On the Stopping Distance and the Stopping Redundancy of Codes
|
|
- Moses Nicholson
- 5 years ago
- Views:
Transcription
1 On the Stoppng Dstance and the Stoppng Redundancy of Codes Moshe Schwartz Unversty of Calforna San Dego La Jolla, CA 92093, U.S.A. Abstract It s now well known that the performance of a lnear code C under teratve decodng on a bnary erasure channel (and other channels) s determned by the sze of the smallest stoppng set n the Tanner graph for C. Several recent papers refer to ths parameter as the stoppng dstance s of C. Ths s somewhat of a msnomer snce the sze of the smallest stoppng set n the Tanner graph for C depends on the correspondng choce of a party-check matrx. It s easy to see that s d, whered s the mnmum Hammng dstance of C, and we show that t s always possble to choose a party-check matrx for C (wth suffcently many dependent rows) such that s = d. We thus ntroduce a new parameter, termed the stoppng redundancy of C, defned as the mnmum number of rows n a party-check matrx H for C such that the correspondng stoppng dstance s(h) attans ts largest possble value, namely s(h) =d. We then derve general bounds on the stoppng redundancy of lnear codes. We also examne several smple ways of constructng codes from other codes, and study the effect of these constructons on the stoppng redundancy. Specfcally, for the famly of bnary Reed-Muller codes (of all orders), we prove that ther stoppng redundancy s at most a constant tmes ther conventonal redundancy. We show that the stoppng redundances of the bnary and ternary extended Golay codes are at most 34 and 22, respectvely. Fnally, we provde upper and lower bounds on the stoppng redundancy of MDS codes. I. INTRODUCTION The recent surge of of renewed nterest n the bnary erasure channel (BEC) s due n large part to the fact that t s the prme example of a channel over whch the performance of teratve decodng algorthms can be analyzed precsely. In partcular, t was shown n [3] that the performance of an LDPC code (and, n fact, any lnear code) under teratve decodng on the BEC s completely determned by certan combnatoral structures called stoppng sets. A stoppng set S n a code C s a subset of the varable nodes n a Tanner graph for C such that all the neghbors of S are connected to S at least twce. The sze s of the smallest stoppng set was termed the stoppng dstance of C n a number of recent papers [5], [7]. The stoppng dstance plays an mportant role n understandng the performance of a code under teratve decodng over the BEC, akn to the role played by the mnmum Hammng dstance d for maxmum-lkelhood decodng. Just as one would lke to maxmze the mnmum dstance d f maxmum-lkelhood or algebrac decodng s to be used, so one should try to maxmze the stoppng dstance s n the case of teratve decodng. There s, however, an mportant dfference between the mnmal dstance d and the stoppng dstance s. Whle the former s a property of a code C, the latter depends on the specfc Alexander Vardy Unversty of Calforna San Dego La Jolla, CA 92093, U.S.A. vardy@klmanjaro.ucsd.edu Tanner graph for C or, equvalently, on the specfc choce of a party-check matrx H for C. In order to emphasze ths, we wll henceforth use s(h) to denote the stoppng dstance and d(c) to denote the mnmum dstance. In algebrac codng theory, a party-check matrx H for a lnear code C usually has n dm(c) lnearly ndependent rows. However, n the context of teratve decodng, t has been already observed n [8], [10] and other papers that addng lnearly dependent rows to H can be advantageous. Certanly, ths can ncrease the stoppng dstance s(h). Thus, throughout ths paper, a party-check matrx for C should be understood as any matrx H whose rows span the dual code C. Then the redundancy r(c) of C may be defned as the mnmum number of rows n a party-check matrx for C. Analogously, we defne the stoppng redundancy ρ(c) of C as the mnmum number of rows n a party-check matrx H for C such that s(h) =d(c). Ths work may be thought of as the frst nvestgaton of the trade-off between the parameters ρ(c), r(c), and d(c). In the next secton, we frst show that the stoppng redundancy ρ(c) s well-defned. That s, gven any lnear code C, t s always possble to fnd a party-check matrx H for C such that s(h) =d(c). In fact, the party-check matrx consstng of all the nonzero codewords of the dual code C has ths property. Hence ρ(c) 2 r(c) 1 for all bnary lnear codes. We then show that f d(c) 3, then any party-check matrx H for C satsfes s(h) =d(c), so ρ(c) =r(c) n ths case. The man result of Secton II s an extenson of ths smple observaton to a general upper bound on the stoppng redundancy of lnear codes (Theorem 4). In Secton III, we study several smple ways of constructng codes from other codes, such as the drect-sum constructon and code extenson by addng an overall party-check. We nvestgate the effect of these constructons on the stoppng redundancy. Note that although we have lmted our dscusson to bnary codes, most of the results n Sectons II and III extend straghtforwardly to lnear codes over an arbtrary fnte feld. We contnue n Secton IV wth an n-depth analyss of the well-known (u, u + v) constructon, and n partcular ts applcaton n the recursve defnton [6, p. 374] of bnary Reed- Muller codes. By slghtly modfyng ths constructon, we establsh a strong upper bound on the stoppng redundancy of Reed-Muller codes of arbtrary orders. Specfcally, we prove that f C s a Reed-Muller code of length 2 m and order r, then ρ(c) d(c)r(c)/2. Thus for any constant d(c), wehave an ncrease n redundancy by only a constant factor.
