Definitions: Universe U of keys, e.g., U N 0. U very large. Set S U of keys, S = m U.

Size: px
Start display at page:

Download "Definitions: Universe U of keys, e.g., U N 0. U very large. Set S U of keys, S = m U."

Transcription

1 7 7 Dictioary: S.isertx): Isert a elemet x. S.deletex): Delete the elemet poited to by x. S.searchk): Retur a poiter to a elemet e with key[e] = k i S if it exists; otherwise retur ull. So far we have implemeted the search for a key by carefully choosig split-elemets. The the memory locatio of a object x with key k is determied by successively comparig k to split-elemets. Hashig tries to directly compute the memory locatio from the give key. The goal is to have costat search time. Defiitios: Uiverse U of keys, e.g., U N 0. U very large. Set S U of keys, S = m U. Array T [0,..., ] hash-table. Hash fuctio h : U [0,..., ]. The hash-fuctio h should fulfill: Fast to evaluate. Small storage requiremet. Good distributio of elemets over the whole table. Erst Mayr, Harald Räcke 29 Erst Mayr, Harald Räcke Ideally the hash fuctio maps all keys to differet memory locatios. k Suppose that we kow the set S of actual keys o isert/o delete). The we may wat to desig a simple hash-fuctio that maps all these keys to differet memory locatios. k k U uiverse of keys k6 k 7 k 3 k 7 k 3 U uiverse of keys k k6 k 7 k 3 k 7 k 6 S actual keys) k 3 k 6 This special case is kow as Direct Addressig. It is usually very urealistic as the uiverse of keys typically is quite large, ad i particular larger tha the available memory. Such a hash fuctio h is called a perfect hash fuctio for set S. Erst Mayr, Harald Räcke 22 Erst Mayr, Harald Räcke 222

2 7 7 If we do ot kow the keys i advace, the best we ca hope for is that the hash fuctio distributes keys evely across the table. Problem: Collisios Usually the uiverse U is much larger tha the table-size. Hece, there may be two elemets k, k 2 from the set S that map to the same memory locatio i.e., hk ) = hk 2 )). This is called a collisio. Typically, collisios do ot appear oce the size of the set S of actual keys gets close to, but already whe S ω ). Lemma The probability of havig a collisio whe hashig m elemets ito a table of size uder uiform hashig is at least e mm ) 2 e m2 2. Uiform hashig: Choose a hash fuctio uiformly at radom from all fuctios f : U [0,..., ]. Erst Mayr, Harald Räcke 223 Erst Mayr, Harald Räcke Proof. Let A m, deote the evet that isertig m keys ito a table of size does ot geerate a collisio. The 4 3 f x) e x x Pr[A m, ] = m l= m j=0 l + = m j=0 e j/ = e m j=0 j ) j = e mm ) 2. Here the first equality follows sice the l-th elemet that is hashed has a probability of l+ to ot geerate a collisio uder the coditio that the previous elemets did ot iduce collisios The iequality x e x is derived by stoppig the Taylor-expasio of e x after the secod term. x Erst Mayr, Harald Räcke 225 Erst Mayr, Harald Räcke 226

3 Resolvig Collisios The methods for dealig with collisios ca be classified ito the two mai types ope addressig, aka. closed hashig hashig with chaiig, aka. closed addressig, ope hashig. There are applicatios e.g. computer chess where you do ot resolve collisios at all. Hashig with Chaiig Arrage elemets that map to the same positio i a liear list. Access: compute hx) ad search list for key[x]. Isert: isert at the frot of the list. U uiverse of keys k k 6 k 4 k 5 k 2 k 7 S actual keys) k 8 k3 k k 4 k 5 k 2 k 7 k 3 k 8 k 6 Erst Mayr, Harald Räcke 227 Erst Mayr, Harald Räcke Hashig with Chaiig Let A deote a strategy for resolvig collisios. We use the followig otatio: A + deotes the average time for a successful search whe usig A; A deotes the average time for a usuccessful search whe usig A; We parameterize the complexity results i terms of α := m, the so-called fill factor of the hash-table. The time required for a usuccessful search is plus the legth of the list that is examied. The average legth of a list is α = m. Hece, if A is the collisio resolvig strategy Hashig with Chaiig we have A = + α. We assume uiform hashig for the followig aalysis. Erst Mayr, Harald Räcke 229 Erst Mayr, Harald Räcke 230

4 Hashig with Chaiig For a successful search observe that we do ot choose a list at radom, but we cosider a radom key k i the hash-table ad ask for the search-time for k. This is plus the umber of elemets that lie before k i k s list. Let k l deote the l-th key iserted ito the table. Let for two keys k i ad k j, X ij deote the idicator variable for the evet that k i ad k j hash to the same positio. Clearly, Pr[X ij = ] = / for uiform hashig. The expected successful search cost is [ E m m i= + m j=i+ keys before k )] i X ij cost for key k i Hashig with Chaiig [ E m m i= + m j=i+ )] X ij = m m = m i= m i= = + m + + m j=i+ m j=i+ E [ X ij ] ) ) = + m m i) m i= m 2 ) mm + ) 2 = + m 2 = + α 2 α 2m. Hece, the expected cost for a successful search is A + + α 2. Erst Mayr, Harald Räcke 23 Erst Mayr, Harald Räcke 232 Hashig with Chaiig Ope Addressig Disadvatages: poiters icrease memory requiremets poiters may lead to bad cache efficiecy Advatages: o à priori limit o the umber of elemets deletio ca be implemeted efficietly by usig balaced trees istead of liked list oe ca also obtai worst-case guaratees. All objects are stored i the table itself. Defie a fuctio hk, j) that determies the table-positio to be examied i the j-th step. The values hk, 0),...,hk, ) must form a permutatio of 0,...,. Searchk): Try positio hk, 0); if it is empty your search fails; otw. cotiue with hk, ), hk, 2),.... Isertx): Search util you fid a empty slot; isert your elemet there. If your search reaches hk, ), ad this slot is o-empty the your table is full. Erst Mayr, Harald Räcke 233 Erst Mayr, Harald Räcke 234

5 Ope Addressig Choices for hk, j): Liear probig: hk, i) = hk) + i mod sometimes: hk, i) = hk) + ci mod ). Quadratic probig: hk, i) = hk) + c i + c 2 i 2 mod. Double hashig: hk, i) = h k) + ih 2 k) mod. For quadratic probig ad double hashig oe has to esure that the search covers all positios i the table i.e., for double hashig h 2 k) must be relatively prime to teilerfremd); for quadratic probig c ad c 2 have to be chose carefully). Liear Probig Advatage: Cache-efficiecy. The ew probe positio is very likely to be i the cache. Disadvatage: Primary clusterig. Log sequeces of occupied table-positios get loger as they have a larger probability to be hit. Furthermore, they ca merge formig larger sequeces. Lemma 2 Let L be the method of liear probig for resolvig collisios: L + 2 L 2 + ) α ) + α) 2 Erst Mayr, Harald Räcke 235 Erst Mayr, Harald Räcke 236 Quadratic Probig Not as cache-efficiet as Liear Probig. Double Hashig Ay probe ito the hash-table usually creates a cache-miss. Secodary clusterig: caused by the fact that all keys mapped to the same positio have the same probe sequece. Lemma 3 Let Q be the method of quadratic probig for resolvig collisios: ) Q + + l α α 2 Lemma 4 Let A be the method of double hashig for resolvig collisios: D + ) α l α D α Q ) α + l α α Erst Mayr, Harald Räcke 237 Erst Mayr, Harald Räcke 238

6 Ope Addressig Ope Addressig #probes Some values: 0 α Liear Probig Quadratic Probig Double Hashig L + L Q + Q D + D L + Q + D + L Q D α Erst Mayr, Harald Räcke 239 Erst Mayr, Harald Räcke 240 Aalysis of Idealized Ope Address Hashig Aalysis of Idealized Ope Address Hashig Let X deote a radom variable describig the umber of probes i a usuccessful search. We aalyze the time for a search i a very idealized Ope Addressig scheme. The probe sequece hk, 0), hk, ), hk, 2),... is equally likely to be ay permutatio of 0,,...,. Let A i deote the evet that the i-th probe occurs ad is to a o-empty slot. Pr[A A 2 A i ] = Pr[A ] Pr[A 2 A ] Pr[A 3 A A 2 ]... Pr[A i A A i 2 ] Pr[X i] = m m m m i + 2 i + 2 m ) i = α i. Erst Mayr, Harald Räcke 24 Erst Mayr, Harald Räcke 242

