Birthday Paradox Calculations and Approximation

Size: px
Start display at page:

Download "Birthday Paradox Calculations and Approximation"

Transcription

1 Birthday Paradox Calculations and Approxiation Joshua E. Hill InfoGard Laboratories -March- v. Birthday Proble In the birthday proble, we have a group of n randoly selected people. If we assue that birthdays are uniforly distributed aong the 365 days of the year (which we ll later call buckets ), then what is the chance that any people in the group share a birthday with each other? Directly calculating this probability is obnoxious, but we can calculate the probability of this event using the probability of the copleent of this event; naely, we calculate the probability of no two people sharing the sae birthday (which is the copleent of the situation we care about) and subtract this probability fro 1. This (under the appropriate convention for the binoial coefficient) is 1 n1 365 k 365 D n nš 365 n. It s fairly clear that if you have 366 people in the roo, then (by the pigeonhole principle) you are guaranteed to have at least one shared birthday (and, indeed, the above forula captures this behavior!) The surprising thing is that the likelihood grows quite quickly: for n D 47, the probability of a shared birthday is slightly greater than 95%, and n D 23 is the first to ake a shared birthday ore likely than not. Figure shows how quickly this probability grows. The Birthday Paradox in Cryptography In cryptography, we are oen interested in the instance where soe rando process (which is either a deterinistic process that we are odeling as rando, or a literal rando process) happens to produce the sae output as soe prior output, which in this setting is called a collision. This is another application of the classic birthday paradox, but generally with ore possible buckets. We ll ignore the vulgarities of the actual calendar such as leap years, leap seconds, various conventions for the calendar, etc. We further assue that cows are spherical, and of unifor density. Making use of the laws of noncontradiction and excluded iddle.

2 Probability of a Shared Birthday n Figure : Probability of a Shared Birthday If we consider the case where there are buckets and n outputs, we can slightly abstract the above calculation and find that the probability of at least one collision is Pr.collision/ D 1 D1 n1 n1 k 1 k. () If we need to actually do calculations, then large quantities for n or ake the above calculation ipractical, but this gives us a hint as to how to proceed. Approxiation We develop a standard approxiation for the above by first reebering that e x D X j 0.1/ j x j j Š D 1 x C X.1/ j x j. () j Š j 2 For ease of notation, we ll denote " x D X.1/ j x j, j Š j 2 which (by the above) tells us that " x D e x C x 1. Soe calculus shows us that " x is non-negative, and is an increasing function when x > 0. One way of interpreting Equation () is that 1 x D e x " x, () The analogous closed for 1. n/nš n is also true, but it is generally ipractical to ake calculations based on this for of the equation.

3 and so for values of x very close to 0 we see that " x 0, so we can approxiate 1 x e x. If we apply this approxiation to Equation (), we arrive at Pr.collision/ 1 n1 e k D 1 exp 0 C 1 C C n 1 D 1 exp.n 1/.n/ 2. () For ease of notation, we ll denote.n 1/.n/ A D exp, 2 which is our approxiation of the probability of there not being a collision. We were operating under the assuption that our approxiation is reasonable, but we d like soe better idea as to how good the approxiation is for actual values of and n. For this, denote x k D k=: " D j.1 A/ Pr.collision/j D jpr.no collision/ Aj n1 D.1 x ˇ k / A ˇ n1 D e x k " ˇ xk Aˇˇˇˇˇ n1 D A 1 e x k " ˇ xk 1!ˇˇˇˇˇ D A 1 A 1 0 n1 e x k x k e x k! e n= n en= n n 2 D A B1 exp 1 n n A ƒ D exp.n 1/.n/ 2 M 1 exp 1 n 2 1 n n () () The step yielding Equation () is based on soe calculus, and the behavior of the ters being ultiplied together, given the possible values of x k. The sign change in Equation () tells us that the Pr.collision/ 1 A; in order to properly bound the probability of collision, we need to include the contribution of ".

4 Together, Equations () and () allow us to bound the probability of a collision given arbitrary input paraeters, naely Pr.collision/ D 1 A C " 1 A C A.1 M / 1 AM.n 1/.n/ D 1 exp 2 n.n C 1/ D 1 exp 2 exp 1 n n 2 n 1 n n We could bound the probability of collision as being less than p by bounding which is true if n.n C 1/ Pr.collision/ 1 exp 1 n n < p, 2 n.n C 1/ 1 p < exp 1 n n. 2 () Taking the log of both sides, we find n.n C 1/ log.1 p/ < C n log 1 n. () 2 Equation () is readily verified for various paraeter settings using a coputer algebra syste. Collision of Blocks In soe circustances, we have the case where collisions are in soe sense binned, that each choice could collide with soe fixed nuber of other choices. Conceptually, apping a rando output through any non-injective function could elicit such a situation, but we also encounter this situation in ore natural settings. In this case, we ll describe the bin size as b. Happily, this proceeds in uch the sae way as the above. First note that in ters of exact calculation, we have Pr.collision/ D 1 D1 D1 n1 n1 n1 bk 1 bk () 1 k. ().=b/ Equation () gives the equivalent forulation as Equation (), but perhaps Equation () gives a better intuitive notion of what is going on. This shows us that in the case that we are concerned with block

5 collisions, we have exactly the sae situation as the non-block case, but the nuber of buckets is the ratio =b. As the exact calculation takes this for, we can naturally use the sae approxiation that we have already developed by replacing the ter with the ratio =b. A Note on Conditional Probability We occasionally encounter situations where we have already done the work necessary to calculate the probability of a birthday collision aer n outputs into two collections of buckets (where each collection has a possibly different nuber of buckets) and we then want to consider a setting where these are cobinatorially cobined. For exaple, iagine that we have two rando processes, the first of which outputs a 16-bit value and the second of which outputs an 8-bit value. Using the above developent, it s easy to calculate the probability of collision for each aer 2 6 outputs (indeed, this can be accoplished with no need to approxiate, given a odern coputer). One can directly do the sae for a 24-bit value. Table : Independent Events: A Non-Exaple (n D 2 6 ) Pr.collision/ 2 8 p 8 D 0: p 16 D 0: p 24 D 0: We know that the axio of conditional probability tells us that if we have two events A and B, then Pr.A \ B/ D Pr.AjB/ Pr.B/, which, in the case that A and B are independent, gives the very useful Pr.A \ B/ D Pr.A/ Pr.B/ (when A and B are independent.) Observe that p 24 p 8 p 16, so the probability of collisions are not independent. The reason for this is soewhat clearer once one considers the exaple of two single-bit quantities. Aer three outputs, each single-bit quantity is guaranteed to collide with soe past output (there are, aer all, only two possible buckets!), but a single two-bit quantity only has a 62:5% chance of colliding aer 3 outputs. We need ore than both collisions happening for soe output, they ust collide on the sae output. The conclusion we should draw fro this is that we can t siply ultiply chances of collision together and expect to get soething sensible out, because these events are not independent. We ll try to avoid including the tie easureent fortnights in any calculations featuring this ratio of buckets per bin.