2 In Secton V, we study the (, 12, 8) extended bnary Golay code G. We prove that ρ(g ) 34 by provdng specfc party-check matrces for ths code. We take G as a test case, and compare the performance of three dfferent decoders: a maxmum-lkelhood decoder, an teratve decoder usng the conventonal 12 double-crculant party-check matrx of [6, p.65], and an teratve decoder usng the 34 partycheck matrx wth maxmum stoppng dstance. In each case, exact analytc expressons for the probablty of decodng falure are derved usng a computer program (see Fgure 1). We conclude n Secton VI wth a bref dscusson and a lst of open problems. Some of our results on stoppng redundancy of lnear codes that are not ncluded here due to space lmtatons are also brefly mentoned n Secton VI. II. GENERAL BOUNDS We begn wth rgorous defntons of the stoppng dstance and the stoppng redundancy. Let C be a bnary lnear code and let H =[h, j ] be a party-check matrx for C. The correspondng Tanner graph T for C s a bpartte graph wth each column of H represented by a varable node and each row of H represented by a check node n such a way that the j-th varable node s connected to the -th check node f and only f h, j 0. As already mentoned, a stoppng set n T s a subset S of the varable nodes such that all the check nodes that are neghbors of a node n S are connected to at least two nodes n S. We dspense wth ths graphcal representaton of stoppng sets n favor of an equvalent defnton drectly n terms of the underlyng party-check matrx H. Thus we say that a stoppng set s a set of columns of H wth the property that the projecton of H onto these columns does not contan a row of weght one. The resultng defnton of the stoppng dstance the smallest sze of a stoppng set bears a strkng resemblance to the defnton of the mnmum Hammng dstance of a lnear code. Recall that the mnmum dstance of a lnear code C can be defned as the largest nteger d(c) such that every d(c) 1 or less columns of H are lnearly ndependent. For bnary codes, ths s equvalent to sayng that d(c) s the largest nteger such that every set of d(c) 1 or less columns of H contans at least one row of odd weght. Defnton 1. Let C be a lnear code and let H be a party-check matrx for C. Then the stoppng dstance of H s defned as the the largest nteger s(h) such that every set of s(h) 1 or less columns of H contans at least one row of weght one. The followng corollary s an mmedate consequence of juxtaposng the defntons of s(h) and d(c) above. Corollary 1. Let C be a lnear code and let H be an arbtrary party-check matrx for C. Then s(h) d(c). Indeed, t s well known [3], [4], [5] that the support of every codeword s a stoppng set, whch s another way to see that s(h) d(c) regardless of the choce of H. Thus gven a lnear code C, the largest stoppng dstance one could hope for s d(c), no matter how cleverly the Tanner graph for C s constructed. The pont s that ths bound can be always acheved by addng dependent rows to H (see Theorem 2). Ths makes the noton of the stoppng dstance, as a property of a code C, somewhat meanngless: wthout restrctng the number of rows n a party-check matrx for C, we cannot dstngush between the stoppng dstance and the conventonal mnmum dstance. Ths observaton, n turn, leads to the followng defnton. Defnton 2. Let C be a lnear code wth mnmum Hammng dstance d(c). Then the stoppng redundancy of C s defned as the the smallest nteger ρ(c) such that there exsts a partycheck matrx H for C wth ρ(c) rows and s(h) =d(c). The followng theorem shows that the stoppng redundancy s, ndeed, well-defned. Theorem 2. Let C be a lnear code, and let H denote the party-check matrx for C consstng of all the nonzero codewords of the dual code C. Then s(h )=d(c). Proof: Let [C ] denote the n C matrx consstng of all the codewords of C. It s well known (cf. [6, p.139]) that [C ] s an orthogonal array of strength d(c) 1. Ths means that any set of t d(c) 1 columns of [C ] contans all the vectors of length t among ts rows, each vector appearng the same number of tmes. In partcular, any set of d(c) 1 or less columns of [C ] contans all the vectors of weght one. Theorem 2 also provdes a trval upper bound on the stoppng redundancy. In partcular, t follows from Theorem 2 that ρ(c) 2 r(c) 1 for any bnary lnear code C. Ths bound holds wth equalty n the degenerate case of the sngle-partycheck code. The next theorem determnes ρ(c) exactly for all bnary lnear codes wth mnmum dstance d(c) 3. Theorem 3. Let C be a bnary lnear code wth mnmum dstance d(c) 3. Then any party-check matrx H for C satsfes s(h) =d(c), and therefore ρ(c) =r(c). Proof: If H contans an all-zero column, then t s obvous that s(h) =d(c) =1. Otherwse s(h) 2, snce then every sngle column of H must contan a row of weght one. Now, f d(c) =3, then every two columns of H are dstnct. Ths mples that these two columns must contan ether the 01 row or the 10 row (or both). Hence s(h) =3. The followng theorem, whch s our man result n ths secton, shows that Theorem 3 s, n fact, a specal case of a general lower bound on the stoppng redundancy of lnear codes. Theorem 4. Let C be a bnary lnear code wth mnmum dstance d(c) 3. Then r(c) r(c) r(c) ρ(c) (1) 1 2 d(c) 2 Proof: We frst prove a slghtly weaker result, whch s conceptually smpler. Namely, let us show that r(c) r(c) r(c) ρ(c) (2) 1 2 d(c) 1 Let H be an arbtrary party-check matrx for C wth r(c) lnearly ndependent rows. Construct another party-check matrx H whose rows are all the lnear combnatons of t rows of H,
3 for all t = 1, 2,..., d(c) 1. Clearly, the number of rows of H s gven by the rght-hand sde of (2). Now let H t, respectvely H t, denote a matrx consstng of some t columns of H, respectvely the correspondng t columns of H. Observe that for all t d(c) 1, thet columns of H t are lnearly ndependent. Ths mples that the row-rank of H t s t, and therefore some t rows of H t must form a bass for F2 t. Hence the 2t 1 nonzero lnear combnatons of these t rows of H t generate all the nonzero vectors n F2 t, ncludng all the vectors of weght one. But for t d(c) 1, the2 t 1 nonzero lnear combnatons of any t rows of H t are among the rows of H t by constructon. Ths proves that s(h )=d(c) and establshes (2). To transton from (2) to (1), observe that we do not need to have all the nonzero vectors of F2 t among the rows of H t ;t would suffce to have at least one vector of weght one. Gven asets F2 t and a postve nteger m, letms denote the set of all vectors obtaned as a lnear combnaton of at most m vectors from S. Defne μ(t) as the smallest nteger wth the property that for any bass B of F2 t, the set μ(t)b contans at least one vector of weght one. Then n the constructon of H, t would suffce to take all the lnear combnatons of at most μ(d(c) 1) rows of H. Clearly μ(t) t 1 for all t (n fact, μ(t) =t 1 for all t), and the theorem follows. The bound of (1), whle much better than ρ(c) 2 r(c) 1, s stll too general to be tght for most codes. Nevertheless, we can conclude from Theorem 4 that when d(c) s a constant, the stoppng redundancy s only polynomal n the (conventonal) redundancy and, hence, n the length of the code. An obvous queston s whether we can do substantally better than Theorem 4. At least n the case of Reed-Muller codes, we shall see n Secton IV that the answer s yes. III. CONSTRUCTIONS OF CODES FROM OTHER CODES In ths secton, we examne several smple ways of constructng codes from other codes. Whle for most such constructons, t s trval