7 Aalysis of Idealized Ope Address Hashig i = 3 Pr[X = i] i Pr[X = i] = Pr[X i] i i E[X] = Pr[X i] α i = i= i= i=0 α i = α. α = + α + α2 + α i The j-th rectagle appears i both sums j times. j times i the first due to multiplicatio with j; ad j times i the secod for summads i =, 2,..., j) Erst Mayr, Harald Räcke 243 Erst Mayr, Harald Räcke 244 i = 4 Pr[X = i] i Pr[X = i] = Pr[X i] i i Aalysis of Idealized Ope Address Hashig The umber of probes i a successful search for k is equal to the umber of probes made i a usuccessful search for k at the time that k is iserted. Let k be the i + -st elemet. The expected time for a search for k is at most i/ = i i m m i=0 i = m m i=0 i = α k= m+ k The j-th rectagle appears i both sums j times. j times i the first due to multiplicatio with j; ad j times i the secod for summads i =, 2,..., j) α m x dx = α l m = α l α. Erst Mayr, Harald Räcke 244 Erst Mayr, Harald Räcke 245

8 f x) Deletios f x) = x k m x dx k=m + How do we delete i a hash-table? For hashig with chaiig this is ot a problem. Simply search for the key, ad delete the item i the correspodig list. For ope addressig this is difficult. m + m +2 m m + x Erst Mayr, Harald Räcke 246 Erst Mayr, Harald Räcke 247 Deletios Deletios for Liear Probig Simply removig a key might iterrupt the probe sequece of other keys which the caot be foud aymore. Oe ca delete a elemet by replacig it with a deleted-marker. Durig a isertio if a deleted-marker is ecoutered a elemet ca be iserted there. Durig a search a deleted-marker must ot be used to termiate the probe sequece. The table could fill up with deleted-markers leadig to bad performace. If a table cotais may deleted-markers liear fractio of the keys) oe ca rehash the whole table ad amortize the cost for this rehash agaist the cost for the deletios. For Liear Probig oe ca delete elemets without usig deletio-markers. Upo a deletio elemets that are further dow i the probe-sequece may be moved to guaratee that they are still foud durig a search. Erst Mayr, Harald Räcke 248 Erst Mayr, Harald Räcke 249

9 Deletios for Liear Probig Algorithm 6 deletep) : T [p] ull 2: p succp) 3: while T [p] ull do 4: y T [p] 5: T [p] ull 6: p succp) 7: iserty) p is the idex ito the table-cell that cotais the object to be deleted. Poiters ito the hash-table become ivalid. Uiversal Hashig Regardless, of the choice of hash-fuctio there is always a iput a set of keys) that has a very poor worst-case behaviour. Therefore, so far we assumed that the hash-fuctio is radom so that regardless of the iput the average case behaviour is good. However, the assumptio of uiform hashig that h is chose radomly from all fuctios f : U [0,..., ] is clearly urealistic as there are U such fuctios. Eve writig dow such a fuctio would take U log bits. Uiversal hashig tries to defie a set H of fuctios that is much smaller but still leads to good average case behaviour whe selectig a hash-fuctio uiformly at radom from H. Erst Mayr, Harald Räcke 250 Erst Mayr, Harald Räcke 25 Uiversal Hashig Uiversal Hashig Defiitio 5 A class H of hash-fuctios from the uiverse U ito the set {0,..., } is called uiversal if for all u, u 2 U with u u 2 Pr[hu ) = hu 2 )], where the probability is w. r. t. the choice of a radom hash-fuctio from set H. Note that this meas that the probability of a collisio is at most. Defiitio 6 A class H of hash-fuctios from the uiverse U ito the set {0,..., } is called 2-idepedet pairwise idepedet) if the followig two coditios hold For ay key u U, ad t {0,..., } Pr[hu) = t] =, i.e., a key is distributed uiformly withi the hash-table. For all u, u 2 U with u u 2, ad for ay two hash-positios t, t 2 : Pr[hu ) = t hu 2 ) = t 2 ] 2. This requiremet clearly implies a uiversal hash-fuctio. Erst Mayr, Harald Räcke 252 Erst Mayr, Harald Räcke 253

10 Uiversal Hashig Uiversal Hashig Defiitio 7 A class H of hash-fuctios from the uiverse U ito the set {0,..., } is called k-idepedet if for ay choice of l k distict keys u,..., u l U, ad for ay set of l ot ecessarily distict hash-positios t,..., t l : Pr[hu ) = t hu l ) = t l ] l, where the probability is w. r. t. the choice of a radom hash-fuctio from set H. Defiitio 8 A class H of hash-fuctios from the uiverse U ito the set {0,..., } is called µ, k)-idepedet if for ay choice of l k distict keys u,..., u l U, ad for ay set of l ot ecessarily distict hash-positios t,..., t l : Pr[hu ) = t hu l ) = t l ] µ l, where the probability is w. r. t. the choice of a radom hash-fuctio from set H. Erst Mayr, Harald Räcke 254 Erst Mayr, Harald Räcke 255 Uiversal Hashig Let U := {0,..., p } for a prime p. Let Z p := {0,..., p }, ad let Z p := {,..., p } deote the set of ivertible elemets i Z p. Uiversal Hashig Proof. Let x, y U be two distict keys. We have to show that the probability of a collisio is oly /. ax + b ay + b mod p) Defie h a,b x) := ax + b mod p) mod If x y the x y) 0 mod p). Lemma 9 The class H = {h a,b a Z p, b Z p} is a uiversal class of hash-fuctios from U to {0,..., }. Multiplyig with a 0 mod p) gives ax y) 0 mod p) where we use that Z p is a field Körper) ad, hece, has o zero divisors ullteilerfrei). Erst Mayr, Harald Räcke 256 Erst Mayr, Harald Räcke 257

11 The hash-fuctio does ot geerate collisios before the mod )-operatio. Furthermore, every choice a, b) is mapped to a differet pair t x, t y ) with t x := ax + b ad t y := ay + b. This holds because we ca compute a ad b whe give t x ad t y : t x ax + b mod p) t y ay + b mod p) t x t y ax y) mod p) t y ay + b mod p) a t x t y )x y) mod p) b t y ay mod p) Uiversal Hashig There is a oe-to-oe correspodece betwee hash-fuctios pairs a, b), a 0) ad pairs t x, t y ), t x t y. Therefore, we ca view the first step before the mod - operatio) as choosig a pair t x, t y ), t x t y uiformly at radom. What happes whe we do the mod operatio? Fix a value t x. There are p possible values for choosig t y. From the rage 0,..., p the values t x, t x +, t x + 2,... map to t x after the modulo-operatio. These are at most p/ values. Erst Mayr, Harald Räcke 258 Erst Mayr, Harald Räcke 259 Uiversal Hashig As t y t x there are p p + p possibilities for choosig t y such that the fial hash-value creates a collisio. Uiversal Hashig It is also possible to show that H is a almost) pairwise idepedet class of hash-fuctios. p 2 pp ) Pr t x t y Z 2 p [ tx mod =h t y mod =h 2 ] p 2 pp ) This happes with probability at most. Note that the middle is the probability that hx) = h ad hy) = h 2. The total umber of choices for t x, t y ) is pp ). The umber of choices for t x t y ) such that t x mod = h t y mod = h 2 ) lies betwee p ad p. Erst Mayr, Harald Räcke 260 Erst Mayr, Harald Räcke 26