6 Motivating Exaples In each of the following exaples, we use Equation () to find the axial integer value of ` so that if, for a given value of, aer n D 2` outputs, the probability for a collision is less than soe given axiu probability bound for a collision, p.. CBC or OFB Modes With AES and DES In ode, inforation about the underlying plaintext leaks in the event that the cipher outputs a previously output value. In ode, such a collision causes the coplete coproise of all data encrypted aer that collision. If we odel and as rando aps, then we can directly apply the aterial we have just developed to find out how any ciphertexts can be output before the probability of producing a collision becoes higher than soe bound. For (which has a -bit block size), we let D 2 64 and for (which has a -bit block size), we let D Table : Maxiu Nuber of Encryptions for and in or ode Algorith p IPSec with GCM provides a way of using ode within ec s Encapsulating Security Payload (), so long as key agreeent is handled using an autoated key anageent syste, coonly or v. For this section, we assue that or v are being used. In Special Publication -, there ust be a chance of less than 2 32 that any particular is re-used with a particular key. For all calculations that follow in this section, we thus set p D 2 32, unless otherwise explicitly stated. In this use, the is always a -octet (-bit) value. The first part of the is the salt, a - octet value that is created using the sae process that produces the session keys for the security association; for this analysis, the salt and the session key are odeled as randoly distributed. We refer to each set of independent (or v) security associations as a key context; each key context has a particular (fixed) key and salt. The last part of the is an -octet, which is set in one of three ways:. A counter with a fixed starting point.. A counter with a randoly generated starting point.. A randoly generated value for each essage.

7 For copleteness, we also provide an analysis for the case where four of the octets of the are fixed to soe ID associated with the sender (e.g., the sender s IP) in order to coply with - IG A. (dated //)... Fixed Starting Point With a fixed starting point, one necessarily collides in the event that the key and salt collide, so the size of the colliding bitstring is the key length plus bits for the salt. As such, we have the results in Table. Table : Allowable Key Contexts (Fixed Starting Point Bounds) Key Length Key Contexts In this case, the size of the counter does not affect the collision bounds but does liit the nuber of possible essages within a single key context. As such, encoding the device s ID into the doesn t affect the nuber of allowable key contexts that can be used for the given collision probability bound, but does ake it so that the nuber of allowable key contexts applies only on a per-odule basis. The resulting nuber of essages per key context liits here are at ost 2 64 essages for ipleentations that use the full -octet as a counter, and 2 32 essages for ipleentations using 4 of the octets to encode an ID (leaving the reaining 4 octets to encode the counter.).. Randoly Generated Starting Point With a randoly generated starting point, you get the benefit of being able to guarantee no collision of the within a fixed key context, along with soe added resistance to collision provided by the rando starting index. To establish how uch added collision resistance we get, we need to first liit the nuber of essages that can be encrypted within a particular key context; this is a tunable paraeter, so we exaine a few reasonable settings for the nuber of essages per key context, which we ll call T. When you choose a starting point for the, x, you not only exclude all the selections up to x C T (which could be used within this key context) but also those starting aer x T (as selecting one of these could eventually cause a collision). We thus exclude at ost 2T selections for each choice (thus b D 2T ). As a special case, if there is effectively no liit on the nuber of essages, then T D 2 64 in the case where 8 octets are used for the counter, and T D 2 32 in the instance where 4 octets are used for the counter. (In this no liit case, we have ade it so that when a key and salt collision happen, then there will be a full collision). In order for the tuple (Key, ) to collide, we ust have a siultaneous collision of the key and salt, then additionally encounter a block collision. As a saple calculation of the nuber of buckets for a

8 128-bit key and a axiu of 2 32 essages per key context, we have D key ƒ (Binned) Counter Salt ƒ ƒ D 2 128C32C31 D Table : Allowable Key Contexts (Rando Starting Point Bounds) Key Length Max Encrypts per Key Context (T) If we effectively do not liit the nuber of essages per key context (and allow the full 2 64 distinct encryptions), this approach is equivalent to the case where we have a fixed starting point (this colun has the sae results as in Table ). If, in response to - IG A., we fixed octets of our by setting the to a device-specific identifier (e.g. the device IP), then there are only thirty-two bits of counter le to be randoly assigned. As such, we surely couldn t encrypt ore than 2 32 essages, and we are le with the bounds described in Table. Table : Allowable Key Contexts (Rando Starting Point Bounds, Copliance with IG A.) Key Length Max Encrypts per Key Context (T) This odification results in a reduction of both the allowable key contexts, and the total essages that can be encrypted within a single key context. The advantage of this approach is that it akes each device specific... Randoly Generated Per-Message ESP IVs In ec, the first four octets of the are fixed within a key context, so there are only eight octets available to be randoly set within a fixed key context. In order to aintain the desired per-key-context collision bound of 2 32, we ust restrict to at ost 2 16 essages within a fixed key context. In the event that a key-context collision has occurred (i.e., a particular key and salt cobination have been used again), the total collision probability would surely rise above our bound, so we are then again le with the situation addressed already in Table.

