Ecient Parallel Algorithms for Computing All Pair. University of Kentucky. Duke University

Size: px
Start display at page:

Download "Ecient Parallel Algorithms for Computing All Pair. University of Kentucky. Duke University"

Transcription

1 Ecient Parallel Algorithm for Computing All Pair Shortet Path in Directed Graph 1 Yijie Han 2 * Victor Y. Pan 3 ** John H. Reif*** *Department of Computer Science Univerity of Kentucky Lexington, KY **Department of Mathematic and Computer Science Lehman College, CUNY Bronx, NY ***Department of Computer Science Duke Univerity Durham, NC Abtract We preent parallel algorithm for computing all pair hortet path in directed graph. Our algorithm ha time complexity O(f(n)=p + I(n) log n) on the PRAM uing p proceor, where I(n) i log n on the EREW PRAM, log log n on the CRCW PRAM, f(n) i o(n 3 ). On the randomized CRCW PRAM we are able to achieve time complexity O(n 3 =p + log n) uing p proceor. Keyword: Analyi of algorithm, deign of algorithm, parallel algorithm, graph algorithm, hortet path. 1 Introduction A number of known algorithm compute the all pair hortet path in graph and digraph with n vertice by uing O(n 3 ) operation [Di][Fl][J]. All thee algorithm, however, ue at leae n 1 recurive tep in the wort cae and thu require at leat the order of n time in their parallel implementation, even if the number of available proceor i not bounded. O(n) time and n 2 proceor bound can indeed be achieved, for intance, in the traightforward parallelization of the algorithm of [Fl]. (Here and hereafter we aume the cutomary PRAM model of parallel computing [KR].) 1 Preliminary verion of thi paper wa preented on the 4th Annual ACM Sympoium on Parallel Algorithm and Architecture, June, Current addre: Electronic Data Sytem, Inc., Ecore Rd., Romulu, MI Supported by NSF Grant CCR and PSC CUNY Award # and #

2 NC algorithm are alo available for thi problem. However, they either need (n 3 log n) operation or only work for the more narrow cla of the input graph and/or digraph (which have the edge weight bounded, ay, by a contant or have a family of mall eparator available) [AGM][DNS][DS][GM][L][PK][PR1][PR2][S]. The recent algorithm of [PP1][PP2] ue O(log 2:5 n) parallel time and O(n 3 ) operation in the cae of a general graph with n vertice. In thi paper we improve the latter time bound to the new record value of O(I(n) log n), till uing O(n 3 ) operation. Here I(n) i the time complexity of computing the minimum of n element uing n proceor. I(n) i O(log n) under the EREW (Excluive Read Excluive Write) PRAM model, O(log log n) under the CRCW (Concurrent Read Concurrent Write) PRAM model [V], and a contant under the randomized CRCW PRAM model [R]. Moreover, the total number of operation involved in our O(I(n) log n) time algorithm can be decreaed to o(n 3 ) on the EREW PRAM and CRCW PRAM, by applying the reult in [Fr][T]. To build our algorithm, we incorporated the well known technique of [Fl] and of the reduction of the hortet path computation to matrix multiplication over the emiring, but added ome new nontrivial technique of tudying path in graph and digraph. We preent our algorithm in three tage to illutrate our intuition behind the algorithm. We rt give a imple parallel algorithm with time complexity O(n 3 =p+i(n) log 1:5 n) uing p proceor. Thi algorithm take O(n 3 ) operation when we ue no more than O(n 3 =(I(n) log 1:5 n)) proceor. We then how how to peed up thi algorithm to achieve time O(I(n) log n) uing O(n 3 =(I(n) log 2=3 n)) proceor. By uing more ophiticated idea we how the time complexity O(n 3 =p + I(n) log n) for the all pair hortet path problem. Straightforward application of the reult in [Fr][T] yield time complexity O(f(n)=p + I(n) log n), where f(n) = o(n 3 ). 2 Computing All Pair Shortet Path We ue number 0; 1; ::: ; n 1 to repreent input vertice, and a matrix A uch that it entry a ij repreent the weight of the arc from i to j. We will ue the emiring (A; min; +), o that A n 1 repreent the hortet ditance between all pair of vertice of the input graph. An arc i an ordered pair of vertice. A path i a nite equence of vertice. We may aume that there i an arc between every pair of vertice, ome of them may have weight 1. Our algorithm ue matrix multiplication to compute hortet path. The computation can therefore be viewed a contracting each hortet path to a ingle arc. For example, for an input matrix A the operation A := AAA contract the length of every hortet path by at leat one half. Thu, if our algorithm contract every path of length l < n to a ingle arc, then it compute all pair hortet path correctly. For a path p, we ue (p) to denote the cot (the number of tep or the number of iteration of a loop) for contracting p to a ingle arc. We alo ue the following pecial denition. Denition 1: For a given integer k, 1. [i] denote a vertex u uch that ik u (i + 1)k 1. [i]; 0 i < n=k, form a partition of vertice. 2

3 2. [i; j] denote a vertex u uch that ik u (j + 1)k 1, [i; j] i empty if j < i. 3. [i; j][g; h] denote an arc (u; v) uch that ik u (j + 1)k 1 and gk v (h + 1)k [i; j] denote an empty path or a path [i; j][i; j] [i; j] of length < n. 2.1 A Simple Parallel Algorithm The input matrix A i divided into ubmatrice. Each ubmatrix i a k k matrix. For convenience, aume that k divide n, and imilarly we aume that the value of all logarithm, power and ratio below are integer where thi i needed. There are a total of n 2 =k 2 ubmatrice A ij ; 0 i; j < n=k. Submatrix A ij contain element in row ik to (i+1)k 1 and column jk to (j + 1)k 1 of A (ee Fig. 1). Our next algorithm combine the technique of Floyd' algorithm and of path computation by mean of matrix multiplication. Algorithm APSP1 for t := 0 to n=k 1 do begin /*Compute the tranitive cloure of A tt uing matrix multiplication. */ A tt := A tt; for all i; j; 0 i; j < n=k; do in parallel A ij := minfa ij ; A it A tt A tj g; end Let (p) denote the number of iteration of the loop indexed by t in algorithm APSP1 that i needed to contract p to a ingle arc, where p i a path of length le than n. Fixing k in the denition 1, we have: Lemma 1: ([0; n=k 1][0; t] [0; n=k 1]) t + 1, 0 t < n=k. Proof: By induction. Before the iteration t < 0, [0; n=k 1][0; t] [0; n=k 1] = [0; n=k 1][0; n=k 1], which i a ingle arc. Now auming that the lemma i true for t, we how that it i true for t + 1. We conider three cae for a path p = [0; n=k 1][0; t + 1] [0; n=k 1]. (1) The interior vertice of p do not contain a vertex in [t + 1]. That i, p i of the form [0; n=k 1][0; t] [0; n=k 1]. In thi cae (p) t + 1, by the induction hypothei. (2) The interior vertice of p contain one vertex in [t + 1]. That i, p i of the form [0; n=k 1][0; t] [t + 1][0; t] [0; n=k 1]. In thi cae p = p 1 p 2, where p 1 = [0; n=k 1][0; t] [t + 1], p 2 = [t + 1][0; t] [0; n=k 1]. By the induction hypothei, (p 1 ) t + 1, (p 2 ) t + 1. Therefore, immediately after the t-th iteration (note that t tart at 0), p 1 ha been contracted to [0; n=k 1][t + 1], and p 2 ha been contracted to [t + 1][0; n=k 1]. Thu p = p 1 p 2 ha been contracted to [0; n=k 1][t + 1][0; n=k 1]. In the (t + 1)-t iteration, intruction A ij := minfa ij ; A i;t+1 A t+1;t+1 A t+1;j g, 0 i; j < n=k, contract the path to a ingle arc [0; n=k 1][0; n=k 1]. Therefore, (p) t + 2. (3) The interior vertice of p contain more than one vertex in [t+1]. That i, p i of the form [0; n=k 1][0; t] [t + 1][0; t + 1] [t + 1][0; t] [0; n=k 1]. In thi cae p = p 1 p 2 p 3, where p 1 = [0; n=k 1][0; t] [t + 1], p 2 = [t + 1][0; t + 1] [t + 1], and p 3 = [t + 1][0; t] [0; n=k 1]. p 2 can 3

4 further be decompoed into block, where each block i of the form [t + 1][0; t] [t + 1]. That i, each block tart at a vertex in [t+1], end with a vertex in [t+1], but goe through only vertice in [0; t]. By the induction hypothei, (p 1 ) t + 1, (p 3 ) t + 1. Let p 0 be any block of p 2. We alo have that (p 0 ) t + 1, by the induction hypothei. Therefore, immediately after the t-th iteration, p 1 ha been contracted to [0; n=k 1][t+1], p 3 ha been contracted to [t+1][0; n=k 1], and each block of p 2 ha been contracted to [t+1][t+1]. Thu p 2 ha been contracted to [t+1]. In the (t+1)-t iteration, intruction A t+1;t+1 := A t+1;t+1 contract p 2 to [t+1][t+1]. Therefore, p ha been contracted to [0; n=k 1][t+1][t+1][0; n=k 1]. Finally, in the (t+1)-t iteration, intruction A ij := minfa ij ; A i;t+1 A t+1;t+1 A t+1;j g, 0 i; j < n=k, contracte p to a ingle arc [0; n=k 1][0; n=k 1]. Therefore, (p) t Theorem 2: Algorithm APSP1 correctly compute all pair hortet path. Proof: Setting t = n=k 1 in Lemma 1 prove thi theorem. 2 Theorem 3: The time complexity of algorithm APSP1 i O((n 3 +nk 2 log k)=p+(ni(n) log n)=k). Proof: Each iteration of the loop indexed by t execute a tranitive cloure operation for A tt, and n 2 =k 2 matrix multiplication and minimization A ij := minfa ij ; A it A tt A tj g. In each iteration the tranitive cloure require O(k 3 log k) operation and n 2 =k 2 matrix multiplication and minimization take O(n 2 =k 2 k 3 ) = O(n 2 k) operation. Therefore, the whole algorithm take O(n 3 + nk 2 log k) operation. Each iteration can be done in time O(I(n) log n) if enough proceor are available. Thu the theorem i proved. 2 Setting k to n= log 0:5 n, we obtain a parallel algorithm with time complexity O(n 3 =p + I(n) log 1:5 n). 2.2 Speeding Up the Algorithm So far we were unable to decreae the time complexity below O(I(n) log 1:5 n) with O(n 3 ) operation becaue we do the tranitive cloure of A tt equentially for t = 0; 1; ::: ; n=k 1. The loop indexed by t in algorithm APSP1 repreent the erialim of the algorithm. We now peed up our algorithm by adopting a new deign. In the following algorithm we let k = n= log 1=3 n and x = log 2=3 n. Algorithm APSP2 for t := 1 to 5 log n do begin for all, 0 < n=k; do in parallel A := A A A ; if t mod x = 0 then A := AAA; end The intuition behind the deign of APSP2 i a follow. We multiply all the diagonal matrice A, 0 < n=k, imultaneouly in each iteration. By doing o we hope to eliminate the erialim in APSP1. We alo replace the intruction for all i; j; 0 i; j < n=k; do in parallel A ij := minfa ij ; A it A tt A tj g; 4