12 Defiitio 0 Let d N; q d + ) be a prime; ad let a {0,..., q } d+. Defie for x {0,..., q} d h a x) := i=0 ) a i x i mod q mod. Let H d := {h a a {0,..., q} d+ }. The class H d is e, d + )-idepedet. For the coefficiets ā {0,..., q } d+ let fā deote the polyomial d fāx) = a i x i) mod q i=0 The polyomial is defied by d + distict poits. Note that i the previous case we had d = ad chose a d 0. Erst Mayr, Harald Räcke 262 Erst Mayr, Harald Räcke 263 Fix l d + ; let x,..., x l {0,..., q } be keys, ad let t,..., t l deote the correspodig hash-fuctio values. Let A l = {hā H hāx i ) = t i for all i {,..., l}} The hā A l hā = fā mod ad fāx i ) {t i + α α {0,..., q }} }{{} =: B i I order to obtai the cardiality of A l we choose our polyomial by fixig d + poits. We first fix the values for iputs x,..., x l. We have B... B l possibilities to do this so that hāx i ) = t i ). A l deotes the set of hashfuctios such that every x i hits its pre-defied positio t i. B i is the set of positios that fā ca hit so that hā still hits t i. Erst Mayr, Harald Räcke 264 Now, we choose d l + other iputs ad choose their value arbitrarily. We have q d l+ possibilities to do this. Therefore we have B... B l q d l+ q l q d l+ possibilities to choose ā such that hā A l. Erst Mayr, Harald Räcke 265

13 Perfect Hashig Therefore the probability of choosig hā from A l is oly q l q d l+ q d+ q+ )l q l + l q + ) l q l ) l l e l. This shows that the H is e, d + )-uiversal. Suppose that we kow the set S of actual keys o isert/o delete). The we may wat to desig a simple hash-fuctio that maps all these keys to differet memory locatios. U uiverse of keys k k6 k 7 k 3 k k 7 S actual keys) k 3 k 6 Erst Mayr, Harald Räcke 266 Erst Mayr, Harald Räcke 267 Perfect Hashig Perfect Hashig Let m = S. We could simply choose the hash-table size very large so that we do t get ay collisios. Usig a uiversal hash-fuctio the expected umber of collisios is ) m E[#Collisios] = 2. If we choose = m 2 the expected umber of collisios is strictly less tha 2. Ca we get a upper boud o the probability of havig collisios? The probability of havig or more collisios ca be at most 2 as otherwise the expectatio would be larger tha 2. Erst Mayr, Harald Räcke 268 We ca fid such a hash-fuctio by a few trials. However, a hash-table size of = m 2 is very very high. We costruct a two-level scheme. We first use a hash-fuctio that maps elemets from S to m buckets. Let m j deote the umber of items that are hashed to the j-th bucket. For each bucket we choose a secod hash-fuctio that maps the elemets of the bucket ito a table of size m 2 j. The secod fuctio ca be chose such that all elemets are mapped to differet locatios. Erst Mayr, Harald Räcke 269

14 Perfect Hashig U uiverse of keys k k 4 k 5 S actual keys) k 7 k 6 k 8 k 3 k 2 m 2 m 3 m 6 m 8 i m i = m Perfect Hashig The total memory that is required by all hash-tables is O j m 2 j ). Note that m j is a radom variable. [ E j m 2 j ] [ = E 2 j [ = 2 E j mj ) + ] m j 2 j ) ] [ ] + E m j 2 mj The first expectatio is simply the expected umber of collisios, for the first level. Sice we use uiversal hashig we have j k k 6 k 4 k 3 k 2 k 8 k 5 k 7 m 2 2 m 2 3 m 2 6 m 2 8 = 2 m 2 ) m + m = 2m. Erst Mayr, Harald Räcke 270 Erst Mayr, Harald Räcke 27 Perfect Hashig We eed oly Om) time to costruct a hash-fuctio h with j m 2 j = O4m), because with probability at least /2 a radom fuctio from a uiversal family will have this property. The we costruct a hash-table h j for every bucket. This takes expected time Om j ) for every bucket. A radom fuctio h j is collisio-free with probability at least /2. We eed Om j ) to test this. We oly eed that the hash-fuctios are chose from a uiversal family!!! Goal: Try to geerate a hash-table with costat worst-case search time i a dyamic sceario. Two hash-tables T [0,..., ] ad T 2 [0,..., ], with hash-fuctios h, ad h 2. A object x is either stored at locatio T [h x)] or T 2 [h 2 x)]. A search clearly takes costat time if the above costrait is met. Erst Mayr, Harald Räcke 272 Erst Mayr, Harald Räcke 273

15 Isert: x x 7 x 4 x 6 x 6 x x 7 x x 9 x 76 x 3 Algorithm 7 Cuckoo-Isertx) : if T [h x)] = x T 2 [h 2 x)] = x the retur 2: steps 3: while steps maxsteps do 4: exchage x ad T [h x)] 5: if x = ull the retur 6: exchage x ad T 2 [h 2 x)] 7: if x = ull the retur 8: steps steps + 9: rehash) // chage hash-fuctios; rehash everythig 0: Cuckoo-Isertx) T T 2 Erst Mayr, Harald Räcke 274 Erst Mayr, Harald Räcke 275 We call oe iteratio through the while-loop a step of the algorithm. We call a sequece of iteratios through the while-loop without the termiatio coditio becomig true a phase of the algorithm. We say a phase is successful if it is ot termiated by the maxstep-coditio, but the while loop is left because x = ull. What is the expected time for a isert-operatio? We first aalyze the probability that we ed-up i a ifiite loop that is the termiated after maxsteps steps). Formally what is the probability to eter a ifiite loop that touches s differet keys? Erst Mayr, Harald Räcke 276 Erst Mayr, Harald Räcke 277

16 : Isert x x x 2 x 0 x 0 x 9 x 9 x x 2 x = x x 2 x 2 23 x 3 x 4 x 34 x 48 x 5 x 7 x 5 x 7 x = x x 6 x 8 x6 x 0 x 7 x 9 x 8 x x x 2 x 3 x 4 x 5 x 6 p p 2 p 3 p 4 p 5 p 6 p 7 p 8 p 9 T x = x x T 2 Erst Mayr, Harald Räcke 278 Erst Mayr, Harald Räcke 279 A cycle-structure is active if for every key x l likig a cell p i from T ad a cell p j from T 2 ) we have h x l ) = p i ad h 2 x l ) = p j Observatio: If durig a phase the isert-procedure rus ito a cycle there must exist a active cycle structure of size s 3. What is the probability that all keys i a cycle-structure of size s correctly map ito their T -cell? This probability is at most µ s sice h is a µ, s)-idepedet hash-fuctio. What is the probability that all keys i the cycle-structure of size s correctly map ito their T 2 -cell? This probability is at most µ s sice h 2 is a µ, s)-idepedet hash-fuctio. These evets are idepedet. Erst Mayr, Harald Räcke 280 Erst Mayr, Harald Räcke 28

17 The umber of cycle-structures of size s is at most The probability that a give cycle-structure of size s is active is at most µ2 2s. What is the probability that there exists a active cycle structure of size s? s 3 s m s. There are at most s 2 possibilities where to attach the forward ad backward liks. There are at most s possibilities to choose where to place key x. There are m s possibilities to choose the keys apart from x. There are s possibilities to choose the cells. Erst Mayr, Harald Räcke 282 Erst Mayr, Harald Räcke 283 The probability that there exists a active cycle-structure is therefore at most s=3 s 3 s m s µ2 µ2 = 2s m µ2 m 2 s=3 Here we used the fact that + ɛ)m. ) s m s 3 s=3 ) s ) s 3 O + ɛ m 2. Now, we aalyze the probability that a phase is ot successful without ruig ito a closed cycle. Hece, ) Pr[cycle] = O m 2. Erst Mayr, Harald Räcke 284 Erst Mayr, Harald Räcke 285