9 .. Attacker Model An attacker who wants to be prepared to attack a syste using in this way will be forced to dedicate soe aount of coputational and storage resources in order to notice that a collision has occurred. There are two basic approaches: an attacker can onitor within a particular key context, or an attacker can onitor across ultiple key contexts which (in the case where the address is not encoded into the ) could take place over any device capable of counicating using with ec. Attackers onitoring for collisions within a fixed key context need to store all the data within that particular key context. As the only approach outlined above susceptible to this style of attack is the rando per-essage approach, the attacker would have to store at ost 2 16 essages, each of which requires storage of at least octets (a -octet and a -octet ciphertext ust both be stored) and at ost roughly 2 32 octets (for IPv) or 2 16 octets (for IPv). Within a key context, duplication of the sent iplies a full (Key, ) collision, so an attacker just needs to copare the on at ost 2 16 essages. For an attacker to have a 2 32 chance of success, they ust then be willing to store 2 19 to 2 48 octets (roughly. MB to TB), with a practical axiu being approxiately GB (for attackers not dealing with IPv ipleentations that support jubogras). Looking for collisions within this data set requires at ost 2 16 operations, so this is an overall odest effort. Attackers onitoring for collisions across ultiple key contexts have a harder tie. They can again watch for collisions within the -octet, but this reveals relatively little. In practice, coparison of these s ay require substantial coputation (given the scale of the nubers involved), but for the purpose of this analysis, we assue that establishing if a particular has been seen before is a coputation that can occur in O.1/ operations (e.g., using the odel, a table lookup or optial hash table lookup). We also assue that the attacker can establish if there has indeed been a (Key, ) collision in O.1/ operations once the atches. Iportantly, the nuber of operations an attacker needs to perfor is never less than the nuber of essages gathered for an attack, as each additional essage requires soe processing to check if the has re-occurred, and if so then to check if this is an exaple of a (Key, ) collision. For exaple, if an attacker onitors 2 64 distinct key contexts, each with 2 16 essages in the, then the attack has a work factor of 2 80 coputations. These results are suarized in Table. All the attacks suarized in Table have a probability of success of 2 32 ; for coparison, the key exhaustion attacks with this probability of success have a coputational work factor of 2 96 for a 128-bit key, for a 192-bit key, and for a 256-bit key. A ore reasonable estiation of the effort required for an attack would be the the attacker s expected resource use for a successful attack; for this, we exaine the case of a probability bound of p D 1 2. These results are suarized in Table. All the attacks suarized in Table have a probability of success of 2 1 ; for coparison, the key exhaustion attacks with this probability of success have a coputational work factor of for a 128- bit key, for a 192-bit key, and for a 256-bit key. For Tables and, attacks with no coputational advantage over the relevant key exhaustion attacks are greyed out. Within these tables, the stated coputational bounds can be converted to storage bounds (in octets) by adding a storage factor to each exponent; this storage factor is between 3 (associated with

10 attacks on data streas containing only the sallest possible essages) to 32 (associated with attacks on data streas containing only the largest possible essages). Table : Attack Coputational Cost (p D 2 32 ) Key Length Max Encrypts per Key Context Fixed Starting Point Rando Starting Point Rando Starting Point (A.) N/A N/A N/A N/A N/A N/A Randoly Generated Per-Message N/A N/A N/A N/A N/A N/A N/A N/A N/A If an attacker is interested in finding a collision for one particular key context (and can thus discard data when it is found not to be related to the desired key context), then the aount of storage is draatically reduced, but so is the attacker s chance of success. In order to benefit fro a birthday style collision, the attacker ust be able to in soe sense retain all the data they have seen, which (as seen above) iposes a assive storage and coputational cost... Standards Details Soe of the above apparent options run afoul of various requireents or guidance. For what follows, we adopt the language of -. This docuent provides for two ways of constructing the, a deterinistic construction (specified in Section..) and a -based Construction (specified in Section..). Deterinistic Construction Setting a fixed starting point for the ust be considered a deterinistic construction of the. Setting a randoly generated starting point for the and then increenting fro there ay also be considered a deterinistic construction of the. In this setting, the salt can be considered In fact, the average cost per octet is best for the attacker when each essage is largest!

11 Table : Attack Expected Coputational Cost (p D 2 1 ) Key Length Max Encrypts per Key Context Fixed Starting Point Rando Starting Point Rando Starting Point (A.) N/A N/A N/A N/A N/A N/A Randoly Generated Per-Message N/A N/A N/A N/A N/A N/A N/A N/A N/A as part of the fixed field. The salt does not uniquely identify the device, so to satisfy the requireents of - IG A., an additional bits of the ust be fixed to soe identifying inforation (e.g., the device IP). This results in the invocation field being at ost bits. The above analysis suggests that requiring this fixed identifier within the does not substantially affect the difficulty of launching an attack fro a coputational perspective (indeed, it akes it worse in the randoly-set case); it does ake it so that an attacker ust gather a ridiculous aount of data fro one target, but this doesn t see wildly less practical than an attacker gathering an even ore ridiculous aount of data fro a possibly vast nuber of targets. Fundaentally, the attacker ust store all this data soewhere, and the aount of data involved is several orders of agnitude beyond anything available to all of huanity (the iniu storage for any of these attacks is on the order of yottabytes, or bytes), to say nothing of single (even well funded) attackers. -based Construction Starting with a randoly generated value (and then increenting fro there) and setting the randoly for each essage can both alost be considered a -based Construction of the. In this construction, the salt value ust be considered part of the free field, as it is not generated using an approved with a sufficient security strength, does not get increented along with the rest of the rando field as described in Paragraph of Section.., and is fundaentally associated with the Note that - does not appear to require encoding the address in case of ec with, as use of in ec assures that (as in paragraph of Section..) a fresh key is liited to a single session of a counication protocol, with probability bound vastly better than 2 32.

12 key context, not the particular essage. The reaining 64-bits of the (that is, the ) is thus categorized as the rando field. Unfortunately, even if this rando field is generated by an approved, it is not sufficiently large to eet the requireents of - Section.. (the rando field is required to be at least 96 bits by Paragraph of Section..). If the is considered suitably strong to be allowed to produce the session keys used in the ec security associations, then it sees reasonable to consider its output as rando-looking enough to ake up a portion of the rando field. Siilarly, though fixing a -octet portion of the rando field does ake the discussed 2 32 essage axiu the wrong bound for per-essage randoly generated rando fields, we saw above that a essage axiu of 2 16 yields the correct collision bound. In the instance that rando field is initially set randoly and then increented, this axiu nuber of essages has less significance.

16 Independence Definitions Potential Pitfall Alternative Formulation. mcs-ftl 2010/9/8 0:40 page 431 #437

16 Independence Definitions Potential Pitfall Alternative Formulation. mcs-ftl 2010/9/8 0:40 page 431 #437 cs-ftl 010/9/8 0:40 page 431 #437 16 Independence 16.1 efinitions Suppose that we flip two fair coins siultaneously on opposite sides of a roo. Intuitively, the way one coin lands does not affect the way

More information

This model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t.

This model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t. CS 493: Algoriths for Massive Data Sets Feb 2, 2002 Local Models, Bloo Filter Scribe: Qin Lv Local Models In global odels, every inverted file entry is copressed with the sae odel. This work wells when

More information

Figure 1: Equivalent electric (RC) circuit of a neurons membrane

Figure 1: Equivalent electric (RC) circuit of a neurons membrane Exercise: Leaky integrate and fire odel of neural spike generation This exercise investigates a siplified odel of how neurons spike in response to current inputs, one of the ost fundaental properties of

More information

Finite fields. and we ve used it in various examples and homework problems. In these notes I will introduce more finite fields

Finite fields. and we ve used it in various examples and homework problems. In these notes I will introduce more finite fields Finite fields I talked in class about the field with two eleents F 2 = {, } and we ve used it in various eaples and hoework probles. In these notes I will introduce ore finite fields F p = {,,...,p } for