5 in APSP1 with intruction if t mod x = 0 then A := AAA; APSP2 ha 5 log n iteration. Each iteration execute a contant number of matrix multiplication. Therefore, if a ucient number of proceor are available APSP2 can be executed in O(I(n) log n) time. Alo note that the number of operation executed by APSP2 cannot be bounded by O(n 3 ) becaue intruction A := AAA i executed more than a contant number of time. Let (p) be the number of iteration of the loop indexed by t in algorithm APSP2 that i needed to contract p to a ingle arc. Fixing k in denition 1, we have: Lemma 4: If p = [i] for any 0 i < n=k, then (p) log jpj, where jpj i the length of p. Proof: Each iteration reduce the length of uch a path by at leat one half until the path ha been contracted to a ingle arc. 2 In the following we will prove inequalitie of the form (p 1 ) (p 2 ) + n, where p 1 and p 2 are path and n i a number. In proving uch an inequality we alway aume that jp 2 j jp 1 j. In fact, in mot ituation p 2 i a ubpath of p 1. Lemma 5: ([0; n=k 1][0; i] [0; n=k 1]) ([0; i] ) + x, 1 i n=k. Proof: After [0; i] ha been contracted to a ingle arc, the intruction A := AAA will be executed within the next x iteration to contract the path to a ingle arc. 2 Lemma 6: If ([i][0; i 1] [i]) z(l) + log l, where l i the length of the path (i.e. there i a term log l in the expreion upbounding ([i][0; i 1] [i])) and z(l) i a nondecreaing function of l, then ([i][0; i] [i]) z(l) + log l + log log l + 3, 1 i < n=k. Proof: Let p = [i][0; i] [i]. Let jpj = L. We will partition p into block which tart from a vertex in [i], end with a vertex in [i], but only go through vertice in [0; i 1]. A block mut go through at leat one vertex in [0; i 1]. Thu a block can be denoted by [i][0; i 1][0; i 1] [i]. p ha no more than L=2 t block of length 2 t. We bound N, the number of arc of the form [i][i] in p. We note that when a block i contracted to a ingle arc [i][i] (we ay thi block i removed or eliminated), it contribute 1 to N. Example: Let p = [i][0][2][i][i][i 1][3][4][i][i][i][2][i][3][4][i]. p ha 4 block. N = 3. Aume that p i contracted to p 1 = [i][0][i][i][i][i][i][2][i][i]. Then p 1 ha 2 block and N = 5. Aume now that p 1 i contracted to p 2 = [i][0][i][i][i]. Then p 2 ha 1 block and N = 2. We note that a a path p i being contracted, the length of p i decreaed, the number of block i decreaed, N may increae. There are two factor aect N. When a block i contracted to a ingle arc, the block i removed, but it contribute 1 to N. On the other hand, the contraction of p alo contract ubpath of the form [i], thu decreaing N. Let P = [i][0; i 1] [i], jp j = l L. By the aumption of the lemma we have (P ) z(l) + log l z(l) + log l. All block of length 2 1 in path p are removed after z(l) +1 iteration. There are at mot L block removed. Therefore after z(l) +1 iteration, thee block contribute at mot L to N. All block of length 2 2 in path p are removed after z(l) + 2 iteration. There are at mot L=2 block removed. Therefore after z(l) + 2 5

6 iteration, thee block contribute at mot L=2 to N. In general, all block of length 2 t+1 in path p are removed after z(l) + t + 1 iteration. There are at mot L=2 t block removed. Therefore after z(l) + t + 1 iteration, thee block contribute at mot L=2 t to N. Now we count how many arc [i][i] are removed after each iteration. Becaue intruction for all, 0 < n=k; do in parallel A := A A A ; i executed in each iteration, the length of a ubpath [i] i cut by at leat half after each iteration. Thu it eem that we can reduce N by half in each iteration imply becaue of thi intruction. Such counting i not accurate. Conider a path p = [i][2][3][i][i][4][5][i][i][2][0][i][i][3][i 1][i]. N i 3 for p. After an iteration (auming that intruction A := AAA i not executed in thi iteration), N i not changed becaue a ingle arc [i][i] cannot be removed by the iteration. However, when an arc [i][i] doe not contribute to the decreaing of N, it i becaue the [i][i] i adjacent to a block. After z(l) + t iteration, all block of length maller than 2 t are removed. Therefore, after z(l) + t iteration there are at mot L=2 t block left, and there are at mot L=2 t arc [i][i] which do not contribute to the decreaing of N. After z(l) iteration, N L. After z(l) + 1 iteration, we do N N=2 = Becaue the length of each ubpath [i] i reduced by half = +L = Becaue there are at mot L arc [i][i] not contributing to the decreaing of N: = +L = Becaue there are at mot L block of length 2 1 removed: = Therefore N 5L=2. After z(l) + 2 iteration N N=2 + L=2 + L=2. Therefore N 9L=4. In general, after z(l) + t iteration N N=2 + L=2 t 1 + L=2 t 1, we have N (4t + 1)L=2 t. After z(l) + log L + 1 iteration, all block are removed, and N (4(log L + 1) + 1)L=2L < 2 log L + 3. At thi moment p i contracted to a path of the form [i] and of length N. It take at mot log(2 log L + 3) < log log L + 2 more iteration to contract the path to a ingle arc. Thu (p) z(l) + log L + log log L Lemma 7: ([0; i] ) log l + i(3x + log log l + 3), 0 i < n=k, where l i the length of the path. Proof: By induction. For i = 0 we have ([0; 0] ) log l by Lemma 4. Now, auming that the lemma hold for i 1, we how that it hold for i. A path p = [0; i] may take the following form: (1). p contain no vertex in [i]. p i of the form [0; i 1]. In thi cae the lemma i true by the induction hypothei. (2). p contain exactly one vertex in [i]. p i of the form [0; i 1] [i][0; i 1]. Aume that [i] i neither the tarting vertex nor the ending vertex of p (we leave to the reader the cae where [i] i the tarting or the ending vertex). p = p 1 p 2 p 3, where p 1 = [0; i 1], p 2 = [0; i 1][i][0; i 1], p 3 = [0; i 1]. We aume that both p 1 and p 2 are not empty 6

7 and leave to the reader the cae when they are empty. After ([0; i 1] ) iteration p 1 i contracted to [0; i 1][0; i 1], p 3 i contracted to [0; i 1][0; i 1]. Therefore p i contracted to [0; i 1][0; i 1][i][0; i 1][0; i 1]. It take at mot 2x more iteration for the intruction A := AAA to be executed twice to contract the whole path to a ingle arc. Therefore (p) ([0; i 1] ) + 2x. Therefore, the lemma i true. (3). p contain more than one vertex in [i]. p i of the form [0; i 1] [i][0; i] [i][0; i 1]. p = p 1 p 2 p 3 p 4 p 5, where p 1 = [0; i 1], p 2 = [0; i 1][i], p 3 = [i][0; i] [i], p 4 = [i][0; i 1], p 5 = [0; i 1]. We aume that p 1 ; p 2 ; p 3 ; p 4 ; p 5 are not empty and leave to the reader the cae where ome of them are empty. After ([0; i 1] ) iteration p 1 i contracted to [0; i 1][0; i 1], p 5 i contracted to [0; i 1][0; i 1]. Now ([i][0; i 1] [i]) ([0; i 1] )+x (by Lemma 5) log l + (i 1)(3x + loglog l + 3) + x (by induction hypothei) = z(l) + log l. Therefore by Lemma 6, (p 3 ) log l + (i 1)(3x + log log l + 3) + x + log log l + 3 = T. Therefore, after T iteration p i contracted to [0; i 1][0; i 1][i][i][0; i 1][0; i 1]. It take at mot 2x more iteration for the intruction A := AAA to be executed twice to contract the whole path to a ingle arc. Therefore, (p) T +2x = log l +i(3x+log log l +3). 2 Theorem 8: Algorithm APSP2 correctly compute all pair hortet path in time O(n 3 log 1=3 n=p + I(n) log n). Proof: Setting i = n=k 1 and l = n in Lemma 7 prove that algorithm APSP2 compute all pair hortet path in log n + (n=k 1)(3x + log log n + 3) 5 log n iteration. If enough proceor are available each iteration can be executed in O(I(n)) time. Intruction A := A A A i executed O(log n) time for all n=k = log 1=3 n ubmatrice, which take O(k 3 (n=k) log n) = O(n 3 log 1=3 n) operation. Intruction A := AAA i executed O(log n=x) time, which take O(n 3 log 1=3 n) operation. 2 If we ue APSP2 for the purpoe of computing A tt in APSP1, we get Corollary: All pair hortet path can be computed in time O(n 3 =p + I(n) log 7=6 n) uing p proceor. Remark: Algorithm APSP1 and APSP2 equentially evaluate the tranitive cloure of the matrice on the diagonal. Thi property i ueful for reducing the complexity of computing the all pair hortet path in graph with a family of precomputed eparator[pr1] [PR2]. 2.3 A Fater Algorithm We divide matrix A into level (ee Fig. 2). The 0-th level i A (0) 0 = A. For each matrix B = A (j) at level j we divide it into four ubmatrice of equal ize, B i 0;0 ; B 0;1 ; B 1;0 ; B 1;1, and dene A (j+1) = B 2i 0;0 and A (j+1) = 2i+1 B 1;1. Thu there i a total of 2 j matrice A (j) at i level j, each of ize n=2 j n=2 j. We involve the matrice up to level L = (log log n)=2, and there are 2 L = log 1=2 n matrice at that level, each of ize n=2 L n=2 L. Let K be the larget number, which i both a power of 3 and le than or equal to log n. Algorithm APSP3 for t := 1 to 8 log n do begin 7

8 for all, 0 < 2 L ; do in parallel /* Do matrix multiplication for all matrice at level L.*/ := A (L) A (L) A (L) ; end A (L) if 0 i L 1 and i i the mallet j uch that t mod (K=3 j ) = 0 then /* Do matrix multiplication for all matrice at level i. */ for all, 0 < 2 i ; do in parallel A (i) := A (i) A (i) A (i) ; APSP3 execute A (L) := A (L) A (L) A (L) in every iteration. For matrice at other level, they are being multiplied a follow. For the time interval from 1 to 8 log n, we let T 0 = ft j t mod K = 0g. Intruction A (0) := A (0) A (0) A (0) i executed for all t 2 T 0. Note that becaue of the way K i dened, T 0 contain only a contant number of element. Let T 1 = ft j t mod (K=3) = 0g T 0. Intruction A (1) := A (1) A (1) A (1) i executed for all t 2 T 1. The reaon T 0 i being ubtracted i that A (1) i a ubmatrix of A (0), thu operation b=2c A (0) := A(0) b=2c b=2c A(0) b=2c A(0) \contain" operation A(1) b=2c := A (1) A (1) A (1). Thu we may view that intruction A (1) := A (1) A (1) A (1) i executed every K=3 iteration. In general. let P T i = ft j t mod (K=3 i i 1 ) = 0g j=0 T j, i < L. Intruction A (i) for all t 2 T i. We may view that intruction A (i) iteration. := A (i) A (i) A (i) := A (i) A (i) A (i) i executed i executed every K=3 i Let k = n=2 L. By denition 1, [i] denote any vertex in fin=2 L ; in=2 L + 1; :::; (i + 1)n=2 L 1g. Denote K=3 L i 1 by t i, 0 i L 1. Then intruction A (L i 1) := A (L i 1) can be viewed a being executed every t i iteration, and intruc- can be viewed a being executed every t 0 iteration. tion A (L 1) A (L i 1) A (L i 1) := A (L 1) A (L 1) A (L 1) To analyze path being contracted by APSP3, we dene function cot(x; l) a follow. cot(0; l) = log l; cot(1; l) = log l + 2t 0 + log log l + 3; If x 6= 0 and x i even, cot(x; l) = cot(x 1; l) + t i, where i i the larget integer j uch that x=2 j i odd; P i 1 If x 6= 1 and x i odd, cot(x; l) = cot(x 1; l) + t 0 + 2(log log l + 3) + j=0 t j, where i i the larget integer j uch that (x + 1)=2 j i odd. Let p be a path, let (p) be the number of iteration needed in APSP3 to contract p to a ingle arc. Let l be the maximum length of the path under conideration. We dene function COST (x; l) a follow. COST (0; l) = ([0] ); COST (1; l) = ([0; 1] ); If x 6= 0 and x i even, COST (x; l) = ([x; x + 2 i 1][0; x 1] [x; x + 2 i 1]), where i i the larget integer j uch that x=2 j i odd; If x 6= 1 and x i odd, COST (x; l) = ([x 2 i + 1; x][0; x] [x 2 i + 1; x]), where i i the larget integer j uch that (x + 1)=2 j i odd. The denition of COST i for path of length l. For example, COST (0; l) i obtained 8