to determne the redundancy of the resultng code, we fnd t consderably more dffcult to determne the resultng stoppng redundancy, and resort to boundng t. We start wth two smple examples. The frst example (Theorem 5) s the well-known drect-sum constructon or, equvalently, the (u, v) constructon. The second one (Theorem 6) s the (u, u) constructon, or concatenaton of a code wth tself. Both theorems have smple constructve proofs whch we omt. Theorem 5. Let C 1, C 2 be (n 1, k 1, d 1 ), (n 2, k 2, d 2 ) bnary lnear codes, respectvely. Then C 3 = {(u, v) : u C 1, v C 2 } s an (n 1 + n 2, k 1 + k 2, mn{d 1, d 2 }) code wth ρ(c 3 ) ρ(c 1 )+ρ(c 2 ) (3) Theorem 6. Let C 1 be an (n, k, d) bnary lnear code. Then the code C 2 = {(u, u) : u C 1 } s a (2n, k,2d) code wth ρ(c 2 ) ρ(c 1 )+n (4) Here s an nterestng observaton about Theorems 5 and 6. It follows from (3) and (4) that f the consttuent codes are optmal, n the sense that ther stoppng redundancy s equal to ther redundancy, then the resultng code s also optmal. Ths ndcates that the bounds n (3) and (4) are tght. In contrast, the nnocuous constructon of extendng a lnear code C by addng an overall party-check [6, p.27] appears to be much more dffcult to handle. The next theorem deals only wth the specal case where d(c) =3. Theorem 7. Let C be an (n, k,3) bnary lnear code. Then the extended code C s an (n + 1, k,4) code wth ρ(c ) 2ρ(C) =2r(C ) 2 (5) Proof: Let H be an arbtrary r(c) n party-check matrx for C. We construct a party-check matrx for C as follows H H 0 = (6) H 1 where H s the btwse complement of H, whle 0 and 1 are the all-zero and the all-one column vectors, respectvely. Label the columns n H by 1, 2,..., n + 1, and let I be a subset of {1, 2,..., n + 1} wth I 3. In fact, t would suffce to consder the case where I {1, 2,..., n} and I = 3; all other cases easly follow from the fact that s(h) =3 by Theorem 3. Let H(I) and H(I) denote the projectons of H and H, respectvely, on the three postons n I. IfH(I) contans a row of weght one, we are done. If H(I) contans a row of weght two, we are also done then the correspondng row n H(I) has weght one. But otherwse, the only rows n H(I) are 000 and 111, whch means that the three columns n H(I) are dentcal, a contradcton snce d(c) =3. The constructon n (5) and (6) s not optmal. For example, f C s the (8, 4, 4) extended Hammng code, t produces a party-check matrx for C wth 6 rows. However, C s also the Reed-Muller code R(1, 3) for whch we gve n the next secton a party-check matrx H wth s(h) =4 and only 5 rows. IV. REED-MULLER CODES We now focus on the well-known (u, u + v) constructon, n partcular n connecton wth the recursve defnton of bnary Reed-Muller codes. Our goal s to derve a constructve upper bound on the stoppng redundancy of R(r, m) the bnary Reed-Muller code of order r and length 2 m. We begn by recallng several well-known facts. Frst, for all r = 0, 1,..., m, the dmenson of R(r, m) s k = r (m ) and ts mnmum dstance s d = 2 m r.letg(r, m) be a generator matrx for R(r, m). Then, usng the (u, u + v) constructon, G(r, m) can be defned recursvely, as follows: G(r, m) def G(r, m 1) G(r, m 1) = 0 G(r 1, m 1) wth the recurson n (7) beng bootstrapped by G(m, m)=i 2 m and G(0, m) =(11 1) for all m. By conventon, the code R( 1, m) s the set {0} for all m. Then R(r, m) = R(m r 1, m) (8) for all m and all r = 1, 0, 1,..., m. It follows from (8) that G(r, m) s a party-check matrx for R(m r 1, m), a code wth mnmum dstance 2 r+1. Hence every 2 r+1 1 columns of G(r, m) are lnearly ndependent. (7)
4 Our objectve n what follows s to construct an alternatve party-check matrx H(r, m) for R(m r 1, m) =R(r, m) such that s(h(r, m)) = 2 r+1. Then the number of rows n H(r, m) gves an upper bound on the stoppng redundancy of R(m r 1, m). Here s the recursve constructon that we use. Recursve Constructon A: For all postve ntegers m and for all r = 1,2,...,m 2, we defne: H(r, m) = H H(r, m 1) H(r, m 1) top def = 0 H(r 1, m 1) (9) H bot H(r 1, m 1) 0 wth the recurson n (9) beng bootstrapped as follows: for all m = 0,1,..., the matrces H(0, m), H(m 1, m), H(m, m) are defned by H(0, m) def = G(0, m) =(11 1) (10) H(m 1, m) def = G(m 1, m) (11) H(m, m) def = G(m, m) =I 2 m (12) We omt the proofs of the next two propostons and lemma. Proposton 8. H(r, m) s a generator matrx for R(r, m) and, hence, a party-check matrx for R(m r 1, m). Proposton 9. The stoppng dstance of H(r, m) s 2 r+1 for all postve ntegers m and for all r = 0, 1,..., m 1, The remanng task s to compute the number of rows n the matrx H(r, m). We denote ths number as g(r, m). Lemma 10. For all r = 0, 1,..., m 1, the number of rows n H(r, m) s gven by m r 1 + g(r, m) = 2 r We are now n a poston to summarze the results of ths secton n the followng theorem. Theorem 11. For all m = 1, 2,... and for all r = 0, 1,..., m, the stoppng redundancy of R(r, m) s upper bounded by ρ ( R(r, m) ) ( r + m r 1 ) 2 (13) Proof: Follows mmedately from (8), Proposton 8, Proposton 9, and Lemma 10. To see how far Theorem 11 s from the (conventonal) redundancy of Reed-Muller codes, let us make a smple calculaton. For ths, t wll be more convenent to work wth the dual code C = R(r, m). Recall that the redundancy of C s r (m ). Comparng ths to the bound on ρ(c) n (13), we fnd that ( m r 1 + ρ(c) )2 2 r r m = 2 r r(c) r Therefore, for any fxed order r, the stoppng redundancy of R(r, m) s at most the redundancy of R(r, m) tmes a constant. Alternatvely, f we take C = R(r, m), then Theorem 11 mples that ρ(c) d(c)r(c)/2. Thus for any fxed d(c), the ncrease n redundancy s by a constant factor. V. GOLAY CODES The (, 12, 8) bnary Golay code G s arguably the most remarkable bnary block code. It s often used as a benchmark n studes of code structure and decodng algorthms. There are several canoncal party-check matrces for G, see [1], [2], [9] and other papers. Our startng pont s the systematc double-crculant matrx H gven n MacWllams and Sloane [6,p.65] and shown n Table I. It can be readly verfed that s H = 4, whch means that H acheves only half of the maxmum possble stoppng dstance. Curously, the stoppng dstance of the two trells-orented party-check matrces for G, gven n [9, p. 2060] and [1, p.1441], s also 4. Computng the bound of Theorem 4 for the specal case of G produces the rather weak result: ρ G Havng tred several methods to construct a party-check matrx for G wth stoppng dstance 8, our best result was acheved usng a greedy (lexcographc) computer search. Specfcally, wth the 4095 nonzero vectors of G lsted lexcographcally, we teratvely construct the party-check matrx H, at each teraton adjonng to H the frst vector on the lst wth the hghest score. Each vector receves ponts to ts score for each yet uncovered -set t covers, where {1,2,...,7}.The resultng matrx s gven n Table I. TABLE I TWO PARITY-CHECK MATRICES FOR THE (, 12, 8) GOLAY CODE G H = H = To evaluate the effect of ncreasng the stoppng dstance, t would be nterestng to compare the performance of teratve decoders for G based on H or H, respectvely. As a baselne for such a comparson, t would be also useful to have the performance of a maxmum-lkelhood decoder for G.In what follows, we gve analytc expressons for the performance of the three decoders on the bnary erasure channel (BEC). Clearly, a maxmum-lkelhood decoder fals to decode (recover) a gven erasure pattern f and only f ths pattern contans the support of (at least one) nonzero codeword of G.