More information

Non-Parametric Non-Line-of-Sight Identification 1

Non-Parametric Non-Line-of-Sight Identification 1 Non-Paraetric Non-Line-of-Sight Identification Sinan Gezici, Hisashi Kobayashi and H. Vincent Poor Departent of Electrical Engineering School of Engineering and Applied Science Princeton University, Princeton,

More information

Model Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon

Model Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon Model Fitting CURM Background Material, Fall 014 Dr. Doreen De Leon 1 Introduction Given a set of data points, we often want to fit a selected odel or type to the data (e.g., we suspect an exponential

More information

OBJECTIVES INTRODUCTION

OBJECTIVES INTRODUCTION M7 Chapter 3 Section 1 OBJECTIVES Suarize data using easures of central tendency, such as the ean, edian, ode, and idrange. Describe data using the easures of variation, such as the range, variance, and

More information

Feature Extraction Techniques

Feature Extraction Techniques Feature Extraction Techniques Unsupervised Learning II Feature Extraction Unsupervised ethods can also be used to find features which can be useful for categorization. There are unsupervised ethods that

More information

Note-A-Rific: Mechanical

Note-A-Rific: Mechanical Note-A-Rific: Mechanical Kinetic You ve probably heard of inetic energy in previous courses using the following definition and forula Any object that is oving has inetic energy. E ½ v 2 E inetic energy

More information

Polygonal Designs: Existence and Construction

Polygonal Designs: Existence and Construction Polygonal Designs: Existence and Construction John Hegean Departent of Matheatics, Stanford University, Stanford, CA 9405 Jeff Langford Departent of Matheatics, Drake University, Des Moines, IA 5011 G

More information

The Transactional Nature of Quantum Information

The Transactional Nature of Quantum Information The Transactional Nature of Quantu Inforation Subhash Kak Departent of Coputer Science Oklahoa State University Stillwater, OK 7478 ABSTRACT Inforation, in its counications sense, is a transactional property.

More information

The Weierstrass Approximation Theorem

The Weierstrass Approximation Theorem 36 The Weierstrass Approxiation Theore Recall that the fundaental idea underlying the construction of the real nubers is approxiation by the sipler rational nubers. Firstly, nubers are often deterined

More information

In this chapter, we consider several graph-theoretic and probabilistic models

In this chapter, we consider several graph-theoretic and probabilistic models THREE ONE GRAPH-THEORETIC AND STATISTICAL MODELS 3.1 INTRODUCTION In this chapter, we consider several graph-theoretic and probabilistic odels for a social network, which we do under different assuptions

More information

arxiv: v1 [cs.ds] 17 Mar 2016

arxiv: v1 [cs.ds] 17 Mar 2016 Tight Bounds for Single-Pass Streaing Coplexity of the Set Cover Proble Sepehr Assadi Sanjeev Khanna Yang Li Abstract arxiv:1603.05715v1 [cs.ds] 17 Mar 2016 We resolve the space coplexity of single-pass

More information

A Note on Scheduling Tall/Small Multiprocessor Tasks with Unit Processing Time to Minimize Maximum Tardiness

A Note on Scheduling Tall/Small Multiprocessor Tasks with Unit Processing Time to Minimize Maximum Tardiness A Note on Scheduling Tall/Sall Multiprocessor Tasks with Unit Processing Tie to Miniize Maxiu Tardiness Philippe Baptiste and Baruch Schieber IBM T.J. Watson Research Center P.O. Box 218, Yorktown Heights,

More information

A note on the multiplication of sparse matrices

A note on the multiplication of sparse matrices Cent. Eur. J. Cop. Sci. 41) 2014 1-11 DOI: 10.2478/s13537-014-0201-x Central European Journal of Coputer Science A note on the ultiplication of sparse atrices Research Article Keivan Borna 12, Sohrab Aboozarkhani

More information

e-companion ONLY AVAILABLE IN ELECTRONIC FORM

e-companion ONLY AVAILABLE IN ELECTRONIC FORM OPERATIONS RESEARCH doi 10.1287/opre.1070.0427ec pp. ec1 ec5 e-copanion ONLY AVAILABLE IN ELECTRONIC FORM infors 07 INFORMS Electronic Copanion A Learning Approach for Interactive Marketing to a Custoer

More information

1 Generalization bounds based on Rademacher complexity

1 Generalization bounds based on Rademacher complexity COS 5: Theoretical Machine Learning Lecturer: Rob Schapire Lecture #0 Scribe: Suqi Liu March 07, 08 Last tie we started proving this very general result about how quickly the epirical average converges

More information

CSE525: Randomized Algorithms and Probabilistic Analysis May 16, Lecture 13

CSE525: Randomized Algorithms and Probabilistic Analysis May 16, Lecture 13 CSE55: Randoied Algoriths and obabilistic Analysis May 6, Lecture Lecturer: Anna Karlin Scribe: Noah Siegel, Jonathan Shi Rando walks and Markov chains This lecture discusses Markov chains, which capture

More information

Physically Based Modeling CS Notes Spring 1997 Particle Collision and Contact

Physically Based Modeling CS Notes Spring 1997 Particle Collision and Contact Physically Based Modeling CS 15-863 Notes Spring 1997 Particle Collision and Contact 1 Collisions with Springs Suppose we wanted to ipleent a particle siulator with a floor : a solid horizontal plane which

More information

Ocean 420 Physical Processes in the Ocean Project 1: Hydrostatic Balance, Advection and Diffusion Answers

Ocean 420 Physical Processes in the Ocean Project 1: Hydrostatic Balance, Advection and Diffusion Answers Ocean 40 Physical Processes in the Ocean Project 1: Hydrostatic Balance, Advection and Diffusion Answers 1. Hydrostatic Balance a) Set all of the levels on one of the coluns to the lowest possible density.

More information

2 Q 10. Likewise, in case of multiple particles, the corresponding density in 2 must be averaged over all

2 Q 10. Likewise, in case of multiple particles, the corresponding density in 2 must be averaged over all Lecture 6 Introduction to kinetic theory of plasa waves Introduction to kinetic theory So far we have been odeling plasa dynaics using fluid equations. The assuption has been that the pressure can be either

More information

ma x = -bv x + F rod.

ma x = -bv x + F rod. Notes on Dynaical Systes Dynaics is the study of change. The priary ingredients of a dynaical syste are its state and its rule of change (also soeties called the dynaic). Dynaical systes can be continuous

More information

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices CS71 Randoness & Coputation Spring 018 Instructor: Alistair Sinclair Lecture 13: February 7 Disclaier: These notes have not been subjected to the usual scrutiny accorded to foral publications. They ay

More information

Block designs and statistics

Block designs and statistics Bloc designs and statistics Notes for Math 447 May 3, 2011 The ain paraeters of a bloc design are nuber of varieties v, bloc size, nuber of blocs b. A design is built on a set of v eleents. Each eleent

More information

Sampling How Big a Sample?