9 by taking the maximum of the number of iteration needed to contract a path over the path of the form [0] and of length l. We give a imple way to gure out the formula we are evaluating. For even x, x 6= 0, we dene COST (x; l) = ([a; b][0; x 1] [a; b]), where a and b can be found out in Fig. 2. We rt nd the larget quare in which x i at the top left corner. For x = 2 thi quare i the quare containing 2, 3. For x = 4 thi quare i the quare containing 4,5,6,7. For x = 6 thi quare i the quare containing 6,7. a i the mallet number in the quare, that i, the number at the top left of the quare. b i the larget number in the quare, that i, the number at the bottom right of the quare. For even x, x 6= 0, we alo dene cot(x; l) = cot(x 1; l) + t i, where t i can be found out in Fig. 2. We rt nd the larget quare in which x i at the top left corner. Then t i i the label in the immediate left neighbor quare. Note that for all even x, x 6= 0, the quare containing t i ' do not overlap. If we um all t i for all even x, x 6= 0, we are in fact umming all t i ' except t 0 ' in Fig. 2. For odd x, x 6= 1, we dene COST (x; l) = ([a; b][0; x] [a; b]), where a and b can be found out in Fig. 2. We rt nd the larget quare in which x i at the bottom right corner. For x = 3 thi quare i the quare containing 0,1,2,3. For x = 5 thi quare i the quare containing 4,5. For x = 7 thi quare i the quare containing 0 to 7. a i the mallet number in the quare. b i the larget number in the quare. For odd x, x 6= 1, we P P alo dene cot(x; l) = cot(x 1; l) + t 0 + 2(log log l + 3) + t j, where t j can be found out in Fig. P 2. We rt nd the larget quare in which x i at the bottom right corner. The t j ' in t j are the t j ' in P the bottom \row" of the quare. P Note that for all odd x, x 6= 0, the quare containing t j ' do not overlap. If we um all t j for all odd x, x 6= 0, we are in fact umming all t i ' in Fig. 2 except the t 0 in the top left quare containing 0 and 1. Now conider the extra t 0. Conidering the fact that x 0 ' are not preent in the formula for cot(x; l), x i even and x 6= 0, if we um all t i for all x except x = 0; 1, we are in fact umming all t i in Fig. 2 twice except the t 0 in the top left quare containing 0 and 1. However, t 0 i counted twice in the formula for cot(1; l). Therefore, if we um t i for all x, we are in fact umming all t i in Fig. 2 exactly twice. We ue everal propertie of APSP3 in the analyi of path. One property we ue i ymmetry. We note that vertice in [2i] and vertice in [2i + 1] are ymmetrical with repect to APSP3. For example, path p 1 = [1][0; 1] [1] i ymmetrical to path p 2 = [0][0; 1] [0]. That i to ay, if we replace [1] in p 1 with [0] and replace [0] with [1] we obtain p 2 a the ymmetrical path of p 1. Becaue a matrix multiplication at level L 1 in APSP3 either involve both [0] and [1] or involve neither [0] nor [1], and matrix multiplication at level L involve [0] and [1]. Therefore, the way that p 1 and p 2 are contracted i the ame a far a APSP3 i ued to contract p 1 and p 2. Therefore, (p 1 ) = (p 2 ). We alo have that p 1 = [2][1] [2] i ymmetrical to p 2 = [2][0] [2], and p 3 = [4; 5][0; 7] [4; 5] i ymmetrical to p 4 = [6; 7][0; 7] [6; 7] (refer to Fig. 2). We alo ue ymmetry in a omewhat generalized ene. For example, p 5 = [6][0; 5] [7] i ymmetrical to p 6 = [6][0; 5] [6] becaue matrix multiplication for contracting p 5 and p 6 proceed in the ame pattern. Alo, p 7 = [6; 7][0; 3] [4; 5] i ymmetrical to p 8 = [6; 7][0; 3] [6; 7]. We have (p 1 ) = (p 2 ) if p 1 and p 2 are ymmetrical. 9

10 The econd property we will ue i revere. The revered path of p 1 = [1][0][2][3] i p 2 = [3][2][0][1]. That i, the revered path i obtained by revering the vertice of the original path. It i not dicult to ee that if p 1 i the revered path of p 2 then (p 1 ) = (p 2 ). The third property we will ue i proper ubet. If the et of path repreented by p 1 i contained in the et of path repreented by path p 2 then we ay that p 1 i a ubet of p 2. If the containment i proper then we ay p 1 i a proper ubet of p 2. For example, [0; 1][5; 6] [0; 1] i a proper ubet of [0; 3][5; 6] [0; 3]. If p 1 i a proper ubet of p 2 then (p 1 ) (p 2 ). We ue four lemma below to prove COST (x; l) cot(x; l). We ue an implied induction. That i, when we are proving COST (x; l) cot(x; l) we aume that COST (y; l) cot(y; l) i true for all 0 y < x. To help undertand the following proof, we ugget that the reader try everal particular value for x and refer to Fig. 2 for each cae analyzed. Lemma 9: COST (0; l) cot(0; l). Proof: Each iteration contract uch a path by at leat half. Therefore, the Lemma i true. 2 Lemma 10: COST (1; l) cot(1; l). Proof: We have the following cae for a path p = [0; 1] : (a1). p i of the form [0] or [1], then (p) log l becaue intruction A (L) i executed in each iteration.. := A (L) A (L) A (L) (a2). p i of the form [1][0] [1]. After [0] i contracted to a ingle arc, it take at mot t 0 iteration for the intruction A (L 1) := A (L 1) A (L 1) A (L 1) to be executed in order to contract the path to a ingle arc. Therefore, (p) ([0] ) + t 0 log l + t 0 (by (a1)). (a3). p i of the form [1][0; 1] [1], then (p) log l + t 0 + log log l + 3 (by (a2) and Lemma 6). (a4). p i of the form [0][0; 1] [0]. Thi cae i a ymmetrical cae of (a3). By ymmetry we have (p) log l + t 0 + log log l + 3. (a5). p i of the form [0][0; 1] [1]. Aume that p ha at leat two vertice in [0] (we leave to the reader the cae that p ha only one vertex in [0]). p can be written a p 1 p 2 p 3, where p 1 = [0][0; 1] [0], p 2 = [0][1], p 3 = [1]. By (a4), (p 1 ) log l + t 0 + log log l + 3. By (a1), (p 3 ) log l. Thu after log l + t 0 + log log l + 3 iteration, p 1 i contracted to a ingle arc [0][0], p 3 i contracted to a ingle arc [1][1] (it i poible p 3 i empty). Therefore p i contracted to [0][0][1][1]. Within t 0 iteration intruction A (L 1) := A (L 1) A (L 1) A (L 1) will be executed, which contract p to a ingle arc. Therefore (p) log l + 2t 0 + log log l + 3. (a6). p i of the form [1][0; 1] [0]. Thi cae i ymmetrical to (a5). Now a path p = [0; 1] can be in only one of the following two ituation. (1). p only contain vertice in [0], or p only contain vertice in [1]. Thi ituation i taken care of in (a1). (2). p contain vertice both in [0] and in [1]. We look at the tarting and ending vertice of p. If the tarting ending vertex pair < a; b > i < [1]; [1] >, the ituation i calculated 10

11 in (a3). If the pair i < [0]; [0] >, it i calculated in (a4). If the pair i < [0]; [1] >, it i calculated in (a5). Finally, if the pair i < [1]; [0] >, it i calculated in (a6). 2 Lemma 11: For even x, x 6= 0, COST (x; l) = ([x; x + 2 i 1][0; x 1] [x; x + 2 i 1]) cot(x; l), where i i the larget integer j uch that x=2 j i odd. Proof: For x 6= 0 and x even, and for p = [x; x + 2 i 1][0; x 1] [x; x + 2 i 1] we have the following cae. (b1). x i a power of 2. By the denition of i, x 2 i = 0. When [0; x 1] i contracted to a ingle arc, p i contracted to [x; x + 2 i 1][0; x 1][0; x 1][x; x + 2 i 1]. Vertice in [0; x 1] and [x; x + 2 i 1] are in A (L i 1) 0, therefore it take at mot t i more iteration to multiply the matrice at level L i 1, in order to contract the path to a ingle arc. Therefore COST (x; l) = ([x; x + 2 i 1][0; x 1] [x; x + 2 i 1]) ([0; x 1] ) + t i = COST (x 1; l) + t i cot(x 1; l) + t i = cot(x; l). (b2). x i not a power of 2. There are three ubcae. (b2.1). p doe not have any vertex in [x 2 i ; x 1]. Thu p i of the form [x; x + 2 i 1][0; x 2 i 1] [x; x + 2 i 1]. We have (p) = ([x; x + 2 i 1][0; x 2 i 1] [x; x + 2 i 1]) ([x 2 i ; x + 2 i 1][0; x 2 i 1] [x 2 i ; x + 2 i 1]) (by proper ubet) = COST (x 2 i ; l) cot(x 2 i ; l) cot(x; l). (b2.2). p contain one vertex in [x 2 i ; x 1]. p i of the form [x; x + 2 i 1][0; x 2 i 1] [x 2 i ; x 1][0; x 2 i 1] [x; x + 2 i 1]. p = p 1 p 2, where p 1 = [x; x + 2 i 1][0; x 2 i 1] [x 2 i ; x 1], p 2 = [x 2 i ; x 1][0; x 2 i 1] [x; x + 2 i 1]. (p 1 ) = ([x; x+2 i 1][0; x 2 i 1] [x 2 i ; x 1]) ([x 2 i ; x+2 i 1][0; x 2 i 1] [x 2 i ; x+2 i 1]) (by proper ubet) = COST (x 2 i ; l) cot(x 2 i ; l) cot(x 1; l). After (p 1 ) iteration p 1 i contracted to a ingle arc. Becaue p 2 i the revere of p 1, p 2 i alo contracted to a ingle arc after (p 1 ) iteration. Therefore, after (p 1 ) iteration p i contracted to p 3 = [x; x+2 i 1][x 2 i ; x 1][x; x+2 i 1]. Vertice in p 3 are all in a ubmatrix A (L i 1). Therefore, it take at mot t i more iteration with an execution of matrix multiplication at level L i 1 to contract p to a ingle arc. Thu, (p) cot(x 1; l) + t i = cot(x; l). (b2.3). p contain more than one vertex in [x 2 i ; x 1]. p i of the form [x; x+2 i 1][0; x 2 i 1] [x 2 i ; x 1][0; x 1] [x 2 i ; x 1][0; x 2 i 1] [x; x + 2 i 1]. p = p 1 p 2 p 3, where p 1 = [x; x + 2 i 1][0; x 2 i 1] [x 2 i ; x 1], p 2 = [x 2 i ; x 1][0; x 1] [x 2 i ; x 1], p 3 = [x 2 i ; x 1][0; x 2 i 1] [x; x + 2 i 1]. We have (p 1 ) = ([x; x + 2 i 1][0; x 2 i 1] [x 2 i ; x 1]) ([x 2 i ; x + 2 i 1][0; x 2 i 1] [x 2 i ; x + 2 i 1]) (by proper ubet) = COST (x 2 i ; l) cot(x 2 i ; l) cot(x 1; l). We alo have (p 3 ) = (p 1 ) (by revere), and (p 2 ) = COST (x 1; l) cot(x 1; l). Therefore, after cot(x 1; l) iteration p i contracted to p 4 = [x; x + 2 i 1][x 2 i ; x 1][x 2 i ; x 1][x; x + 2 i 1]. Vertice in p 4 are all in a ubmatrix A (L i 1). Therefore, it take at mot t i more iteration with an execution of matrix multiplication at level L i 1 to contract p to a ingle arc. Thu, (p) cot(x 1; l) + t i = cot(x; l). 2 Lemma 12: For odd x, x 6= 1, COST (x; l) = ([x 2 i +1; x][0; x] [x 2 i +1; x]) cot(x; l), where i i the larget integer j uch that (x + 1)=2 j i odd. Proof: Let i be the larget integer j uch that (x + 1)=2 j i odd, Let y = x 1. Let i 0 be the larget integer j uch that y=2 j i odd. We have the following cae: 11