18 x 9 x 8 x x x 2 x 3 x 4 x 5 x 6 p p 2 p 3 p 4 p 5 p 6 p 7 p 8 p 9 Sequece of visited keys: x = x, x 2, x 3, x 4, x 5, x 6, x 7, x 3, x 2, x = x, x 8, x 9,... x 7 Cosider the sequece of ot ecessarily distict keys startig with x i the order that they are visited durig the phase. Lemma If the sequece is of legth p the there exists a sub-sequece of at least p/3 keys startig with x of distict keys. Proof. x is cotaied at most twice i the sequece. Either the sub-sequece startig from x util right before the first repeated key, or the sub-sequece startig from the repetitio of x util the ed must cotai at least p/3 distict keys. Erst Mayr, Harald Räcke 286 Erst Mayr, Harald Räcke 287 x x x 2 x 3 x 4 x 5 x 6 x 7 x 8 p p 2 p 3 p 4 p 5 p 6 p 7 p 8 p 9 x x x 2 x 3 x 4 x 5 x 6 x 7 x 8 p p 2 p 3 p 4 p 5 p 6 p 7 p 8 p 9 A path-structure is active if for every key x l likig a cell p i from T ad a cell p j from T 2 ) we have h x l ) = p i ad h 2 x l ) = p j A path-structure of size s is defied by s + differet cells alteratig btw. cells from T ad T 2 ). s distict keys x = x, x 2,..., x s, likig the cells. The leftmost cell is either from T or T 2. Observatio: If a phase takes at least t steps without ruig ito a cycle there must exist a active path-structure of size 2t )/3. Erst Mayr, Harald Räcke 288 Erst Mayr, Harald Räcke 289

19 The probability that a give path-structure of size s is active is at most µ2 2s. The probability that there exists a active path-structure of size s is at most 2 s+ m s µ2 2s ) m s 2µ 2 2µ 2 + ɛ 2µ 2 + ɛ ) s ) 2t )/3 = 2µ 2 + ɛ ) 2t 2)/3. We choose maxsteps 3l 2 +. The the probability that a phase is termiated usuccessfully without ruig ito a cycle is at most Pr[usuccessful o cycle] Pr[ active path-structure of size at least Pr[ active path-structure of size at least l + ] 2µ 2 ) l + ɛ m 2 2maxsteps +) 3 ] by choosig l log ) ) 2µ 2 m /log 2 +ɛ = log 2µ 2 m 2) /log + ɛ ) Note that this gives maxsteps = Θlog m). Erst Mayr, Harald Räcke 290 Erst Mayr, Harald Räcke 29 The expected umber of steps i the successful phase of a isert operatio is: Hece, E[umber of steps phase successful] = Pr[search takes at least t steps phase successful] t We have Pr[search at least t steps successful] = Pr[search at least t steps successful]/ Pr[successful] Pr[search at least t steps o cycle], c E[umber of steps phase successful] = Pr[search at least t steps o cycle] c t [ + ] 2µ 2 ) 2t 2)/3 c + ɛ t 2 = c + 2µ2 ) t = O). c + ɛ) 2/3 t 0 where we use the fact that for a suitable costat c 0 Pr[successful] = Pr[o cycle] Pr[usuccessful o cycle] c Pr[o cycle] Erst Mayr, Harald Räcke 293

20 A phase that is ot successful iduces cost Om) for doig a complete rehash this domiates the cost for the steps i the phase). The probability that a phase is ot successful is p = O/m 2 ) probability O/m 2 ) of ruig ito a cycle ad probability O/m 2 ) of reachig maxsteps without ruig ito a cycle). The expected umber of usuccessful phases is i p i = p = p p = Op). What kid of hash-fuctios do we eed? Sice maxsteps is Θlog m) the largest size of a path-structure or cycle-structure cotais just Θlog m) differet keys. Therefore, it is sufficiet to have µ, Θlog m))-idepedet hash-fuctios. Therefore the expected cost for re-hashes is Om) Op) = O/m). Erst Mayr, Harald Räcke 294 Erst Mayr, Harald Räcke 295 How do we make sure that + ɛ)m? Let α := / + ɛ). Keep track of the umber of elemets i the table. Whe m α we double ad do a complete re-hash table-expad). Wheever m drops below α/4 we divide by 2 ad do a rehash table-shrik). Note that right after a chage i table-size we have m = α/2. I order for a table-expad to occur at least α/2 isertios are required. Similar, for a table-shrik at least α/4 deletios must occur. Therefore we ca amortize the rehash cost after a chage i table-size agaist the cost for isertios ad deletios. Lemma 2 has a expected costat isert-time ad a worst-case costat search-time. Note that the above lemma oly holds if the fill-factor umber of keys/total umber of hash-table slots) is at most 2+ɛ). Erst Mayr, Harald Räcke 296 Erst Mayr, Harald Räcke 297

7.7 Hashing. 7.7 Hashing. Perfect Hashing. Direct Addressing

7.7 Hashing. 7.7 Hashing. Perfect Hashing. Direct Addressing Dictioary: S.isertx): Isert a elemet x. S.deletex): Delete the elemet poited to by x. S.searchk): Retur a poiter to a elemet e with key[e] = k i S if it exists; otherwise retur ull. So far we have implemeted

More information

So far we have implemented the search for a key by carefully choosing split-elements.

So far we have implemented the search for a key by carefully choosing split-elements. 7.7 Hashing Dictionary: S. insert(x): Insert an element x. S. delete(x): Delete the element pointed to by x. S. search(k): Return a pointer to an element e with key[e] = k in S if it exists; otherwise

More information

11. Hash Tables. m is not too large. Many applications require a dynamic set that supports only the directory operations INSERT, SEARCH and DELETE.

11. Hash Tables. m is not too large. Many applications require a dynamic set that supports only the directory operations INSERT, SEARCH and DELETE. 11. Hash Tables May applicatios require a dyamic set that supports oly the directory operatios INSERT, SEARCH ad DELETE. A hash table is a geeralizatio of the simpler otio of a ordiary array. Directly

More information

Hashing. Algorithm : Design & Analysis [09]

Hashing. Algorithm : Design & Analysis [09] Hashig Algorithm : Desig & Aalysis [09] I the last class Implemetig Dictioary ADT Defiitio of red-black tree Black height Isertio ito a red-black tree Deletio from a red-black tree Hashig Hashig Collisio

More information

Hashing and Amortization

Hashing and Amortization Lecture Hashig ad Amortizatio Supplemetal readig i CLRS: Chapter ; Chapter 7 itro; Sectio 7.. Arrays ad Hashig Arrays are very useful. The items i a array are statically addressed, so that isertig, deletig,

More information

OPTIMAL ALGORITHMS -- SUPPLEMENTAL NOTES

OPTIMAL ALGORITHMS -- SUPPLEMENTAL NOTES OPTIMAL ALGORITHMS -- SUPPLEMENTAL NOTES Peter M. Maurer Why Hashig is θ(). As i biary search, hashig assumes that keys are stored i a array which is idexed by a iteger. However, hashig attempts to bypass

More information

1 Hash tables. 1.1 Implementation

1 Hash tables. 1.1 Implementation Lecture 8 Hash Tables, Uiversal Hash Fuctios, Balls ad Bis Scribes: Luke Johsto, Moses Charikar, G. Valiat Date: Oct 18, 2017 Adapted From Virgiia Williams lecture otes 1 Hash tables A hash table is a

More information

Analysis of Algorithms. Introduction. Contents

Analysis of Algorithms. Introduction. Contents Itroductio The focus of this module is mathematical aspects of algorithms. Our mai focus is aalysis of algorithms, which meas evaluatig efficiecy of algorithms by aalytical ad mathematical methods. We

More information

Design and Analysis of Algorithms

Design and Analysis of Algorithms Desig ad Aalysis of Algorithms Probabilistic aalysis ad Radomized algorithms Referece: CLRS Chapter 5 Topics: Hirig problem Idicatio radom variables Radomized algorithms Huo Hogwei 1 The hirig problem

More information

Problem Set 2 Solutions

Problem Set 2 Solutions CS271 Radomess & Computatio, Sprig 2018 Problem Set 2 Solutios Poit totals are i the margi; the maximum total umber of poits was 52. 1. Probabilistic method for domiatig sets 6pts Pick a radom subset S

More information

19.1 The dictionary problem

19.1 The dictionary problem CS125 Lecture 19 Fall 2016 19.1 The dictioary proble Cosider the followig data structural proble, usually called the dictioary proble. We have a set of ites. Each ite is a (key, value pair. Keys are i