Sampling How Big a Sample? C. G. G. Aitken, 1 Ph.D. Sapling How Big a Saple? REFERENCE: Aitken CGG. Sapling how big a saple? J Forensic Sci 1999;44(4):750 760. ABSTRACT: It is thought that, in a consignent of discrete units, a certain

More information

Ph 20.3 Numerical Solution of Ordinary Differential Equations

Ph 20.3 Numerical Solution of Ordinary Differential Equations Ph 20.3 Nuerical Solution of Ordinary Differential Equations Due: Week 5 -v20170314- This Assignent So far, your assignents have tried to failiarize you with the hardware and software in the Physics Coputing

More information

arxiv: v1 [cs.ds] 3 Feb 2014

arxiv: v1 [cs.ds] 3 Feb 2014 arxiv:40.043v [cs.ds] 3 Feb 04 A Bound on the Expected Optiality of Rando Feasible Solutions to Cobinatorial Optiization Probles Evan A. Sultani The Johns Hopins University APL evan@sultani.co http://www.sultani.co/

More information

arxiv: v3 [cs.ds] 22 Mar 2016

arxiv: v3 [cs.ds] 22 Mar 2016 A Shifting Bloo Filter Fraewor for Set Queries arxiv:1510.03019v3 [cs.ds] Mar 01 ABSTRACT Tong Yang Peing University, China yangtongeail@gail.co Yuanun Zhong Nanjing University, China un@sail.nju.edu.cn

More information

Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links

Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Tie-Varying Jaing Links Jun Kurihara KDDI R&D Laboratories, Inc 2 5 Ohara, Fujiino, Saitaa, 356 8502 Japan Eail: kurihara@kddilabsjp

More information

Probability Distributions

Probability Distributions Probability Distributions In Chapter, we ephasized the central role played by probability theory in the solution of pattern recognition probles. We turn now to an exploration of soe particular exaples

More information

Soft Computing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis

Soft Computing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis Soft Coputing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis Beverly Rivera 1,2, Irbis Gallegos 1, and Vladik Kreinovich 2 1 Regional Cyber and Energy Security Center RCES

More information

Some Perspective. Forces and Newton s Laws

Some Perspective. Forces and Newton s Laws Soe Perspective The language of Kineatics provides us with an efficient ethod for describing the otion of aterial objects, and we ll continue to ake refineents to it as we introduce additional types of

More information

A Simple Regression Problem

A Simple Regression Problem A Siple Regression Proble R. M. Castro March 23, 2 In this brief note a siple regression proble will be introduced, illustrating clearly the bias-variance tradeoff. Let Y i f(x i ) + W i, i,..., n, where

More information

When Short Runs Beat Long Runs

When Short Runs Beat Long Runs When Short Runs Beat Long Runs Sean Luke George Mason University http://www.cs.gu.edu/ sean/ Abstract What will yield the best results: doing one run n generations long or doing runs n/ generations long

More information

P (t) = P (t = 0) + F t Conclusion: If we wait long enough, the velocity of an electron will diverge, which is obviously impossible and wrong.

P (t) = P (t = 0) + F t Conclusion: If we wait long enough, the velocity of an electron will diverge, which is obviously impossible and wrong. 4 Phys520.nb 2 Drude theory ~ Chapter in textbook 2.. The relaxation tie approxiation Here we treat electrons as a free ideal gas (classical) 2... Totally ignore interactions/scatterings Under a static

More information

Using EM To Estimate A Probablity Density With A Mixture Of Gaussians

Using EM To Estimate A Probablity Density With A Mixture Of Gaussians Using EM To Estiate A Probablity Density With A Mixture Of Gaussians Aaron A. D Souza adsouza@usc.edu Introduction The proble we are trying to address in this note is siple. Given a set of data points

More information

LogLog-Beta and More: A New Algorithm for Cardinality Estimation Based on LogLog Counting

LogLog-Beta and More: A New Algorithm for Cardinality Estimation Based on LogLog Counting LogLog-Beta and More: A New Algorith for Cardinality Estiation Based on LogLog Counting Jason Qin, Denys Ki, Yuei Tung The AOLP Core Data Service, AOL, 22000 AOL Way Dulles, VA 20163 E-ail: jasonqin@teaaolco

More information

Reading from Young & Freedman: For this topic, read the introduction to chapter 25 and sections 25.1 to 25.3 & 25.6.

Reading from Young & Freedman: For this topic, read the introduction to chapter 25 and sections 25.1 to 25.3 & 25.6. PHY10 Electricity Topic 6 (Lectures 9 & 10) Electric Current and Resistance n this topic, we will cover: 1) Current in a conductor ) Resistivity 3) Resistance 4) Oh s Law 5) The Drude Model of conduction

More information

E0 370 Statistical Learning Theory Lecture 6 (Aug 30, 2011) Margin Analysis

E0 370 Statistical Learning Theory Lecture 6 (Aug 30, 2011) Margin Analysis E0 370 tatistical Learning Theory Lecture 6 (Aug 30, 20) Margin Analysis Lecturer: hivani Agarwal cribe: Narasihan R Introduction In the last few lectures we have seen how to obtain high confidence bounds

More information

General Properties of Radiation Detectors Supplements

General Properties of Radiation Detectors Supplements Phys. 649: Nuclear Techniques Physics Departent Yarouk University Chapter 4: General Properties of Radiation Detectors Suppleents Dr. Nidal M. Ershaidat Overview Phys. 649: Nuclear Techniques Physics Departent

More information

ASSUME a source over an alphabet size m, from which a sequence of n independent samples are drawn. The classical

ASSUME a source over an alphabet size m, from which a sequence of n independent samples are drawn. The classical IEEE TRANSACTIONS ON INFORMATION THEORY Large Alphabet Source Coding using Independent Coponent Analysis Aichai Painsky, Meber, IEEE, Saharon Rosset and Meir Feder, Fellow, IEEE arxiv:67.7v [cs.it] Jul

More information

SPECTRUM sensing is a core concept of cognitive radio

SPECTRUM sensing is a core concept of cognitive radio World Acadey of Science, Engineering and Technology International Journal of Electronics and Counication Engineering Vol:6, o:2, 202 Efficient Detection Using Sequential Probability Ratio Test in Mobile

More information

3.8 Three Types of Convergence

3.8 Three Types of Convergence 3.8 Three Types of Convergence 3.8 Three Types of Convergence 93 Suppose that we are given a sequence functions {f k } k N on a set X and another function f on X. What does it ean for f k to converge to

More information

Probability and Stochastic Processes: A Friendly Introduction for Electrical and Computer Engineers Roy D. Yates and David J.