12 (c1). ([x][0; y 1] [x]) ([y; y + 2 i0 1][0; y 1] [y; y + 2 i0 1]) = COST (x 1; l) cot(x 1; l). ([x][0; y 1] [y]) ([y; y+2 i0 1][0; y 1] [y; y+2 i0 1]) = COST (x 1; l) cot(x 1; l). ([y][0; y 1] [x]) ([y; y+2 i0 1][0; y 1] [y; y+2 i0 1]) = COST (x 1; l) cot(x 1; l). ([y][0; y 1] [y]) ([y; y+2 i0 1][0; y 1] [y; y+2 i0 1]) = COST (x 1; l) cot(x 1; l). All by proper ubet. (c2). ([y][0; y] [y]) cot(x 1; l) + log log l + 3 (by Lemma 6 and (c1), becaue cot(x 1; l) = z(l) + log l). (c3). [x][0; y] [x] can have three ubcae. (c3.1). [x][0; y] [x] doe not contain any vertex in [y]. Thu it i of the form [x][0; y 1] [x]. Thi reduce to (c1). (c3.2). [x][0; y] [x] contain one vertex in [y]. It i of the form p = [x][0; y 1] [y][0; y 1] [x]. p = p 1 p 2, where p 1 = [x][0; y 1] [y] and p 2 = [y][0; y 1] [x]. We have (p 1 ) = (p 2 ) (by revere). After (p 1 ) iteration p i contracted to [x][y][x]. Becaue [x] and [y] are in a ubmatrix A (L 1), it take t 0 more iteration to contract p to a ingle arc. Therefore ([x][0; y] [x]) ([x][0; y 1] [y]) + t 0. Thi reduce to cae (c1). (c3.3). [x][0; y] [x] contain more than one vertex in [y]. It i of the form p = [x][0; y 1] [y][0; y] [y][0; y 1] [x]. p = p 1 p 2 p 3, where p 1 = [x][0; y 1] [y], p 2 = [y][0; y] [y], p 3 = [y][0; y 1] [x]. We have (p 1 ) = (p 3 ) (by revere). After maxf(p 1 ); (p 2 )g iteration p i contracted to [x][y][y][x]. Becaue [x] and [y] are in a ubmatrix A (L 1), it take at mot t 0 more iteration to contract p to a ingle arc. Thu (p) maxf(p 1 ); (p 2 )g + t 0. Now (p 1 ) i evaluated in cae (c1) and (p 2 ) i evaluated in cae (c2). Summarizing three ubcae for (c3) and uing (c1) and (c2), we obtain that ([x][0; y] [x]) cot(x 1; l) + t 0 + log log l + 3. (c4). ([x][0; x] [x]) cot(x 1; l) + t 0 + log log l log log l + 3 (by Lemma 6 and (c3)). (c5). We ue i tep to evaluate ([x 2 i +1; x][0; x] [x 2 i +1; x]). We dene cot(x; l; 0) = cot(x 1; l) + t 0 + 2(log log l + 3) and cot(x; l; j) = cot(x; l; j 1) + t j 1, 1 j i. In tep 1 j i we evaluate ([x 2 j + 1; x][0; x] [x 2 j + 1; x]). We how that ([x 2 j + 1; x][0; x] [x 2 j + 1; x]) cot(x; l; j). We denote ([x 2 j + 1; x][0; x] [x 2 j + 1; x]) by COST (x; l; j). Therefore we need etablih COST (x; l; j) cot(x; l; j), 1 j i. We have the following tep: (c5.1). ([x 2 j 1 + 1; x][0; x] [x 2 j 1 + 1; x]) = ([x 2 j + 1; x 2 j 1 ][0; x] [x 2 j + 1; x 2 j 1 ]), by ymmetry. (c5.2). Evaluate ([x 2 j + 1; x 2 j 1 ][0; x] [x 2 j 1 + 1; x]). For uch a path p we have the following cae: (c5.2.1). p contain only one vertex in [x 2 j +1; x 2 j 1 ] and one vertex in [x 2 j 1 +1; x]. Then p i of the form [x 2 j + 1; x 2 j 1 ][0; x 2 j ] [x 2 j 1 + 1; x]. We have (p) = ([x 2 j + 1; x 2 j 1 ][0; x 2 j ] [x 2 j 1 + 1; x]) ([x 2 j + 1; x][0; x 2 j ] [x 2 j + 1; x]) (by proper ubet) = COST (x 2 j + 1; l) cot(x 2 j + 1; l) cot(x; l; j). (c5.2.2). p contain more than one vertex in [x 2 j + 1; x 2 j 1 ] but only one vertex in [x 2 j 1 +1; x]. Let p = p 1 p 2, where p 1 contain all vertice [x 2 j +1; x 2 j 1 ] in p and end at the lat vertex [x 2 j +1; x 2 j 1 ] in p. p 1 and p 2 can be written a p 1 = [x 2 j +1; x 12

13 2 j 1 ][0; x 2 j 1 ] [x 2 j + 1; x 2 j 1 ], p 2 = [x 2 j + 1; x 2 j 1 ][0; x 2 j ] [x 2 j 1 + 1; x]. (p 1 ) = ([x 2 j + 1; x 2 j 1 ][0; x 2 j 1 ] [x 2 j + 1; x 2 j 1 ]) ([x 2 j + 1; x 2 j 1 ][0; x] [x 2 j +1; x 2 j 1 ]) (by proper ubet) = ([x 2 j 1 +1; x][0; x] [x 2 j 1 +1; x]) (by ymmetry, ee cae (c5.1)) = COST (x; l; j 1) cot(x; l; j 1). (p 2 ) = ([x 2 j + 1; x 2 j 1 ][0; x 2 j ] [x 2 j 1 + 1; x]) ([x 2 j + 1; x][0; x 2 j ] [x 2 j + 1; x]) (by proper ubet) = COST (x 2 j + 1; l) cot(x 2 j + 1; l) cot(x; l; j 1). Therefore, after cot(x; l; j 1) iteration p 1 i contracted to [x 2 j + 1; x 2 j 1 ][x 2 j + 1; x 2 j 1 ], p 2 i contracted to [x 2 j + 1; x 2 j 1 ][x 2 j 1 + 1; x]. Therefore p i contracted to [x 2 j + 1; x 2 j 1 ][x 2 j + 1; x 2 j 1 ][x 2 j 1 + 1; x]. It take at mot t j 1 more := A (L j) iteration for the intruction A (L j) contract p to a ingle arc. Therefore, (p) cot(x; l; j 1) + t j 1 = cot(x; l; j). A (L j) A (L j) to be executed in order to (c5.2.3). p contain more than one vertex in [x 2 j 1 + 1; x] but only one vertex in [x 2 j + 1; x 2 j 1 ]. Thi cae i ymmetrical to cae (c5.2.2). By ymmetry we have (p) cot(x; l; j). (c5.2.4). p contain more than one vertex in [x 2 j + 1; x 2 j 1 ] and more than one vertex in [x 2 j 1 + 1; x]. Let p = p 1 p 2 p 3, where p 1 contain all vertice [x 2 j + 1; x 2 j 1 ] in p and end at the lat vertex [x 2 j + 1; x 2 j 1 ] in p. p 1, p 2 and p 3 can be written a p 1 = [x 2 j +1; x 2 j 1 ][0; x] [x 2 j +1; x 2 j 1 ], p 2 = [x 2 j +1; x 2 j 1 ][0; x 2 j ] [x 2 j 1 +1; x], p 3 = [x 2 j 1 +1; x][0; x] [x 2 j 1 +1; x]. (p 1 ) = ([x 2 j +1; x 2 j 1 ][0; x] [x 2 j + 1; x 2 j 1 ]) = ([x 2 j 1 + 1; x][0; x] [x 2 j 1 + 1; x]) (by ymmetry, ee cae (c5.1)) = COST (x; l; j 1) cot(x; l; j 1). (p 2 ) = ([x 2 j + 1; x 2 j 1 ][0; x 2 j ] [x 2 j 1 + 1; x]) ([x 2 j +1; x][0; x 2 j ] [x 2 j +1; x]) (by proper ubet) = COST (x 2 j +1; l) cot(x 2 j + 1; l) cot(x; l; j 1). (p 3 ) = ([x 2 j 1 + 1; x][0; x] [x 2 j 1 + 1; x]) = COST (x; l; j 1) cot(x; l; j 1). Therefore, after cot(x; l; j 1) iteration p 1 i contracted to [x 2 j + 1; x 2 j 1 ][x 2 j + 1; x 2 j 1 ], p 2 i contracted to [x 2 j + 1; x 2 j 1 ][x 2 j 1 +1; x], p 3 i contracted to [x 2 j 1 +1; x][x 2 j 1 +1; x]. Thu p i contracted to [x 2 j + 1; x 2 j 1 ][x 2 j + 1; x 2 j 1 ][x 2 j 1 + 1; x][x 2 j 1 + 1; x]. It take at mot t j 1 more iteration for the intruction A (L j) := A (L j) A (L j) A (L j) to be executed in order to contract p to a ingle arc. Therefore, (p) cot(x; l; j 1)+t j 1 = cot(x; l; j). Summarizing (c5.2.1), (c5.2.2), (c5.2.3) and (c5.2.4) we have (p) = ([x 2 j + 1; x 2 j 1 ][0; x] [x 2 j 1 + 1; x]) cot(x; l; j). (c5.3). Evaluating ([x 2 j 1 + 1; x][0; x] [x 2 j + 1; x 2 j 1 ]). Thi i the revered path of the path analyzed in cae (c5.2). Therefore ([x 2 j 1 + 1; x][0; x] [x 2 j + 1; x 2 j 1 ]) cot(x; l; j). (c5.4). Now evaluating ([x 2 j + 1; x][0; x] [x 2 j + 1; x]) = COST (x; l; j). The tarting ending vertex pair < a; b > of path p = [x 2 j + 1; x][0; x] [x 2 j + 1; x] i either < [x 2 j +1; x 2 j 1 ]; [x 2 j +1; x 2 j 1 ] > or < [x 2 j 1 +1; x]; [x 2 j 1 +1; x] > or < [x 2 j +1; x 2 j 1 ]; [x 2 j 1 +1; x] > or < [x 2 j 1 +1; x]; [x 2 j +1; x 2 j 1 ] >. Therefore p i one of the four path p 1, p 2, p 3, p 4, where p 1 = [x 2 j +1; x 2 j 1 ][0; x] [x 2 j +1; x 2 j 1 ], p 2 = [x 2 j 1 +1; x][0; x] [x 2 j 1 +1; x], p 3 = [x 2 j +1; x 2 j 1 ][0; x] [x 2 j 1 +1; x], and p 4 = [x 2 j 1 + 1; x][0; x] [x 2 j + 1; x 2 j 1 ]. We have (p 2 ) = COST (x; l; j 1) cot(x; l; j 1) cot(x; l; j), (p 1 ) = (p 2 ) (by ymmetry), (p 3 ) cot(x; l; j) (by (c5.2)), (p 4 ) cot(x; l; j) (by (c5.3)). Therefore we have (p) cot(x; l; j). 13

