Trivial Strings

The Frequent Paucity of Trivial Strings The Frequent Paucity of Trivial Strings Jack H. Lutz Departent of Coputer Science Iowa State University Aes, IA 50011, USA lutz@cs.iastate.edu Abstract A 1976 theore of Chaitin can be used to show that

More information

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search Quantu algoriths (CO 781, Winter 2008) Prof Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search ow we begin to discuss applications of quantu walks to search algoriths

More information

time time δ jobs jobs

time time δ jobs jobs Approxiating Total Flow Tie on Parallel Machines Stefano Leonardi Danny Raz y Abstract We consider the proble of optiizing the total ow tie of a strea of jobs that are released over tie in a ultiprocessor

More information

arxiv: v2 [math.co] 8 Mar 2018

arxiv: v2 [math.co] 8 Mar 2018 Restricted lonesu atrices arxiv:1711.10178v2 [ath.co] 8 Mar 2018 Beáta Bényi Faculty of Water Sciences, National University of Public Service, Budapest beata.benyi@gail.co March 9, 2018 Keywords: enueration,

More information

Some Classical Ergodic Theorems

Some Classical Ergodic Theorems Soe Classical Ergodic Theores Matt Rosenzweig Contents Classical Ergodic Theores. Mean Ergodic Theores........................................2 Maxial Ergodic Theore.....................................

More information

Convex Programming for Scheduling Unrelated Parallel Machines

Convex Programming for Scheduling Unrelated Parallel Machines Convex Prograing for Scheduling Unrelated Parallel Machines Yossi Azar Air Epstein Abstract We consider the classical proble of scheduling parallel unrelated achines. Each job is to be processed by exactly

More information

Model Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon

Model Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon Model Fitting CURM Background Material, Fall 014 Dr. Doreen De Leon 1 Introduction Given a set of data points, we often want to fit a selected odel or type to the data (e.g., we suspect an exponential

More information

Generalized Alignment Chain: Improved Converse Results for Index Coding

Generalized Alignment Chain: Improved Converse Results for Index Coding Generalized Alignent Chain: Iproved Converse Results for Index Coding Yucheng Liu and Parastoo Sadeghi Research School of Electrical, Energy and Materials Engineering Australian National University, Canberra,

More information

. The univariate situation. It is well-known for a long tie that denoinators of Pade approxiants can be considered as orthogonal polynoials with respe

. The univariate situation. It is well-known for a long tie that denoinators of Pade approxiants can be considered as orthogonal polynoials with respe PROPERTIES OF MULTIVARIATE HOMOGENEOUS ORTHOGONAL POLYNOMIALS Brahi Benouahane y Annie Cuyt? Keywords Abstract It is well-known that the denoinators of Pade approxiants can be considered as orthogonal

More information

In this chapter, we consider several graph-theoretic and probabilistic models

In this chapter, we consider several graph-theoretic and probabilistic models THREE ONE GRAPH-THEORETIC AND STATISTICAL MODELS 3.1 INTRODUCTION In this chapter, we consider several graph-theoretic and probabilistic odels for a social network, which we do under different assuptions

More information

A Better Algorithm For an Ancient Scheduling Problem. David R. Karger Steven J. Phillips Eric Torng. Department of Computer Science

A Better Algorithm For an Ancient Scheduling Problem. David R. Karger Steven J. Phillips Eric Torng. Department of Computer Science A Better Algorith For an Ancient Scheduling Proble David R. Karger Steven J. Phillips Eric Torng Departent of Coputer Science Stanford University Stanford, CA 9435-4 Abstract One of the oldest and siplest

More information

Upper bound on false alarm rate for landmine detection and classification using syntactic pattern recognition

Upper bound on false alarm rate for landmine detection and classification using syntactic pattern recognition Upper bound on false alar rate for landine detection and classification using syntactic pattern recognition Ahed O. Nasif, Brian L. Mark, Kenneth J. Hintz, and Nathalia Peixoto Dept. of Electrical and

More information

Uniform Approximation and Bernstein Polynomials with Coefficients in the Unit Interval