Probability and Stochastic Processes: A Friendly Introduction for Electrical and Computer Engineers Roy D. Yates and David J. Probability and Stochastic Processes: A Friendly Introduction for Electrical and oputer Engineers Roy D. Yates and David J. Goodan Proble Solutions : Yates and Goodan,1..3 1.3.1 1.4.6 1.4.7 1.4.8 1..6

More information

Ch 12: Variations on Backpropagation

Ch 12: Variations on Backpropagation Ch 2: Variations on Backpropagation The basic backpropagation algorith is too slow for ost practical applications. It ay take days or weeks of coputer tie. We deonstrate why the backpropagation algorith

More information

A Note on the Applied Use of MDL Approximations

A Note on the Applied Use of MDL Approximations A Note on the Applied Use of MDL Approxiations Daniel J. Navarro Departent of Psychology Ohio State University Abstract An applied proble is discussed in which two nested psychological odels of retention

More information

Intelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines

Intelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines Intelligent Systes: Reasoning and Recognition Jaes L. Crowley osig 1 Winter Seester 2018 Lesson 6 27 February 2018 Outline Perceptrons and Support Vector achines Notation...2 Linear odels...3 Lines, Planes

More information

Midterm 1 Sample Solution

Midterm 1 Sample Solution Midter 1 Saple Solution NOTE: Throughout the exa a siple graph is an undirected, unweighted graph with no ultiple edges (i.e., no exact repeats of the sae edge) and no self-loops (i.e., no edges fro a

More information

Bootstrapping Dependent Data

Bootstrapping Dependent Data Bootstrapping Dependent Data One of the key issues confronting bootstrap resapling approxiations is how to deal with dependent data. Consider a sequence fx t g n t= of dependent rando variables. Clearly

More information

Approximation in Stochastic Scheduling: The Power of LP-Based Priority Policies

Approximation in Stochastic Scheduling: The Power of LP-Based Priority Policies Approxiation in Stochastic Scheduling: The Power of -Based Priority Policies Rolf Möhring, Andreas Schulz, Marc Uetz Setting (A P p stoch, r E( w and (B P p stoch E( w We will assue that the processing

More information

Course Notes for EE227C (Spring 2018): Convex Optimization and Approximation

Course Notes for EE227C (Spring 2018): Convex Optimization and Approximation Course Notes for EE227C (Spring 2018): Convex Optiization and Approxiation Instructor: Moritz Hardt Eail: hardt+ee227c@berkeley.edu Graduate Instructor: Max Sichowitz Eail: sichow+ee227c@berkeley.edu October

More information

The Chebyshev Matching Transformer

The Chebyshev Matching Transformer /9/ The Chebyshev Matching Transforer /5 The Chebyshev Matching Transforer An alternative to Binoial (Maxially Flat) functions (and there are any such alternatives!) are Chebyshev polynoials. Pafnuty Chebyshev

More information

Reducing Vibration and Providing Robustness with Multi-Input Shapers

Reducing Vibration and Providing Robustness with Multi-Input Shapers 29 Aerican Control Conference Hyatt Regency Riverfront, St. Louis, MO, USA June -2, 29 WeA6.4 Reducing Vibration and Providing Robustness with Multi-Input Shapers Joshua Vaughan and Willia Singhose Abstract

More information

ESTIMATING AND FORMING CONFIDENCE INTERVALS FOR EXTREMA OF RANDOM POLYNOMIALS. A Thesis. Presented to. The Faculty of the Department of Mathematics

ESTIMATING AND FORMING CONFIDENCE INTERVALS FOR EXTREMA OF RANDOM POLYNOMIALS. A Thesis. Presented to. The Faculty of the Department of Mathematics ESTIMATING AND FORMING CONFIDENCE INTERVALS FOR EXTREMA OF RANDOM POLYNOMIALS A Thesis Presented to The Faculty of the Departent of Matheatics San Jose State University In Partial Fulfillent of the Requireents

More information

arxiv: v3 [quant-ph] 18 Oct 2017

arxiv: v3 [quant-ph] 18 Oct 2017 Self-guaranteed easureent-based quantu coputation Masahito Hayashi 1,, and Michal Hajdušek, 1 Graduate School of Matheatics, Nagoya University, Furocho, Chikusa-ku, Nagoya 464-860, Japan Centre for Quantu

More information

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 11 10/15/2008 ABSTRACT INTEGRATION I

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 11 10/15/2008 ABSTRACT INTEGRATION I MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 11 10/15/2008 ABSTRACT INTEGRATION I Contents 1. Preliinaries 2. The ain result 3. The Rieann integral 4. The integral of a nonnegative

More information

Symbolic Analysis as Universal Tool for Deriving Properties of Non-linear Algorithms Case study of EM Algorithm

Symbolic Analysis as Universal Tool for Deriving Properties of Non-linear Algorithms Case study of EM Algorithm Acta Polytechnica Hungarica Vol., No., 04 Sybolic Analysis as Universal Tool for Deriving Properties of Non-linear Algoriths Case study of EM Algorith Vladiir Mladenović, Miroslav Lutovac, Dana Porrat

More information

Module #1: Units and Vectors Revisited. Introduction. Units Revisited EXAMPLE 1.1. A sample of iron has a mass of mg. How many kg is that?

Module #1: Units and Vectors Revisited. Introduction. Units Revisited EXAMPLE 1.1. A sample of iron has a mass of mg. How many kg is that? Module #1: Units and Vectors Revisited Introduction There are probably no concepts ore iportant in physics than the two listed in the title of this odule. In your first-year physics course, I a sure that

More information

Biostatistics Department Technical Report

Biostatistics Department Technical Report Biostatistics Departent Technical Report BST006-00 Estiation of Prevalence by Pool Screening With Equal Sized Pools and a egative Binoial Sapling Model Charles R. Katholi, Ph.D. Eeritus Professor Departent

More information

What is Probability? (again)

What is Probability? (again) INRODUCTION TO ROBBILITY Basic Concepts and Definitions n experient is any process that generates well-defined outcoes. Experient: Record an age Experient: Toss a die Experient: Record an opinion yes,

More information

A remark on a success rate model for DPA and CPA

A remark on a success rate model for DPA and CPA A reark on a success rate odel for DPA and CPA A. Wieers, BSI Version 0.5 andreas.wieers@bsi.bund.de Septeber 5, 2018 Abstract The success rate is the ost coon evaluation etric for easuring the perforance

More information

COS 424: Interacting with Data. Written Exercises

COS 424: Interacting with Data. Written Exercises COS 424: Interacting with Data Hoework #4 Spring 2007 Regression Due: Wednesday, April 18 Written Exercises See the course website for iportant inforation about collaboration and late policies, as well