14 Summarizing (c1) to (c5) we have COST (x; l) = ([x 2 i + 1; x][0; x] [x 2 i + 1; x]) cot(x; l; i) = cot(x; l; 0) + P i 1 j=0 t j = cot(x 1; l) + t 0 + 2(log log n + 3) + P i 1 j=0 t j = cot(x; l). 2 Theorem 13: COST (x; l) cot(x; l), 0 x < 2 L. Proof: By Lemma 9 to Theorem 14: The total number of iteration needed to compute all pair hortet path in APSP3 i no more than 8 log n. Proof: By Theorem 13, cot(2 L 1; n) upper bound the number of iteration needed to contract any path of length le than n to a ingle arc. We have cot(2 L 1; n) log n+2 L (log log n+3)+ P L j=1 t j 12 L j+1 = log n+2 L (log log n+3)+ P L j=1 K2L j+1 =3 L j 2 log n+6 log n = 8 log n. A we have explained before, when P we um all t i ' for all x we are in L fact umming all t i ' in Fig. 2 twice. We thu get the term j=1 t j 12 L j+1. 2(log log n+3) i included once for each odd x except x = 1 where the term i only log log n + 3. Thu we get the term 2 L (log log n + 3). The term log n come from cot(1; n). 2 Theorem 15: Algorithm APSP3 compute all pair hortet path in time O(n 3 =p + I(n) log n). Proof: Each iteration can be executed in I(n) time if enough proceor are available. Thu we only need to how that the total number of operation executed i O(n 3 ). Matrice at level i, 0 i < L, are multiplied with themelve 8 log n=t L i 1 8 log n3 i =K 24 3 i time. There are 2 i uch matrice and each matrix multiplication take O((n=2 i ) 3 ) operation. Thu the total number of operation for thee matrix multiplication i O( P L 1 i=0 3i 2 i (n=2 i ) 3 ) = O(n 3 ). There are 2 L ubmatrice at level L. Each of them i multiplied to itelf 8 log n time. The total number of operation for thee matrix multiplication i O(2 L (n=2 L ) 3 log n) = O(n 3 ). 2 If we multiply two matrice by uing the reult in [Fr][T], we can reduce the number of operation to o(n 3 ). Corollary: Algorithm APSP3 compute all pair hortet path in time O(f(n)=p+I(n) log n) on the EREW and CRCW PRAM, where f(n) = o(n 3 ). 2 Thi corollary doe not apply to the randomized CRCW PRAM. Becaue we multiply two matrice in contant time uing n 3 proceor on the randomized PRAM, Fredman and Takaoka' technique cannot be applied in contant time to reult in aving. Reference [AGM] N. Alon, Z. Galil, O. Margalit. On the exponent of all pair hortet path problem. Proc. 32nd Ann. IEEE Symp. FOCS, , [DNS] E. Dekel, D. Naimi and S. Sahni. Parallel matrix and graph algorithm. SIAM J. Comput. 10, , [DS] E. Dekel and S. Sahni. Binary tree and parallel cheduling algorithm. IEEE Tran. Comput. 32, ,

15 [Di] E. W. Dijktra. A note on two problem in connextion with graph. Numeriche Mathematik 1, , [Fl] R. N. Floyd. Algorithm 97, Shortet path. Comm. ACM 5, 345, [Fr] [GM] [J] [KR] [L] [PK] [PP1] [PP2] [PR1] [PR2] M. L. Fredman. New bound on the complexity of the hortet path problem. SIAM J. Comput., Vol. 5, No. 1, 83-89(March 1976). H. Gazit and G. L. Miller. An improved parallel algorithm that compute the BFS numbering of a directed graph. Information Proceing Letter 28:1, 61-65, D. B. Johnon. Ecient algorithm for hortet path in pare network. J. ACM, 24, 1, 1-13, M. Karp, V. Ramachandran. A urvey of parallel algorithm for hared memory machine. \Handbook of Theoretical Computer Science," , North-Holland, Amterdam, A. Linga. Ecient parallel algorithm for path problem in planar directed graph. Proc. SIGAL'90, Lecture Note in Computer Science 450, R. C. Paige and C. P. Krukal. Parallel algorithm for hortet path problem. Proc Int. Conf. on Parallel Proceing, St. Charle, Illinoi, V. Y. Pan and F. P. Preparata. Supereective low-down of parallel algorithm. Proc ACM Symp. on Parallel Algorithm and Architecture, San Diego, California, V. Y. Pan and F. P. Preparata. Work-preerving peed-up of parallel matrix computation. SIAM J. Comput., Vol. 24, No. 4, V. Y. Pan and J. H. Reif. Fat and ecient olution of path algebra problem. Journal of Computer and Sytem Science, 38(3): , June V. Y. Pan and J. H. Reif. The parallel computation of minimum cot path in graph by tream contraction. Information Proceing Letter 40, 79-83, [R] R. Reichuk. Probabilitic parallel algorithm for orting and election. SIAM J. Comput., Vol. 14, No. 2, (May 1985). [S] [T] R. Seidel. On the all-pair-hortet-path problem. Proc. 24th ACM STOC, ACM Pre, (1992). T. Takaoka. A new upper bound on the complexity of the all pair hortet path problem. Info. Proce. Lett. 43, (1992). [V] L. G. Valiant. Parallelim in comparion problem. SIAM J. Comp., Vol. 4, No. 3, (Sept. 1975). 15

16 A 00 A 01 A 02 A 03 A 10 A 11 A 12 A 13 A 22 A 20 A 21 A 23 A 30 A 31 A 32 A 33 Fig t 0 1 t 1 2 t 0 t t 0 t t 0 7 Fig

Lecture 21. The Lovasz splitting-off lemma Topics in Combinatorial Optimization April 29th, 2004

Lecture 21. The Lovasz splitting-off lemma Topics in Combinatorial Optimization April 29th, 2004 18.997 Topic in Combinatorial Optimization April 29th, 2004 Lecture 21 Lecturer: Michel X. Goeman Scribe: Mohammad Mahdian 1 The Lovaz plitting-off lemma Lovaz plitting-off lemma tate the following. Theorem

More information

Preemptive scheduling on a small number of hierarchical machines

Preemptive scheduling on a small number of hierarchical machines Available online at www.ciencedirect.com Information and Computation 06 (008) 60 619 www.elevier.com/locate/ic Preemptive cheduling on a mall number of hierarchical machine György Dóa a, Leah Eptein b,

More information

LINEAR ALGEBRA METHOD IN COMBINATORICS. Theorem 1.1 (Oddtown theorem). In a town of n citizens, no more than n clubs can be formed under the rules

LINEAR ALGEBRA METHOD IN COMBINATORICS. Theorem 1.1 (Oddtown theorem). In a town of n citizens, no more than n clubs can be formed under the rules LINEAR ALGEBRA METHOD IN COMBINATORICS 1 Warming-up example Theorem 11 (Oddtown theorem) In a town of n citizen, no more tha club can be formed under the rule each club have an odd number of member each

More information

Myriad of applications

Myriad of applications Shortet Path Myriad of application Finding hortet ditance between location (Google map, etc.) Internet router protocol: OSPF (Open Shortet Path Firt) i ued to find the hortet path to interchange package

More information

Chapter 4. The Laplace Transform Method

Chapter 4. The Laplace Transform Method Chapter 4. The Laplace Tranform Method The Laplace Tranform i a tranformation, meaning that it change a function into a new function. Actually, it i a linear tranformation, becaue it convert a linear combination

More information

Theoretical Computer Science. Optimal algorithms for online scheduling with bounded rearrangement at the end

Theoretical Computer Science. Optimal algorithms for online scheduling with bounded rearrangement at the end Theoretical Computer Science 4 (0) 669 678 Content lit available at SciVere ScienceDirect Theoretical Computer Science journal homepage: www.elevier.com/locate/tc Optimal algorithm for online cheduling

More information

Optimal Coordination of Samples in Business Surveys

Optimal Coordination of Samples in Business Surveys Paper preented at the ICES-III, June 8-, 007, Montreal, Quebec, Canada Optimal Coordination of Sample in Buine Survey enka Mach, Ioana Şchiopu-Kratina, Philip T Rei, Jean-Marc Fillion Statitic Canada New

More information

Lecture 7: Testing Distributions

Lecture 7: Testing Distributions CSE 5: Sublinear (and Streaming) Algorithm Spring 014 Lecture 7: Teting Ditribution April 1, 014 Lecturer: Paul Beame Scribe: Paul Beame 1 Teting Uniformity of Ditribution We return today to property teting

More information

Unavoidable Cycles in Polynomial-Based Time-Invariant LDPC Convolutional Codes

Unavoidable Cycles in Polynomial-Based Time-Invariant LDPC Convolutional Codes European Wirele, April 7-9,, Vienna, Autria ISBN 978--87-4-9 VE VERLAG GMBH Unavoidable Cycle in Polynomial-Baed Time-Invariant LPC Convolutional Code Hua Zhou and Norbert Goertz Intitute of Telecommunication

More information

Social Studies 201 Notes for November 14, 2003

Social Studies 201 Notes for November 14, 2003 1 Social Studie 201 Note for November 14, 2003 Etimation of a mean, mall ample ize Section 8.4, p. 501. When a reearcher ha only a mall ample ize available, the central limit theorem doe not apply to the

More information

Moment of Inertia of an Equilateral Triangle with Pivot at one Vertex

Moment of Inertia of an Equilateral Triangle with Pivot at one Vertex oment of nertia of an Equilateral Triangle with Pivot at one Vertex There are two wa (at leat) to derive the expreion f an equilateral triangle that i rotated about one vertex, and ll how ou both here.