Uniform Approximation and Bernstein Polynomials with Coefficients in the Unit Interval Unifor Approxiation and Bernstein Polynoials with Coefficients in the Unit Interval Weiang Qian and Marc D. Riedel Electrical and Coputer Engineering, University of Minnesota 200 Union St. S.E. Minneapolis,

More information

A Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine. (1900 words)

A Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine. (1900 words) 1 A Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine (1900 words) Contact: Jerry Farlow Dept of Matheatics Univeristy of Maine Orono, ME 04469 Tel (07) 866-3540 Eail: farlow@ath.uaine.edu

More information

Curious Bounds for Floor Function Sums

Curious Bounds for Floor Function Sums 1 47 6 11 Journal of Integer Sequences, Vol. 1 (018), Article 18.1.8 Curious Bounds for Floor Function Sus Thotsaporn Thanatipanonda and Elaine Wong 1 Science Division Mahidol University International

More information

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials Fast Montgoery-like Square Root Coputation over GF( ) for All Trinoials Yin Li a, Yu Zhang a, a Departent of Coputer Science and Technology, Xinyang Noral University, Henan, P.R.China Abstract This letter

More information

Understanding Machine Learning Solution Manual

Understanding Machine Learning Solution Manual Understanding Machine Learning Solution Manual Written by Alon Gonen Edited by Dana Rubinstein Noveber 17, 2014 2 Gentle Start 1. Given S = ((x i, y i )), define the ultivariate polynoial p S (x) = i []:y

More information

M ath. Res. Lett. 15 (2008), no. 2, c International Press 2008 SUM-PRODUCT ESTIMATES VIA DIRECTED EXPANDERS. Van H. Vu. 1.

M ath. Res. Lett. 15 (2008), no. 2, c International Press 2008 SUM-PRODUCT ESTIMATES VIA DIRECTED EXPANDERS. Van H. Vu. 1. M ath. Res. Lett. 15 (2008), no. 2, 375 388 c International Press 2008 SUM-PRODUCT ESTIMATES VIA DIRECTED EXPANDERS Van H. Vu Abstract. Let F q be a finite field of order q and P be a polynoial in F q[x

More information

Feature Extraction Techniques

Feature Extraction Techniques Feature Extraction Techniques Unsupervised Learning II Feature Extraction Unsupervised ethods can also be used to find features which can be useful for categorization. There are unsupervised ethods that

More information

ON REGULARITY, TRANSITIVITY, AND ERGODIC PRINCIPLE FOR QUADRATIC STOCHASTIC VOLTERRA OPERATORS MANSOOR SABUROV

ON REGULARITY, TRANSITIVITY, AND ERGODIC PRINCIPLE FOR QUADRATIC STOCHASTIC VOLTERRA OPERATORS MANSOOR SABUROV ON REGULARITY TRANSITIVITY AND ERGODIC PRINCIPLE FOR QUADRATIC STOCHASTIC VOLTERRA OPERATORS MANSOOR SABUROV Departent of Coputational & Theoretical Sciences Faculty of Science International Islaic University

More information

The concavity and convexity of the Boros Moll sequences

The concavity and convexity of the Boros Moll sequences The concavity and convexity of the Boros Moll sequences Ernest X.W. Xia Departent of Matheatics Jiangsu University Zhenjiang, Jiangsu 1013, P.R. China ernestxwxia@163.co Subitted: Oct 1, 013; Accepted:

More information

Research Article Some Formulae of Products of the Apostol-Bernoulli and Apostol-Euler Polynomials

Research Article Some Formulae of Products of the Apostol-Bernoulli and Apostol-Euler Polynomials Discrete Dynaics in Nature and Society Volue 202, Article ID 927953, pages doi:055/202/927953 Research Article Soe Forulae of Products of the Apostol-Bernoulli and Apostol-Euler Polynoials Yuan He and

More information

Fundamental Limits of Database Alignment

Fundamental Limits of Database Alignment Fundaental Liits of Database Alignent Daniel Cullina Dept of Electrical Engineering Princeton University dcullina@princetonedu Prateek Mittal Dept of Electrical Engineering Princeton University pittal@princetonedu