More information

Time-memory tradeoff attacks

Time-memory tradeoff attacks Charles University in Prague Faculty of Matheatics and Physics BACHELOR THESIS Monika Seidlová Tie-eory tradeoff attacks Departent of Algebra Supervisor of the bachelor thesis: Study prograe: Specialization:

More information

CS Lecture 13. More Maximum Likelihood

CS Lecture 13. More Maximum Likelihood CS 6347 Lecture 13 More Maxiu Likelihood Recap Last tie: Introduction to axiu likelihood estiation MLE for Bayesian networks Optial CPTs correspond to epirical counts Today: MLE for CRFs 2 Maxiu Likelihood

More information

Distributed Subgradient Methods for Multi-agent Optimization

Distributed Subgradient Methods for Multi-agent Optimization 1 Distributed Subgradient Methods for Multi-agent Optiization Angelia Nedić and Asuan Ozdaglar October 29, 2007 Abstract We study a distributed coputation odel for optiizing a su of convex objective functions

More information

Interactive Markov Models of Evolutionary Algorithms

Interactive Markov Models of Evolutionary Algorithms Cleveland State University EngagedScholarship@CSU Electrical Engineering & Coputer Science Faculty Publications Electrical Engineering & Coputer Science Departent 2015 Interactive Markov Models of Evolutionary

More information

arxiv:math/ v1 [math.co] 22 Jul 2005

arxiv:math/ v1 [math.co] 22 Jul 2005 Distances between the winning nubers in Lottery Konstantinos Drakakis arxiv:ath/0507469v1 [ath.co] 22 Jul 2005 16 March 2005 Abstract We prove an interesting fact about Lottery: the winning 6 nubers (out

More information

A method to determine relative stroke detection efficiencies from multiplicity distributions

A method to determine relative stroke detection efficiencies from multiplicity distributions A ethod to deterine relative stroke detection eiciencies ro ultiplicity distributions Schulz W. and Cuins K. 2. Austrian Lightning Detection and Inoration Syste (ALDIS), Kahlenberger Str.2A, 90 Vienna,

More information

Inspection; structural health monitoring; reliability; Bayesian analysis; updating; decision analysis; value of information

Inspection; structural health monitoring; reliability; Bayesian analysis; updating; decision analysis; value of information Cite as: Straub D. (2014). Value of inforation analysis with structural reliability ethods. Structural Safety, 49: 75-86. Value of Inforation Analysis with Structural Reliability Methods Daniel Straub

More information

Multicollision Attacks on Some Generalized Sequential Hash Functions

Multicollision Attacks on Some Generalized Sequential Hash Functions Multicollision Attacks on Soe Generalized Sequential Hash Functions M. Nandi David R. Cheriton School of Coputer Science University of Waterloo Waterloo, Ontario N2L 3G1, Canada 2nandi@uwaterloo.ca D.

More information

A Better Algorithm For an Ancient Scheduling Problem. David R. Karger Steven J. Phillips Eric Torng. Department of Computer Science

A Better Algorithm For an Ancient Scheduling Problem. David R. Karger Steven J. Phillips Eric Torng. Department of Computer Science A Better Algorith For an Ancient Scheduling Proble David R. Karger Steven J. Phillips Eric Torng Departent of Coputer Science Stanford University Stanford, CA 9435-4 Abstract One of the oldest and siplest

More information

arxiv: v2 [math.co] 3 Dec 2008

arxiv: v2 [math.co] 3 Dec 2008 arxiv:0805.2814v2 [ath.co] 3 Dec 2008 Connectivity of the Unifor Rando Intersection Graph Sion R. Blacburn and Stefanie Gere Departent of Matheatics Royal Holloway, University of London Egha, Surrey TW20

More information

LAB MECH8.COMP From Physics with Computers, Vernier Software & Technology, 2003.

LAB MECH8.COMP From Physics with Computers, Vernier Software & Technology, 2003. LAB MECH8.COMP Fro Physics with Coputers, Vernier Software & Technology, 003. INTRODUCTION You have probably watched a ball roll off a table and strike the floor. What deterines where it will land? Could

More information

Generalized Alignment Chain: Improved Converse Results for Index Coding

Generalized Alignment Chain: Improved Converse Results for Index Coding Generalized Alignent Chain: Iproved Converse Results for Index Coding Yucheng Liu and Parastoo Sadeghi Research School of Electrical, Energy and Materials Engineering Australian National University, Canberra,

More information

a a a a a a a m a b a b

a a a a a a a m a b a b Algebra / Trig Final Exa Study Guide (Fall Seester) Moncada/Dunphy Inforation About the Final Exa The final exa is cuulative, covering Appendix A (A.1-A.5) and Chapter 1. All probles will be ultiple choice

More information

Proc. of the IEEE/OES Seventh Working Conference on Current Measurement Technology UNCERTAINTIES IN SEASONDE CURRENT VELOCITIES

Proc. of the IEEE/OES Seventh Working Conference on Current Measurement Technology UNCERTAINTIES IN SEASONDE CURRENT VELOCITIES Proc. of the IEEE/OES Seventh Working Conference on Current Measureent Technology UNCERTAINTIES IN SEASONDE CURRENT VELOCITIES Belinda Lipa Codar Ocean Sensors 15 La Sandra Way, Portola Valley, CA 98 blipa@pogo.co

More information

Now multiply the left-hand-side by ω and the right-hand side by dδ/dt (recall ω= dδ/dt) to get:

Now multiply the left-hand-side by ω and the right-hand side by dδ/dt (recall ω= dδ/dt) to get: Equal Area Criterion.0 Developent of equal area criterion As in previous notes, all powers are in per-unit. I want to show you the equal area criterion a little differently than the book does it. Let s

More information

Support Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization

Support Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization Recent Researches in Coputer Science Support Vector Machine Classification of Uncertain and Ibalanced data using Robust Optiization RAGHAV PAT, THEODORE B. TRAFALIS, KASH BARKER School of Industrial Engineering

More information

Randomized Accuracy-Aware Program Transformations For Efficient Approximate Computations

Randomized Accuracy-Aware Program Transformations For Efficient Approximate Computations Randoized Accuracy-Aware Progra Transforations For Efficient Approxiate Coputations Zeyuan Allen Zhu Sasa Misailovic Jonathan A. Kelner Martin Rinard MIT CSAIL zeyuan@csail.it.edu isailo@it.edu kelner@it.edu

More information

2.9 Feedback and Feedforward Control

2.9 Feedback and Feedforward Control 2.9 Feedback and Feedforward Control M. F. HORDESKI (985) B. G. LIPTÁK (995) F. G. SHINSKEY (970, 2005) Feedback control is the action of oving a anipulated variable in response to a deviation or error

More information

List Scheduling and LPT Oliver Braun (09/05/2017)

