Definitions: Universe U of keys, e.g., U N 0. U very large. Set S U of keys, S = m U.
|
|
- Bertram Atkins
- 5 years ago
- Views:
Transcription
1 7 7 Dictioary: S.isertx): Isert a elemet x. S.deletex): Delete the elemet poited to by x. S.searchk): Retur a poiter to a elemet e with key[e] = k i S if it exists; otherwise retur ull. So far we have implemeted the search for a key by carefully choosig split-elemets. The the memory locatio of a object x with key k is determied by successively comparig k to split-elemets. Hashig tries to directly compute the memory locatio from the give key. The goal is to have costat search time. Defiitios: Uiverse U of keys, e.g., U N 0. U very large. Set S U of keys, S = m U. Array T [0,..., ] hash-table. Hash fuctio h : U [0,..., ]. The hash-fuctio h should fulfill: Fast to evaluate. Small storage requiremet. Good distributio of elemets over the whole table. Erst Mayr, Harald Räcke 29 Erst Mayr, Harald Räcke Ideally the hash fuctio maps all keys to differet memory locatios. k Suppose that we kow the set S of actual keys o isert/o delete). The we may wat to desig a simple hash-fuctio that maps all these keys to differet memory locatios. k k U uiverse of keys k6 k 7 k 3 k 7 k 3 U uiverse of keys k k6 k 7 k 3 k 7 k 6 S actual keys) k 3 k 6 This special case is kow as Direct Addressig. It is usually very urealistic as the uiverse of keys typically is quite large, ad i particular larger tha the available memory. Such a hash fuctio h is called a perfect hash fuctio for set S. Erst Mayr, Harald Räcke 22 Erst Mayr, Harald Räcke 222
2 7 7 If we do ot kow the keys i advace, the best we ca hope for is that the hash fuctio distributes keys evely across the table. Problem: Collisios Usually the uiverse U is much larger tha the table-size. Hece, there may be two elemets k, k 2 from the set S that map to the same memory locatio i.e., hk ) = hk 2 )). This is called a collisio. Typically, collisios do ot appear oce the size of the set S of actual keys gets close to, but already whe S ω ). Lemma The probability of havig a collisio whe hashig m elemets ito a table of size uder uiform hashig is at least e mm ) 2 e m2 2. Uiform hashig: Choose a hash fuctio uiformly at radom from all fuctios f : U [0,..., ]. Erst Mayr, Harald Räcke 223 Erst Mayr, Harald Räcke Proof. Let A m, deote the evet that isertig m keys ito a table of size does ot geerate a collisio. The 4 3 f x) e x x Pr[A m, ] = m l= m j=0 l + = m j=0 e j/ = e m j=0 j ) j = e mm ) 2. Here the first equality follows sice the l-th elemet that is hashed has a probability of l+ to ot geerate a collisio uder the coditio that the previous elemets did ot iduce collisios The iequality x e x is derived by stoppig the Taylor-expasio of e x after the secod term. x Erst Mayr, Harald Räcke 225 Erst Mayr, Harald Räcke 226
3 Resolvig Collisios The methods for dealig with collisios ca be classified ito the two mai types ope addressig, aka. closed hashig hashig with chaiig, aka. closed addressig, ope hashig. There are applicatios e.g. computer chess where you do ot resolve collisios at all. Hashig with Chaiig Arrage elemets that map to the same positio i a liear list. Access: compute hx) ad search list for key[x]. Isert: isert at the frot of the list. U uiverse of keys k k 6 k 4 k 5 k 2 k 7 S actual keys) k 8 k3 k k 4 k 5 k 2 k 7 k 3 k 8 k 6 Erst Mayr, Harald Räcke 227 Erst Mayr, Harald Räcke Hashig with Chaiig Let A deote a strategy for resolvig collisios. We use the followig otatio: A + deotes the average time for a successful search whe usig A; A deotes the average time for a usuccessful search whe usig A; We parameterize the complexity results i terms of α := m, the so-called fill factor of the hash-table. The time required for a usuccessful search is plus the legth of the list that is examied. The average legth of a list is α = m. Hece, if A is the collisio resolvig strategy Hashig with Chaiig we have A = + α. We assume uiform hashig for the followig aalysis. Erst Mayr, Harald Räcke 229 Erst Mayr, Harald Räcke 230
4 Hashig with Chaiig For a successful search observe that we do ot choose a list at radom, but we cosider a radom key k i the hash-table ad ask for the search-time for k. This is plus the umber of elemets that lie before k i k s list. Let k l deote the l-th key iserted ito the table. Let for two keys k i ad k j, X ij deote the idicator variable for the evet that k i ad k j hash to the same positio. Clearly, Pr[X ij = ] = / for uiform hashig. The expected successful search cost is [ E m m i= + m j=i+ keys before k )] i X ij cost for key k i Hashig with Chaiig [ E m m i= + m j=i+ )] X ij = m m = m i= m i= = + m + + m j=i+ m j=i+ E [ X ij ] ) ) = + m m i) m i= m 2 ) mm + ) 2 = + m 2 = + α 2 α 2m. Hece, the expected cost for a successful search is A + + α 2. Erst Mayr, Harald Räcke 23 Erst Mayr, Harald Räcke 232 Hashig with Chaiig Ope Addressig Disadvatages: poiters icrease memory requiremets poiters may lead to bad cache efficiecy Advatages: o à priori limit o the umber of elemets deletio ca be implemeted efficietly by usig balaced trees istead of liked list oe ca also obtai worst-case guaratees. All objects are stored i the table itself. Defie a fuctio hk, j) that determies the table-positio to be examied i the j-th step. The values hk, 0),...,hk, ) must form a permutatio of 0,...,. Searchk): Try positio hk, 0); if it is empty your search fails; otw. cotiue with hk, ), hk, 2),.... Isertx): Search util you fid a empty slot; isert your elemet there. If your search reaches hk, ), ad this slot is o-empty the your table is full. Erst Mayr, Harald Räcke 233 Erst Mayr, Harald Räcke 234
5 Ope Addressig Choices for hk, j): Liear probig: hk, i) = hk) + i mod sometimes: hk, i) = hk) + ci mod ). Quadratic probig: hk, i) = hk) + c i + c 2 i 2 mod. Double hashig: hk, i) = h k) + ih 2 k) mod. For quadratic probig ad double hashig oe has to esure that the search covers all positios i the table i.e., for double hashig h 2 k) must be relatively prime to teilerfremd); for quadratic probig c ad c 2 have to be chose carefully). Liear Probig Advatage: Cache-efficiecy. The ew probe positio is very likely to be i the cache. Disadvatage: Primary clusterig. Log sequeces of occupied table-positios get loger as they have a larger probability to be hit. Furthermore, they ca merge formig larger sequeces. Lemma 2 Let L be the method of liear probig for resolvig collisios: L + 2 L 2 + ) α ) + α) 2 Erst Mayr, Harald Räcke 235 Erst Mayr, Harald Räcke 236 Quadratic Probig Not as cache-efficiet as Liear Probig. Double Hashig Ay probe ito the hash-table usually creates a cache-miss. Secodary clusterig: caused by the fact that all keys mapped to the same positio have the same probe sequece. Lemma 3 Let Q be the method of quadratic probig for resolvig collisios: ) Q + + l α α 2 Lemma 4 Let A be the method of double hashig for resolvig collisios: D + ) α l α D α Q ) α + l α α Erst Mayr, Harald Räcke 237 Erst Mayr, Harald Räcke 238