5 Decoder-Falure Probablty TABLE II NUMBER OF UNDECODABLE ERASURE PATTERNS BY WEIGHT w IN THREE DECODERS FOR G w Total Patterns Ψ ML (w) Ψ H (w) Ψ H (w) ( w ) ( w ) ( w ) ( w ) maxmum-lkelhood decoder teratve decoder based upon H teratve decoder usng H Erasure Probablty Fg. 1. The decodng falure probablty of three decoders for G :amaxmum-lkelhood decoder and teratve decoders based upon H and H Let Ψ ML (w) denote the number of such erasure patterns as a functon of ther weght w. Then Pr ML {decodng falure} = Ψ ML (w) p w (1 p) w where p s the erasure probablty of the BEC. In contrast, an teratve decoder (based on H or H ) fals f and only f the erasure pattern contans a stoppng set. Thus Pr H {decodng falure} = Ψ H (w) p w (1 p) w 10-4 Pr H {decodng falure} = Ψ H (w) p w (1 p) w where Ψ H (w) and Ψ H (w) denote the number of erasure patterns of weght w that contan a stoppng set of H and H, respectvely. It remans to compute Ψ H, Ψ H, and Ψ ML. Obvously, Ψ ML (w) =0 for w 7 and Ψ ML (w) =( w ) for w 13 (any 13 columns of a party-check matrx for G are lnearly dependent). For the other values of w, wehave w 11 Ψ ML (w) = w ( )+2576 w = 12 where we made use of Table IV of [2]. To fnd Ψ H ( ) and Ψ H ( ), we used exhaustve computer search. These functons are gven n Table II. The resultng probabltes of decodng falure are plotted n Fgure 1. Note that whle we may add rows to H to elmnate more stoppng sets, ths would have neglgble effect snce the slope of the performance curve s domnated by the smallest w for whch Ψ H (w) 0. VI. FURTHER RESULTS AND OPEN PROBLEMS Ths paper only scratches the surface of the many nterestng and mportant problems that arse n the nvestgaton of stoppng redundancy. Here s a representatve sample: Determne the stoppng redundancy of well-known codes wth substantal algebrac and/or combnatoral structure. In partcular, s t true that ρ(g )=34? It appears that provng lower bounds on the stoppng redundancy, even for specfc codes such as G, s qute dffcult. Is the constructon devsed for bnary Reed-Muller codes n Secton IV optmal? More generally, for whch famles of codes can one fnd party-check matrces wth only O ( r(c) ) rows and stoppng dstance equal to d(c)? Are there codes wth non-vanshng rate and normalzed dstance, whose stoppng redundancy s O ( r(c) )?We can answer ths wth a no, n the case where the dual codes also have non-vanshng normalzed dstance. REFERENCES [1] A.R. Calderbank, G.D. Forney, Jr., and A. Vardy, Mnmal tal-btng trellses: the Golay code and more, IEEE Trans. Inform. Theory, vol. 45, pp , July [2] J.H. Conway and N.J.A. Sloane, Orbt and coset analyss of the Golay and related codes, IEEE Trans. Inform. Theory, vol. 36, pp , September [3] C. D, D. Proett, I.E. Telatar, T.J. Rchardson, and R. Urbanke, Fntelength analyss of low-densty party-check codes on the bnary erasure channel, IEEE Trans. Inform. Theory, vol. 48, pp , Jun [4] J. Feldman, Decodng Error-Correctng Codes va Lnear Programmng Ph.D. Thess, Massachusetts Insttute of Technology, September [5] N. Kashyap and A. Vardy, Stoppng sets n codes from desgns, n Proc. IEEE Internat. Symp. Informaton Theory, Yokohama, Japan, July [6] F.J. MacWllams and N.J.A. Sloane, The Theory of Error-Correctng Co-des. Amsterdam: North-Holland, [7] A. Orltsky, K. Vswananathan, and J. Zhang, Stoppng set dstrbuton of LDPC code ensembles, IEEE Trans. Inform. Theory, vol. 51, pp , March [8] N. Santh and A. Vardy, On the effect of party-check weghts n teratve decodng, n Proc. IEEE Internatonal Symposum Informaton Theory, Chcago, IL., July [9] A. Vardy, Trells structure of codes, Chapter n the HANDBOOK OF CODING THEORY, V. Pless and W.C. Huffman (Edtors), Elsever, [10] J.S. Yedda, J. Chen, and M. Fossorer, Generatng code representatons sutable for belef propagaton decodng, n Proc. 40-th Allerton Conference Commun., Control, and Computng, Montcello, IL., October 2002.
Min Cut, Fast Cut, Polynomial Identities
Randomzed Algorthms, Summer 016 Mn Cut, Fast Cut, Polynomal Identtes Instructor: Thomas Kesselhem and Kurt Mehlhorn 1 Mn Cuts n Graphs Lecture (5 pages) Throughout ths secton, G = (V, E) s a mult-graph.
