Cryptanalysis of PKP: A New Approach

Size: px
Start display at page:

Download "Cryptanalysis of PKP: A New Approach"

Transcription

1 Cryptanaysis of PKP: A New Approach Éiane Jaumes and Antoine Joux DCSSI 18, rue du Dr. Zamenhoff F Issy-es-Mx Cedex France eiane.jaumes@wanadoo.fr Antoine.Joux@ens.fr Abstract. Quite recenty, in [4], a new time-memory tradeoff agorithm was presented. The origina goa of this agorithm was to count the number of points on an eiptic curve, however, the authors caimed that their approach coud be appied to other probems. In this paper, we describe such an appication and show a new way to attack the Permuted Kerne Probem. This new method is faster than any previousy known technique but sti requires exponentia time. In practice, we find that attacking PKP for the origina size proposed by Shamir in [6] coud be done on a singe PC in 125 years. 1 Introduction The Permuted Kerne Probem was introduced in cryptography by Shamir at Crypto 1989 [6]. This NP compete probem can be stated as foows: Given a m n matrix, a n vector V and a prime p Find a permutation π such that the permuted vector V π is in the kerne of the matrix moduo p. Any instance of the probem with this choice of parameters wi be denoted as a PKP p (m, n) probem. Without oss of generaity, the eft part of m n matrix can be turned into the identity sub-matrix, as expained in [6]. In [6], it was shown that this probem possesses a nice zero-knowedge proof and can thus be turned into an authentification scheme. Moreover, when used in practice the scheme offers a good eve of security using ony simpe computations which can be efficienty impemented, even in sma portabe devices. Since PKP is so simpe, and uses ony basic inear agebra, it is extremey tempting to search for it s weaknesses. This ed to many papers [3,1,2,5], which a concuded that the origina dimension proposed par Shamir are a bit too sma, but the scheme sti resists a known attacks. A the proposed attacks combine exhaustive search with some form of time-memory tradeoff. However, none of the cassica timememory tradeoff techniques seems to appy to this probem, and thus specific methods had to be deveoped in the previous papers. In this paper, we appy a K. Kim (Ed.): PKC 21, LNCS 1992, pp , 21. c Springer-Verag Berin Heideberg 21

2 166 Éiane Jaumes and Antoine Joux new time-memory tradeoff from [4] to the permuted kerne probem. This new technique was originay designed to repace the fina baby-step/giant-step when counting points on eiptic curves using the Schoof-Ekies-Atkies agorithm. 2 Genera Description of the Agorithm In this section, we reformuate the agorithm from [4] in a genera setting, without any reference to the specific probem of point counting on eiptic curve. In our genera setting, we want to sove the foowing probem: Given a n vector P whose entries are primes, four sets S 1, S 2, S 3 and S 4 of n vectors, and n sets D 1,..., D n Find v (1) S 1,v (2) S 2,v (3) S 3,v (4) S 4,d 1 D 1,..., d n 1 D n 1 and d n D n such that: i [1 n] : v (1) i + v (2) i + v (3) i + v (4) i d i (mod P i ) Ceary, this probem, which we note 4SET, can be soved by exhaustivey trying the N 1 N 2 N 3 N 4 possibe vaues of v (1),v (2),v (3) and v (4), where N i denotes the cardinaity of S i. We propose here a time-memory tradeoff that aows to sove this probem faster than exhaustive search. Without oss of generaity, we assume that: D 1 D 2 D n, P 1 P 2 P n where D i denotes the size of D i. Then, et α i = Di P i, choose k a positive integer smaer than n and et k k Ψ = α i and Φ = i=1 The agorithm then consists of a precomputation phase and of a main oop containing two enumeration phases, one invoving v (1) and v (2), the A-phase, and one invoving v (3) and v (4), the B-phase. Agorithm for soving 4SET Precomputation step: Sort the two sets S 2 and S 4, according to the exicographica order on the vector coordinates. In the seque, this wi permit to quicky find vectors in one of these sets given its first k coordinates. Main oop: For M 1 [ P 1 1], M 2 [ P 2 1],... M k [ P k 1] do: A phase: For each Θ D 1 D k, For v (1) S 1 and v (2) S 2 such that the first k coordinates 1 v (1) i + v (2) i match Θ i M i moduo P i, 1 Thanks to the precomputation step, such v (2) can be accessed quicky by computing Θ i M i v (1) i (mod P i) before searching the matching entries in the sorted set S 2. i=1 P i

3 Cryptanaysis of PKP: A New Approach 167 For a >kcompute and store the foowing set: H Θ,v (1),v (2), = {θ v (1) v (2) θ D }. B phase: For each v (3) S 3 and v (4) S 4 such that the first k coordinates v (3) i + v (4) i match M i, If there exists Θ D 1 D k,v (1) S 1 and v (2) S 2 such that for every >k,v (3) + v (4) (mod P )isinh Θ,v (1),v,, (2) Then v (1) i + v (2) + v (3) i + v (4) is a soution of the 4SET probem. Terminate 2.1 Practica Considerations In practice, buiding the sets H Θ,v (1),v (2), in the A-phase and checking their intersections in the B-phase can be done very efficienty. Indeed, a these sets can be stored in a singe array of bits. This array has n =k+1 P ines and one coumn for each pair (v (1),v (2) ). Each ine of this array can aso be seen as a bit string B,τ where τ {,...,P 1}. During the A-phase, we store a1inb,τ in the position corresponding to (v (1),v (2) )ifτ H Θ,v (1),v (2), and a otherwise. Note that a strings B,τ have the same ength, however this ength may vary from one round of the main oop to the next. On average, this ength is ΨN 1 N 2. During the B-phase, to check whether τ = v (3) + v (4) (mod P ) is in H Θ,v (1),v (2), for every and some pair (v (1),v (2) ), we simpy perform a ogica AND between the strings B,τ. If the resuting string is non-ni we have a soution, since any bit equa to 1 in this string corresponds to a pair (v (1),v (2) ) such that v (1) + v (2) + v (3) + v (4) is a soution of the 4SET probem. Note that, when the expected number of soutions of a 4SET probem is much smaer than 1, it is worthwhie not to test the ast conditions. Indeed, in that case, one can simpy remove the useess components and buid a simiar probem with fewer conditions. In fact, this approach was impicity used in [4] since some of the conditions found by the SEA agorithm where discarded for the fina step. On the contrary, PKP probems are usuay buit in such a way that a conditions are usefu and cannot be discarded (see section 4). 2.2 Anaysis of the Agorithm Precomputation step : The number of operations required to sort S 2 is O(N 2 og(n 2 )) and to sort S 4 it is O(N 4 og(n 4 )). Thus the time needed is O(max(N 2,N 4 ) og(max(n 2,N 4 ))). The tota memory required in this precomputation step is O(max(N 1,N 2,N 3,N 4 ) i og(p i)) because S 1 and S 3 must aso be stored, and because each vector can be represented with i og(p i) bits.