6 Ope Addressig Ope Addressig #probes Some values: 0 α Liear Probig Quadratic Probig Double Hashig L + L Q + Q D + D L + Q + D + L Q D α Erst Mayr, Harald Räcke 239 Erst Mayr, Harald Räcke 240 Aalysis of Idealized Ope Address Hashig Aalysis of Idealized Ope Address Hashig Let X deote a radom variable describig the umber of probes i a usuccessful search. We aalyze the time for a search i a very idealized Ope Addressig scheme. The probe sequece hk, 0), hk, ), hk, 2),... is equally likely to be ay permutatio of 0,,...,. Let A i deote the evet that the i-th probe occurs ad is to a o-empty slot. Pr[A A 2 A i ] = Pr[A ] Pr[A 2 A ] Pr[A 3 A A 2 ]... Pr[A i A A i 2 ] Pr[X i] = m m m m i + 2 i + 2 m ) i = α i. Erst Mayr, Harald Räcke 24 Erst Mayr, Harald Räcke 242
7 Aalysis of Idealized Ope Address Hashig i = 3 Pr[X = i] i Pr[X = i] = Pr[X i] i i E[X] = Pr[X i] α i = i= i= i=0 α i = α. α = + α + α2 + α i The j-th rectagle appears i both sums j times. j times i the first due to multiplicatio with j; ad j times i the secod for summads i =, 2,..., j) Erst Mayr, Harald Räcke 243 Erst Mayr, Harald Räcke 244 i = 4 Pr[X = i] i Pr[X = i] = Pr[X i] i i Aalysis of Idealized Ope Address Hashig The umber of probes i a successful search for k is equal to the umber of probes made i a usuccessful search for k at the time that k is iserted. Let k be the i + -st elemet. The expected time for a search for k is at most i/ = i i m m i=0 i = m m i=0 i = α k= m+ k The j-th rectagle appears i both sums j times. j times i the first due to multiplicatio with j; ad j times i the secod for summads i =, 2,..., j) α m x dx = α l m = α l α. Erst Mayr, Harald Räcke 244 Erst Mayr, Harald Räcke 245
8 f x) Deletios f x) = x k m x dx k=m + How do we delete i a hash-table? For hashig with chaiig this is ot a problem. Simply search for the key, ad delete the item i the correspodig list. For ope addressig this is difficult. m + m +2 m m + x Erst Mayr, Harald Räcke 246 Erst Mayr, Harald Räcke 247 Deletios Deletios for Liear Probig Simply removig a key might iterrupt the probe sequece of other keys which the caot be foud aymore. Oe ca delete a elemet by replacig it with a deleted-marker. Durig a isertio if a deleted-marker is ecoutered a elemet ca be iserted there. Durig a search a deleted-marker must ot be used to termiate the probe sequece. The table could fill up with deleted-markers leadig to bad performace. If a table cotais may deleted-markers liear fractio of the keys) oe ca rehash the whole table ad amortize the cost for this rehash agaist the cost for the deletios. For Liear Probig oe ca delete elemets without usig deletio-markers. Upo a deletio elemets that are further dow i the probe-sequece may be moved to guaratee that they are still foud durig a search. Erst Mayr, Harald Räcke 248 Erst Mayr, Harald Räcke 249
9 Deletios for Liear Probig Algorithm 6 deletep) : T [p] ull 2: p succp) 3: while T [p] ull do 4: y T [p] 5: T [p] ull 6: p succp) 7: iserty) p is the idex ito the table-cell that cotais the object to be deleted. Poiters ito the hash-table become ivalid. Uiversal Hashig Regardless, of the choice of hash-fuctio there is always a iput a set of keys) that has a very poor worst-case behaviour. Therefore, so far we assumed that the hash-fuctio is radom so that regardless of the iput the average case behaviour is good. However, the assumptio of uiform hashig that h is chose radomly from all fuctios f : U [0,..., ] is clearly urealistic as there are U such fuctios. Eve writig dow such a fuctio would take U log bits. Uiversal hashig tries to defie a set H of fuctios that is much smaller but still leads to good average case behaviour whe selectig a hash-fuctio uiformly at radom from H. Erst Mayr, Harald Räcke 250 Erst Mayr, Harald Räcke 25 Uiversal Hashig Uiversal Hashig Defiitio 5 A class H of hash-fuctios from the uiverse U ito the set {0,..., } is called uiversal if for all u, u 2 U with u u 2 Pr[hu ) = hu 2 )], where the probability is w. r. t. the choice of a radom hash-fuctio from set H. Note that this meas that the probability of a collisio is at most. Defiitio 6 A class H of hash-fuctios from the uiverse U ito the set {0,..., } is called 2-idepedet pairwise idepedet) if the followig two coditios hold For ay key u U, ad t {0,..., } Pr[hu) = t] =, i.e., a key is distributed uiformly withi the hash-table. For all u, u 2 U with u u 2, ad for ay two hash-positios t, t 2 : Pr[hu ) = t hu 2 ) = t 2 ] 2. This requiremet clearly implies a uiversal hash-fuctio. Erst Mayr, Harald Räcke 252 Erst Mayr, Harald Räcke 253
10 Uiversal Hashig Uiversal Hashig Defiitio 7 A class H of hash-fuctios from the uiverse U ito the set {0,..., } is called k-idepedet if for ay choice of l k distict keys u,..., u l U, ad for ay set of l ot ecessarily distict hash-positios t,..., t l : Pr[hu ) = t hu l ) = t l ] l, where the probability is w. r. t. the choice of a radom hash-fuctio from set H. Defiitio 8 A class H of hash-fuctios from the uiverse U ito the set {0,..., } is called µ, k)-idepedet if for ay choice of l k distict keys u,..., u l U, ad for ay set of l ot ecessarily distict hash-positios t,..., t l : Pr[hu ) = t hu l ) = t l ] µ l, where the probability is w. r. t. the choice of a radom hash-fuctio from set H. Erst Mayr, Harald Räcke 254 Erst Mayr, Harald Räcke 255 Uiversal Hashig Let U := {0,..., p } for a prime p. Let Z p := {0,..., p }, ad let Z p := {,..., p } deote the set of ivertible elemets i Z p. Uiversal Hashig Proof. Let x, y U be two distict keys. We have to show that the probability of a collisio is oly /. ax + b ay + b mod p) Defie h a,b x) := ax + b mod p) mod If x y the x y) 0 mod p). Lemma 9 The class H = {h a,b a Z p, b Z p} is a uiversal class of hash-fuctios from U to {0,..., }. Multiplyig with a 0 mod p) gives ax y) 0 mod p) where we use that Z p is a field Körper) ad, hece, has o zero divisors ullteilerfrei). Erst Mayr, Harald Räcke 256 Erst Mayr, Harald Räcke 257