More information

CS / MCS 401 Homework 3 grader solutions

CS / MCS 401 Homework 3 grader solutions CS / MCS 401 Homework 3 grader solutios assigmet due July 6, 016 writte by Jāis Lazovskis maximum poits: 33 Some questios from CLRS. Questios marked with a asterisk were ot graded. 1 Use the defiitio of

More information

Randomized Algorithms I, Spring 2018, Department of Computer Science, University of Helsinki Homework 1: Solutions (Discussed January 25, 2018)

Randomized Algorithms I, Spring 2018, Department of Computer Science, University of Helsinki Homework 1: Solutions (Discussed January 25, 2018) Radomized Algorithms I, Sprig 08, Departmet of Computer Sciece, Uiversity of Helsiki Homework : Solutios Discussed Jauary 5, 08). Exercise.: Cosider the followig balls-ad-bi game. We start with oe black

More information

Skip Lists. Presentation for use with the textbook, Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015 S 3 S S 1

Skip Lists. Presentation for use with the textbook, Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015 S 3 S S 1 Presetatio for use with the textbook, Algorithm Desig ad Applicatios, by M. T. Goodrich ad R. Tamassia, Wiley, 2015 Skip Lists S 3 15 15 23 10 15 23 36 Skip Lists 1 What is a Skip List A skip list for

More information

(A sequence also can be thought of as the list of function values attained for a function f :ℵ X, where f (n) = x n for n 1.) x 1 x N +k x N +4 x 3

(A sequence also can be thought of as the list of function values attained for a function f :ℵ X, where f (n) = x n for n 1.) x 1 x N +k x N +4 x 3 MATH 337 Sequeces Dr. Neal, WKU Let X be a metric space with distace fuctio d. We shall defie the geeral cocept of sequece ad limit i a metric space, the apply the results i particular to some special

More information

ECEN 655: Advanced Channel Coding Spring Lecture 7 02/04/14. Belief propagation is exact on tree-structured factor graphs.

ECEN 655: Advanced Channel Coding Spring Lecture 7 02/04/14. Belief propagation is exact on tree-structured factor graphs. ECEN 655: Advaced Chael Codig Sprig 014 Prof. Hery Pfister Lecture 7 0/04/14 Scribe: Megke Lia 1 4-Cycles i Gallager s Esemble What we already kow: Belief propagatio is exact o tree-structured factor graphs.

More information

Skip lists: A randomized dictionary

Skip lists: A randomized dictionary Discrete Math for Bioiformatics WS 11/12:, by A. Bocmayr/K. Reiert, 31. Otober 2011, 09:53 3001 Sip lists: A radomized dictioary The expositio is based o the followig sources, which are all recommeded

More information

w (1) ˆx w (1) x (1) /ρ and w (2) ˆx w (2) x (2) /ρ.

w (1) ˆx w (1) x (1) /ρ and w (2) ˆx w (2) x (2) /ρ. 2 5. Weighted umber of late jobs 5.1. Release dates ad due dates: maximimizig the weight of o-time jobs Oce we add release dates, miimizig the umber of late jobs becomes a sigificatly harder problem. For

More information

THE ASYMPTOTIC COMPLEXITY OF MATRIX REDUCTION OVER FINITE FIELDS

THE ASYMPTOTIC COMPLEXITY OF MATRIX REDUCTION OVER FINITE FIELDS THE ASYMPTOTIC COMPLEXITY OF MATRIX REDUCTION OVER FINITE FIELDS DEMETRES CHRISTOFIDES Abstract. Cosider a ivertible matrix over some field. The Gauss-Jorda elimiatio reduces this matrix to the idetity

More information

Lecture 11: Hash Functions and Random Oracle Model

Lecture 11: Hash Functions and Random Oracle Model CS 7810 Foudatios of Cryptography October 16, 017 Lecture 11: Hash Fuctios ad Radom Oracle Model Lecturer: Daiel Wichs Scribe: Akshar Varma 1 Topic Covered Defiitio of Hash Fuctios Merkle-Damgaård Theorem

More information

Lecture 4: Unique-SAT, Parity-SAT, and Approximate Counting

Lecture 4: Unique-SAT, Parity-SAT, and Approximate Counting Advaced Complexity Theory Sprig 206 Lecture 4: Uique-SAT, Parity-SAT, ad Approximate Coutig Prof. Daa Moshkovitz Scribe: Aoymous Studet Scribe Date: Fall 202 Overview I this lecture we begi talkig about

More information

DATA STRUCTURES I, II, III, AND IV

DATA STRUCTURES I, II, III, AND IV Data structures DATA STRUCTURES I, II, III, AND IV I. Amortized Aalysis II. Biary ad Biomial Heaps III. Fiboacci Heaps IV. Uio Fid Static problems. Give a iput, produce a output. Ex. Sortig, FFT, edit

More information

Analysis of Algorithms -Quicksort-

Analysis of Algorithms -Quicksort- Aalysis of Algorithms -- Adreas Ermedahl MRTC (Mälardales Real-Time Research Ceter) adreas.ermedahl@mdh.se Autum 2004 Proposed by C.A.R. Hoare i 962 Worst- case ruig time: Θ( 2 ) Expected ruig time: Θ(

More information

An Introduction to Randomized Algorithms

An Introduction to Randomized Algorithms A Itroductio to Radomized Algorithms The focus of this lecture is to study a radomized algorithm for quick sort, aalyze it usig probabilistic recurrece relatios, ad also provide more geeral tools for aalysis

More information

MA131 - Analysis 1. Workbook 2 Sequences I

MA131 - Analysis 1. Workbook 2 Sequences I MA3 - Aalysis Workbook 2 Sequeces I Autum 203 Cotets 2 Sequeces I 2. Itroductio.............................. 2.2 Icreasig ad Decreasig Sequeces................ 2 2.3 Bouded Sequeces..........................

More information

Sequences and Series of Functions

Sequences and Series of Functions Chapter 6 Sequeces ad Series of Fuctios 6.1. Covergece of a Sequece of Fuctios Poitwise Covergece. Defiitio 6.1. Let, for each N, fuctio f : A R be defied. If, for each x A, the sequece (f (x)) coverges

More information

Disjoint set (Union-Find)

Disjoint set (Union-Find) CS124 Lecture 7 Fall 2018 Disjoit set (Uio-Fid) For Kruskal s algorithm for the miimum spaig tree problem, we foud that we eeded a data structure for maitaiig a collectio of disjoit sets. That is, we eed

More information

Lecture 11: Pseudorandom functions

Lecture 11: Pseudorandom functions COM S 6830 Cryptography Oct 1, 2009 Istructor: Rafael Pass 1 Recap Lecture 11: Pseudoradom fuctios Scribe: Stefao Ermo Defiitio 1 (Ge, Ec, Dec) is a sigle message secure ecryptio scheme if for all uppt

More information

CS161: Algorithm Design and Analysis Handout #10 Stanford University Wednesday, 10 February 2016

CS161: Algorithm Design and Analysis Handout #10 Stanford University Wednesday, 10 February 2016 CS161: Algorithm Desig ad Aalysis Hadout #10 Staford Uiversity Wedesday, 10 February 2016 Lecture #11: Wedesday, 10 February 2016 Topics: Example midterm problems ad solutios from a log time ago Sprig

More information

CSE 202 Homework 1 Matthias Springer, A Yes, there does always exist a perfect matching without a strong instability.

CSE 202 Homework 1 Matthias Springer, A Yes, there does always exist a perfect matching without a strong instability. CSE 0 Homework 1 Matthias Spriger, A9950078 1 Problem 1 Notatio a b meas that a is matched to b. a < b c meas that b likes c more tha a. Equality idicates a tie. Strog istability Yes, there does always

More information

Sequences I. Chapter Introduction

Sequences I. Chapter Introduction Chapter 2 Sequeces I 2. Itroductio A sequece is a list of umbers i a defiite order so that we kow which umber is i the first place, which umber is i the secod place ad, for ay atural umber, we kow which

More information

Examples: data compression, path-finding, game-playing, scheduling, bin packing

Examples: data compression, path-finding, game-playing, scheduling, bin packing Algorithms - Basic Cocepts Algorithms so what is a algorithm, ayway? The dictioary defiitio: A algorithm is a well-defied computatioal procedure that takes iput ad produces output. This class will deal

More information

Lecture 12: November 13, 2018

Lecture 12: November 13, 2018 Mathematical Toolkit Autum 2018 Lecturer: Madhur Tulsiai Lecture 12: November 13, 2018 1 Radomized polyomial idetity testig We will use our kowledge of coditioal probability to prove the followig lemma,

More information

THE SOLUTION OF NONLINEAR EQUATIONS f( x ) = 0.