More informationProblem Set 9 Solutions
Desgn and Analyss of Algorthms May 4, 2015 Massachusetts Insttute of Technology 6.046J/18.410J Profs. Erk Demane, Srn Devadas, and Nancy Lynch Problem Set 9 Solutons Problem Set 9 Solutons Ths problem
More informationISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 1, July 2013
ISSN: 2277-375 Constructon of Trend Free Run Orders for Orthogonal rrays Usng Codes bstract: Sometmes when the expermental runs are carred out n a tme order sequence, the response can depend on the run
More informationAPPENDIX A Some Linear Algebra
APPENDIX A Some Lnear Algebra The collecton of m, n matrces A.1 Matrces a 1,1,..., a 1,n A = a m,1,..., a m,n wth real elements a,j s denoted by R m,n. If n = 1 then A s called a column vector. Smlarly,
More informationDifference Equations
Dfference Equatons c Jan Vrbk 1 Bascs Suppose a sequence of numbers, say a 0,a 1,a,a 3,... s defned by a certan general relatonshp between, say, three consecutve values of the sequence, e.g. a + +3a +1
More informationA new construction of 3-separable matrices via an improved decoding of Macula s construction
Dscrete Optmzaton 5 008 700 704 Contents lsts avalable at ScenceDrect Dscrete Optmzaton journal homepage: wwwelsevercom/locate/dsopt A new constructon of 3-separable matrces va an mproved decodng of Macula
More informationMaximizing the number of nonnegative subsets
Maxmzng the number of nonnegatve subsets Noga Alon Hao Huang December 1, 213 Abstract Gven a set of n real numbers, f the sum of elements of every subset of sze larger than k s negatve, what s the maxmum
More informationLecture Notes on Linear Regression
Lecture Notes on Lnear Regresson Feng L fl@sdueducn Shandong Unversty, Chna Lnear Regresson Problem In regresson problem, we am at predct a contnuous target value gven an nput feature vector We assume
More information3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X
Statstcs 1: Probablty Theory II 37 3 EPECTATION OF SEVERAL RANDOM VARIABLES As n Probablty Theory I, the nterest n most stuatons les not on the actual dstrbuton of a random vector, but rather on a number
More informationModule 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:
More informationMore metrics on cartesian products
More metrcs on cartesan products If (X, d ) are metrc spaces for 1 n, then n Secton II4 of the lecture notes we defned three metrcs on X whose underlyng topologes are the product topology The purpose of
More informationLecture 5 Decoding Binary BCH Codes
Lecture 5 Decodng Bnary BCH Codes In ths class, we wll ntroduce dfferent methods for decodng BCH codes 51 Decodng the [15, 7, 5] 2 -BCH Code Consder the [15, 7, 5] 2 -code C we ntroduced n the last lecture
More informationNotes on Frequency Estimation in Data Streams
Notes on Frequency Estmaton n Data Streams In (one of) the data streamng model(s), the data s a sequence of arrvals a 1, a 2,..., a m of the form a j = (, v) where s the dentty of the tem and belongs to
More informationThe Order Relation and Trace Inequalities for. Hermitian Operators
Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence
More informationModule 9. Lecture 6. Duality in Assignment Problems
Module 9 1 Lecture 6 Dualty n Assgnment Problems In ths lecture we attempt to answer few other mportant questons posed n earler lecture for (AP) and see how some of them can be explaned through the concept
More informationCollege of Computer & Information Science Fall 2009 Northeastern University 20 October 2009
College of Computer & Informaton Scence Fall 2009 Northeastern Unversty 20 October 2009 CS7880: Algorthmc Power Tools Scrbe: Jan Wen and Laura Poplawsk Lecture Outlne: Prmal-dual schema Network Desgn:
More informationDIFFERENTIAL FORMS BRIAN OSSERMAN
DIFFERENTIAL FORMS BRIAN OSSERMAN Dfferentals are an mportant topc n algebrac geometry, allowng the use of some classcal geometrc arguments n the context of varetes over any feld. We wll use them to defne
More informationFoundations of Arithmetic
Foundatons of Arthmetc Notaton We shall denote the sum and product of numbers n the usual notaton as a 2 + a 2 + a 3 + + a = a, a 1 a 2 a 3 a = a The notaton a b means a dvdes b,.e. ac = b where c s an
More informationFACTORIZATION IN KRULL MONOIDS WITH INFINITE CLASS GROUP
C O L L O Q U I U M M A T H E M A T I C U M VOL. 80 1999 NO. 1 FACTORIZATION IN KRULL MONOIDS WITH INFINITE CLASS GROUP BY FLORIAN K A I N R A T H (GRAZ) Abstract. Let H be a Krull monod wth nfnte class
More informationHomework Notes Week 7
Homework Notes Week 7 Math 4 Sprng 4 #4 (a Complete the proof n example 5 that s an nner product (the Frobenus nner product on M n n (F In the example propertes (a and (d have already been verfed so we
More informationRefined Coding Bounds for Network Error Correction
Refned Codng Bounds for Network Error Correcton Shenghao Yang Department of Informaton Engneerng The Chnese Unversty of Hong Kong Shatn, N.T., Hong Kong shyang5@e.cuhk.edu.hk Raymond W. Yeung Department
More informationLow Complexity Soft-Input Soft-Output Hamming Decoder
Low Complexty Soft-Input Soft-Output Hammng Der Benjamn Müller, Martn Holters, Udo Zölzer Helmut Schmdt Unversty Unversty of the Federal Armed Forces Department of Sgnal Processng and Communcatons Holstenhofweg
More informationEdge Isoperimetric Inequalities
November 7, 2005 Ross M. Rchardson Edge Isopermetrc Inequaltes 1 Four Questons Recall that n the last lecture we looked at the problem of sopermetrc nequaltes n the hypercube, Q n. Our noton of boundary
More informationCOS 521: Advanced Algorithms Game Theory and Linear Programming
COS 521: Advanced Algorthms Game Theory and Lnear Programmng Moses Charkar February 27, 2013 In these notes, we ntroduce some basc concepts n game theory and lnear programmng (LP). We show a connecton
More informationLectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix
Lectures - Week 4 Matrx norms, Condtonng, Vector Spaces, Lnear Independence, Spannng sets and Bass, Null space and Range of a Matrx Matrx Norms Now we turn to assocatng a number to each matrx. We could
More informationLinear Regression Analysis: Terminology and Notation
ECON 35* -- Secton : Basc Concepts of Regresson Analyss (Page ) Lnear Regresson Analyss: Termnology and Notaton Consder the generc verson of the smple (two-varable) lnear regresson model. It s represented
More informationarxiv: v1 [math.co] 1 Mar 2014
Unon-ntersectng set systems Gyula O.H. Katona and Dánel T. Nagy March 4, 014 arxv:1403.0088v1 [math.co] 1 Mar 014 Abstract Three ntersecton theorems are proved. Frst, we determne the sze of the largest
More information2.3 Nilpotent endomorphisms
s a block dagonal matrx, wth A Mat dm U (C) In fact, we can assume that B = B 1 B k, wth B an ordered bass of U, and that A = [f U ] B, where f U : U U s the restrcton of f to U 40 23 Nlpotent endomorphsms
More informationTAIL BOUNDS FOR SUMS OF GEOMETRIC AND EXPONENTIAL VARIABLES
TAIL BOUNDS FOR SUMS OF GEOMETRIC AND EXPONENTIAL VARIABLES SVANTE JANSON Abstract. We gve explct bounds for the tal probabltes for sums of ndependent geometrc or exponental varables, possbly wth dfferent
More informationCSCE 790S Background Results
CSCE 790S Background Results Stephen A. Fenner September 8, 011 Abstract These results are background to the course CSCE 790S/CSCE 790B, Quantum Computaton and Informaton (Sprng 007 and Fall 011). Each
More informationApproximate Smallest Enclosing Balls
Chapter 5 Approxmate Smallest Enclosng Balls 5. Boundng Volumes A boundng volume for a set S R d s a superset of S wth a smple shape, for example a box, a ball, or an ellpsod. Fgure 5.: Boundng boxes Q(P
More informationThe Multiple Classical Linear Regression Model (CLRM): Specification and Assumptions. 1. Introduction
ECONOMICS 5* -- NOTE (Summary) ECON 5* -- NOTE The Multple Classcal Lnear Regresson Model (CLRM): Specfcaton and Assumptons. Introducton CLRM stands for the Classcal Lnear Regresson Model. The CLRM s also
More informationPh 219a/CS 219a. Exercises Due: Wednesday 23 October 2013
1 Ph 219a/CS 219a Exercses Due: Wednesday 23 October 2013 1.1 How far apart are two quantum states? Consder two quantum states descrbed by densty operators ρ and ρ n an N-dmensonal Hlbert space, and consder
More informationHidden Markov Models & The Multivariate Gaussian (10/26/04)
CS281A/Stat241A: Statstcal Learnng Theory Hdden Markov Models & The Multvarate Gaussan (10/26/04) Lecturer: Mchael I. Jordan Scrbes: Jonathan W. Hu 1 Hdden Markov Models As a bref revew, hdden Markov models
More informationU.C. Berkeley CS294: Spectral Methods and Expanders Handout 8 Luca Trevisan February 17, 2016
U.C. Berkeley CS94: Spectral Methods and Expanders Handout 8 Luca Trevsan February 7, 06 Lecture 8: Spectral Algorthms Wrap-up In whch we talk about even more generalzatons of Cheeger s nequaltes, and
More informationIntroductory Cardinality Theory Alan Kaylor Cline
Introductory Cardnalty Theory lan Kaylor Clne lthough by name the theory of set cardnalty may seem to be an offshoot of combnatorcs, the central nterest s actually nfnte sets. Combnatorcs deals wth fnte
More informationAffine transformations and convexity
Affne transformatons and convexty The purpose of ths document s to prove some basc propertes of affne transformatons nvolvng convex sets. Here are a few onlne references for background nformaton: http://math.ucr.edu/
More information5 The Rational Canonical Form
5 The Ratonal Canoncal Form Here p s a monc rreducble factor of the mnmum polynomal m T and s not necessarly of degree one Let F p denote the feld constructed earler n the course, consstng of all matrces
More informationThe Geometry of Logit and Probit
The Geometry of Logt and Probt Ths short note s meant as a supplement to Chapters and 3 of Spatal Models of Parlamentary Votng and the notaton and reference to fgures n the text below s to those two chapters.