4 168 Éiane Jaumes and Antoine Joux Phase A : Ceary, the average number of pairs (v (1),v (2) ) constructed in each execution of phase A is ΨN 1 N 2. To do this construction, we enumerate a possibe vaues of Θ and v (1) and search for matching vaues of v (2). This requires O(N 1 og(n 2 )ΨΦ) operations. Then for each vaid pair (v (1),v (2) ), n k bits are to be set, the tota number of operations for this step is O((n k)ψn 1 N 2 ). A in a, the number of operations required is: O(max(N 1 og(n 2 )ΨΦ,(n k)ψn 1 N 2 )). n The tota memory needed to store a the sets is O(ΨN 1 N 2 i=k P i). Phase B : In each execution of phase B, N 3 N 4 /Φ pairs (v (3),v (4) ) are constructed. This construction requires O(N 3 og(n 4 )) operations. Then for each pair the ogica AND of n k of the strings constructed in phase A is computed. Since on average the ength of the strings is ΨN 1 N 2 the number of operations is O((n k)ψn 1 N 2 N 3 N 4 /Φ). A in a, each iteration of phase B costs : O(max(N 3 og(n 4 ), (n k)ψn 1 N 2 N 3 N 4 /Φ)). In term of memory compexity, phase B does not require any memory not aready used in the precomputation or in phase A. When the choice of parameters is reasonabe, the time compexity is dominated by phase B and can be expressed as : O((n k)ψn 1 N 2 N 3 N 4 ). Without going too far into the anaysis of the parameters, et say that a choice is reasonabe if a the N i are of the same order N, ifψ 1/N and if Φ does not become too arge. Moreover, in that case the memory needed is: O(N n P i ). i=k Note: With the agorithm as presented here Φ shoud not become arger than N 3/2. However, if we sighty modify it be transferring haf of Θ from phase A to phase B, Φ can grow up to N 2. Moreover, this transformation reduces the amount of memory needed, by shortening the sets stored during phase A. Since we sti need to store the sets, the memory requirement becomes: 3 Appication to PKP O(N n og(p i )). i=1 In order to appy the agorithm of the previous section to PKP, we need to buid sets S 1, S 2, S 3, S 4 and D 1, D 2,..., D n from a PKP instance. Before doing

5 Cryptanaysis of PKP: A New Approach 169 that, we wi sighty transform the PKP instance. Foowing [3], we can add one more inear equation to the PKP instance. This new equation stems from the simpe fact that the sum σ of the coordinates of the soution vector does not depend on the permutation π. Appying Gaussian eimination to the extended inear system, we find that the soution vector V π must verify: σ ) (A I m+1 V π =,. where A isa(m+1) (n m 1) matrix and I m+1 is the (m+1) (m+1) identity matrix. Ceary, in order to find a soution to the permuted kerne probem thus written, it suffices to try a the possibe vaues of the components of V π that enters A, to find the remaining components by Gaussian eimination and to check that the vector found is indeed a permutation of V. This agorithm requires n!/(n m 1)! trias. In the seque, we wi refer to it as being the exhaustive search technique for PKP, and we wi competey forget the simpe minded search where one tries a possibe vaues for π, which requires n! trias. We can now divide A into four roughy equa parts, and we find: σ ) (A 1 A 2 A 3 A 4 I m+1 V π =,. where A i isa(m +1) n i matrix and n 1 + n 2 + n 3 + n 4 = n m 1. We then buid the sets S i by computing the product of A i by a possibe choices of the corresponding n i bits. Ceary, the size of S i is N i = n!/(n n i )!. Once these sets are constructed, we can appy the agorithm from section 2. Note: In fact, the agorithm from section 2 can be further refined in the case of PKP. The idea is that whie merging together an eement of S 1 and an eement of S 2 in phase A or an eement of S 3 and an eement of S 4 in phase B, one shoud check their compatibiity, i.e. verify that put together they form a correct subset of V, which is true if and ony if they have no nontrivia intersection (assuming that V contains no doube). This reduces the term N 1 N 2 and N 3 N 4 in the compexities respectivey to n!/(n n 1 n 2 )! and n!/(n n 3 n 4 )!. 4Asymptotica Anaysis In order to make an asymptotica anaysis of our agorithm, we first need to describe an asymptotica version of PKP. For defining this version, we wi foow the two foowing criteria:

6 17 Éiane Jaumes and Antoine Joux Buiding a strong instance of PKP, shoud be easy. More precisey, this means that for any random matrix, finding a kerne vector with distinct coordinates shoud be easy. Since kerne vectors are chosen at random when buiding a PKP probem, this impies that the probabiity of a random kerne vector to have a distinct coordinates shoud not be too ow. Taking in account the birthday paradox, this means that n shoud be no arger that O( p). As expained in [6], the expected number of soutions of a PKP instance shoud be as near to 1 as possibe. This eads to the condition p m n!. Foowing these criteria et p = O(n 2 ), then: m n og n/ og p n/2 Using these two criteria, we propose PKP p (n, n/2 ) as a reasonabe asymptotic choice, where p is a prime near n 2. With this choice of parameters, an exhaustive search attack on PKP takes roughy n!/m! =O((2n/e) n/2 ) trias. For the attack described in section 3, we need to choose the parameter k and thus the vaue of Ψ. A particuary interesting choice is to use the same amount of storage for the sets S i and the strings. Assuming that N 1 = N 2 = N 3 = N 4, this eads to Ψ 1/N 1. Since N 1 = O((((8/7) 7 )(n/e)) n/8 ), we find that the time compexity of the agorithm is O((((8/7) 7 )(n/e)) 3n/8+ε ) and the space compexity is O((((8/7) 7 )(n/e)) n/8+ε ). The vaue ε in the exponent offers a simpe repacement for the non exponentia terms that shoud appear in these two formuas, and permits a simper expression. In fact, if we further take into account the note at the end of section 3, we can somewhat reduce the constant (8/7) 7 appearing in the time compexity. 5 Practica Resuts In practice, it turns out that the previous ideas ead to a faster attack against PKP, than a previousy known techniques. The best previous theoretica attacks against PKP are those from [2] and an impementation of these attacks is described in [5]. In the rest of this section we compare the avaiabe data for this attack with our resuts. In [2], the foowing resuts are found: Resuts from [2] Time needed Memory needed (in tupes) PKP 251 (16, 32) tupes tupes PKP 251 (37, 64)