More information

Codes Correcting Two Deletions

Codes Correcting Two Deletions 1 Code Correcting Two Deletion Ryan Gabry and Frederic Sala Spawar Sytem Center Univerity of California, Lo Angele ryan.gabry@navy.mil fredala@ucla.edu Abtract In thi work, we invetigate the problem of

More information

Convex Hulls of Curves Sam Burton

Convex Hulls of Curves Sam Burton Convex Hull of Curve Sam Burton 1 Introduction Thi paper will primarily be concerned with determining the face of convex hull of curve of the form C = {(t, t a, t b ) t [ 1, 1]}, a < b N in R 3. We hall

More information

Social Studies 201 Notes for March 18, 2005

Social Studies 201 Notes for March 18, 2005 1 Social Studie 201 Note for March 18, 2005 Etimation of a mean, mall ample ize Section 8.4, p. 501. When a reearcher ha only a mall ample ize available, the central limit theorem doe not apply to the

More information

Avoiding Forbidden Submatrices by Row Deletions

Avoiding Forbidden Submatrices by Row Deletions Avoiding Forbidden Submatrice by Row Deletion Sebatian Wernicke, Jochen Alber, Jen Gramm, Jiong Guo, and Rolf Niedermeier Wilhelm-Schickard-Intitut für Informatik, niverität Tübingen, Sand 13, D-72076

More information

Problem Set 8 Solutions

Problem Set 8 Solutions Deign and Analyi of Algorithm April 29, 2015 Maachuett Intitute of Technology 6.046J/18.410J Prof. Erik Demaine, Srini Devada, and Nancy Lynch Problem Set 8 Solution Problem Set 8 Solution Thi problem

More information

Source slideplayer.com/fundamentals of Analytical Chemistry, F.J. Holler, S.R.Crouch. Chapter 6: Random Errors in Chemical Analysis

Source slideplayer.com/fundamentals of Analytical Chemistry, F.J. Holler, S.R.Crouch. Chapter 6: Random Errors in Chemical Analysis Source lideplayer.com/fundamental of Analytical Chemitry, F.J. Holler, S.R.Crouch Chapter 6: Random Error in Chemical Analyi Random error are preent in every meaurement no matter how careful the experimenter.

More information

Lecture 9: Shor s Algorithm

Lecture 9: Shor s Algorithm Quantum Computation (CMU 8-859BB, Fall 05) Lecture 9: Shor Algorithm October 7, 05 Lecturer: Ryan O Donnell Scribe: Sidhanth Mohanty Overview Let u recall the period finding problem that wa et up a a function

More information

arxiv: v1 [math.mg] 25 Aug 2011

arxiv: v1 [math.mg] 25 Aug 2011 ABSORBING ANGLES, STEINER MINIMAL TREES, AND ANTIPODALITY HORST MARTINI, KONRAD J. SWANEPOEL, AND P. OLOFF DE WET arxiv:08.5046v [math.mg] 25 Aug 20 Abtract. We give a new proof that a tar {op i : i =,...,

More information

ON THE APPROXIMATION ERROR IN HIGH DIMENSIONAL MODEL REPRESENTATION. Xiaoqun Wang

ON THE APPROXIMATION ERROR IN HIGH DIMENSIONAL MODEL REPRESENTATION. Xiaoqun Wang Proceeding of the 2008 Winter Simulation Conference S. J. Maon, R. R. Hill, L. Mönch, O. Roe, T. Jefferon, J. W. Fowler ed. ON THE APPROXIMATION ERROR IN HIGH DIMENSIONAL MODEL REPRESENTATION Xiaoqun Wang

More information

CS 170: Midterm Exam II University of California at Berkeley Department of Electrical Engineering and Computer Sciences Computer Science Division

CS 170: Midterm Exam II University of California at Berkeley Department of Electrical Engineering and Computer Sciences Computer Science Division 1 1 April 000 Demmel / Shewchuk CS 170: Midterm Exam II Univerity of California at Berkeley Department of Electrical Engineering and Computer Science Computer Science Diviion hi i a cloed book, cloed calculator,

More information

Clustering Methods without Given Number of Clusters

Clustering Methods without Given Number of Clusters Clutering Method without Given Number of Cluter Peng Xu, Fei Liu Introduction A we now, mean method i a very effective algorithm of clutering. It mot powerful feature i the calability and implicity. However,

More information

Copyright 1967, by the author(s). All rights reserved.

Copyright 1967, by the author(s). All rights reserved. Copyright 1967, by the author(). All right reerved. Permiion to make digital or hard copie of all or part of thi work for peronal or claroom ue i granted without fee provided that copie are not made or

More information

List Coloring Graphs

List Coloring Graphs Lit Coloring Graph February 6, 004 LIST COLORINGS AND CHOICE NUMBER Thomaen Long Grotzch girth 5 verion Thomaen Long Let G be a connected planar graph of girth at leat 5. Let A be a et of vertice in G

More information

7.2 INVERSE TRANSFORMS AND TRANSFORMS OF DERIVATIVES 281

7.2 INVERSE TRANSFORMS AND TRANSFORMS OF DERIVATIVES 281 72 INVERSE TRANSFORMS AND TRANSFORMS OF DERIVATIVES 28 and i 2 Show how Euler formula (page 33) can then be ued to deduce the reult a ( a) 2 b 2 {e at co bt} {e at in bt} b ( a) 2 b 2 5 Under what condition

More information

Math 273 Solutions to Review Problems for Exam 1

Math 273 Solutions to Review Problems for Exam 1 Math 7 Solution to Review Problem for Exam True or Fale? Circle ONE anwer for each Hint: For effective tudy, explain why if true and give a counterexample if fale (a) T or F : If a b and b c, then a c

More information

List coloring hypergraphs

List coloring hypergraphs Lit coloring hypergraph Penny Haxell Jacque Vertraete Department of Combinatoric and Optimization Univerity of Waterloo Waterloo, Ontario, Canada pehaxell@uwaterloo.ca Department of Mathematic Univerity

More information

New bounds for Morse clusters

New bounds for Morse clusters New bound for More cluter Tamá Vinkó Advanced Concept Team, European Space Agency, ESTEC Keplerlaan 1, 2201 AZ Noordwijk, The Netherland Tama.Vinko@ea.int and Arnold Neumaier Fakultät für Mathematik, Univerität

More information

Competitive Analysis of Task Scheduling Algorithms on a Fault-Prone Machine and the Impact of Resource Augmentation

Competitive Analysis of Task Scheduling Algorithms on a Fault-Prone Machine and the Impact of Resource Augmentation Competitive Analyi of Tak Scheduling Algorithm on a Fault-Prone Machine and the Impact of Reource Augmentation Antonio Fernández Anta a, Chryi Georgiou b, Dariuz R. Kowalki c, Elli Zavou a,d,1 a Intitute

More information

One Class of Splitting Iterative Schemes

One Class of Splitting Iterative Schemes One Cla of Splitting Iterative Scheme v Ciegi and V. Pakalnytė Vilniu Gedimina Technical Univerity Saulėtekio al. 11, 2054, Vilniu, Lithuania rc@fm.vtu.lt Abtract. Thi paper deal with the tability analyi

More information

arxiv: v2 [math.co] 11 Sep 2017

arxiv: v2 [math.co] 11 Sep 2017 The maximum number of clique in graph without long cycle Ruth Luo September 13, 017 arxiv:1701.0747v [math.co] 11 Sep 017 Abtract The Erdő Gallai Theorem tate that for k 3 every graph on n vertice with

More information

Electronic Theses and Dissertations

Electronic Theses and Dissertations Eat Tenneee State Univerity Digital Common @ Eat Tenneee State Univerity Electronic Thee and Diertation Student Work 5-208 Vector Partition Jennifer French Eat Tenneee State Univerity Follow thi and additional

More information

Solving Differential Equations by the Laplace Transform and by Numerical Methods

Solving Differential Equations by the Laplace Transform and by Numerical Methods 36CH_PHCalter_TechMath_95099 3//007 :8 PM Page Solving Differential Equation by the Laplace Tranform and by Numerical Method OBJECTIVES When you have completed thi chapter, you hould be able to: Find the

More information

4. Connectivity Connectivity Connectivity. Whitney's s connectivity theorem: (G) (G) (G) for special

4. Connectivity Connectivity Connectivity. Whitney's s connectivity theorem: (G) (G) (G) for special 4. Connectivity 4.. Connectivity Vertex-cut and vertex-connectivity Edge-cut and edge-connectivty Whitney' connectivity theorem: Further theorem for the relation of and graph 4.. The Menger Theorem and

More information

Comparing Means: t-tests for Two Independent Samples

Comparing Means: t-tests for Two Independent Samples Comparing ean: t-tet for Two Independent Sample Independent-eaure Deign t-tet for Two Independent Sample Allow reearcher to evaluate the mean difference between two population uing data from two eparate

More information

Chip-firing game and a partial Tutte polynomial for Eulerian digraphs

Chip-firing game and a partial Tutte polynomial for Eulerian digraphs Chip-firing game and a partial Tutte polynomial for Eulerian digraph Kévin Perrot Aix Mareille Univerité, CNRS, LIF UMR 7279 3288 Mareille cedex 9, France. kevin.perrot@lif.univ-mr.fr Trung Van Pham Intitut

More information

Primitive Digraphs with the Largest Scrambling Index

Primitive Digraphs with the Largest Scrambling Index Primitive Digraph with the Larget Scrambling Index Mahmud Akelbek, Steve Kirkl 1 Department of Mathematic Statitic, Univerity of Regina, Regina, Sakatchewan, Canada S4S 0A Abtract The crambling index of

More information

Chapter Landscape of an Optimization Problem. Local Search. Coping With NP-Hardness. Gradient Descent: Vertex Cover

Chapter Landscape of an Optimization Problem. Local Search. Coping With NP-Hardness. Gradient Descent: Vertex Cover Coping With NP-Hardne Chapter 12 Local Search Q Suppoe I need to olve an NP-hard problem What hould I do? A Theory ay you're unlikely to find poly-time algorithm Mut acrifice one of three deired feature

More information

RELIABILITY OF REPAIRABLE k out of n: F SYSTEM HAVING DISCRETE REPAIR AND FAILURE TIMES DISTRIBUTIONS

RELIABILITY OF REPAIRABLE k out of n: F SYSTEM HAVING DISCRETE REPAIR AND FAILURE TIMES DISTRIBUTIONS www.arpapre.com/volume/vol29iue1/ijrras_29_1_01.pdf RELIABILITY OF REPAIRABLE k out of n: F SYSTEM HAVING DISCRETE REPAIR AND FAILURE TIMES DISTRIBUTIONS Sevcan Demir Atalay 1,* & Özge Elmataş Gültekin

More information

General System of Nonconvex Variational Inequalities and Parallel Projection Method

General System of Nonconvex Variational Inequalities and Parallel Projection Method Mathematica Moravica Vol. 16-2 (2012), 79 87 General Sytem of Nonconvex Variational Inequalitie and Parallel Projection Method Balwant Singh Thakur and Suja Varghee Abtract. Uing the prox-regularity notion,

More information

SOLUTIONS TO ALGEBRAIC GEOMETRY AND ARITHMETIC CURVES BY QING LIU. I will collect my solutions to some of the exercises in this book in this document.