More informationInner Product. Euclidean Space. Orthonormal Basis. Orthogonal
Inner Product Defnton 1 () A Eucldean space s a fnte-dmensonal vector space over the reals R, wth an nner product,. Defnton 2 (Inner Product) An nner product, on a real vector space X s a symmetrc, blnear,
More informationprinceton univ. F 17 cos 521: Advanced Algorithm Design Lecture 7: LP Duality Lecturer: Matt Weinberg
prnceton unv. F 17 cos 521: Advanced Algorthm Desgn Lecture 7: LP Dualty Lecturer: Matt Wenberg Scrbe: LP Dualty s an extremely useful tool for analyzng structural propertes of lnear programs. Whle there
More informationError Probability for M Signals
Chapter 3 rror Probablty for M Sgnals In ths chapter we dscuss the error probablty n decdng whch of M sgnals was transmtted over an arbtrary channel. We assume the sgnals are represented by a set of orthonormal
More informationAmusing Properties of Odd Numbers Derived From Valuated Binary Tree
IOSR Journal of Mathematcs (IOSR-JM) e-iss: 78-578, p-iss: 19-765X. Volume 1, Issue 6 Ver. V (ov. - Dec.016), PP 5-57 www.osrjournals.org Amusng Propertes of Odd umbers Derved From Valuated Bnary Tree
More informationSingular Value Decomposition: Theory and Applications
Sngular Value Decomposton: Theory and Applcatons Danel Khashab Sprng 2015 Last Update: March 2, 2015 1 Introducton A = UDV where columns of U and V are orthonormal and matrx D s dagonal wth postve real
More informationTHE CHINESE REMAINDER THEOREM. We should thank the Chinese for their wonderful remainder theorem. Glenn Stevens
THE CHINESE REMAINDER THEOREM KEITH CONRAD We should thank the Chnese for ther wonderful remander theorem. Glenn Stevens 1. Introducton The Chnese remander theorem says we can unquely solve any par of
More informationLecture 3: Shannon s Theorem
CSE 533: Error-Correctng Codes (Autumn 006 Lecture 3: Shannon s Theorem October 9, 006 Lecturer: Venkatesan Guruswam Scrbe: Wdad Machmouch 1 Communcaton Model The communcaton model we are usng conssts
More informationComplete subgraphs in multipartite graphs
Complete subgraphs n multpartte graphs FLORIAN PFENDER Unverstät Rostock, Insttut für Mathematk D-18057 Rostock, Germany Floran.Pfender@un-rostock.de Abstract Turán s Theorem states that every graph G
More informationThe lower and upper bounds on Perron root of nonnegative irreducible matrices
Journal of Computatonal Appled Mathematcs 217 (2008) 259 267 wwwelsevercom/locate/cam The lower upper bounds on Perron root of nonnegatve rreducble matrces Guang-Xn Huang a,, Feng Yn b,keguo a a College
More informationPsychology 282 Lecture #24 Outline Regression Diagnostics: Outliers
Psychology 282 Lecture #24 Outlne Regresson Dagnostcs: Outlers In an earler lecture we studed the statstcal assumptons underlyng the regresson model, ncludng the followng ponts: Formal statement of assumptons.
More informationChapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems
Numercal Analyss by Dr. Anta Pal Assstant Professor Department of Mathematcs Natonal Insttute of Technology Durgapur Durgapur-713209 emal: anta.bue@gmal.com 1 . Chapter 5 Soluton of System of Lnear Equatons
More informationLecture 10 Support Vector Machines II
Lecture 10 Support Vector Machnes II 22 February 2016 Taylor B. Arnold Yale Statstcs STAT 365/665 1/28 Notes: Problem 3 s posted and due ths upcomng Frday There was an early bug n the fake-test data; fxed
More informationThe internal structure of natural numbers and one method for the definition of large prime numbers
The nternal structure of natural numbers and one method for the defnton of large prme numbers Emmanul Manousos APM Insttute for the Advancement of Physcs and Mathematcs 3 Poulou str. 53 Athens Greece Abstract
More informationFor now, let us focus on a specific model of neurons. These are simplified from reality but can achieve remarkable results.