7 Cryptanaysis of PKP: A New Approach 171 In order to make the same kind of evauation for our agorithm, we first need to compute the size of the sets S 1, S 2, S 3, S 4. Starting with PKP(16, 32), we take n 1 = n 2 = n 4 = 4 and n 3 =3,wefindN 1 = N 2 = N 4 = 8634 and N 3 = In order to have Ψ 1/N 1, we take k = 6 and find Ψ = (24/251) 6. With these choice, the space needed is dominated by the storage of the four sets S i, and 32 (N 1 + N 2 + N 3 + N 4 ) 2 26 bytes are needed. This may seem arger than the 2 24 in the above tabe, however this size was not in bytes but in 1 tupes, and thus both sizes are equivaent. The basic time estimate is ΨN 1 N 2 N 3 N However, recaing the note from section 3 it becomes Ψn! 2 /((n n 1 n 2 )!(n n 3 n 4 )!) Once again, this does not seem better than the vaue 2 52 in the above tabe. However, remember than our basic operation is a bit operation and that on most computers we can pack 32 or even 64 bit operations in a singe word operation, thus owering the compexity to As the size increases, the advantage of the new agorithm becomes much cearer. Indeed, for PKP(37, 64), we can take n 1 = n 3 =6,n 2 = n 4 = 7 and k = 17. Then Ψ = (48/251) k, the space needed becomes and the time needed However, whie better that the estimates from [2], these vaues are competey unreachabe. The foowing tabe shows the resuts of the new attack for various dimensions of PKP. New Resuts k Time needed Memory needed PKP 251 (16, 32) bytes PKP 251 (15, 32) bytes PKP 251 (24, 48) bytes PKP 251 (37, 64) bytes In [5], the attack described in [2] was truy impemented, and experiments were made. At that time, a singe workstation woud have taken 2 years for PKP(16, 32). In a private communication, the author from [5] tod us than on current machines, experiment showed that this estimate was owered to 7 years. The ratio between the two figures is much worse than expected because a these computations heaviy rey on memory usage. Since the speed of memory access did not increase as quicky as the speed of processors, this accounts for the ow ratio. By comparison, on the same machine (Pentium II, 4MHz), the new attack woud take 125 years (at most) to find the secret key of PKP(16, 32). Quite strangey, in a practica impementation, phase A takes proportionay much onger then phase B because in the former case we make random memory access (on singe bits) whie in the atter we read the memory in sequentia order. Consequenty, phase B is cache friendy whie phase A isn t. Moreover, we cannot use the theoreticay optima choice for k, because the code that contros the oop then becomes predominant. Thus our practica choices were n 1 =3, n 2 =4,n 3 =3,n 4 = 5 and k = 4. With these choices, each iteration of the main oop took just under a second, and the tota memory needed was 25 megabytes. Since iterations of the main oop are needed, a tota running time of 125 years is expected.

8 172 Éiane Jaumes and Antoine Joux 6 Concusion In this paper, we showed that the time-memory tradeoff technique for [4] coud be appied to the PKP probem. Very curiousy, this eads to an agorithm which presents simiarities with the agorithm from [2]. In practice, this new agorithm can attack PKP(16,32) about five times faster than a previous attacks. However, this attack woud sti require 125 years on a 45MHz PC. Since the agorithm is straightforward to paraeized, this computation is feasibe and PKP(16,32) can no onger be considered as secure. Moreover, PKP(15,32) which takes about 24 times as ong, is potentiay endangered and shoud no onger be used for ong-term appications. However, sighty arger probems such PKP(24,48) or PKP(37,64) are competey out of reach. References 1. T. Baritaud, M. Campane, P. Chauvaud, and H. Gibert. On the security on the permuted kerne identification scheme. In CRYPTO92, voume 74 of LNCS, pages , P. Chauvaud and J. Patarin. Improved agorithms for the permuted kernem probem. In CRYPTO93, voume 773, pages , J. Georgiades. Some remarks on the security of the identification scheme based on permuted kernes. Journa of Cryptoogy, 5: , A. Joux and R. Lercier. Chinese & Match, an aternative to atkin s match and sort method used in the SEA agorithm. Mathematics of Computation, To appear. 5. G. Poupard. A reaistic security anaysis of identification schemes based on combinatoria probems. European transactions on teecommunications, 8:471 48, A. Shamir. An efficient identification scheme based on permuted kernes. In CRYPTO89, voume 435 of LNCS, pages 66 69, 1989.

Algorithms to solve massively under-defined systems of multivariate quadratic equations

Algorithms to solve massively under-defined systems of multivariate quadratic equations Agorithms to sove massivey under-defined systems of mutivariate quadratic equations Yasufumi Hashimoto Abstract It is we known that the probem to sove a set of randomy chosen mutivariate quadratic equations

More information

Explicit overall risk minimization transductive bound

Explicit overall risk minimization transductive bound 1 Expicit overa risk minimization transductive bound Sergio Decherchi, Paoo Gastado, Sandro Ridea, Rodofo Zunino Dept. of Biophysica and Eectronic Engineering (DIBE), Genoa University Via Opera Pia 11a,

More information

A Brief Introduction to Markov Chains and Hidden Markov Models

A Brief Introduction to Markov Chains and Hidden Markov Models A Brief Introduction to Markov Chains and Hidden Markov Modes Aen B MacKenzie Notes for December 1, 3, &8, 2015 Discrete-Time Markov Chains You may reca that when we first introduced random processes,

More information

CS229 Lecture notes. Andrew Ng

CS229 Lecture notes. Andrew Ng CS229 Lecture notes Andrew Ng Part IX The EM agorithm In the previous set of notes, we taked about the EM agorithm as appied to fitting a mixture of Gaussians. In this set of notes, we give a broader view

More information

Uniprocessor Feasibility of Sporadic Tasks with Constrained Deadlines is Strongly conp-complete

Uniprocessor Feasibility of Sporadic Tasks with Constrained Deadlines is Strongly conp-complete Uniprocessor Feasibiity of Sporadic Tasks with Constrained Deadines is Strongy conp-compete Pontus Ekberg and Wang Yi Uppsaa University, Sweden Emai: {pontus.ekberg yi}@it.uu.se Abstract Deciding the feasibiity

More information

Approximated MLC shape matrix decomposition with interleaf collision constraint

Approximated MLC shape matrix decomposition with interleaf collision constraint Approximated MLC shape matrix decomposition with intereaf coision constraint Thomas Kainowski Antje Kiese Abstract Shape matrix decomposition is a subprobem in radiation therapy panning. A given fuence

More information

Cryptanalysis of multi-hfe

Cryptanalysis of multi-hfe Cryptanaysis of muti-hfe Yasufumi Hashimoto Abstract Muti-HFE Chen et a, 2009 is one of cryptosystems whose pubic key is a set of mutivariate quadratic forms over a finite fied Its quadratic forms are

More information

Approximated MLC shape matrix decomposition with interleaf collision constraint

Approximated MLC shape matrix decomposition with interleaf collision constraint Agorithmic Operations Research Vo.4 (29) 49 57 Approximated MLC shape matrix decomposition with intereaf coision constraint Antje Kiese and Thomas Kainowski Institut für Mathematik, Universität Rostock,

More information

A. Distribution of the test statistic

A. Distribution of the test statistic A. Distribution of the test statistic In the sequentia test, we first compute the test statistic from a mini-batch of size m. If a decision cannot be made with this statistic, we keep increasing the mini-batch

More information

Problem set 6 The Perron Frobenius theorem.