11 The hash-fuctio does ot geerate collisios before the mod )-operatio. Furthermore, every choice a, b) is mapped to a differet pair t x, t y ) with t x := ax + b ad t y := ay + b. This holds because we ca compute a ad b whe give t x ad t y : t x ax + b mod p) t y ay + b mod p) t x t y ax y) mod p) t y ay + b mod p) a t x t y )x y) mod p) b t y ay mod p) Uiversal Hashig There is a oe-to-oe correspodece betwee hash-fuctios pairs a, b), a 0) ad pairs t x, t y ), t x t y. Therefore, we ca view the first step before the mod - operatio) as choosig a pair t x, t y ), t x t y uiformly at radom. What happes whe we do the mod operatio? Fix a value t x. There are p possible values for choosig t y. From the rage 0,..., p the values t x, t x +, t x + 2,... map to t x after the modulo-operatio. These are at most p/ values. Erst Mayr, Harald Räcke 258 Erst Mayr, Harald Räcke 259 Uiversal Hashig As t y t x there are p p + p possibilities for choosig t y such that the fial hash-value creates a collisio. Uiversal Hashig It is also possible to show that H is a almost) pairwise idepedet class of hash-fuctios. p 2 pp ) Pr t x t y Z 2 p [ tx mod =h t y mod =h 2 ] p 2 pp ) This happes with probability at most. Note that the middle is the probability that hx) = h ad hy) = h 2. The total umber of choices for t x, t y ) is pp ). The umber of choices for t x t y ) such that t x mod = h t y mod = h 2 ) lies betwee p ad p. Erst Mayr, Harald Räcke 260 Erst Mayr, Harald Räcke 26
12 Defiitio 0 Let d N; q d + ) be a prime; ad let a {0,..., q } d+. Defie for x {0,..., q} d h a x) := i=0 ) a i x i mod q mod. Let H d := {h a a {0,..., q} d+ }. The class H d is e, d + )-idepedet. For the coefficiets ā {0,..., q } d+ let fā deote the polyomial d fāx) = a i x i) mod q i=0 The polyomial is defied by d + distict poits. Note that i the previous case we had d = ad chose a d 0. Erst Mayr, Harald Räcke 262 Erst Mayr, Harald Räcke 263 Fix l d + ; let x,..., x l {0,..., q } be keys, ad let t,..., t l deote the correspodig hash-fuctio values. Let A l = {hā H hāx i ) = t i for all i {,..., l}} The hā A l hā = fā mod ad fāx i ) {t i + α α {0,..., q }} }{{} =: B i I order to obtai the cardiality of A l we choose our polyomial by fixig d + poits. We first fix the values for iputs x,..., x l. We have B... B l possibilities to do this so that hāx i ) = t i ). A l deotes the set of hashfuctios such that every x i hits its pre-defied positio t i. B i is the set of positios that fā ca hit so that hā still hits t i. Erst Mayr, Harald Räcke 264 Now, we choose d l + other iputs ad choose their value arbitrarily. We have q d l+ possibilities to do this. Therefore we have B... B l q d l+ q l q d l+ possibilities to choose ā such that hā A l. Erst Mayr, Harald Räcke 265
13 Perfect Hashig Therefore the probability of choosig hā from A l is oly q l q d l+ q d+ q+ )l q l + l q + ) l q l ) l l e l. This shows that the H is e, d + )-uiversal. Suppose that we kow the set S of actual keys o isert/o delete). The we may wat to desig a simple hash-fuctio that maps all these keys to differet memory locatios. U uiverse of keys k k6 k 7 k 3 k k 7 S actual keys) k 3 k 6 Erst Mayr, Harald Räcke 266 Erst Mayr, Harald Räcke 267 Perfect Hashig Perfect Hashig Let m = S. We could simply choose the hash-table size very large so that we do t get ay collisios. Usig a uiversal hash-fuctio the expected umber of collisios is ) m E[#Collisios] = 2. If we choose = m 2 the expected umber of collisios is strictly less tha 2. Ca we get a upper boud o the probability of havig collisios? The probability of havig or more collisios ca be at most 2 as otherwise the expectatio would be larger tha 2. Erst Mayr, Harald Räcke 268 We ca fid such a hash-fuctio by a few trials. However, a hash-table size of = m 2 is very very high. We costruct a two-level scheme. We first use a hash-fuctio that maps elemets from S to m buckets. Let m j deote the umber of items that are hashed to the j-th bucket. For each bucket we choose a secod hash-fuctio that maps the elemets of the bucket ito a table of size m 2 j. The secod fuctio ca be chose such that all elemets are mapped to differet locatios. Erst Mayr, Harald Räcke 269
14 Perfect Hashig U uiverse of keys k k 4 k 5 S actual keys) k 7 k 6 k 8 k 3 k 2 m 2 m 3 m 6 m 8 i m i = m Perfect Hashig The total memory that is required by all hash-tables is O j m 2 j ). Note that m j is a radom variable. [ E j m 2 j ] [ = E 2 j [ = 2 E j mj ) + ] m j 2 j ) ] [ ] + E m j 2 mj The first expectatio is simply the expected umber of collisios, for the first level. Sice we use uiversal hashig we have j k k 6 k 4 k 3 k 2 k 8 k 5 k 7 m 2 2 m 2 3 m 2 6 m 2 8 = 2 m 2 ) m + m = 2m. Erst Mayr, Harald Räcke 270 Erst Mayr, Harald Räcke 27 Perfect Hashig We eed oly Om) time to costruct a hash-fuctio h with j m 2 j = O4m), because with probability at least /2 a radom fuctio from a uiversal family will have this property. The we costruct a hash-table h j for every bucket. This takes expected time Om j ) for every bucket. A radom fuctio h j is collisio-free with probability at least /2. We eed Om j ) to test this. We oly eed that the hash-fuctios are chose from a uiversal family!!! Goal: Try to geerate a hash-table with costat worst-case search time i a dyamic sceario. Two hash-tables T [0,..., ] ad T 2 [0,..., ], with hash-fuctios h, ad h 2. A object x is either stored at locatio T [h x)] or T 2 [h 2 x)]. A search clearly takes costat time if the above costrait is met. Erst Mayr, Harald Räcke 272 Erst Mayr, Harald Räcke 273
15 Isert: x x 7 x 4 x 6 x 6 x x 7 x x 9 x 76 x 3 Algorithm 7 Cuckoo-Isertx) : if T [h x)] = x T 2 [h 2 x)] = x the retur 2: steps 3: while steps maxsteps do 4: exchage x ad T [h x)] 5: if x = ull the retur 6: exchage x ad T 2 [h 2 x)] 7: if x = ull the retur 8: steps steps + 9: rehash) // chage hash-fuctios; rehash everythig 0: Cuckoo-Isertx) T T 2 Erst Mayr, Harald Räcke 274 Erst Mayr, Harald Räcke 275 We call oe iteratio through the while-loop a step of the algorithm. We call a sequece of iteratios through the while-loop without the termiatio coditio becomig true a phase of the algorithm. We say a phase is successful if it is ot termiated by the maxstep-coditio, but the while loop is left because x = ull. What is the expected time for a isert-operatio? We first aalyze the probability that we ed-up i a ifiite loop that is the termiated after maxsteps steps). Formally what is the probability to eter a ifiite loop that touches s differet keys? Erst Mayr, Harald Räcke 276 Erst Mayr, Harald Räcke 277