Neural Networks : Dervaton compled by Alvn Wan from Professor Jtendra Malk s lecture Ths type of computaton s called deep learnng and s the most popular method for many problems, such as computer vson
More informationC/CS/Phy191 Problem Set 3 Solutions Out: Oct 1, 2008., where ( 00. ), so the overall state of the system is ) ( ( ( ( 00 ± 11 ), Φ ± = 1
C/CS/Phy9 Problem Set 3 Solutons Out: Oct, 8 Suppose you have two qubts n some arbtrary entangled state ψ You apply the teleportaton protocol to each of the qubts separately What s the resultng state obtaned
More informationComposite Hypotheses testing
Composte ypotheses testng In many hypothess testng problems there are many possble dstrbutons that can occur under each of the hypotheses. The output of the source s a set of parameters (ponts n a parameter
More informationA 2D Bounded Linear Program (H,c) 2D Linear Programming
A 2D Bounded Lnear Program (H,c) h 3 v h 8 h 5 c h 4 h h 6 h 7 h 2 2D Lnear Programmng C s a polygonal regon, the ntersecton of n halfplanes. (H, c) s nfeasble, as C s empty. Feasble regon C s unbounded
More informationLecture 17 : Stochastic Processes II
: Stochastc Processes II 1 Contnuous-tme stochastc process So far we have studed dscrete-tme stochastc processes. We studed the concept of Makov chans and martngales, tme seres analyss, and regresson analyss
More informationBézier curves. Michael S. Floater. September 10, These notes provide an introduction to Bézier curves. i=0
Bézer curves Mchael S. Floater September 1, 215 These notes provde an ntroducton to Bézer curves. 1 Bernsten polynomals Recall that a real polynomal of a real varable x R, wth degree n, s a functon of
More informationn ). This is tight for all admissible values of t, k and n. k t + + n t
MAXIMIZING THE NUMBER OF NONNEGATIVE SUBSETS NOGA ALON, HAROUT AYDINIAN, AND HAO HUANG Abstract. Gven a set of n real numbers, f the sum of elements of every subset of sze larger than k s negatve, what
More information= z 20 z n. (k 20) + 4 z k = 4
Problem Set #7 solutons 7.2.. (a Fnd the coeffcent of z k n (z + z 5 + z 6 + z 7 + 5, k 20. We use the known seres expanson ( n+l ( z l l z n below: (z + z 5 + z 6 + z 7 + 5 (z 5 ( + z + z 2 + z + 5 5
More informationVolume 18 Figure 1. Notation 1. Notation 2. Observation 1. Remark 1. Remark 2. Remark 3. Remark 4. Remark 5. Remark 6. Theorem A [2]. Theorem B [2].
Bulletn of Mathematcal Scences and Applcatons Submtted: 016-04-07 ISSN: 78-9634, Vol. 18, pp 1-10 Revsed: 016-09-08 do:10.1805/www.scpress.com/bmsa.18.1 Accepted: 016-10-13 017 ScPress Ltd., Swtzerland
More informationLinear, affine, and convex sets and hulls In the sequel, unless otherwise specified, X will denote a real vector space.
Lnear, affne, and convex sets and hulls In the sequel, unless otherwse specfed, X wll denote a real vector space. Lnes and segments. Gven two ponts x, y X, we defne xy = {x + t(y x) : t R} = {(1 t)x +
More informationFinding Dense Subgraphs in G(n, 1/2)
Fndng Dense Subgraphs n Gn, 1/ Atsh Das Sarma 1, Amt Deshpande, and Rav Kannan 1 Georga Insttute of Technology,atsh@cc.gatech.edu Mcrosoft Research-Bangalore,amtdesh,annan@mcrosoft.com Abstract. Fndng
More informationA CLASS OF RECURSIVE SETS. Florentin Smarandache University of New Mexico 200 College Road Gallup, NM 87301, USA
A CLASS OF RECURSIVE SETS Florentn Smarandache Unversty of New Mexco 200 College Road Gallup, NM 87301, USA E-mal: smarand@unmedu In ths artcle one bulds a class of recursve sets, one establshes propertes
More informationDifferential Polynomials
JASS 07 - Polynomals: Ther Power and How to Use Them Dfferental Polynomals Stephan Rtscher March 18, 2007 Abstract Ths artcle gves an bref ntroducton nto dfferental polynomals, deals and manfolds and ther
More informationU.C. Berkeley CS294: Beyond Worst-Case Analysis Luca Trevisan September 5, 2017
U.C. Berkeley CS94: Beyond Worst-Case Analyss Handout 4s Luca Trevsan September 5, 07 Summary of Lecture 4 In whch we ntroduce semdefnte programmng and apply t to Max Cut. Semdefnte Programmng Recall that
More informationLecture 20: Lift and Project, SDP Duality. Today we will study the Lift and Project method. Then we will prove the SDP duality theorem.
prnceton u. sp 02 cos 598B: algorthms and complexty Lecture 20: Lft and Project, SDP Dualty Lecturer: Sanjeev Arora Scrbe:Yury Makarychev Today we wll study the Lft and Project method. Then we wll prove
More informationa b a In case b 0, a being divisible by b is the same as to say that
Secton 6.2 Dvsblty among the ntegers An nteger a ε s dvsble by b ε f there s an nteger c ε such that a = bc. Note that s dvsble by any nteger b, snce = b. On the other hand, a s dvsble by only f a = :
More informationNP-Completeness : Proofs
NP-Completeness : Proofs Proof Methods A method to show a decson problem Π NP-complete s as follows. (1) Show Π NP. (2) Choose an NP-complete problem Π. (3) Show Π Π. A method to show an optmzaton problem
More informationCase A. P k = Ni ( 2L i k 1 ) + (# big cells) 10d 2 P k.
THE CELLULAR METHOD In ths lecture, we ntroduce the cellular method as an approach to ncdence geometry theorems lke the Szemeréd-Trotter theorem. The method was ntroduced n the paper Combnatoral complexty
More information8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS
SECTION 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS 493 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS All the vector spaces you have studed thus far n the text are real vector spaces because the scalars
More informationSubset Topological Spaces and Kakutani s Theorem
MOD Natural Neutrosophc Subset Topologcal Spaces and Kakutan s Theorem W. B. Vasantha Kandasamy lanthenral K Florentn Smarandache 1 Copyrght 1 by EuropaNova ASBL and the Authors Ths book can be ordered
More informationOn the Interval Zoro Symmetric Single-step Procedure for Simultaneous Finding of Polynomial Zeros
Appled Mathematcal Scences, Vol. 5, 2011, no. 75, 3693-3706 On the Interval Zoro Symmetrc Sngle-step Procedure for Smultaneous Fndng of Polynomal Zeros S. F. M. Rusl, M. Mons, M. A. Hassan and W. J. Leong
More informationSpectral Graph Theory and its Applications September 16, Lecture 5
Spectral Graph Theory and ts Applcatons September 16, 2004 Lecturer: Danel A. Spelman Lecture 5 5.1 Introducton In ths lecture, we wll prove the followng theorem: Theorem 5.1.1. Let G be a planar graph
More informationStanford University CS359G: Graph Partitioning and Expanders Handout 4 Luca Trevisan January 13, 2011
Stanford Unversty CS359G: Graph Parttonng and Expanders Handout 4 Luca Trevsan January 3, 0 Lecture 4 In whch we prove the dffcult drecton of Cheeger s nequalty. As n the past lectures, consder an undrected
More informationMATH 241B FUNCTIONAL ANALYSIS - NOTES EXAMPLES OF C ALGEBRAS
MATH 241B FUNCTIONAL ANALYSIS - NOTES EXAMPLES OF C ALGEBRAS These are nformal notes whch cover some of the materal whch s not n the course book. The man purpose s to gve a number of nontrval examples
More informationKernel Methods and SVMs Extension
Kernel Methods and SVMs Extenson The purpose of ths document s to revew materal covered n Machne Learnng 1 Supervsed Learnng regardng support vector machnes (SVMs). Ths document also provdes a general
More informationChapter 8 Indicator Variables
Chapter 8 Indcator Varables In general, e explanatory varables n any regresson analyss are assumed to be quanttatve n nature. For example, e varables lke temperature, dstance, age etc. are quanttatve n
More informationGames of Threats. Elon Kohlberg Abraham Neyman. Working Paper
Games of Threats Elon Kohlberg Abraham Neyman Workng Paper 18-023 Games of Threats Elon Kohlberg Harvard Busness School Abraham Neyman The Hebrew Unversty of Jerusalem Workng Paper 18-023 Copyrght 2017
More informationThe Minimum Universal Cost Flow in an Infeasible Flow Network
Journal of Scences, Islamc Republc of Iran 17(2): 175-180 (2006) Unversty of Tehran, ISSN 1016-1104 http://jscencesutacr The Mnmum Unversal Cost Flow n an Infeasble Flow Network H Saleh Fathabad * M Bagheran
More informationThe L(2, 1)-Labeling on -Product of Graphs
Annals of Pure and Appled Mathematcs Vol 0, No, 05, 9-39 ISSN: 79-087X (P, 79-0888(onlne Publshed on 7 Aprl 05 wwwresearchmathscorg Annals of The L(, -Labelng on -Product of Graphs P Pradhan and Kamesh
More informationLinear Approximation with Regularization and Moving Least Squares
Lnear Approxmaton wth Regularzaton and Movng Least Squares Igor Grešovn May 007 Revson 4.6 (Revson : March 004). 5 4 3 0.5 3 3.5 4 Contents: Lnear Fttng...4. Weghted Least Squares n Functon Approxmaton...