Problem set 6 The Perron Frobenius theorem. Probem set 6 The Perron Frobenius theorem. Math 22a4 Oct 2 204, Due Oct.28 In a future probem set I want to discuss some criteria which aow us to concude that that the ground state of a sef-adjoint operator

More information

XSAT of linear CNF formulas

XSAT of linear CNF formulas XSAT of inear CN formuas Bernd R. Schuh Dr. Bernd Schuh, D-50968 Kön, Germany; bernd.schuh@netcoogne.de eywords: compexity, XSAT, exact inear formua, -reguarity, -uniformity, NPcompeteness Abstract. Open

More information

Bayesian Learning. You hear a which which could equally be Thanks or Tanks, which would you go with?

Bayesian Learning. You hear a which which could equally be Thanks or Tanks, which would you go with? Bayesian Learning A powerfu and growing approach in machine earning We use it in our own decision making a the time You hear a which which coud equay be Thanks or Tanks, which woud you go with? Combine

More information

MONOCHROMATIC LOOSE PATHS IN MULTICOLORED k-uniform CLIQUES

MONOCHROMATIC LOOSE PATHS IN MULTICOLORED k-uniform CLIQUES MONOCHROMATIC LOOSE PATHS IN MULTICOLORED k-uniform CLIQUES ANDRZEJ DUDEK AND ANDRZEJ RUCIŃSKI Abstract. For positive integers k and, a k-uniform hypergraph is caed a oose path of ength, and denoted by

More information

8 Digifl'.11 Cth:uits and devices

8 Digifl'.11 Cth:uits and devices 8 Digif'. Cth:uits and devices 8. Introduction In anaog eectronics, votage is a continuous variabe. This is usefu because most physica quantities we encounter are continuous: sound eves, ight intensity,

More information

Torsion and shear stresses due to shear centre eccentricity in SCIA Engineer Delft University of Technology. Marijn Drillenburg

Torsion and shear stresses due to shear centre eccentricity in SCIA Engineer Delft University of Technology. Marijn Drillenburg Torsion and shear stresses due to shear centre eccentricity in SCIA Engineer Deft University of Technoogy Marijn Drienburg October 2017 Contents 1 Introduction 2 1.1 Hand Cacuation....................................

More information

Math 124B January 31, 2012

Math 124B January 31, 2012 Math 124B January 31, 212 Viktor Grigoryan 7 Inhomogeneous boundary vaue probems Having studied the theory of Fourier series, with which we successfuy soved boundary vaue probems for the homogeneous heat

More information

Sequential Decoding of Polar Codes with Arbitrary Binary Kernel

Sequential Decoding of Polar Codes with Arbitrary Binary Kernel Sequentia Decoding of Poar Codes with Arbitrary Binary Kerne Vera Miosavskaya, Peter Trifonov Saint-Petersburg State Poytechnic University Emai: veram,petert}@dcn.icc.spbstu.ru Abstract The probem of efficient

More information

MATH 172: MOTIVATION FOR FOURIER SERIES: SEPARATION OF VARIABLES

MATH 172: MOTIVATION FOR FOURIER SERIES: SEPARATION OF VARIABLES MATH 172: MOTIVATION FOR FOURIER SERIES: SEPARATION OF VARIABLES Separation of variabes is a method to sove certain PDEs which have a warped product structure. First, on R n, a inear PDE of order m is

More information

<C 2 2. λ 2 l. λ 1 l 1 < C 1

<C 2 2. λ 2 l. λ 1 l 1 < C 1 Teecommunication Network Contro and Management (EE E694) Prof. A. A. Lazar Notes for the ecture of 7/Feb/95 by Huayan Wang (this document was ast LaT E X-ed on May 9,995) Queueing Primer for Muticass Optima

More information

Recursive Constructions of Parallel FIFO and LIFO Queues with Switched Delay Lines

Recursive Constructions of Parallel FIFO and LIFO Queues with Switched Delay Lines Recursive Constructions of Parae FIFO and LIFO Queues with Switched Deay Lines Po-Kai Huang, Cheng-Shang Chang, Feow, IEEE, Jay Cheng, Member, IEEE, and Duan-Shin Lee, Senior Member, IEEE Abstract One

More information

Expectation-Maximization for Estimating Parameters for a Mixture of Poissons

Expectation-Maximization for Estimating Parameters for a Mixture of Poissons Expectation-Maximization for Estimating Parameters for a Mixture of Poissons Brandon Maone Department of Computer Science University of Hesini February 18, 2014 Abstract This document derives, in excrutiating

More information

Partial permutation decoding for MacDonald codes

Partial permutation decoding for MacDonald codes Partia permutation decoding for MacDonad codes J.D. Key Department of Mathematics and Appied Mathematics University of the Western Cape 7535 Bevie, South Africa P. Seneviratne Department of Mathematics

More information

TitleCryptanalysis of the Quaternion Rai. IEICE Transactions on Fundamentals.

TitleCryptanalysis of the Quaternion Rai. IEICE Transactions on Fundamentals. TiteCryptanaysis of the Quaternion Rai Author(s Hashimoto, Yasufumi Citation IEICE Transactions on Fundamentas Communications and Computer Science Issue Date 205-0-0 URL http://hd.hande.net/20.500.2000/

More information

Minkowski sum based lattice construction for multivariate simultaneous Coppersmith s technique and applications to RSA

Minkowski sum based lattice construction for multivariate simultaneous Coppersmith s technique and applications to RSA Minkowski sum based attice construction for mutivariate simutaneous Coppersmith s technique and appications to RSA Yoshinori Aono aono@nict.go.jp Nationa Institute of Information and Communications Technoogy

More information

Primal and dual active-set methods for convex quadratic programming

Primal and dual active-set methods for convex quadratic programming Math. Program., Ser. A 216) 159:469 58 DOI 1.17/s117-15-966-2 FULL LENGTH PAPER Prima and dua active-set methods for convex quadratic programming Anders Forsgren 1 Phiip E. Gi 2 Eizabeth Wong 2 Received:

More information

BDD-Based Analysis of Gapped q-gram Filters

BDD-Based Analysis of Gapped q-gram Filters BDD-Based Anaysis of Gapped q-gram Fiters Marc Fontaine, Stefan Burkhardt 2 and Juha Kärkkäinen 2 Max-Panck-Institut für Informatik Stuhsatzenhausweg 85, 6623 Saarbrücken, Germany e-mai: stburk@mpi-sb.mpg.de

More information

Stochastic Complement Analysis of Multi-Server Threshold Queues. with Hysteresis. Abstract

Stochastic Complement Analysis of Multi-Server Threshold Queues. with Hysteresis. Abstract Stochastic Compement Anaysis of Muti-Server Threshod Queues with Hysteresis John C.S. Lui The Dept. of Computer Science & Engineering The Chinese University of Hong Kong Leana Goubchik Dept. of Computer

More information

LECTURE NOTES 9 TRACELESS SYMMETRIC TENSOR APPROACH TO LEGENDRE POLYNOMIALS AND SPHERICAL HARMONICS

LECTURE NOTES 9 TRACELESS SYMMETRIC TENSOR APPROACH TO LEGENDRE POLYNOMIALS AND SPHERICAL HARMONICS MASSACHUSETTS INSTITUTE OF TECHNOLOGY Physics Department Physics 8.07: Eectromagnetism II October 7, 202 Prof. Aan Guth LECTURE NOTES 9 TRACELESS SYMMETRIC TENSOR APPROACH TO LEGENDRE POLYNOMIALS AND SPHERICAL