16 : Isert x x x 2 x 0 x 0 x 9 x 9 x x 2 x = x x 2 x 2 23 x 3 x 4 x 34 x 48 x 5 x 7 x 5 x 7 x = x x 6 x 8 x6 x 0 x 7 x 9 x 8 x x x 2 x 3 x 4 x 5 x 6 p p 2 p 3 p 4 p 5 p 6 p 7 p 8 p 9 T x = x x T 2 Erst Mayr, Harald Räcke 278 Erst Mayr, Harald Räcke 279 A cycle-structure is active if for every key x l likig a cell p i from T ad a cell p j from T 2 ) we have h x l ) = p i ad h 2 x l ) = p j Observatio: If durig a phase the isert-procedure rus ito a cycle there must exist a active cycle structure of size s 3. What is the probability that all keys i a cycle-structure of size s correctly map ito their T -cell? This probability is at most µ s sice h is a µ, s)-idepedet hash-fuctio. What is the probability that all keys i the cycle-structure of size s correctly map ito their T 2 -cell? This probability is at most µ s sice h 2 is a µ, s)-idepedet hash-fuctio. These evets are idepedet. Erst Mayr, Harald Räcke 280 Erst Mayr, Harald Räcke 28
17 The umber of cycle-structures of size s is at most The probability that a give cycle-structure of size s is active is at most µ2 2s. What is the probability that there exists a active cycle structure of size s? s 3 s m s. There are at most s 2 possibilities where to attach the forward ad backward liks. There are at most s possibilities to choose where to place key x. There are m s possibilities to choose the keys apart from x. There are s possibilities to choose the cells. Erst Mayr, Harald Räcke 282 Erst Mayr, Harald Räcke 283 The probability that there exists a active cycle-structure is therefore at most s=3 s 3 s m s µ2 µ2 = 2s m µ2 m 2 s=3 Here we used the fact that + ɛ)m. ) s m s 3 s=3 ) s ) s 3 O + ɛ m 2. Now, we aalyze the probability that a phase is ot successful without ruig ito a closed cycle. Hece, ) Pr[cycle] = O m 2. Erst Mayr, Harald Räcke 284 Erst Mayr, Harald Räcke 285
18 x 9 x 8 x x x 2 x 3 x 4 x 5 x 6 p p 2 p 3 p 4 p 5 p 6 p 7 p 8 p 9 Sequece of visited keys: x = x, x 2, x 3, x 4, x 5, x 6, x 7, x 3, x 2, x = x, x 8, x 9,... x 7 Cosider the sequece of ot ecessarily distict keys startig with x i the order that they are visited durig the phase. Lemma If the sequece is of legth p the there exists a sub-sequece of at least p/3 keys startig with x of distict keys. Proof. x is cotaied at most twice i the sequece. Either the sub-sequece startig from x util right before the first repeated key, or the sub-sequece startig from the repetitio of x util the ed must cotai at least p/3 distict keys. Erst Mayr, Harald Räcke 286 Erst Mayr, Harald Räcke 287 x x x 2 x 3 x 4 x 5 x 6 x 7 x 8 p p 2 p 3 p 4 p 5 p 6 p 7 p 8 p 9 x x x 2 x 3 x 4 x 5 x 6 x 7 x 8 p p 2 p 3 p 4 p 5 p 6 p 7 p 8 p 9 A path-structure is active if for every key x l likig a cell p i from T ad a cell p j from T 2 ) we have h x l ) = p i ad h 2 x l ) = p j A path-structure of size s is defied by s + differet cells alteratig btw. cells from T ad T 2 ). s distict keys x = x, x 2,..., x s, likig the cells. The leftmost cell is either from T or T 2. Observatio: If a phase takes at least t steps without ruig ito a cycle there must exist a active path-structure of size 2t )/3. Erst Mayr, Harald Räcke 288 Erst Mayr, Harald Räcke 289
19 The probability that a give path-structure of size s is active is at most µ2 2s. The probability that there exists a active path-structure of size s is at most 2 s+ m s µ2 2s ) m s 2µ 2 2µ 2 + ɛ 2µ 2 + ɛ ) s ) 2t )/3 = 2µ 2 + ɛ ) 2t 2)/3. We choose maxsteps 3l 2 +. The the probability that a phase is termiated usuccessfully without ruig ito a cycle is at most Pr[usuccessful o cycle] Pr[ active path-structure of size at least Pr[ active path-structure of size at least l + ] 2µ 2 ) l + ɛ m 2 2maxsteps +) 3 ] by choosig l log ) ) 2µ 2 m /log 2 +ɛ = log 2µ 2 m 2) /log + ɛ ) Note that this gives maxsteps = Θlog m). Erst Mayr, Harald Räcke 290 Erst Mayr, Harald Räcke 29 The expected umber of steps i the successful phase of a isert operatio is: Hece, E[umber of steps phase successful] = Pr[search takes at least t steps phase successful] t We have Pr[search at least t steps successful] = Pr[search at least t steps successful]/ Pr[successful] Pr[search at least t steps o cycle], c E[umber of steps phase successful] = Pr[search at least t steps o cycle] c t [ + ] 2µ 2 ) 2t 2)/3 c + ɛ t 2 = c + 2µ2 ) t = O). c + ɛ) 2/3 t 0 where we use the fact that for a suitable costat c 0 Pr[successful] = Pr[o cycle] Pr[usuccessful o cycle] c Pr[o cycle] Erst Mayr, Harald Räcke 293
20 A phase that is ot successful iduces cost Om) for doig a complete rehash this domiates the cost for the steps i the phase). The probability that a phase is ot successful is p = O/m 2 ) probability O/m 2 ) of ruig ito a cycle ad probability O/m 2 ) of reachig maxsteps without ruig ito a cycle). The expected umber of usuccessful phases is i p i = p = p p = Op). What kid of hash-fuctios do we eed? Sice maxsteps is Θlog m) the largest size of a path-structure or cycle-structure cotais just Θlog m) differet keys. Therefore, it is sufficiet to have µ, Θlog m))-idepedet hash-fuctios. Therefore the expected cost for re-hashes is Om) Op) = O/m). Erst Mayr, Harald Räcke 294 Erst Mayr, Harald Räcke 295 How do we make sure that + ɛ)m? Let α := / + ɛ). Keep track of the umber of elemets i the table. Whe m α we double ad do a complete re-hash table-expad). Wheever m drops below α/4 we divide by 2 ad do a rehash table-shrik). Note that right after a chage i table-size we have m = α/2. I order for a table-expad to occur at least α/2 isertios are required. Similar, for a table-shrik at least α/4 deletios must occur. Therefore we ca amortize the rehash cost after a chage i table-size agaist the cost for isertios ad deletios. Lemma 2 has a expected costat isert-time ad a worst-case costat search-time. Note that the above lemma oly holds if the fill-factor umber of keys/total umber of hash-table slots) is at most 2+ɛ). Erst Mayr, Harald Räcke 296 Erst Mayr, Harald Räcke 297
7.7 Hashing. 7.7 Hashing. Perfect Hashing. Direct Addressing
Dictioary: S.isertx): Isert a elemet x. S.deletex): Delete the elemet poited to by x. S.searchk): Retur a poiter to a elemet e with key[e] = k i S if it exists; otherwise retur ull. So far we have implemeted
More informationSo far we have implemented the search for a key by carefully choosing split-elements.
7.7 Hashing Dictionary: S. insert(x): Insert an element x. S. delete(x): Delete the element pointed to by x. S. search(k): Return a pointer to an element e with key[e] = k in S if it exists; otherwise
More information11. Hash Tables. m is not too large. Many applications require a dynamic set that supports only the directory operations INSERT, SEARCH and DELETE.