SOLUTIONS TO ALGEBRAIC GEOMETRY AND ARITHMETIC CURVES BY QING LIU. I will collect my solutions to some of the exercises in this book in this document. SOLUTIONS TO ALGEBRAIC GEOMETRY AND ARITHMETIC CURVES BY QING LIU CİHAN BAHRAN I will collect my olution to ome of the exercie in thi book in thi document. Section 2.1 1. Let A = k[[t ]] be the ring of

More information

Sampling and the Discrete Fourier Transform

Sampling and the Discrete Fourier Transform Sampling and the Dicrete Fourier Tranform Sampling Method Sampling i mot commonly done with two device, the ample-and-hold (S/H) and the analog-to-digital-converter (ADC) The S/H acquire a CT ignal at

More information

Yoram Gat. Technical report No. 548, March Abstract. A classier is said to have good generalization ability if it performs on

Yoram Gat. Technical report No. 548, March Abstract. A classier is said to have good generalization ability if it performs on A bound concerning the generalization ability of a certain cla of learning algorithm Yoram Gat Univerity of California, Berkeley Technical report No. 548, March 999 Abtract A claier i aid to have good

More information

3.1 The Revised Simplex Algorithm. 3 Computational considerations. Thus, we work with the following tableau. Basic observations = CARRY. ... m.

3.1 The Revised Simplex Algorithm. 3 Computational considerations. Thus, we work with the following tableau. Basic observations = CARRY. ... m. 3 Computational conideration In what follow, we analyze the complexity of the Simplex algorithm more in detail For thi purpoe, we focu on the update proce in each iteration of thi procedure Clearly, ince,

More information

Symmetric Determinantal Representation of Formulas and Weakly Skew Circuits

Symmetric Determinantal Representation of Formulas and Weakly Skew Circuits Contemporary Mathematic Symmetric Determinantal Repreentation of Formula and Weakly Skew Circuit Bruno Grenet, Erich L. Kaltofen, Pacal Koiran, and Natacha Portier Abtract. We deploy algebraic complexity

More information

Gain and Phase Margins Based Delay Dependent Stability Analysis of Two- Area LFC System with Communication Delays

Gain and Phase Margins Based Delay Dependent Stability Analysis of Two- Area LFC System with Communication Delays Gain and Phae Margin Baed Delay Dependent Stability Analyi of Two- Area LFC Sytem with Communication Delay Şahin Sönmez and Saffet Ayaun Department of Electrical Engineering, Niğde Ömer Halidemir Univerity,

More information

CHAPTER 6. Estimation

CHAPTER 6. Estimation CHAPTER 6 Etimation Definition. Statitical inference i the procedure by which we reach a concluion about a population on the bai of information contained in a ample drawn from that population. Definition.

More information

An Inequality for Nonnegative Matrices and the Inverse Eigenvalue Problem

An Inequality for Nonnegative Matrices and the Inverse Eigenvalue Problem An Inequality for Nonnegative Matrice and the Invere Eigenvalue Problem Robert Ream Program in Mathematical Science The Univerity of Texa at Dalla Box 83688, Richardon, Texa 7583-688 Abtract We preent

More information

UNIT 15 RELIABILITY EVALUATION OF k-out-of-n AND STANDBY SYSTEMS

UNIT 15 RELIABILITY EVALUATION OF k-out-of-n AND STANDBY SYSTEMS UNIT 1 RELIABILITY EVALUATION OF k-out-of-n AND STANDBY SYSTEMS Structure 1.1 Introduction Objective 1.2 Redundancy 1.3 Reliability of k-out-of-n Sytem 1.4 Reliability of Standby Sytem 1. Summary 1.6 Solution/Anwer

More information

V = 4 3 πr3. d dt V = d ( 4 dv dt. = 4 3 π d dt r3 dv π 3r2 dv. dt = 4πr 2 dr

V = 4 3 πr3. d dt V = d ( 4 dv dt. = 4 3 π d dt r3 dv π 3r2 dv. dt = 4πr 2 dr 0.1 Related Rate In many phyical ituation we have a relationhip between multiple quantitie, and we know the rate at which one of the quantitie i changing. Oftentime we can ue thi relationhip a a convenient

More information

Lecture 17: Analytic Functions and Integrals (See Chapter 14 in Boas)

Lecture 17: Analytic Functions and Integrals (See Chapter 14 in Boas) Lecture 7: Analytic Function and Integral (See Chapter 4 in Boa) Thi i a good point to take a brief detour and expand on our previou dicuion of complex variable and complex function of complex variable.

More information

Discrete Mathematics

Discrete Mathematics Dicrete Mathematic 310 (010) 334 3333 Content lit available at ScienceDirect Dicrete Mathematic journal homepage: www.elevier.com/locate/dic Rank number of grid graph Hannah Alpert Department of Mathematic,

More information

Suggested Answers To Exercises. estimates variability in a sampling distribution of random means. About 68% of means fall

Suggested Answers To Exercises. estimates variability in a sampling distribution of random means. About 68% of means fall Beyond Significance Teting ( nd Edition), Rex B. Kline Suggeted Anwer To Exercie Chapter. The tatitic meaure variability among core at the cae level. In a normal ditribution, about 68% of the core fall

More information

Online Parallel Scheduling of Non-uniform Tasks: Trading Failures for Energy

Online Parallel Scheduling of Non-uniform Tasks: Trading Failures for Energy Online Parallel Scheduling of Non-uniform Tak: Trading Failure for Energy Antonio Fernández Anta a, Chryi Georgiou b, Dariuz R. Kowalki c, Elli Zavou a,d,1 a Intitute IMDEA Network b Univerity of Cypru

More information

Laplace Transformation

Laplace Transformation Univerity of Technology Electromechanical Department Energy Branch Advance Mathematic Laplace Tranformation nd Cla Lecture 6 Page of 7 Laplace Tranformation Definition Suppoe that f(t) i a piecewie continuou

More information

Pikeville Independent Schools [ALGEBRA 1 CURRICULUM MAP ]

Pikeville Independent Schools [ALGEBRA 1 CURRICULUM MAP ] Pikeville Independent School [ALGEBRA 1 CURRICULUM MAP 20162017] Augut X X X 11 12 15 16 17 18 19 22 23 24 25 26 12 37 8 12 29 30 31 13 15 September 1 2 X 6 7 8 9 16 17 18 21 PreAlgebra Review Algebra

More information

Physics 741 Graduate Quantum Mechanics 1 Solutions to Final Exam, Fall 2014

Physics 741 Graduate Quantum Mechanics 1 Solutions to Final Exam, Fall 2014 Phyic 7 Graduate Quantum Mechanic Solution to inal Eam all 0 Each quetion i worth 5 point with point for each part marked eparately Some poibly ueful formula appear at the end of the tet In four dimenion

More information

DIFFERENTIAL EQUATIONS

DIFFERENTIAL EQUATIONS DIFFERENTIAL EQUATIONS Laplace Tranform Paul Dawkin Table of Content Preface... Laplace Tranform... Introduction... The Definition... 5 Laplace Tranform... 9 Invere Laplace Tranform... Step Function...4

More information

CS4800: Algorithms & Data Jonathan Ullman

CS4800: Algorithms & Data Jonathan Ullman CS800: Algorithm & Data Jonathan Ullman Lecture 17: Network Flow Chooing Good Augmenting Path Mar 0, 018 Recap Directed graph! = #, % Two pecial node: ource & and ink = ' Edge capacitie ( ) 9 5 15 15 ource

More information

Flag-transitive non-symmetric 2-designs with (r, λ) = 1 and alternating socle

Flag-transitive non-symmetric 2-designs with (r, λ) = 1 and alternating socle Flag-tranitive non-ymmetric -deign with (r, λ = 1 and alternating ocle Shenglin Zhou, Yajie Wang School of Mathematic South China Univerity of Technology Guangzhou, Guangdong 510640, P. R. China lzhou@cut.edu.cn

More information

Math Skills. Scientific Notation. Uncertainty in Measurements. Appendix A5 SKILLS HANDBOOK

Math Skills. Scientific Notation. Uncertainty in Measurements. Appendix A5 SKILLS HANDBOOK ppendix 5 Scientific Notation It i difficult to work with very large or very mall number when they are written in common decimal notation. Uually it i poible to accommodate uch number by changing the SI

More information

March 18, 2014 Academic Year 2013/14

March 18, 2014 Academic Year 2013/14 POLITONG - SHANGHAI BASIC AUTOMATIC CONTROL Exam grade March 8, 4 Academic Year 3/4 NAME (Pinyin/Italian)... STUDENT ID Ue only thee page (including the back) for anwer. Do not ue additional heet. Ue of

More information

66 Lecture 3 Random Search Tree i unique. Lemma 3. Let X and Y be totally ordered et, and let be a function aigning a ditinct riority in Y to each ele

66 Lecture 3 Random Search Tree i unique. Lemma 3. Let X and Y be totally ordered et, and let be a function aigning a ditinct riority in Y to each ele Lecture 3 Random Search Tree In thi lecture we will decribe a very imle robabilitic data tructure that allow inert, delete, and memberhi tet (among other oeration) in exected logarithmic time. Thee reult

More information

UNIQUE CONTINUATION FOR A QUASILINEAR ELLIPTIC EQUATION IN THE PLANE

UNIQUE CONTINUATION FOR A QUASILINEAR ELLIPTIC EQUATION IN THE PLANE UNIQUE CONTINUATION FOR A QUASILINEAR ELLIPTIC EQUATION IN THE PLANE SEPPO GRANLUND AND NIKO MAROLA Abtract. We conider planar olution to certain quailinear elliptic equation ubject to the Dirichlet boundary

More information

Design spacecraft external surfaces to ensure 95 percent probability of no mission-critical failures from particle impact.

Design spacecraft external surfaces to ensure 95 percent probability of no mission-critical failures from particle impact. PREFERRED RELIABILITY PAGE 1 OF 6 PRACTICES METEOROIDS & SPACE DEBRIS Practice: Deign pacecraft external urface to enure 95 percent probability of no miion-critical failure from particle impact. Benefit:

More information

A Constraint Propagation Algorithm for Determining the Stability Margin. The paper addresses the stability margin assessment for linear systems

A Constraint Propagation Algorithm for Determining the Stability Margin. The paper addresses the stability margin assessment for linear systems A Contraint Propagation Algorithm for Determining the Stability Margin of Linear Parameter Circuit and Sytem Lubomir Kolev and Simona Filipova-Petrakieva Abtract The paper addree the tability margin aement

More information

FUNDAMENTALS OF POWER SYSTEMS

FUNDAMENTALS OF POWER SYSTEMS 1 FUNDAMENTALS OF POWER SYSTEMS 1 Chapter FUNDAMENTALS OF POWER SYSTEMS INTRODUCTION The three baic element of electrical engineering are reitor, inductor and capacitor. The reitor conume ohmic or diipative

More information

ON A CERTAIN FAMILY OF QUARTIC THUE EQUATIONS WITH THREE PARAMETERS

ON A CERTAIN FAMILY OF QUARTIC THUE EQUATIONS WITH THREE PARAMETERS ON A CERTAIN FAMILY OF QUARTIC THUE EQUATIONS WITH THREE PARAMETERS VOLKER ZIEGLER Abtract We conider the parameterized Thue equation X X 3 Y (ab + (a + bx Y abxy 3 + a b Y = ±1, where a, b 1 Z uch that

More information

Markus A. Hitz and Erich Kaltofen. Adaption to symmetric RNS is not dicult, but destroys. some of the clarity in the descriptions.