More informationSUCCESSIVE MINIMA AND LATTICE POINTS (AFTER HENK, GILLET AND SOULÉ) M(B) := # ( B Z N)
SUCCESSIVE MINIMA AND LATTICE POINTS (AFTER HENK, GILLET AND SOULÉ) S.BOUCKSOM Abstract. The goal of ths note s to present a remarably smple proof, due to Hen, of a result prevously obtaned by Gllet-Soulé,
More informationLecture 12: Discrete Laplacian
Lecture 12: Dscrete Laplacan Scrbe: Tanye Lu Our goal s to come up wth a dscrete verson of Laplacan operator for trangulated surfaces, so that we can use t n practce to solve related problems We are mostly
More informationTornado and Luby Transform Codes. Ashish Khisti Presentation October 22, 2003
Tornado and Luby Transform Codes Ashsh Khst 6.454 Presentaton October 22, 2003 Background: Erasure Channel Elas[956] studed the Erasure Channel β x x β β x 2 m x 2 k? Capacty of Noseless Erasure Channel
More informationMath 217 Fall 2013 Homework 2 Solutions
Math 17 Fall 013 Homework Solutons Due Thursday Sept. 6, 013 5pm Ths homework conssts of 6 problems of 5 ponts each. The total s 30. You need to fully justfy your answer prove that your functon ndeed has
More informationLimited Dependent Variables
Lmted Dependent Varables. What f the left-hand sde varable s not a contnuous thng spread from mnus nfnty to plus nfnty? That s, gven a model = f (, β, ε, where a. s bounded below at zero, such as wages
More informationREGULAR POSITIVE TERNARY QUADRATIC FORMS. 1. Introduction
REGULAR POSITIVE TERNARY QUADRATIC FORMS BYEONG-KWEON OH Abstract. A postve defnte quadratc form f s sad to be regular f t globally represents all ntegers that are represented by the genus of f. In 997
More informationAnti-van der Waerden numbers of 3-term arithmetic progressions.
Ant-van der Waerden numbers of 3-term arthmetc progressons. Zhanar Berkkyzy, Alex Schulte, and Mchael Young Aprl 24, 2016 Abstract The ant-van der Waerden number, denoted by aw([n], k), s the smallest
More informationNUMERICAL DIFFERENTIATION
NUMERICAL DIFFERENTIATION 1 Introducton Dfferentaton s a method to compute the rate at whch a dependent output y changes wth respect to the change n the ndependent nput x. Ths rate of change s called the
More informationStructure and Drive Paul A. Jensen Copyright July 20, 2003
Structure and Drve Paul A. Jensen Copyrght July 20, 2003 A system s made up of several operatons wth flow passng between them. The structure of the system descrbes the flow paths from nputs to outputs.
More informationFREQUENCY DISTRIBUTIONS Page 1 of The idea of a frequency distribution for sets of observations will be introduced,
FREQUENCY DISTRIBUTIONS Page 1 of 6 I. Introducton 1. The dea of a frequency dstrbuton for sets of observatons wll be ntroduced, together wth some of the mechancs for constructng dstrbutons of data. Then
More informationRepresentation theory and quantum mechanics tutorial Representation theory and quantum conservation laws
Representaton theory and quantum mechancs tutoral Representaton theory and quantum conservaton laws Justn Campbell August 1, 2017 1 Generaltes on representaton theory 1.1 Let G GL m (R) be a real algebrac
More informationA Simple Research of Divisor Graphs
The 29th Workshop on Combnatoral Mathematcs and Computaton Theory A Smple Research o Dvsor Graphs Yu-png Tsao General Educaton Center Chna Unversty o Technology Tape Tawan yp-tsao@cuteedutw Tape Tawan
More informationCOMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS
Avalable onlne at http://sck.org J. Math. Comput. Sc. 3 (3), No., 6-3 ISSN: 97-537 COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS
More informationTHE ARIMOTO-BLAHUT ALGORITHM FOR COMPUTATION OF CHANNEL CAPACITY. William A. Pearlman. References: S. Arimoto - IEEE Trans. Inform. Thy., Jan.
THE ARIMOTO-BLAHUT ALGORITHM FOR COMPUTATION OF CHANNEL CAPACITY Wllam A. Pearlman 2002 References: S. Armoto - IEEE Trans. Inform. Thy., Jan. 1972 R. Blahut - IEEE Trans. Inform. Thy., July 1972 Recall
More informationPerron Vectors of an Irreducible Nonnegative Interval Matrix
Perron Vectors of an Irreducble Nonnegatve Interval Matrx Jr Rohn August 4 2005 Abstract As s well known an rreducble nonnegatve matrx possesses a unquely determned Perron vector. As the man result of
More informationBezier curves. Michael S. Floater. August 25, These notes provide an introduction to Bezier curves. i=0
Bezer curves Mchael S. Floater August 25, 211 These notes provde an ntroducton to Bezer curves. 1 Bernsten polynomals Recall that a real polynomal of a real varable x R, wth degree n, s a functon of the
More informationDONALD M. DAVIS. 1. Main result
v 1 -PERIODIC 2-EXPONENTS OF SU(2 e ) AND SU(2 e + 1) DONALD M. DAVIS Abstract. We determne precsely the largest v 1 -perodc homotopy groups of SU(2 e ) and SU(2 e +1). Ths gves new results about the largest
More informationAssortment Optimization under MNL
Assortment Optmzaton under MNL Haotan Song Aprl 30, 2017 1 Introducton The assortment optmzaton problem ams to fnd the revenue-maxmzng assortment of products to offer when the prces of products are fxed.
More information