11. Hash Tables May applicatios require a dyamic set that supports oly the directory operatios INSERT, SEARCH ad DELETE. A hash table is a geeralizatio of the simpler otio of a ordiary array. Directly
More informationHashing. Algorithm : Design & Analysis [09]
Hashig Algorithm : Desig & Aalysis [09] I the last class Implemetig Dictioary ADT Defiitio of red-black tree Black height Isertio ito a red-black tree Deletio from a red-black tree Hashig Hashig Collisio
More informationHashing and Amortization
Lecture Hashig ad Amortizatio Supplemetal readig i CLRS: Chapter ; Chapter 7 itro; Sectio 7.. Arrays ad Hashig Arrays are very useful. The items i a array are statically addressed, so that isertig, deletig,
More informationOPTIMAL ALGORITHMS -- SUPPLEMENTAL NOTES
OPTIMAL ALGORITHMS -- SUPPLEMENTAL NOTES Peter M. Maurer Why Hashig is θ(). As i biary search, hashig assumes that keys are stored i a array which is idexed by a iteger. However, hashig attempts to bypass
More information1 Hash tables. 1.1 Implementation
Lecture 8 Hash Tables, Uiversal Hash Fuctios, Balls ad Bis Scribes: Luke Johsto, Moses Charikar, G. Valiat Date: Oct 18, 2017 Adapted From Virgiia Williams lecture otes 1 Hash tables A hash table is a
More informationAnalysis of Algorithms. Introduction. Contents
Itroductio The focus of this module is mathematical aspects of algorithms. Our mai focus is aalysis of algorithms, which meas evaluatig efficiecy of algorithms by aalytical ad mathematical methods. We
More informationDesign and Analysis of Algorithms
Desig ad Aalysis of Algorithms Probabilistic aalysis ad Radomized algorithms Referece: CLRS Chapter 5 Topics: Hirig problem Idicatio radom variables Radomized algorithms Huo Hogwei 1 The hirig problem
More informationProblem Set 2 Solutions
CS271 Radomess & Computatio, Sprig 2018 Problem Set 2 Solutios Poit totals are i the margi; the maximum total umber of poits was 52. 1. Probabilistic method for domiatig sets 6pts Pick a radom subset S
More information19.1 The dictionary problem
CS125 Lecture 19 Fall 2016 19.1 The dictioary proble Cosider the followig data structural proble, usually called the dictioary proble. We have a set of ites. Each ite is a (key, value pair. Keys are i
More informationCS / MCS 401 Homework 3 grader solutions
CS / MCS 401 Homework 3 grader solutios assigmet due July 6, 016 writte by Jāis Lazovskis maximum poits: 33 Some questios from CLRS. Questios marked with a asterisk were ot graded. 1 Use the defiitio of
More informationRandomized Algorithms I, Spring 2018, Department of Computer Science, University of Helsinki Homework 1: Solutions (Discussed January 25, 2018)
Radomized Algorithms I, Sprig 08, Departmet of Computer Sciece, Uiversity of Helsiki Homework : Solutios Discussed Jauary 5, 08). Exercise.: Cosider the followig balls-ad-bi game. We start with oe black
More informationSkip Lists. Presentation for use with the textbook, Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015 S 3 S S 1
Presetatio for use with the textbook, Algorithm Desig ad Applicatios, by M. T. Goodrich ad R. Tamassia, Wiley, 2015 Skip Lists S 3 15 15 23 10 15 23 36 Skip Lists 1 What is a Skip List A skip list for
More information(A sequence also can be thought of as the list of function values attained for a function f :ℵ X, where f (n) = x n for n 1.) x 1 x N +k x N +4 x 3
MATH 337 Sequeces Dr. Neal, WKU Let X be a metric space with distace fuctio d. We shall defie the geeral cocept of sequece ad limit i a metric space, the apply the results i particular to some special
More informationECEN 655: Advanced Channel Coding Spring Lecture 7 02/04/14. Belief propagation is exact on tree-structured factor graphs.
ECEN 655: Advaced Chael Codig Sprig 014 Prof. Hery Pfister Lecture 7 0/04/14 Scribe: Megke Lia 1 4-Cycles i Gallager s Esemble What we already kow: Belief propagatio is exact o tree-structured factor graphs.
More informationSkip lists: A randomized dictionary
Discrete Math for Bioiformatics WS 11/12:, by A. Bocmayr/K. Reiert, 31. Otober 2011, 09:53 3001 Sip lists: A radomized dictioary The expositio is based o the followig sources, which are all recommeded
More informationw (1) ˆx w (1) x (1) /ρ and w (2) ˆx w (2) x (2) /ρ.
2 5. Weighted umber of late jobs 5.1. Release dates ad due dates: maximimizig the weight of o-time jobs Oce we add release dates, miimizig the umber of late jobs becomes a sigificatly harder problem. For
More informationTHE ASYMPTOTIC COMPLEXITY OF MATRIX REDUCTION OVER FINITE FIELDS
THE ASYMPTOTIC COMPLEXITY OF MATRIX REDUCTION OVER FINITE FIELDS DEMETRES CHRISTOFIDES Abstract. Cosider a ivertible matrix over some field. The Gauss-Jorda elimiatio reduces this matrix to the idetity
More informationLecture 11: Hash Functions and Random Oracle Model
CS 7810 Foudatios of Cryptography October 16, 017 Lecture 11: Hash Fuctios ad Radom Oracle Model Lecturer: Daiel Wichs Scribe: Akshar Varma 1 Topic Covered Defiitio of Hash Fuctios Merkle-Damgaård Theorem
More informationLecture 4: Unique-SAT, Parity-SAT, and Approximate Counting
Advaced Complexity Theory Sprig 206 Lecture 4: Uique-SAT, Parity-SAT, ad Approximate Coutig Prof. Daa Moshkovitz Scribe: Aoymous Studet Scribe Date: Fall 202 Overview I this lecture we begi talkig about
More informationDATA STRUCTURES I, II, III, AND IV
Data structures DATA STRUCTURES I, II, III, AND IV I. Amortized Aalysis II. Biary ad Biomial Heaps III. Fiboacci Heaps IV. Uio Fid Static problems. Give a iput, produce a output. Ex. Sortig, FFT, edit
More informationAnalysis of Algorithms -Quicksort-
Aalysis of Algorithms -- Adreas Ermedahl MRTC (Mälardales Real-Time Research Ceter) adreas.ermedahl@mdh.se Autum 2004 Proposed by C.A.R. Hoare i 962 Worst- case ruig time: Θ( 2 ) Expected ruig time: Θ(
More informationAn Introduction to Randomized Algorithms
A Itroductio to Radomized Algorithms The focus of this lecture is to study a radomized algorithm for quick sort, aalyze it usig probabilistic recurrece relatios, ad also provide more geeral tools for aalysis
More informationMA131 - Analysis 1. Workbook 2 Sequences I
MA3 - Aalysis Workbook 2 Sequeces I Autum 203 Cotets 2 Sequeces I 2. Itroductio.............................. 2.2 Icreasig ad Decreasig Sequeces................ 2 2.3 Bouded Sequeces..........................