More information

Statistical Learning Theory: A Primer

Statistical Learning Theory: A Primer Internationa Journa of Computer Vision 38(), 9 3, 2000 c 2000 uwer Academic Pubishers. Manufactured in The Netherands. Statistica Learning Theory: A Primer THEODOROS EVGENIOU, MASSIMILIANO PONTIL AND TOMASO

More information

Efficient Generation of Random Bits from Finite State Markov Chains

Efficient Generation of Random Bits from Finite State Markov Chains Efficient Generation of Random Bits from Finite State Markov Chains Hongchao Zhou and Jehoshua Bruck, Feow, IEEE Abstract The probem of random number generation from an uncorreated random source (of unknown

More information

C. Fourier Sine Series Overview

C. Fourier Sine Series Overview 12 PHILIP D. LOEWEN C. Fourier Sine Series Overview Let some constant > be given. The symboic form of the FSS Eigenvaue probem combines an ordinary differentia equation (ODE) on the interva (, ) with a

More information

arxiv: v1 [math.co] 17 Dec 2018

arxiv: v1 [math.co] 17 Dec 2018 On the Extrema Maximum Agreement Subtree Probem arxiv:1812.06951v1 [math.o] 17 Dec 2018 Aexey Markin Department of omputer Science, Iowa State University, USA amarkin@iastate.edu Abstract Given two phyogenetic

More information

An Algorithm for Pruning Redundant Modules in Min-Max Modular Network

An Algorithm for Pruning Redundant Modules in Min-Max Modular Network An Agorithm for Pruning Redundant Modues in Min-Max Moduar Network Hui-Cheng Lian and Bao-Liang Lu Department of Computer Science and Engineering, Shanghai Jiao Tong University 1954 Hua Shan Rd., Shanghai

More information

SEMINAR 2. PENDULUMS. V = mgl cos θ. (2) L = T V = 1 2 ml2 θ2 + mgl cos θ, (3) d dt ml2 θ2 + mgl sin θ = 0, (4) θ + g l

SEMINAR 2. PENDULUMS. V = mgl cos θ. (2) L = T V = 1 2 ml2 θ2 + mgl cos θ, (3) d dt ml2 θ2 + mgl sin θ = 0, (4) θ + g l Probem 7. Simpe Penduum SEMINAR. PENDULUMS A simpe penduum means a mass m suspended by a string weightess rigid rod of ength so that it can swing in a pane. The y-axis is directed down, x-axis is directed

More information

T.C. Banwell, S. Galli. {bct, Telcordia Technologies, Inc., 445 South Street, Morristown, NJ 07960, USA

T.C. Banwell, S. Galli. {bct, Telcordia Technologies, Inc., 445 South Street, Morristown, NJ 07960, USA ON THE SYMMETRY OF THE POWER INE CHANNE T.C. Banwe, S. Gai {bct, sgai}@research.tecordia.com Tecordia Technoogies, Inc., 445 South Street, Morristown, NJ 07960, USA Abstract The indoor power ine network

More information

12.2. Maxima and Minima. Introduction. Prerequisites. Learning Outcomes

12.2. Maxima and Minima. Introduction. Prerequisites. Learning Outcomes Maima and Minima 1. Introduction In this Section we anayse curves in the oca neighbourhood of a stationary point and, from this anaysis, deduce necessary conditions satisfied by oca maima and oca minima.

More information

Efficiently Generating Random Bits from Finite State Markov Chains

Efficiently Generating Random Bits from Finite State Markov Chains 1 Efficienty Generating Random Bits from Finite State Markov Chains Hongchao Zhou and Jehoshua Bruck, Feow, IEEE Abstract The probem of random number generation from an uncorreated random source (of unknown

More information

The EM Algorithm applied to determining new limit points of Mahler measures

The EM Algorithm applied to determining new limit points of Mahler measures Contro and Cybernetics vo. 39 (2010) No. 4 The EM Agorithm appied to determining new imit points of Maher measures by Souad E Otmani, Georges Rhin and Jean-Marc Sac-Épée Université Pau Veraine-Metz, LMAM,

More information

MARKOV CHAINS AND MARKOV DECISION THEORY. Contents

MARKOV CHAINS AND MARKOV DECISION THEORY. Contents MARKOV CHAINS AND MARKOV DECISION THEORY ARINDRIMA DATTA Abstract. In this paper, we begin with a forma introduction to probabiity and expain the concept of random variabes and stochastic processes. After

More information

Pattern Frequency Sequences and Internal Zeros

Pattern Frequency Sequences and Internal Zeros Advances in Appied Mathematics 28, 395 420 (2002 doi:10.1006/aama.2001.0789, avaiabe onine at http://www.ideaibrary.com on Pattern Frequency Sequences and Interna Zeros Mikós Bóna Department of Mathematics,

More information

K a,k minors in graphs of bounded tree-width *

K a,k minors in graphs of bounded tree-width * K a,k minors in graphs of bounded tree-width * Thomas Böhme Institut für Mathematik Technische Universität Imenau Imenau, Germany E-mai: tboehme@theoinf.tu-imenau.de and John Maharry Department of Mathematics

More information

Combining reaction kinetics to the multi-phase Gibbs energy calculation

Combining reaction kinetics to the multi-phase Gibbs energy calculation 7 th European Symposium on Computer Aided Process Engineering ESCAPE7 V. Pesu and P.S. Agachi (Editors) 2007 Esevier B.V. A rights reserved. Combining reaction inetics to the muti-phase Gibbs energy cacuation

More information

CS 331: Artificial Intelligence Propositional Logic 2. Review of Last Time

CS 331: Artificial Intelligence Propositional Logic 2. Review of Last Time CS 33 Artificia Inteigence Propositiona Logic 2 Review of Last Time = means ogicay foows - i means can be derived from If your inference agorithm derives ony things that foow ogicay from the KB, the inference

More information

Periods and Borders of Random Words

Periods and Borders of Random Words Periods and Borders of Random Words Štěpán Houb and Jeffrey Shait 2 Department of Agebra, Facuty of Mathematics and Physics, Chares University, Prague, Czech Repubic houb@karin.mff.cuni.cz 2 Schoo of Computer

More information

Lecture Note 3: Stationary Iterative Methods

Lecture Note 3: Stationary Iterative Methods MATH 5330: Computationa Methods of Linear Agebra Lecture Note 3: Stationary Iterative Methods Xianyi Zeng Department of Mathematica Sciences, UTEP Stationary Iterative Methods The Gaussian eimination (or

More information

V.B The Cluster Expansion

V.B The Cluster Expansion V.B The Custer Expansion For short range interactions, speciay with a hard core, it is much better to repace the expansion parameter V( q ) by f( q ) = exp ( βv( q )), which is obtained by summing over

More information

Lecture 6 Povh Krane Enge Williams Properties of 2-nucleon potential

Lecture 6 Povh Krane Enge Williams Properties of 2-nucleon potential Lecture 6 Povh Krane Enge Wiiams Properties of -nuceon potentia 16.1 4.4 3.6 9.9 Meson Theory of Nucear potentia 4.5 3.11 9.10 I recommend Eisberg and Resnik notes as distributed Probems, Lecture 6 1 Consider

More information

Separation of Variables and a Spherical Shell with Surface Charge

Separation of Variables and a Spherical Shell with Surface Charge Separation of Variabes and a Spherica She with Surface Charge In cass we worked out the eectrostatic potentia due to a spherica she of radius R with a surface charge density σθ = σ cos θ. This cacuation

More information

How many random edges make a dense hypergraph non-2-colorable?