THE SOLUTION OF NONLINEAR EQUATIONS f( x ) = 0. THE SOLUTION OF NONLINEAR EQUATIONS f( ) = 0. Noliear Equatio Solvers Bracketig. Graphical. Aalytical Ope Methods Bisectio False Positio (Regula-Falsi) Fied poit iteratio Newto Raphso Secat The root of

More information

IP Reference guide for integer programming formulations.

IP Reference guide for integer programming formulations. IP Referece guide for iteger programmig formulatios. by James B. Orli for 15.053 ad 15.058 This documet is iteded as a compact (or relatively compact) guide to the formulatio of iteger programs. For more

More information

Recursive Algorithms. Recurrences. Recursive Algorithms Analysis

Recursive Algorithms. Recurrences. Recursive Algorithms Analysis Recursive Algorithms Recurreces Computer Sciece & Egieerig 35: Discrete Mathematics Christopher M Bourke cbourke@cseuledu A recursive algorithm is oe i which objects are defied i terms of other objects

More information

CS284A: Representations and Algorithms in Molecular Biology

CS284A: Representations and Algorithms in Molecular Biology CS284A: Represetatios ad Algorithms i Molecular Biology Scribe Notes o Lectures 3 & 4: Motif Discovery via Eumeratio & Motif Represetatio Usig Positio Weight Matrix Joshua Gervi Based o presetatios by

More information

Trial division, Pollard s p 1, Pollard s ρ, and Fermat s method. Christopher Koch 1. April 8, 2014

Trial division, Pollard s p 1, Pollard s ρ, and Fermat s method. Christopher Koch 1. April 8, 2014 Iteger Divisio Algorithm ad Cogruece Iteger Trial divisio,,, ad with itegers mod Iverses mod Multiplicatio ad GCD Iteger Christopher Koch 1 1 Departmet of Computer Sciece ad Egieerig CSE489/589 Algorithms

More information

Discrete Mathematics for CS Spring 2007 Luca Trevisan Lecture 22

Discrete Mathematics for CS Spring 2007 Luca Trevisan Lecture 22 CS 70 Discrete Mathematics for CS Sprig 2007 Luca Trevisa Lecture 22 Aother Importat Distributio The Geometric Distributio Questio: A biased coi with Heads probability p is tossed repeatedly util the first

More information

On Random Line Segments in the Unit Square

On Random Line Segments in the Unit Square O Radom Lie Segmets i the Uit Square Thomas A. Courtade Departmet of Electrical Egieerig Uiversity of Califoria Los Ageles, Califoria 90095 Email: tacourta@ee.ucla.edu I. INTRODUCTION Let Q = [0, 1] [0,

More information

1 of 7 7/16/2009 6:06 AM Virtual Laboratories > 6. Radom Samples > 1 2 3 4 5 6 7 6. Order Statistics Defiitios Suppose agai that we have a basic radom experimet, ad that X is a real-valued radom variable

More information

Lecture 2: April 3, 2013

Lecture 2: April 3, 2013 TTIC/CMSC 350 Mathematical Toolkit Sprig 203 Madhur Tulsiai Lecture 2: April 3, 203 Scribe: Shubhedu Trivedi Coi tosses cotiued We retur to the coi tossig example from the last lecture agai: Example. Give,

More information

Lecture 2: Concentration Bounds

Lecture 2: Concentration Bounds CSE 52: Desig ad Aalysis of Algorithms I Sprig 206 Lecture 2: Cocetratio Bouds Lecturer: Shaya Oveis Ghara March 30th Scribe: Syuzaa Sargsya Disclaimer: These otes have ot bee subjected to the usual scrutiy

More information

Chapter 6. Advanced Counting Techniques

Chapter 6. Advanced Counting Techniques Chapter 6 Advaced Coutig Techiques 6.: Recurrece Relatios Defiitio: A recurrece relatio for the sequece {a } is a equatio expressig a i terms of oe or more of the previous terms of the sequece: a,a2,a3,,a

More information

ACO Comprehensive Exam 9 October 2007 Student code A. 1. Graph Theory

ACO Comprehensive Exam 9 October 2007 Student code A. 1. Graph Theory 1. Graph Theory Prove that there exist o simple plaar triagulatio T ad two distict adjacet vertices x, y V (T ) such that x ad y are the oly vertices of T of odd degree. Do ot use the Four-Color Theorem.

More information

Discrete Mathematics and Probability Theory Fall 2009 Satish Rao,David Tse Note 12

Discrete Mathematics and Probability Theory Fall 2009 Satish Rao,David Tse Note 12 CS 70 Discrete Mathematics ad Probability Theory Fall 2009 Satish Rao,David Tse Note 12 Two Killer Applicatios I this lecture, we will see two killer apps of elemetary probability i Computer Sciece. 1.

More information

4.1 Sigma Notation and Riemann Sums

4.1 Sigma Notation and Riemann Sums 0 the itegral. Sigma Notatio ad Riema Sums Oe strategy for calculatig the area of a regio is to cut the regio ito simple shapes, calculate the area of each simple shape, ad the add these smaller areas

More information

Design and Analysis of ALGORITHM (Topic 2)

Design and Analysis of ALGORITHM (Topic 2) DR. Gatot F. Hertoo, MSc. Desig ad Aalysis of ALGORITHM (Topic 2) Algorithms + Data Structures = Programs Lessos Leared 1 Our Machie Model: Assumptios Geeric Radom Access Machie (RAM) Executes operatios

More information

Filter banks. Separately, the lowpass and highpass filters are not invertible. removes the highest frequency 1/ 2and

Filter banks. Separately, the lowpass and highpass filters are not invertible. removes the highest frequency 1/ 2and Filter bas Separately, the lowpass ad highpass filters are ot ivertible T removes the highest frequecy / ad removes the lowest frequecy Together these filters separate the sigal ito low-frequecy ad high-frequecy

More information

Lecture 4 February 16, 2016

Lecture 4 February 16, 2016 MIT 6.854/18.415: Advaced Algorithms Sprig 16 Prof. Akur Moitra Lecture 4 February 16, 16 Scribe: Be Eysebach, Devi Neal 1 Last Time Cosistet Hashig - hash fuctios that evolve well Radom Trees - routig

More information

Chapter 6 Infinite Series

Chapter 6 Infinite Series Chapter 6 Ifiite Series I the previous chapter we cosidered itegrals which were improper i the sese that the iterval of itegratio was ubouded. I this chapter we are goig to discuss a topic which is somewhat

More information

Axioms of Measure Theory

Axioms of Measure Theory MATH 532 Axioms of Measure Theory Dr. Neal, WKU I. The Space Throughout the course, we shall let X deote a geeric o-empty set. I geeral, we shall ot assume that ay algebraic structure exists o X so that

More information

Lecture 9: Pseudo-random generators against space bounded computation,

Lecture 9: Pseudo-random generators against space bounded computation, Lecture 9: Pseudo-radom geerators agaist space bouded computatio, Primality Testig Topics i Pseudoradomess ad Complexity (Sprig 2018) Rutgers Uiversity Swastik Kopparty Scribes: Harsha Tirumala, Jiyu Zhag

More information

Divide and Conquer. 1 Overview. 2 Multiplying Bit Strings. COMPSCI 330: Design and Analysis of Algorithms 1/19/2016 and 1/21/2016

Divide and Conquer. 1 Overview. 2 Multiplying Bit Strings. COMPSCI 330: Design and Analysis of Algorithms 1/19/2016 and 1/21/2016 COMPSCI 330: Desig ad Aalysis of Algorithms 1/19/2016 ad 1/21/2016 Lecturer: Debmalya Paigrahi Divide ad Coquer Scribe: Tiaqi Sog 1 Overview I this lecture, a importat algorithm desig techique called divide-ad-coquer