More informationSequences and Series of Functions
Chapter 6 Sequeces ad Series of Fuctios 6.1. Covergece of a Sequece of Fuctios Poitwise Covergece. Defiitio 6.1. Let, for each N, fuctio f : A R be defied. If, for each x A, the sequece (f (x)) coverges
More informationDisjoint set (Union-Find)
CS124 Lecture 7 Fall 2018 Disjoit set (Uio-Fid) For Kruskal s algorithm for the miimum spaig tree problem, we foud that we eeded a data structure for maitaiig a collectio of disjoit sets. That is, we eed
More informationLecture 11: Pseudorandom functions
COM S 6830 Cryptography Oct 1, 2009 Istructor: Rafael Pass 1 Recap Lecture 11: Pseudoradom fuctios Scribe: Stefao Ermo Defiitio 1 (Ge, Ec, Dec) is a sigle message secure ecryptio scheme if for all uppt
More informationCS161: Algorithm Design and Analysis Handout #10 Stanford University Wednesday, 10 February 2016
CS161: Algorithm Desig ad Aalysis Hadout #10 Staford Uiversity Wedesday, 10 February 2016 Lecture #11: Wedesday, 10 February 2016 Topics: Example midterm problems ad solutios from a log time ago Sprig
More informationCSE 202 Homework 1 Matthias Springer, A Yes, there does always exist a perfect matching without a strong instability.
CSE 0 Homework 1 Matthias Spriger, A9950078 1 Problem 1 Notatio a b meas that a is matched to b. a < b c meas that b likes c more tha a. Equality idicates a tie. Strog istability Yes, there does always
More informationSequences I. Chapter Introduction
Chapter 2 Sequeces I 2. Itroductio A sequece is a list of umbers i a defiite order so that we kow which umber is i the first place, which umber is i the secod place ad, for ay atural umber, we kow which
More informationExamples: data compression, path-finding, game-playing, scheduling, bin packing
Algorithms - Basic Cocepts Algorithms so what is a algorithm, ayway? The dictioary defiitio: A algorithm is a well-defied computatioal procedure that takes iput ad produces output. This class will deal
More informationLecture 12: November 13, 2018
Mathematical Toolkit Autum 2018 Lecturer: Madhur Tulsiai Lecture 12: November 13, 2018 1 Radomized polyomial idetity testig We will use our kowledge of coditioal probability to prove the followig lemma,
More informationTHE SOLUTION OF NONLINEAR EQUATIONS f( x ) = 0.
THE SOLUTION OF NONLINEAR EQUATIONS f( ) = 0. Noliear Equatio Solvers Bracketig. Graphical. Aalytical Ope Methods Bisectio False Positio (Regula-Falsi) Fied poit iteratio Newto Raphso Secat The root of
More informationIP Reference guide for integer programming formulations.
IP Referece guide for iteger programmig formulatios. by James B. Orli for 15.053 ad 15.058 This documet is iteded as a compact (or relatively compact) guide to the formulatio of iteger programs. For more
More informationRecursive Algorithms. Recurrences. Recursive Algorithms Analysis
Recursive Algorithms Recurreces Computer Sciece & Egieerig 35: Discrete Mathematics Christopher M Bourke cbourke@cseuledu A recursive algorithm is oe i which objects are defied i terms of other objects
More informationCS284A: Representations and Algorithms in Molecular Biology
CS284A: Represetatios ad Algorithms i Molecular Biology Scribe Notes o Lectures 3 & 4: Motif Discovery via Eumeratio & Motif Represetatio Usig Positio Weight Matrix Joshua Gervi Based o presetatios by
More informationTrial division, Pollard s p 1, Pollard s ρ, and Fermat s method. Christopher Koch 1. April 8, 2014
Iteger Divisio Algorithm ad Cogruece Iteger Trial divisio,,, ad with itegers mod Iverses mod Multiplicatio ad GCD Iteger Christopher Koch 1 1 Departmet of Computer Sciece ad Egieerig CSE489/589 Algorithms
More informationDiscrete Mathematics for CS Spring 2007 Luca Trevisan Lecture 22
CS 70 Discrete Mathematics for CS Sprig 2007 Luca Trevisa Lecture 22 Aother Importat Distributio The Geometric Distributio Questio: A biased coi with Heads probability p is tossed repeatedly util the first
More informationOn Random Line Segments in the Unit Square
O Radom Lie Segmets i the Uit Square Thomas A. Courtade Departmet of Electrical Egieerig Uiversity of Califoria Los Ageles, Califoria 90095 Email: tacourta@ee.ucla.edu I. INTRODUCTION Let Q = [0, 1] [0,
More information1 of 7 7/16/2009 6:06 AM Virtual Laboratories > 6. Radom Samples > 1 2 3 4 5 6 7 6. Order Statistics Defiitios Suppose agai that we have a basic radom experimet, ad that X is a real-valued radom variable
More informationLecture 2: April 3, 2013
TTIC/CMSC 350 Mathematical Toolkit Sprig 203 Madhur Tulsiai Lecture 2: April 3, 203 Scribe: Shubhedu Trivedi Coi tosses cotiued We retur to the coi tossig example from the last lecture agai: Example. Give,
More informationLecture 2: Concentration Bounds
CSE 52: Desig ad Aalysis of Algorithms I Sprig 206 Lecture 2: Cocetratio Bouds Lecturer: Shaya Oveis Ghara March 30th Scribe: Syuzaa Sargsya Disclaimer: These otes have ot bee subjected to the usual scrutiy
More informationChapter 6. Advanced Counting Techniques
Chapter 6 Advaced Coutig Techiques 6.: Recurrece Relatios Defiitio: A recurrece relatio for the sequece {a } is a equatio expressig a i terms of oe or more of the previous terms of the sequece: a,a2,a3,,a
More informationACO Comprehensive Exam 9 October 2007 Student code A. 1. Graph Theory
1. Graph Theory Prove that there exist o simple plaar triagulatio T ad two distict adjacet vertices x, y V (T ) such that x ad y are the oly vertices of T of odd degree. Do ot use the Four-Color Theorem.
More informationDiscrete Mathematics and Probability Theory Fall 2009 Satish Rao,David Tse Note 12
CS 70 Discrete Mathematics ad Probability Theory Fall 2009 Satish Rao,David Tse Note 12 Two Killer Applicatios I this lecture, we will see two killer apps of elemetary probability i Computer Sciece. 1.