How many random edges make a dense hypergraph non-2-colorable? How many random edges make a dense hypergraph non--coorabe? Benny Sudakov Jan Vondrák Abstract We study a mode of random uniform hypergraphs, where a random instance is obtained by adding random edges

More information

Maximum likelihood decoding of trellis codes in fading channels with no receiver CSI is a polynomial-complexity problem

Maximum likelihood decoding of trellis codes in fading channels with no receiver CSI is a polynomial-complexity problem 1 Maximum ikeihood decoding of treis codes in fading channes with no receiver CSI is a poynomia-compexity probem Chun-Hao Hsu and Achieas Anastasopouos Eectrica Engineering and Computer Science Department

More information

THE OUT-OF-PLANE BEHAVIOUR OF SPREAD-TOW FABRICS

THE OUT-OF-PLANE BEHAVIOUR OF SPREAD-TOW FABRICS ECCM6-6 TH EUROPEAN CONFERENCE ON COMPOSITE MATERIALS, Sevie, Spain, -6 June 04 THE OUT-OF-PLANE BEHAVIOUR OF SPREAD-TOW FABRICS M. Wysocki a,b*, M. Szpieg a, P. Heström a and F. Ohsson c a Swerea SICOMP

More information

First-Order Corrections to Gutzwiller s Trace Formula for Systems with Discrete Symmetries

First-Order Corrections to Gutzwiller s Trace Formula for Systems with Discrete Symmetries c 26 Noninear Phenomena in Compex Systems First-Order Corrections to Gutzwier s Trace Formua for Systems with Discrete Symmetries Hoger Cartarius, Jörg Main, and Günter Wunner Institut für Theoretische

More information

Gauss Law. 2. Gauss s Law: connects charge and field 3. Applications of Gauss s Law

Gauss Law. 2. Gauss s Law: connects charge and field 3. Applications of Gauss s Law Gauss Law 1. Review on 1) Couomb s Law (charge and force) 2) Eectric Fied (fied and force) 2. Gauss s Law: connects charge and fied 3. Appications of Gauss s Law Couomb s Law and Eectric Fied Couomb s

More information

Statistical Inference, Econometric Analysis and Matrix Algebra

Statistical Inference, Econometric Analysis and Matrix Algebra Statistica Inference, Econometric Anaysis and Matrix Agebra Bernhard Schipp Water Krämer Editors Statistica Inference, Econometric Anaysis and Matrix Agebra Festschrift in Honour of Götz Trenker Physica-Verag

More information

Robust Sensitivity Analysis for Linear Programming with Ellipsoidal Perturbation

Robust Sensitivity Analysis for Linear Programming with Ellipsoidal Perturbation Robust Sensitivity Anaysis for Linear Programming with Eipsoida Perturbation Ruotian Gao and Wenxun Xing Department of Mathematica Sciences Tsinghua University, Beijing, China, 100084 September 27, 2017

More information

PHYS 110B - HW #1 Fall 2005, Solutions by David Pace Equations referenced as Eq. # are from Griffiths Problem statements are paraphrased

PHYS 110B - HW #1 Fall 2005, Solutions by David Pace Equations referenced as Eq. # are from Griffiths Problem statements are paraphrased PHYS 110B - HW #1 Fa 2005, Soutions by David Pace Equations referenced as Eq. # are from Griffiths Probem statements are paraphrased [1.] Probem 6.8 from Griffiths A ong cyinder has radius R and a magnetization

More information

$, (2.1) n="# #. (2.2)

$, (2.1) n=# #. (2.2) Chapter. Eectrostatic II Notes: Most of the materia presented in this chapter is taken from Jackson, Chap.,, and 4, and Di Bartoo, Chap... Mathematica Considerations.. The Fourier series and the Fourier

More information

Higher dimensional PDEs and multidimensional eigenvalue problems

Higher dimensional PDEs and multidimensional eigenvalue problems Higher dimensiona PEs and mutidimensiona eigenvaue probems 1 Probems with three independent variabes Consider the prototypica equations u t = u (iffusion) u tt = u (W ave) u zz = u (Lapace) where u = u

More information

Efficient Algorithms for Pairing-Based Cryptosystems

Efficient Algorithms for Pairing-Based Cryptosystems CS548 Advanced Information Security Efficient Agorithms for Pairing-Based Cryptosystems Pauo S. L. M. Barreto, HaeY. Kim, Ben Lynn, and Michae Scott Proceedings of Crypto, 2002 2010. 04. 22. Kanghoon Lee,

More information

Minimizing Total Weighted Completion Time on Uniform Machines with Unbounded Batch

Minimizing Total Weighted Completion Time on Uniform Machines with Unbounded Batch The Eighth Internationa Symposium on Operations Research and Its Appications (ISORA 09) Zhangiaie, China, September 20 22, 2009 Copyright 2009 ORSC & APORC, pp. 402 408 Minimizing Tota Weighted Competion

More information

Lecture 6: Moderately Large Deflection Theory of Beams

Lecture 6: Moderately Large Deflection Theory of Beams Structura Mechanics 2.8 Lecture 6 Semester Yr Lecture 6: Moderatey Large Defection Theory of Beams 6.1 Genera Formuation Compare to the cassica theory of beams with infinitesima deformation, the moderatey

More information

International Journal of Mass Spectrometry

International Journal of Mass Spectrometry Internationa Journa of Mass Spectrometry 280 (2009) 179 183 Contents ists avaiabe at ScienceDirect Internationa Journa of Mass Spectrometry journa homepage: www.esevier.com/ocate/ijms Stark mixing by ion-rydberg

More information

1D Heat Propagation Problems

1D Heat Propagation Problems Chapter 1 1D Heat Propagation Probems If the ambient space of the heat conduction has ony one dimension, the Fourier equation reduces to the foowing for an homogeneous body cρ T t = T λ 2 + Q, 1.1) x2

More information

Indirect Optimal Control of Dynamical Systems

Indirect Optimal Control of Dynamical Systems Computationa Mathematics and Mathematica Physics, Vo. 44, No. 3, 24, pp. 48 439. Transated from Zhurna Vychisite noi Matematiki i Matematicheskoi Fiziki, Vo. 44, No. 3, 24, pp. 444 466. Origina Russian

More information

V.B The Cluster Expansion

V.B The Cluster Expansion V.B The Custer Expansion For short range interactions, speciay with a hard core, it is much better to repace the expansion parameter V( q ) by f(q ) = exp ( βv( q )) 1, which is obtained by summing over