More information

Computational and Statistical Learning Theory

Computational and Statistical Learning Theory Coputational and Statistical Learning Theory Proble sets 5 and 6 Due: Noveber th Please send your solutions to learning-subissions@ttic.edu Notations/Definitions Recall the definition of saple based Radeacher

More information

Cosine similarity and the Borda rule

Cosine similarity and the Borda rule Cosine siilarity and the Borda rule Yoko Kawada Abstract Cosine siilarity is a coonly used siilarity easure in coputer science. We propose a voting rule based on cosine siilarity, naely, the cosine siilarity

More information

Singularities of divisors on abelian varieties

Singularities of divisors on abelian varieties Singularities of divisors on abelian varieties Olivier Debarre March 20, 2006 This is joint work with Christopher Hacon. We work over the coplex nubers. Let D be an effective divisor on an abelian variety

More information

arxiv: v3 [math.nt] 14 Nov 2016

arxiv: v3 [math.nt] 14 Nov 2016 A new integral-series identity of ultiple zeta values and regularizations Masanobu Kaneko and Shuji Yaaoto Noveber 15, 2016 arxiv:1605.03117v3 [ath.nt] 14 Nov 2016 Abstract We present a new integral =

More information

THE CONSTRUCTION OF GOOD EXTENSIBLE RANK-1 LATTICES. 1. Introduction We are interested in approximating a high dimensional integral [0,1]

THE CONSTRUCTION OF GOOD EXTENSIBLE RANK-1 LATTICES. 1. Introduction We are interested in approximating a high dimensional integral [0,1] MATHEMATICS OF COMPUTATION Volue 00, Nuber 0, Pages 000 000 S 0025-578(XX)0000-0 THE CONSTRUCTION OF GOOD EXTENSIBLE RANK- LATTICES JOSEF DICK, FRIEDRICH PILLICHSHAMMER, AND BENJAMIN J. WATERHOUSE Abstract.

More information

Research Article On the Isolated Vertices and Connectivity in Random Intersection Graphs

Research Article On the Isolated Vertices and Connectivity in Random Intersection Graphs International Cobinatorics Volue 2011, Article ID 872703, 9 pages doi:10.1155/2011/872703 Research Article On the Isolated Vertices and Connectivity in Rando Intersection Graphs Yilun Shang Institute for

More information

FPTAS for optimizing polynomials over the mixed-integer points of polytopes in fixed dimension

FPTAS for optimizing polynomials over the mixed-integer points of polytopes in fixed dimension Matheatical Prograing anuscript No. (will be inserted by the editor) Jesús A. De Loera Rayond Heecke Matthias Köppe Robert Weisantel FPTAS for optiizing polynoials over the ixed-integer points of polytopes

More information

The Weierstrass Approximation Theorem

The Weierstrass Approximation Theorem 36 The Weierstrass Approxiation Theore Recall that the fundaental idea underlying the construction of the real nubers is approxiation by the sipler rational nubers. Firstly, nubers are often deterined

More information

Descent polynomials. Mohamed Omar Department of Mathematics, Harvey Mudd College, 301 Platt Boulevard, Claremont, CA , USA,

Descent polynomials. Mohamed Omar Department of Mathematics, Harvey Mudd College, 301 Platt Boulevard, Claremont, CA , USA, Descent polynoials arxiv:1710.11033v2 [ath.co] 13 Nov 2017 Alexander Diaz-Lopez Departent of Matheatics and Statistics, Villanova University, 800 Lancaster Avenue, Villanova, PA 19085, USA, alexander.diaz-lopez@villanova.edu

More information

INDEPENDENT SETS IN HYPERGRAPHS

INDEPENDENT SETS IN HYPERGRAPHS INDEPENDENT SETS IN HYPERGRAPHS Abstract. Many iportant theores and conjectures in cobinatorics, such as the theore of Szeerédi on arithetic progressions and the Erdős-Stone Theore in extreal graph theory,

More information

On the Existence of Pure Nash Equilibria in Weighted Congestion Games

On the Existence of Pure Nash Equilibria in Weighted Congestion Games MATHEMATICS OF OPERATIONS RESEARCH Vol. 37, No. 3, August 2012, pp. 419 436 ISSN 0364-765X (print) ISSN 1526-5471 (online) http://dx.doi.org/10.1287/oor.1120.0543 2012 INFORMS On the Existence of Pure

More information

Generalized eigenfunctions and a Borel Theorem on the Sierpinski Gasket.