More information4.1 Sigma Notation and Riemann Sums
0 the itegral. Sigma Notatio ad Riema Sums Oe strategy for calculatig the area of a regio is to cut the regio ito simple shapes, calculate the area of each simple shape, ad the add these smaller areas
More informationDesign and Analysis of ALGORITHM (Topic 2)
DR. Gatot F. Hertoo, MSc. Desig ad Aalysis of ALGORITHM (Topic 2) Algorithms + Data Structures = Programs Lessos Leared 1 Our Machie Model: Assumptios Geeric Radom Access Machie (RAM) Executes operatios
More informationFilter banks. Separately, the lowpass and highpass filters are not invertible. removes the highest frequency 1/ 2and
Filter bas Separately, the lowpass ad highpass filters are ot ivertible T removes the highest frequecy / ad removes the lowest frequecy Together these filters separate the sigal ito low-frequecy ad high-frequecy
More informationLecture 4 February 16, 2016
MIT 6.854/18.415: Advaced Algorithms Sprig 16 Prof. Akur Moitra Lecture 4 February 16, 16 Scribe: Be Eysebach, Devi Neal 1 Last Time Cosistet Hashig - hash fuctios that evolve well Radom Trees - routig
More informationChapter 6 Infinite Series
Chapter 6 Ifiite Series I the previous chapter we cosidered itegrals which were improper i the sese that the iterval of itegratio was ubouded. I this chapter we are goig to discuss a topic which is somewhat
More informationAxioms of Measure Theory
MATH 532 Axioms of Measure Theory Dr. Neal, WKU I. The Space Throughout the course, we shall let X deote a geeric o-empty set. I geeral, we shall ot assume that ay algebraic structure exists o X so that
More informationLecture 9: Pseudo-random generators against space bounded computation,
Lecture 9: Pseudo-radom geerators agaist space bouded computatio, Primality Testig Topics i Pseudoradomess ad Complexity (Sprig 2018) Rutgers Uiversity Swastik Kopparty Scribes: Harsha Tirumala, Jiyu Zhag
More informationDivide and Conquer. 1 Overview. 2 Multiplying Bit Strings. COMPSCI 330: Design and Analysis of Algorithms 1/19/2016 and 1/21/2016
COMPSCI 330: Desig ad Aalysis of Algorithms 1/19/2016 ad 1/21/2016 Lecturer: Debmalya Paigrahi Divide ad Coquer Scribe: Tiaqi Sog 1 Overview I this lecture, a importat algorithm desig techique called divide-ad-coquer
More informationProblem Set 4 Due Oct, 12
EE226: Radom Processes i Systems Lecturer: Jea C. Walrad Problem Set 4 Due Oct, 12 Fall 06 GSI: Assae Gueye This problem set essetially reviews detectio theory ad hypothesis testig ad some basic otios
More information6 Integers Modulo n. integer k can be written as k = qn + r, with q,r, 0 r b. So any integer.
6 Itegers Modulo I Example 2.3(e), we have defied the cogruece of two itegers a,b with respect to a modulus. Let us recall that a b (mod ) meas a b. We have proved that cogruece is a equivalece relatio
More informationRecursive Algorithm for Generating Partitions of an Integer. 1 Preliminary
Recursive Algorithm for Geeratig Partitios of a Iteger Sug-Hyuk Cha Computer Sciece Departmet, Pace Uiversity 1 Pace Plaza, New York, NY 10038 USA scha@pace.edu Abstract. This article first reviews the
More informationInfinite Sequences and Series
Chapter 6 Ifiite Sequeces ad Series 6.1 Ifiite Sequeces 6.1.1 Elemetary Cocepts Simply speakig, a sequece is a ordered list of umbers writte: {a 1, a 2, a 3,...a, a +1,...} where the elemets a i represet
More informationMath 475, Problem Set #12: Answers
Math 475, Problem Set #12: Aswers A. Chapter 8, problem 12, parts (b) ad (d). (b) S # (, 2) = 2 2, sice, from amog the 2 ways of puttig elemets ito 2 distiguishable boxes, exactly 2 of them result i oe
More informationCHAPTER 10 INFINITE SEQUENCES AND SERIES
CHAPTER 10 INFINITE SEQUENCES AND SERIES 10.1 Sequeces 10.2 Ifiite Series 10.3 The Itegral Tests 10.4 Compariso Tests 10.5 The Ratio ad Root Tests 10.6 Alteratig Series: Absolute ad Coditioal Covergece
More informationDiscrete Mathematics and Probability Theory Spring 2016 Rao and Walrand Note 19
CS 70 Discrete Mathematics ad Probability Theory Sprig 2016 Rao ad Walrad Note 19 Some Importat Distributios Recall our basic probabilistic experimet of tossig a biased coi times. This is a very simple
More informationTest One (Answer Key)
CS395/Ma395 (Sprig 2005) Test Oe Name: Page 1 Test Oe (Aswer Key) CS395/Ma395: Aalysis of Algorithms This is a closed book, closed otes, 70 miute examiatio. It is worth 100 poits. There are twelve (12)
More informationOptimally Sparse SVMs
A. Proof of Lemma 3. We here prove a lower boud o the umber of support vectors to achieve geeralizatio bouds of the form which we cosider. Importatly, this result holds ot oly for liear classifiers, but
More informationIt is often useful to approximate complicated functions using simpler ones. We consider the task of approximating a function by a polynomial.
Taylor Polyomials ad Taylor Series It is ofte useful to approximate complicated fuctios usig simpler oes We cosider the task of approximatig a fuctio by a polyomial If f is at least -times differetiable
More informationTR/46 OCTOBER THE ZEROS OF PARTIAL SUMS OF A MACLAURIN EXPANSION A. TALBOT
TR/46 OCTOBER 974 THE ZEROS OF PARTIAL SUMS OF A MACLAURIN EXPANSION by A. TALBOT .. Itroductio. A problem i approximatio theory o which I have recetly worked [] required for its solutio a proof that the
More information62. Power series Definition 16. (Power series) Given a sequence {c n }, the series. c n x n = c 0 + c 1 x + c 2 x 2 + c 3 x 3 +
62. Power series Defiitio 16. (Power series) Give a sequece {c }, the series c x = c 0 + c 1 x + c 2 x 2 + c 3 x 3 + is called a power series i the variable x. The umbers c are called the coefficiets of
More informationMAT1026 Calculus II Basic Convergence Tests for Series
MAT026 Calculus II Basic Covergece Tests for Series Egi MERMUT 202.03.08 Dokuz Eylül Uiversity Faculty of Sciece Departmet of Mathematics İzmir/TURKEY Cotets Mootoe Covergece Theorem 2 2 Series of Real
More informationHOMEWORK 2 SOLUTIONS
HOMEWORK SOLUTIONS CSE 55 RANDOMIZED AND APPROXIMATION ALGORITHMS 1. Questio 1. a) The larger the value of k is, the smaller the expected umber of days util we get all the coupos we eed. I fact if = k
More informationEcon 325 Notes on Point Estimator and Confidence Interval 1 By Hiro Kasahara
Poit Estimator Eco 325 Notes o Poit Estimator ad Cofidece Iterval 1 By Hiro Kasahara Parameter, Estimator, ad Estimate The ormal probability desity fuctio is fully characterized by two costats: populatio
More informationAverage-Case Analysis of QuickSort
Average-Case Aalysis of QuickSort Comp 363 Fall Semester 003 October 3, 003 The purpose of this documet is to itroduce the idea of usig recurrece relatios to do average-case aalysis. The average-case ruig
More informationMA131 - Analysis 1. Workbook 3 Sequences II
MA3 - Aalysis Workbook 3 Sequeces II Autum 2004 Cotets 2.8 Coverget Sequeces........................ 2.9 Algebra of Limits......................... 2 2.0 Further Useful Results........................
More informationPolynomials with Rational Roots that Differ by a Non-zero Constant. Generalities
Polyomials with Ratioal Roots that Differ by a No-zero Costat Philip Gibbs The problem of fidig two polyomials P(x) ad Q(x) of a give degree i a sigle variable x that have all ratioal roots ad differ by
More informationFall 2013 MTH431/531 Real analysis Section Notes
Fall 013 MTH431/531 Real aalysis Sectio 8.1-8. Notes Yi Su 013.11.1 1. Defiitio of uiform covergece. We look at a sequece of fuctios f (x) ad study the coverget property. Notice we have two parameters
More informationCS 330 Discussion - Probability
CS 330 Discussio - Probability March 24 2017 1 Fudametals of Probability 11 Radom Variables ad Evets A radom variable X is oe whose value is o-determiistic For example, suppose we flip a coi ad set X =
More informationOutline for Today. A simple and lightning fast hash table implementation. Why the degree of independence matters.