More information

#A48 INTEGERS 12 (2012) ON A COMBINATORIAL CONJECTURE OF TU AND DENG

#A48 INTEGERS 12 (2012) ON A COMBINATORIAL CONJECTURE OF TU AND DENG #A48 INTEGERS 12 (2012) ON A COMBINATORIAL CONJECTURE OF TU AND DENG Guixin Deng Schoo of Mathematica Sciences, Guangxi Teachers Education University, Nanning, P.R.China dengguixin@ive.com Pingzhi Yuan

More information

Asynchronous Control for Coupled Markov Decision Systems

Asynchronous Control for Coupled Markov Decision Systems INFORMATION THEORY WORKSHOP (ITW) 22 Asynchronous Contro for Couped Marov Decision Systems Michae J. Neey University of Southern Caifornia Abstract This paper considers optima contro for a coection of

More information

arxiv: v2 [cond-mat.stat-mech] 14 Nov 2008

arxiv: v2 [cond-mat.stat-mech] 14 Nov 2008 Random Booean Networks Barbara Drosse Institute of Condensed Matter Physics, Darmstadt University of Technoogy, Hochschustraße 6, 64289 Darmstadt, Germany (Dated: June 27) arxiv:76.335v2 [cond-mat.stat-mech]

More information

6.434J/16.391J Statistics for Engineers and Scientists May 4 MIT, Spring 2006 Handout #17. Solution 7

6.434J/16.391J Statistics for Engineers and Scientists May 4 MIT, Spring 2006 Handout #17. Solution 7 6.434J/16.391J Statistics for Engineers and Scientists May 4 MIT, Spring 2006 Handout #17 Soution 7 Probem 1: Generating Random Variabes Each part of this probem requires impementation in MATLAB. For the

More information

Honors Thesis Bounded Query Functions With Limited Output Bits II

Honors Thesis Bounded Query Functions With Limited Output Bits II Honors Thesis Bounded Query Functions With Limited Output Bits II Daibor Zeený University of Maryand, Batimore County May 29, 2007 Abstract We sove some open questions in the area of bounded query function

More information

Lower Bounds for the Relative Greedy Algorithm for Approximating Steiner Trees

Lower Bounds for the Relative Greedy Algorithm for Approximating Steiner Trees This paper appeared in: Networks 47:2 (2006), -5 Lower Bounds for the Reative Greed Agorithm for Approimating Steiner Trees Stefan Hougard Stefan Kirchner Humbodt-Universität zu Berin Institut für Informatik

More information

17 Lecture 17: Recombination and Dark Matter Production

17 Lecture 17: Recombination and Dark Matter Production PYS 652: Astrophysics 88 17 Lecture 17: Recombination and Dark Matter Production New ideas pass through three periods: It can t be done. It probaby can be done, but it s not worth doing. I knew it was

More information

Asymptotic Properties of a Generalized Cross Entropy Optimization Algorithm

Asymptotic Properties of a Generalized Cross Entropy Optimization Algorithm 1 Asymptotic Properties of a Generaized Cross Entropy Optimization Agorithm Zijun Wu, Michae Koonko, Institute for Appied Stochastics and Operations Research, Caustha Technica University Abstract The discrete

More information

hole h vs. e configurations: l l for N > 2 l + 1 J = H as example of localization, delocalization, tunneling ikx k

hole h vs. e configurations: l l for N > 2 l + 1 J = H as example of localization, delocalization, tunneling ikx k Infinite 1-D Lattice CTDL, pages 1156-1168 37-1 LAST TIME: ( ) ( ) + N + 1 N hoe h vs. e configurations: for N > + 1 e rij unchanged ζ( NLS) ζ( NLS) [ ζn unchanged ] Hund s 3rd Rue (Lowest L - S term of

More information

Applied Nuclear Physics (Fall 2006) Lecture 7 (10/2/06) Overview of Cross Section Calculation

Applied Nuclear Physics (Fall 2006) Lecture 7 (10/2/06) Overview of Cross Section Calculation 22.101 Appied Nucear Physics (Fa 2006) Lecture 7 (10/2/06) Overview of Cross Section Cacuation References P. Roman, Advanced Quantum Theory (Addison-Wesey, Reading, 1965), Chap 3. A. Foderaro, The Eements

More information

Componentwise Determination of the Interval Hull Solution for Linear Interval Parameter Systems

Componentwise Determination of the Interval Hull Solution for Linear Interval Parameter Systems Componentwise Determination of the Interva Hu Soution for Linear Interva Parameter Systems L. V. Koev Dept. of Theoretica Eectrotechnics, Facuty of Automatics, Technica University of Sofia, 1000 Sofia,

More information

A proposed nonparametric mixture density estimation using B-spline functions

A proposed nonparametric mixture density estimation using B-spline functions A proposed nonparametric mixture density estimation using B-spine functions Atizez Hadrich a,b, Mourad Zribi a, Afif Masmoudi b a Laboratoire d Informatique Signa et Image de a Côte d Opae (LISIC-EA 4491),

More information

Substructuring Preconditioners for the Bidomain Extracellular Potential Problem

Substructuring Preconditioners for the Bidomain Extracellular Potential Problem Substructuring Preconditioners for the Bidomain Extraceuar Potentia Probem Mico Pennacchio 1 and Vaeria Simoncini 2,1 1 IMATI - CNR, via Ferrata, 1, 27100 Pavia, Itay mico@imaticnrit 2 Dipartimento di

More information

Schedulability Analysis of Deferrable Scheduling Algorithms for Maintaining Real-Time Data Freshness

Schedulability Analysis of Deferrable Scheduling Algorithms for Maintaining Real-Time Data Freshness 1 Scheduabiity Anaysis of Deferrabe Scheduing Agorithms for Maintaining Rea-Time Data Freshness Song Han, Deji Chen, Ming Xiong, Kam-yiu Lam, Aoysius K. Mok, Krithi Ramamritham UT Austin, Emerson Process

More information

SydU STAT3014 (2015) Second semester Dr. J. Chan 18

SydU STAT3014 (2015) Second semester Dr. J. Chan 18 STAT3014/3914 Appied Stat.-Samping C-Stratified rand. sampe Stratified Random Samping.1 Introduction Description The popuation of size N is divided into mutuay excusive and exhaustive subpopuations caed

More information

Nonlinear Analysis of Spatial Trusses

Nonlinear Analysis of Spatial Trusses Noninear Anaysis of Spatia Trusses João Barrigó October 14 Abstract The present work addresses the noninear behavior of space trusses A formuation for geometrica noninear anaysis is presented, which incudes

More information

CONJUGATE GRADIENT WITH SUBSPACE OPTIMIZATION

CONJUGATE GRADIENT WITH SUBSPACE OPTIMIZATION CONJUGATE GRADIENT WITH SUBSPACE OPTIMIZATION SAHAR KARIMI AND STEPHEN VAVASIS Abstract. In this paper we present a variant of the conjugate gradient (CG) agorithm in which we invoke a subspace minimization