Generalized eigenfunctions and a Borel Theorem on the Sierpinski Gasket. Generalized eigenfunctions and a Borel Theore on the Sierpinski Gasket. Kasso A. Okoudjou, Luke G. Rogers, and Robert S. Strichartz May 26, 2006 1 Introduction There is a well developed theory (see [5,

More information

Reducibility and Completeness

Reducibility and Completeness Reducibility and Copleteness Chapter 28 of the forthcoing CRC Handbook on Algoriths and Theory of Coputation Eric Allender 1 Rutgers University Michael C. Loui 2 University of Illinois at Urbana-Chapaign

More information

1 Generalization bounds based on Rademacher complexity

1 Generalization bounds based on Rademacher complexity COS 5: Theoretical Machine Learning Lecturer: Rob Schapire Lecture #0 Scribe: Suqi Liu March 07, 08 Last tie we started proving this very general result about how quickly the epirical average converges

More information

Generalized AOR Method for Solving System of Linear Equations. Davod Khojasteh Salkuyeh. Department of Mathematics, University of Mohaghegh Ardabili,

Generalized AOR Method for Solving System of Linear Equations. Davod Khojasteh Salkuyeh. Department of Mathematics, University of Mohaghegh Ardabili, Australian Journal of Basic and Applied Sciences, 5(3): 35-358, 20 ISSN 99-878 Generalized AOR Method for Solving Syste of Linear Equations Davod Khojasteh Salkuyeh Departent of Matheatics, University

More information

Optimal Jamming Over Additive Noise: Vector Source-Channel Case

Optimal Jamming Over Additive Noise: Vector Source-Channel Case Fifty-first Annual Allerton Conference Allerton House, UIUC, Illinois, USA October 2-3, 2013 Optial Jaing Over Additive Noise: Vector Source-Channel Case Erah Akyol and Kenneth Rose Abstract This paper

More information

AN ALGEBRAIC AND COMBINATORIAL APPROACH TO THE CONSTRUCTION OF EXPERIMENTAL DESIGNS

AN ALGEBRAIC AND COMBINATORIAL APPROACH TO THE CONSTRUCTION OF EXPERIMENTAL DESIGNS Geotec., Const. Mat. & Env., ISSN: 2186-2982(P), 2186-2990(O), Japan AN ALGEBRAIC AND COMBINATORIAL APPROACH TO THE CONSTRUCTION OF EXPERIMENTAL DESIGNS Julio Roero 1 and Scott H. Murray 2 1 Departent

More information

On the Communication Complexity of Lipschitzian Optimization for the Coordinated Model of Computation

On the Communication Complexity of Lipschitzian Optimization for the Coordinated Model of Computation journal of coplexity 6, 459473 (2000) doi:0.006jco.2000.0544, available online at http:www.idealibrary.co on On the Counication Coplexity of Lipschitzian Optiization for the Coordinated Model of Coputation

More information

Lecture 21 Principle of Inclusion and Exclusion

Lecture 21 Principle of Inclusion and Exclusion Lecture 21 Principle of Inclusion and Exclusion Holden Lee and Yoni Miller 5/6/11 1 Introduction and first exaples We start off with an exaple Exaple 11: At Sunnydale High School there are 28 students

More information

}, (n 0) be a finite irreducible, discrete time MC. Let S = {1, 2,, m} be its state space. Let P = [p ij. ] be the transition matrix of the MC.

}, (n 0) be a finite irreducible, discrete time MC. Let S = {1, 2,, m} be its state space. Let P = [p ij. ] be the transition matrix of the MC. Abstract Questions are posed regarding the influence that the colun sus of the transition probabilities of a stochastic atrix (with row sus all one) have on the stationary distribution, the ean first passage

More information