More information

Problem Set 4 Due Oct, 12

Problem Set 4 Due Oct, 12 EE226: Radom Processes i Systems Lecturer: Jea C. Walrad Problem Set 4 Due Oct, 12 Fall 06 GSI: Assae Gueye This problem set essetially reviews detectio theory ad hypothesis testig ad some basic otios

More information

6 Integers Modulo n. integer k can be written as k = qn + r, with q,r, 0 r b. So any integer.

6 Integers Modulo n. integer k can be written as k = qn + r, with q,r, 0 r b. So any integer. 6 Itegers Modulo I Example 2.3(e), we have defied the cogruece of two itegers a,b with respect to a modulus. Let us recall that a b (mod ) meas a b. We have proved that cogruece is a equivalece relatio

More information

Recursive Algorithm for Generating Partitions of an Integer. 1 Preliminary

Recursive Algorithm for Generating Partitions of an Integer. 1 Preliminary Recursive Algorithm for Geeratig Partitios of a Iteger Sug-Hyuk Cha Computer Sciece Departmet, Pace Uiversity 1 Pace Plaza, New York, NY 10038 USA scha@pace.edu Abstract. This article first reviews the

More information

Infinite Sequences and Series

Infinite Sequences and Series Chapter 6 Ifiite Sequeces ad Series 6.1 Ifiite Sequeces 6.1.1 Elemetary Cocepts Simply speakig, a sequece is a ordered list of umbers writte: {a 1, a 2, a 3,...a, a +1,...} where the elemets a i represet

More information

Math 475, Problem Set #12: Answers

Math 475, Problem Set #12: Answers Math 475, Problem Set #12: Aswers A. Chapter 8, problem 12, parts (b) ad (d). (b) S # (, 2) = 2 2, sice, from amog the 2 ways of puttig elemets ito 2 distiguishable boxes, exactly 2 of them result i oe

More information

CHAPTER 10 INFINITE SEQUENCES AND SERIES

CHAPTER 10 INFINITE SEQUENCES AND SERIES CHAPTER 10 INFINITE SEQUENCES AND SERIES 10.1 Sequeces 10.2 Ifiite Series 10.3 The Itegral Tests 10.4 Compariso Tests 10.5 The Ratio ad Root Tests 10.6 Alteratig Series: Absolute ad Coditioal Covergece

More information

Discrete Mathematics and Probability Theory Spring 2016 Rao and Walrand Note 19

Discrete Mathematics and Probability Theory Spring 2016 Rao and Walrand Note 19 CS 70 Discrete Mathematics ad Probability Theory Sprig 2016 Rao ad Walrad Note 19 Some Importat Distributios Recall our basic probabilistic experimet of tossig a biased coi times. This is a very simple

More information

Test One (Answer Key)

Test One (Answer Key) CS395/Ma395 (Sprig 2005) Test Oe Name: Page 1 Test Oe (Aswer Key) CS395/Ma395: Aalysis of Algorithms This is a closed book, closed otes, 70 miute examiatio. It is worth 100 poits. There are twelve (12)

More information

Optimally Sparse SVMs

Optimally Sparse SVMs A. Proof of Lemma 3. We here prove a lower boud o the umber of support vectors to achieve geeralizatio bouds of the form which we cosider. Importatly, this result holds ot oly for liear classifiers, but

More information

It is often useful to approximate complicated functions using simpler ones. We consider the task of approximating a function by a polynomial.

It is often useful to approximate complicated functions using simpler ones. We consider the task of approximating a function by a polynomial. Taylor Polyomials ad Taylor Series It is ofte useful to approximate complicated fuctios usig simpler oes We cosider the task of approximatig a fuctio by a polyomial If f is at least -times differetiable

More information

TR/46 OCTOBER THE ZEROS OF PARTIAL SUMS OF A MACLAURIN EXPANSION A. TALBOT

TR/46 OCTOBER THE ZEROS OF PARTIAL SUMS OF A MACLAURIN EXPANSION A. TALBOT TR/46 OCTOBER 974 THE ZEROS OF PARTIAL SUMS OF A MACLAURIN EXPANSION by A. TALBOT .. Itroductio. A problem i approximatio theory o which I have recetly worked [] required for its solutio a proof that the

More information

62. Power series Definition 16. (Power series) Given a sequence {c n }, the series. c n x n = c 0 + c 1 x + c 2 x 2 + c 3 x 3 +

62. Power series Definition 16. (Power series) Given a sequence {c n }, the series. c n x n = c 0 + c 1 x + c 2 x 2 + c 3 x 3 + 62. Power series Defiitio 16. (Power series) Give a sequece {c }, the series c x = c 0 + c 1 x + c 2 x 2 + c 3 x 3 + is called a power series i the variable x. The umbers c are called the coefficiets of

More information

MAT1026 Calculus II Basic Convergence Tests for Series

MAT1026 Calculus II Basic Convergence Tests for Series MAT026 Calculus II Basic Covergece Tests for Series Egi MERMUT 202.03.08 Dokuz Eylül Uiversity Faculty of Sciece Departmet of Mathematics İzmir/TURKEY Cotets Mootoe Covergece Theorem 2 2 Series of Real

More information

HOMEWORK 2 SOLUTIONS

HOMEWORK 2 SOLUTIONS HOMEWORK SOLUTIONS CSE 55 RANDOMIZED AND APPROXIMATION ALGORITHMS 1. Questio 1. a) The larger the value of k is, the smaller the expected umber of days util we get all the coupos we eed. I fact if = k

More information

Econ 325 Notes on Point Estimator and Confidence Interval 1 By Hiro Kasahara

Econ 325 Notes on Point Estimator and Confidence Interval 1 By Hiro Kasahara Poit Estimator Eco 325 Notes o Poit Estimator ad Cofidece Iterval 1 By Hiro Kasahara Parameter, Estimator, ad Estimate The ormal probability desity fuctio is fully characterized by two costats: populatio

More information

Average-Case Analysis of QuickSort

Average-Case Analysis of QuickSort Average-Case Aalysis of QuickSort Comp 363 Fall Semester 003 October 3, 003 The purpose of this documet is to itroduce the idea of usig recurrece relatios to do average-case aalysis. The average-case ruig

More information

MA131 - Analysis 1. Workbook 3 Sequences II

MA131 - Analysis 1. Workbook 3 Sequences II MA3 - Aalysis Workbook 3 Sequeces II Autum 2004 Cotets 2.8 Coverget Sequeces........................ 2.9 Algebra of Limits......................... 2 2.0 Further Useful Results........................

More information

Polynomials with Rational Roots that Differ by a Non-zero Constant. Generalities

Polynomials with Rational Roots that Differ by a Non-zero Constant. Generalities Polyomials with Ratioal Roots that Differ by a No-zero Costat Philip Gibbs The problem of fidig two polyomials P(x) ad Q(x) of a give degree i a sigle variable x that have all ratioal roots ad differ by

More information

Fall 2013 MTH431/531 Real analysis Section Notes

Fall 2013 MTH431/531 Real analysis Section Notes Fall 013 MTH431/531 Real aalysis Sectio 8.1-8. Notes Yi Su 013.11.1 1. Defiitio of uiform covergece. We look at a sequece of fuctios f (x) ad study the coverget property. Notice we have two parameters

More information

CS 330 Discussion - Probability

CS 330 Discussion - Probability CS 330 Discussio - Probability March 24 2017 1 Fudametals of Probability 11 Radom Variables ad Evets A radom variable X is oe whose value is o-determiistic For example, suppose we flip a coi ad set X =

More information

Outline for Today. A simple and lightning fast hash table implementation. Why the degree of independence matters.