More information

FRIEZE GROUPS IN R 2

FRIEZE GROUPS IN R 2 FRIEZE GROUPS IN R 2 MAXWELL STOLARSKI Abstract. Focusing on the Eucidean pane under the Pythagorean Metric, our goa is to cassify the frieze groups, discrete subgroups of the set of isometries of the

More information

Rate-Distortion Theory of Finite Point Processes

Rate-Distortion Theory of Finite Point Processes Rate-Distortion Theory of Finite Point Processes Günther Koiander, Dominic Schuhmacher, and Franz Hawatsch, Feow, IEEE Abstract We study the compression of data in the case where the usefu information

More information

Turbo Codes. Coding and Communication Laboratory. Dept. of Electrical Engineering, National Chung Hsing University

Turbo Codes. Coding and Communication Laboratory. Dept. of Electrical Engineering, National Chung Hsing University Turbo Codes Coding and Communication Laboratory Dept. of Eectrica Engineering, Nationa Chung Hsing University Turbo codes 1 Chapter 12: Turbo Codes 1. Introduction 2. Turbo code encoder 3. Design of intereaver

More information

NEW DEVELOPMENT OF OPTIMAL COMPUTING BUDGET ALLOCATION FOR DISCRETE EVENT SIMULATION

NEW DEVELOPMENT OF OPTIMAL COMPUTING BUDGET ALLOCATION FOR DISCRETE EVENT SIMULATION NEW DEVELOPMENT OF OPTIMAL COMPUTING BUDGET ALLOCATION FOR DISCRETE EVENT SIMULATION Hsiao-Chang Chen Dept. of Systems Engineering University of Pennsyvania Phiadephia, PA 904-635, U.S.A. Chun-Hung Chen

More information

On the Goal Value of a Boolean Function

On the Goal Value of a Boolean Function On the Goa Vaue of a Booean Function Eric Bach Dept. of CS University of Wisconsin 1210 W. Dayton St. Madison, WI 53706 Lisa Heerstein Dept of CSE NYU Schoo of Engineering 2 Metrotech Center, 10th Foor

More information

Analysis of Emerson s Multiple Model Interpolation Estimation Algorithms: The MIMO Case

Analysis of Emerson s Multiple Model Interpolation Estimation Algorithms: The MIMO Case Technica Report PC-04-00 Anaysis of Emerson s Mutipe Mode Interpoation Estimation Agorithms: The MIMO Case João P. Hespanha Dae E. Seborg University of Caifornia, Santa Barbara February 0, 004 Anaysis

More information

Lecture 17 - The Secrets we have Swept Under the Rug

Lecture 17 - The Secrets we have Swept Under the Rug Lecture 17 - The Secrets we have Swept Under the Rug Today s ectures examines some of the uirky features of eectrostatics that we have negected up unti this point A Puzze... Let s go back to the basics

More information

New Efficiency Results for Makespan Cost Sharing

New Efficiency Results for Makespan Cost Sharing New Efficiency Resuts for Makespan Cost Sharing Yvonne Beischwitz a, Forian Schoppmann a, a University of Paderborn, Department of Computer Science Fürstenaee, 3302 Paderborn, Germany Abstract In the context

More information

Online Load Balancing on Related Machines

Online Load Balancing on Related Machines Onine Load Baancing on Reated Machines ABSTRACT Sungjin Im University of Caifornia at Merced Merced, CA, USA sim3@ucmerced.edu Debmaya Panigrahi Duke University Durham, NC, USA debmaya@cs.duke.edu We give

More information

Determining The Degree of Generalization Using An Incremental Learning Algorithm

Determining The Degree of Generalization Using An Incremental Learning Algorithm Determining The Degree of Generaization Using An Incrementa Learning Agorithm Pabo Zegers Facutad de Ingeniería, Universidad de os Andes San Caros de Apoquindo 22, Las Condes, Santiago, Chie pzegers@uandes.c

More information

Convergence Property of the Iri-Imai Algorithm for Some Smooth Convex Programming Problems

Convergence Property of the Iri-Imai Algorithm for Some Smooth Convex Programming Problems Convergence Property of the Iri-Imai Agorithm for Some Smooth Convex Programming Probems S. Zhang Communicated by Z.Q. Luo Assistant Professor, Department of Econometrics, University of Groningen, Groningen,

More information

Formulas for Angular-Momentum Barrier Factors Version II

Formulas for Angular-Momentum Barrier Factors Version II BNL PREPRINT BNL-QGS-06-101 brfactor1.tex Formuas for Anguar-Momentum Barrier Factors Version II S. U. Chung Physics Department, Brookhaven Nationa Laboratory, Upton, NY 11973 March 19, 2015 abstract A

More information

Stat 155 Game theory, Yuval Peres Fall Lectures 4,5,6

Stat 155 Game theory, Yuval Peres Fall Lectures 4,5,6 Stat 155 Game theory, Yuva Peres Fa 2004 Lectures 4,5,6 In the ast ecture, we defined N and P positions for a combinatoria game. We wi now show more formay that each starting position in a combinatoria

More information

Stochastic Variational Inference with Gradient Linearization

Stochastic Variational Inference with Gradient Linearization Stochastic Variationa Inference with Gradient Linearization Suppementa Materia Tobias Pötz * Anne S Wannenwetsch Stefan Roth Department of Computer Science, TU Darmstadt Preface In this suppementa materia,

More information

Stochastic Automata Networks (SAN) - Modelling. and Evaluation. Paulo Fernandes 1. Brigitte Plateau 2. May 29, 1997

Stochastic Automata Networks (SAN) - Modelling. and Evaluation. Paulo Fernandes 1. Brigitte Plateau 2. May 29, 1997 Stochastic utomata etworks (S) - Modeing and Evauation Pauo Fernandes rigitte Pateau 2 May 29, 997 Institut ationa Poytechnique de Grenobe { IPG Ecoe ationae Superieure d'informatique et de Mathematiques

More information

SVM: Terminology 1(6) SVM: Terminology 2(6)

SVM: Terminology 1(6) SVM: Terminology 2(6) Andrew Kusiak Inteigent Systems Laboratory 39 Seamans Center he University of Iowa Iowa City, IA 54-57 SVM he maxima margin cassifier is simiar to the perceptron: It aso assumes that the data points are

More information

Efficient Pseudorandom Functions from the Decisional Linear Assumption and Weaker Variants

Efficient Pseudorandom Functions from the Decisional Linear Assumption and Weaker Variants Efficient Pseudorandom Functions from the Decisiona Linear Assumption and Weaker Variants ABSTRACT Aison B Lewko University of Texas at Austin 1 University Station Austin, TX 78712 abishop@mathutexasedu

More information

Statistical Learning Theory: a Primer

Statistical Learning Theory: a Primer ??,??, 1 6 (??) c?? Kuwer Academic Pubishers, Boston. Manufactured in The Netherands. Statistica Learning Theory: a Primer THEODOROS EVGENIOU AND MASSIMILIANO PONTIL Center for Bioogica and Computationa

More information