Liear Probig Outlie for Today Liear Probig Hashig A simple ad lightig fast hash table implemetatio. Aalyzig Liear Probig Why the degree of idepedece matters. Fourth Momet Bouds Aother approach for estimatig
More information11. FINITE FIELDS. Example 1: The following tables define addition and multiplication for a field of order 4.
11. FINITE FIELDS 11.1. A Field With 4 Elemets Probably the oly fiite fields which you ll kow about at this stage are the fields of itegers modulo a prime p, deoted by Z p. But there are others. Now although
More informationTopic 9: Sampling Distributions of Estimators
Topic 9: Samplig Distributios of Estimators Course 003, 2016 Page 0 Samplig distributios of estimators Sice our estimators are statistics (particular fuctios of radom variables), their distributio ca be
More informationDiscrete Mathematics and Probability Theory Spring 2012 Alistair Sinclair Note 15
CS 70 Discrete Mathematics ad Probability Theory Sprig 2012 Alistair Siclair Note 15 Some Importat Distributios The first importat distributio we leared about i the last Lecture Note is the biomial distributio
More informationChapter 3. Strong convergence. 3.1 Definition of almost sure convergence
Chapter 3 Strog covergece As poited out i the Chapter 2, there are multiple ways to defie the otio of covergece of a sequece of radom variables. That chapter defied covergece i probability, covergece i
More informationEmpirical Process Theory and Oracle Inequalities
Stat 928: Statistical Learig Theory Lecture: 10 Empirical Process Theory ad Oracle Iequalities Istructor: Sham Kakade 1 Risk vs Risk See Lecture 0 for a discussio o termiology. 2 The Uio Boud / Boferoi
More informationIt is always the case that unions, intersections, complements, and set differences are preserved by the inverse image of a function.
MATH 532 Measurable Fuctios Dr. Neal, WKU Throughout, let ( X, F, µ) be a measure space ad let (!, F, P ) deote the special case of a probability space. We shall ow begi to study real-valued fuctios defied
More informationMath 61CM - Solutions to homework 3
Math 6CM - Solutios to homework 3 Cédric De Groote October 2 th, 208 Problem : Let F be a field, m 0 a fixed oegative iteger ad let V = {a 0 + a x + + a m x m a 0,, a m F} be the vector space cosistig
More informationb i u x i U a i j u x i u x j
M ath 5 2 7 Fall 2 0 0 9 L ecture 1 9 N ov. 1 6, 2 0 0 9 ) S ecod- Order Elliptic Equatios: Weak S olutios 1. Defiitios. I this ad the followig two lectures we will study the boudary value problem Here
More informationThe multiplicative structure of finite field and a construction of LRC
IERG6120 Codig for Distributed Storage Systems Lecture 8-06/10/2016 The multiplicative structure of fiite field ad a costructio of LRC Lecturer: Keeth Shum Scribe: Zhouyi Hu Notatios: We use the otatio
More informationDiscrete Mathematics and Probability Theory Summer 2014 James Cook Note 15
CS 70 Discrete Mathematics ad Probability Theory Summer 2014 James Cook Note 15 Some Importat Distributios I this ote we will itroduce three importat probability distributios that are widely used to model
More informationFrequentist Inference
Frequetist Iferece The topics of the ext three sectios are useful applicatios of the Cetral Limit Theorem. Without kowig aythig about the uderlyig distributio of a sequece of radom variables {X i }, for
More information7.1 Convergence of sequences of random variables
Chapter 7 Limit Theorems Throughout this sectio we will assume a probability space (, F, P), i which is defied a ifiite sequece of radom variables (X ) ad a radom variable X. The fact that for every ifiite
More informationRandom Variables, Sampling and Estimation
Chapter 1 Radom Variables, Samplig ad Estimatio 1.1 Itroductio This chapter will cover the most importat basic statistical theory you eed i order to uderstad the ecoometric material that will be comig
More informationPolynomial identity testing and global minimum cut
CHAPTER 6 Polyomial idetity testig ad global miimum cut I this lecture we will cosider two further problems that ca be solved usig probabilistic algorithms. I the first half, we will cosider the problem
More informationNICK DUFRESNE. 1 1 p(x). To determine some formulas for the generating function of the Schröder numbers, r(x) = a(x) =
AN INTRODUCTION TO SCHRÖDER AND UNKNOWN NUMBERS NICK DUFRESNE Abstract. I this article we will itroduce two types of lattice paths, Schröder paths ad Ukow paths. We will examie differet properties of each,
More informationMath 155 (Lecture 3)
Math 55 (Lecture 3) September 8, I this lecture, we ll cosider the aswer to oe of the most basic coutig problems i combiatorics Questio How may ways are there to choose a -elemet subset of the set {,,,
More information3.2 Properties of Division 3.3 Zeros of Polynomials 3.4 Complex and Rational Zeros of Polynomials
Math 60 www.timetodare.com 3. Properties of Divisio 3.3 Zeros of Polyomials 3.4 Complex ad Ratioal Zeros of Polyomials I these sectios we will study polyomials algebraically. Most of our work will be cocered
More informationThe Random Walk For Dummies
The Radom Walk For Dummies Richard A Mote Abstract We look at the priciples goverig the oe-dimesioal discrete radom walk First we review five basic cocepts of probability theory The we cosider the Beroulli
More informationThe Boolean Ring of Intervals
MATH 532 Lebesgue Measure Dr. Neal, WKU We ow shall apply the results obtaied about outer measure to the legth measure o the real lie. Throughout, our space X will be the set of real umbers R. Whe ecessary,
More information6.003 Homework #3 Solutions
6.00 Homework # Solutios Problems. Complex umbers a. Evaluate the real ad imagiary parts of j j. π/ Real part = Imagiary part = 0 e Euler s formula says that j = e jπ/, so jπ/ j π/ j j = e = e. Thus the
More information2 Statistical Principles
2 Statistical Priciples This lecture will serve two mai goals. First we will itroduce ad the tool of radom hash fuctios. Secod we itroduce a radomized/probabilistic view of algorithms ad data aalysis.
More informationLecture Notes for Analysis Class
Lecture Notes for Aalysis Class Topological Spaces A topology for a set X is a collectio T of subsets of X such that: (a) X ad the empty set are i T (b) Uios of elemets of T are i T (c) Fiite itersectios
More informationLecture 10 October Minimaxity and least favorable prior sequences
STATS 300A: Theory of Statistics Fall 205 Lecture 0 October 22 Lecturer: Lester Mackey Scribe: Brya He, Rahul Makhijai Warig: These otes may cotai factual ad/or typographic errors. 0. Miimaxity ad least
More informationInduction: Solutions
Writig Proofs Misha Lavrov Iductio: Solutios Wester PA ARML Practice March 6, 206. Prove that a 2 2 chessboard with ay oe square removed ca always be covered by shaped tiles. Solutio : We iduct o. For
More informationMa 530 Introduction to Power Series
Ma 530 Itroductio to Power Series Please ote that there is material o power series at Visual Calculus. Some of this material was used as part of the presetatio of the topics that follow. What is a Power
More information