Outline for Today. A simple and lightning fast hash table implementation. Why the degree of independence matters. Liear Probig Outlie for Today Liear Probig Hashig A simple ad lightig fast hash table implemetatio. Aalyzig Liear Probig Why the degree of idepedece matters. Fourth Momet Bouds Aother approach for estimatig

More information

11. FINITE FIELDS. Example 1: The following tables define addition and multiplication for a field of order 4.

11. FINITE FIELDS. Example 1: The following tables define addition and multiplication for a field of order 4. 11. FINITE FIELDS 11.1. A Field With 4 Elemets Probably the oly fiite fields which you ll kow about at this stage are the fields of itegers modulo a prime p, deoted by Z p. But there are others. Now although

More information

Topic 9: Sampling Distributions of Estimators

Topic 9: Sampling Distributions of Estimators Topic 9: Samplig Distributios of Estimators Course 003, 2016 Page 0 Samplig distributios of estimators Sice our estimators are statistics (particular fuctios of radom variables), their distributio ca be

More information

Discrete Mathematics and Probability Theory Spring 2012 Alistair Sinclair Note 15

Discrete Mathematics and Probability Theory Spring 2012 Alistair Sinclair Note 15 CS 70 Discrete Mathematics ad Probability Theory Sprig 2012 Alistair Siclair Note 15 Some Importat Distributios The first importat distributio we leared about i the last Lecture Note is the biomial distributio

More information

Chapter 3. Strong convergence. 3.1 Definition of almost sure convergence

Chapter 3. Strong convergence. 3.1 Definition of almost sure convergence Chapter 3 Strog covergece As poited out i the Chapter 2, there are multiple ways to defie the otio of covergece of a sequece of radom variables. That chapter defied covergece i probability, covergece i

More information

Empirical Process Theory and Oracle Inequalities

Empirical Process Theory and Oracle Inequalities Stat 928: Statistical Learig Theory Lecture: 10 Empirical Process Theory ad Oracle Iequalities Istructor: Sham Kakade 1 Risk vs Risk See Lecture 0 for a discussio o termiology. 2 The Uio Boud / Boferoi

More information

It is always the case that unions, intersections, complements, and set differences are preserved by the inverse image of a function.

It is always the case that unions, intersections, complements, and set differences are preserved by the inverse image of a function. MATH 532 Measurable Fuctios Dr. Neal, WKU Throughout, let ( X, F, µ) be a measure space ad let (!, F, P ) deote the special case of a probability space. We shall ow begi to study real-valued fuctios defied

More information

Math 61CM - Solutions to homework 3

Math 61CM - Solutions to homework 3 Math 6CM - Solutios to homework 3 Cédric De Groote October 2 th, 208 Problem : Let F be a field, m 0 a fixed oegative iteger ad let V = {a 0 + a x + + a m x m a 0,, a m F} be the vector space cosistig

More information

b i u x i U a i j u x i u x j

b i u x i U a i j u x i u x j M ath 5 2 7 Fall 2 0 0 9 L ecture 1 9 N ov. 1 6, 2 0 0 9 ) S ecod- Order Elliptic Equatios: Weak S olutios 1. Defiitios. I this ad the followig two lectures we will study the boudary value problem Here

More information

The multiplicative structure of finite field and a construction of LRC

The multiplicative structure of finite field and a construction of LRC IERG6120 Codig for Distributed Storage Systems Lecture 8-06/10/2016 The multiplicative structure of fiite field ad a costructio of LRC Lecturer: Keeth Shum Scribe: Zhouyi Hu Notatios: We use the otatio

More information

Discrete Mathematics and Probability Theory Summer 2014 James Cook Note 15

Discrete Mathematics and Probability Theory Summer 2014 James Cook Note 15 CS 70 Discrete Mathematics ad Probability Theory Summer 2014 James Cook Note 15 Some Importat Distributios I this ote we will itroduce three importat probability distributios that are widely used to model

More information

Frequentist Inference

Frequentist Inference Frequetist Iferece The topics of the ext three sectios are useful applicatios of the Cetral Limit Theorem. Without kowig aythig about the uderlyig distributio of a sequece of radom variables {X i }, for

More information

7.1 Convergence of sequences of random variables

7.1 Convergence of sequences of random variables Chapter 7 Limit Theorems Throughout this sectio we will assume a probability space (, F, P), i which is defied a ifiite sequece of radom variables (X ) ad a radom variable X. The fact that for every ifiite

More information

Random Variables, Sampling and Estimation

Random Variables, Sampling and Estimation Chapter 1 Radom Variables, Samplig ad Estimatio 1.1 Itroductio This chapter will cover the most importat basic statistical theory you eed i order to uderstad the ecoometric material that will be comig

More information

Polynomial identity testing and global minimum cut

Polynomial identity testing and global minimum cut CHAPTER 6 Polyomial idetity testig ad global miimum cut I this lecture we will cosider two further problems that ca be solved usig probabilistic algorithms. I the first half, we will cosider the problem

More information

NICK DUFRESNE. 1 1 p(x). To determine some formulas for the generating function of the Schröder numbers, r(x) = a(x) =

NICK DUFRESNE. 1 1 p(x). To determine some formulas for the generating function of the Schröder numbers, r(x) = a(x) = AN INTRODUCTION TO SCHRÖDER AND UNKNOWN NUMBERS NICK DUFRESNE Abstract. I this article we will itroduce two types of lattice paths, Schröder paths ad Ukow paths. We will examie differet properties of each,

More information

Math 155 (Lecture 3)

Math 155 (Lecture 3) Math 55 (Lecture 3) September 8, I this lecture, we ll cosider the aswer to oe of the most basic coutig problems i combiatorics Questio How may ways are there to choose a -elemet subset of the set {,,,

More information

3.2 Properties of Division 3.3 Zeros of Polynomials 3.4 Complex and Rational Zeros of Polynomials

3.2 Properties of Division 3.3 Zeros of Polynomials 3.4 Complex and Rational Zeros of Polynomials Math 60 www.timetodare.com 3. Properties of Divisio 3.3 Zeros of Polyomials 3.4 Complex ad Ratioal Zeros of Polyomials I these sectios we will study polyomials algebraically. Most of our work will be cocered

More information

The Random Walk For Dummies

The Random Walk For Dummies The Radom Walk For Dummies Richard A Mote Abstract We look at the priciples goverig the oe-dimesioal discrete radom walk First we review five basic cocepts of probability theory The we cosider the Beroulli

More information

The Boolean Ring of Intervals

The Boolean Ring of Intervals MATH 532 Lebesgue Measure Dr. Neal, WKU We ow shall apply the results obtaied about outer measure to the legth measure o the real lie. Throughout, our space X will be the set of real umbers R. Whe ecessary,

More information

6.003 Homework #3 Solutions

6.003 Homework #3 Solutions 6.00 Homework # Solutios Problems. Complex umbers a. Evaluate the real ad imagiary parts of j j. π/ Real part = Imagiary part = 0 e Euler s formula says that j = e jπ/, so jπ/ j π/ j j = e = e. Thus the

More information

2 Statistical Principles

2 Statistical Principles 2 Statistical Priciples This lecture will serve two mai goals. First we will itroduce ad the tool of radom hash fuctios. Secod we itroduce a radomized/probabilistic view of algorithms ad data aalysis.

More information

Lecture Notes for Analysis Class

Lecture Notes for Analysis Class Lecture Notes for Aalysis Class Topological Spaces A topology for a set X is a collectio T of subsets of X such that: (a) X ad the empty set are i T (b) Uios of elemets of T are i T (c) Fiite itersectios

More information

Lecture 10 October Minimaxity and least favorable prior sequences

Lecture 10 October Minimaxity and least favorable prior sequences STATS 300A: Theory of Statistics Fall 205 Lecture 0 October 22 Lecturer: Lester Mackey Scribe: Brya He, Rahul Makhijai Warig: These otes may cotai factual ad/or typographic errors. 0. Miimaxity ad least

More information

Induction: Solutions

Induction: Solutions Writig Proofs Misha Lavrov Iductio: Solutios Wester PA ARML Practice March 6, 206. Prove that a 2 2 chessboard with ay oe square removed ca always be covered by shaped tiles. Solutio : We iduct o. For

More information

Ma 530 Introduction to Power Series

Ma 530 Introduction to Power Series Ma 530 Itroductio to Power Series Please ote that there is material o power series at Visual Calculus. Some of this material was used as part of the presetatio of the topics that follow. What is a Power

More information