List Scheduling and LPT Oliver Braun (09/05/2017) List Scheduling and LPT Oliver Braun (09/05/207) We investigate the classical scheduling proble P ax where a set of n independent jobs has to be processed on 2 parallel and identical processors (achines)

More information

Supplementary Information for Design of Bending Multi-Layer Electroactive Polymer Actuators

Supplementary Information for Design of Bending Multi-Layer Electroactive Polymer Actuators Suppleentary Inforation for Design of Bending Multi-Layer Electroactive Polyer Actuators Bavani Balakrisnan, Alek Nacev, and Elisabeth Sela University of Maryland, College Park, Maryland 074 1 Analytical

More information

3.3 Variational Characterization of Singular Values

3.3 Variational Characterization of Singular Values 3.3. Variational Characterization of Singular Values 61 3.3 Variational Characterization of Singular Values Since the singular values are square roots of the eigenvalues of the Heritian atrices A A and

More information

PHY 171. Lecture 14. (February 16, 2012)

PHY 171. Lecture 14. (February 16, 2012) PHY 171 Lecture 14 (February 16, 212) In the last lecture, we looked at a quantitative connection between acroscopic and icroscopic quantities by deriving an expression for pressure based on the assuptions

More information

On the Maximum Likelihood Estimation of Weibull Distribution with Lifetime Data of Hard Disk Drives

On the Maximum Likelihood Estimation of Weibull Distribution with Lifetime Data of Hard Disk Drives 314 Int'l Conf. Par. and Dist. Proc. Tech. and Appl. PDPTA'17 On the Maxiu Likelihood Estiation of Weibull Distribution with Lifetie Data of Hard Disk Drives Daiki Koizui Departent of Inforation and Manageent

More information

Pattern Recognition and Machine Learning. Artificial Neural networks

Pattern Recognition and Machine Learning. Artificial Neural networks Pattern Recognition and Machine Learning Jaes L. Crowley ENSIMAG 3 - MMIS Fall Seester 2017 Lessons 7 20 Dec 2017 Outline Artificial Neural networks Notation...2 Introduction...3 Key Equations... 3 Artificial

More information

Handwriting Detection Model Based on Four-Dimensional Vector Space Model

Handwriting Detection Model Based on Four-Dimensional Vector Space Model Journal of Matheatics Research; Vol. 10, No. 4; August 2018 ISSN 1916-9795 E-ISSN 1916-9809 Published by Canadian Center of Science and Education Handwriting Detection Model Based on Four-Diensional Vector

More information

Uncoupled automata and pure Nash equilibria

Uncoupled automata and pure Nash equilibria Int J Gae Theory (200) 39:483 502 DOI 0.007/s0082-00-0227-9 ORIGINAL PAPER Uncoupled autoata and pure Nash equilibria Yakov Babichenko Accepted: 2 February 200 / Published online: 20 March 200 Springer-Verlag

More information

Principal Components Analysis

Principal Components Analysis Principal Coponents Analysis Cheng Li, Bingyu Wang Noveber 3, 204 What s PCA Principal coponent analysis (PCA) is a statistical procedure that uses an orthogonal transforation to convert a set of observations

More information

Support recovery in compressed sensing: An estimation theoretic approach

Support recovery in compressed sensing: An estimation theoretic approach Support recovery in copressed sensing: An estiation theoretic approach Ain Karbasi, Ali Horati, Soheil Mohajer, Martin Vetterli School of Coputer and Counication Sciences École Polytechnique Fédérale de

More information

DERIVING PROPER UNIFORM PRIORS FOR REGRESSION COEFFICIENTS

DERIVING PROPER UNIFORM PRIORS FOR REGRESSION COEFFICIENTS DERIVING PROPER UNIFORM PRIORS FOR REGRESSION COEFFICIENTS N. van Erp and P. van Gelder Structural Hydraulic and Probabilistic Design, TU Delft Delft, The Netherlands Abstract. In probles of odel coparison

More information

Lecture 21 Principle of Inclusion and Exclusion

Lecture 21 Principle of Inclusion and Exclusion Lecture 21 Principle of Inclusion and Exclusion Holden Lee and Yoni Miller 5/6/11 1 Introduction and first exaples We start off with an exaple Exaple 11: At Sunnydale High School there are 28 students

More information

Data Streaming Algorithms for Efficient and Accurate Estimation of Flow Size Distribution

Data Streaming Algorithms for Efficient and Accurate Estimation of Flow Size Distribution Data Streaing Algoriths for Efficient and Accurate Estiation of Flow Size Distribution Abhishek Kuar Minho Sung Jun (Ji) Xu College of Coputing Georgia Institute of Technology {akuar,hsung,jx}@cc.gatech.edu

More information

Tight Bounds for Maximal Identifiability of Failure Nodes in Boolean Network Tomography

Tight Bounds for Maximal Identifiability of Failure Nodes in Boolean Network Tomography Tight Bounds for axial Identifiability of Failure Nodes in Boolean Network Toography Nicola Galesi Sapienza Università di Roa nicola.galesi@uniroa1.it Fariba Ranjbar Sapienza Università di Roa fariba.ranjbar@uniroa1.it

More information

8.1 Force Laws Hooke s Law

8.1 Force Laws Hooke s Law 8.1 Force Laws There are forces that don't change appreciably fro one instant to another, which we refer to as constant in tie, and forces that don't change appreciably fro one point to another, which

More information

Saddle Points in Random Matrices: Analysis of Knuth Search Algorithms

Saddle Points in Random Matrices: Analysis of Knuth Search Algorithms Saddle Points in Rando Matrices: Analysis of Knuth Search Algoriths Micha Hofri Philippe Jacquet Dept. of Coputer Science INRIA, Doaine de Voluceau - Rice University Rocquencourt - B.P. 05 Houston TX 77005

More information

IN modern society that various systems have become more

IN modern society that various systems have become more Developent of Reliability Function in -Coponent Standby Redundant Syste with Priority Based on Maxiu Entropy Principle Ryosuke Hirata, Ikuo Arizono, Ryosuke Toohiro, Satoshi Oigawa, and Yasuhiko Takeoto

More information

Problem Set 2. Chapter 1 Numerical:

Problem Set 2. Chapter 1 Numerical: Chapter 1 Nuerical: roble Set 16. The atoic radius of xenon is 18 p. Is that consistent with its b paraeter of 5.15 1 - L/ol? Hint: what is the volue of a ole of xenon atos and how does that copare to

More information

Support Vector Machines MIT Course Notes Cynthia Rudin

Support Vector Machines MIT Course Notes Cynthia Rudin Support Vector Machines MIT 5.097 Course Notes Cynthia Rudin Credit: Ng, Hastie, Tibshirani, Friedan Thanks: Şeyda Ertekin Let s start with soe intuition about argins. The argin of an exaple x i = distance

More information