Markus A. Hitz and Erich Kaltofen. Adaption to symmetric RNS is not dicult, but destroys. some of the clarity in the descriptions. Integer Diviion in eidue Number Sytem arku A. Hitz and Erich Kaltofen Abtract Thi contribution to the ongoing dicuion of diviion algorithm for reidue number ytem (NS) i baed on Neton iteration for computing

More information

Dimensional Analysis A Tool for Guiding Mathematical Calculations

Dimensional Analysis A Tool for Guiding Mathematical Calculations Dimenional Analyi A Tool for Guiding Mathematical Calculation Dougla A. Kerr Iue 1 February 6, 2010 ABSTRACT AND INTRODUCTION In converting quantitie from one unit to another, we may know the applicable

More information

Overflow from last lecture: Ewald construction and Brillouin zones Structure factor

Overflow from last lecture: Ewald construction and Brillouin zones Structure factor Lecture 5: Overflow from lat lecture: Ewald contruction and Brillouin zone Structure factor Review Conider direct lattice defined by vector R = u 1 a 1 + u 2 a 2 + u 3 a 3 where u 1, u 2, u 3 are integer

More information

Practice Problems - Week #7 Laplace - Step Functions, DE Solutions Solutions

Practice Problems - Week #7 Laplace - Step Functions, DE Solutions Solutions For Quetion -6, rewrite the piecewie function uing tep function, ketch their graph, and find F () = Lf(t). 0 0 < t < 2. f(t) = (t 2 4) 2 < t In tep-function form, f(t) = u 2 (t 2 4) The graph i the olid

More information

Multicolor Sunflowers

Multicolor Sunflowers Multicolor Sunflower Dhruv Mubayi Lujia Wang October 19, 2017 Abtract A unflower i a collection of ditinct et uch that the interection of any two of them i the ame a the common interection C of all of

More information

Pythagorean Triple Updated 08--5 Drlnoordzij@leennoordzijnl wwwleennoordzijme Content A Roadmap for generating Pythagorean Triple Pythagorean Triple 3 Dicuion Concluion 5 A Roadmap for generating Pythagorean

More information

Some Sets of GCF ϵ Expansions Whose Parameter ϵ Fetch the Marginal Value

Some Sets of GCF ϵ Expansions Whose Parameter ϵ Fetch the Marginal Value Journal of Mathematical Reearch with Application May, 205, Vol 35, No 3, pp 256 262 DOI:03770/jin:2095-26520503002 Http://jmredluteducn Some Set of GCF ϵ Expanion Whoe Parameter ϵ Fetch the Marginal Value

More information

SOME RESULTS ON INFINITE POWER TOWERS

SOME RESULTS ON INFINITE POWER TOWERS NNTDM 16 2010) 3, 18-24 SOME RESULTS ON INFINITE POWER TOWERS Mladen Vailev - Miana 5, V. Hugo Str., Sofia 1124, Bulgaria E-mail:miana@abv.bg Abtract To my friend Kratyu Gumnerov In the paper the infinite

More information

The machines in the exercise work as follows:

The machines in the exercise work as follows: Tik-79.148 Spring 2001 Introduction to Theoretical Computer Science Tutorial 9 Solution to Demontration Exercie 4. Contructing a complex Turing machine can be very laboriou. With the help of machine chema

More information

NCAAPMT Calculus Challenge Challenge #3 Due: October 26, 2011

NCAAPMT Calculus Challenge Challenge #3 Due: October 26, 2011 NCAAPMT Calculu Challenge 011 01 Challenge #3 Due: October 6, 011 A Model of Traffic Flow Everyone ha at ome time been on a multi-lane highway and encountered road contruction that required the traffic

More information

Design By Emulation (Indirect Method)

Design By Emulation (Indirect Method) Deign By Emulation (Indirect Method he baic trategy here i, that Given a continuou tranfer function, it i required to find the bet dicrete equivalent uch that the ignal produced by paing an input ignal

More information

ON A CERTAIN FAMILY OF QUARTIC THUE EQUATIONS WITH THREE PARAMETERS. Volker Ziegler Technische Universität Graz, Austria

ON A CERTAIN FAMILY OF QUARTIC THUE EQUATIONS WITH THREE PARAMETERS. Volker Ziegler Technische Universität Graz, Austria GLASNIK MATEMATIČKI Vol. 1(61)(006), 9 30 ON A CERTAIN FAMILY OF QUARTIC THUE EQUATIONS WITH THREE PARAMETERS Volker Ziegler Techniche Univerität Graz, Autria Abtract. We conider the parameterized Thue

More information

2 Hatad, Jukna & Pudlak gate, namely we hall tudy the ize of depth-three circuit. The technique we hall ue ha two ource. The rt one i a \nite" verion

2 Hatad, Jukna & Pudlak gate, namely we hall tudy the ize of depth-three circuit. The technique we hall ue ha two ource. The rt one i a \nite verion TOP-DOWN LOWER BOUNDS FOR DEPTH-THREE CIRCUITS J. Hatad, S. Jukna and P. Pudlak Abtract. We preent a top-down lower bound method for depth-three ^ _ :-circuit which i impler than the previou method and

More information

Chapter 2 Sampling and Quantization. In order to investigate sampling and quantization, the difference between analog

Chapter 2 Sampling and Quantization. In order to investigate sampling and quantization, the difference between analog Chapter Sampling and Quantization.1 Analog and Digital Signal In order to invetigate ampling and quantization, the difference between analog and digital ignal mut be undertood. Analog ignal conit of continuou

More information

Hardware Implementation of Canonic Signed Digit Recoding

Hardware Implementation of Canonic Signed Digit Recoding IOSR Journal of VLSI and Signal Proceing (IOSR-JVSP) Volume 6, Iue 2, Ver. I (Mar. -Apr. 2016), PP 11-15 e-issn: 2319 4200, p-issn No. : 2319 4197 www.iorjournal.org Hardware Implementation of Canonic

More information

Simple Observer Based Synchronization of Lorenz System with Parametric Uncertainty

Simple Observer Based Synchronization of Lorenz System with Parametric Uncertainty IOSR Journal of Electrical and Electronic Engineering (IOSR-JEEE) ISSN: 78-676Volume, Iue 6 (Nov. - Dec. 0), PP 4-0 Simple Oberver Baed Synchronization of Lorenz Sytem with Parametric Uncertainty Manih

More information

At the end of this lesson, the students should be able to understand:

At the end of this lesson, the students should be able to understand: Intructional Objective: At the end of thi leon, the tudent hould be able to undertand: Baic failure mechanim of riveted joint. Concept of deign of a riveted joint. 1. Strength of riveted joint: Strength

More information

Euler-Bernoulli Beams

Euler-Bernoulli Beams Euler-Bernoulli Beam The Euler-Bernoulli beam theory wa etablihed around 750 with contribution from Leonard Euler and Daniel Bernoulli. Bernoulli provided an expreion for the train energy in beam bending,

More information

Bogoliubov Transformation in Classical Mechanics

Bogoliubov Transformation in Classical Mechanics Bogoliubov Tranformation in Claical Mechanic Canonical Tranformation Suppoe we have a et of complex canonical variable, {a j }, and would like to conider another et of variable, {b }, b b ({a j }). How

More information

Secretary problems with competing employers

Secretary problems with competing employers Secretary problem with competing employer Nicole Immorlica 1, Robert Kleinberg 2, and Mohammad Mahdian 1 1 Microoft Reearch, One Microoft Way, Redmond, WA. {nickle,mahdian}@microoft.com 2 UC Berkeley Computer

More information

Tail estimates for sums of variables sampled by a random walk

Tail estimates for sums of variables sampled by a random walk Tail etimate for um of variable ampled by a random walk arxiv:math/0608740v mathpr] 11 Oct 006 Roy Wagner April 1, 008 Abtract We prove tail etimate for variable i f(x i), where (X i ) i i the trajectory

More information

Aggregating value ranges: preference elicitation and truthfulness

Aggregating value ranges: preference elicitation and truthfulness DOI 10.1007/10458-009-9118-5 Aggregating value range: preference elicitation and truthfulne Joeph Farfel Vincent Conitzer The Author() 009 Abtract We tudy the cae where agent have preference over range

More information

arxiv: v4 [math.co] 21 Sep 2014

arxiv: v4 [math.co] 21 Sep 2014 ASYMPTOTIC IMPROVEMENT OF THE SUNFLOWER BOUND arxiv:408.367v4 [math.co] 2 Sep 204 JUNICHIRO FUKUYAMA Abtract. A unflower with a core Y i a family B of et uch that U U Y for each two different element U

More information

Fermi Distribution Function. n(e) T = 0 T > 0 E F

Fermi Distribution Function. n(e) T = 0 T > 0 E F LECTURE 3 Maxwell{Boltzmann, Fermi, and Boe Statitic Suppoe we have a ga of N identical point particle in a box ofvolume V. When we ay \ga", we mean that the particle are not interacting with one another.

More information

The continuous time random walk (CTRW) was introduced by Montroll and Weiss 1.

The continuous time random walk (CTRW) was introduced by Montroll and Weiss 1. 1 I. CONTINUOUS TIME RANDOM WALK The continuou time random walk (CTRW) wa introduced by Montroll and Wei 1. Unlike dicrete time random walk treated o far, in the CTRW the number of jump n made by the walker

More information

Technical Appendix: Auxiliary Results and Proofs

Technical Appendix: Auxiliary Results and Proofs A Technical Appendix: Auxiliary Reult and Proof Lemma A. The following propertie hold for q (j) = F r [c + ( ( )) ] de- ned in Lemma. (i) q (j) >, 8 (; ]; (ii) R q (j)d = ( ) q (j) + R q (j)d ; (iii) R

More information

LDPC Convolutional Codes Based on Permutation Polynomials over Integer Rings

LDPC Convolutional Codes Based on Permutation Polynomials over Integer Rings LDPC Convolutional Code Baed on Permutation Polynomial over Integer Ring Marco B. S. Tavare and Gerhard P. Fettwei Vodafone Chair Mobile Communication Sytem, Dreden Univerity of Technology, 01062 Dreden,

More information

Some Applications of Spanning Trees in K s,t

Some Applications of Spanning Trees in K s,t Some Application of Spanning Tree in K,t L.H. Clark, A.T. Mohr, and T.D. Porter Department of Mathematic Southern Illinoi Univerity Carbondale, IL 62901-4408 tporter@math.iu.edu Abtract We partition the

More information

PIPELINED DIVISION OF SIGNED NUMBERS WITH THE USE OF RESIDUE ARITHMETIC FOR SMALL NUMBER RANGE WITH THE PROGRAMMABLE GATE ARRAY

PIPELINED DIVISION OF SIGNED NUMBERS WITH THE USE OF RESIDUE ARITHMETIC FOR SMALL NUMBER RANGE WITH THE PROGRAMMABLE GATE ARRAY POZNAN UNIVE RSITY OF TE CHNOLOGY ACADE MIC JOURNALS No 76 Electrical Engineering 03 Robert SMYK* Zenon ULMAN* Maciej CZYŻAK* PIPELINED DIVISION OF SIGNED NUMBERS WITH THE USE OF RESIDUE ARITHMETIC FOR

More information

Computers and Mathematics with Applications. Sharp algebraic periodicity conditions for linear higher order

Computers and Mathematics with Applications. Sharp algebraic periodicity conditions for linear higher order Computer and Mathematic with Application 64 (2012) 2262 2274 Content lit available at SciVere ScienceDirect Computer and Mathematic with Application journal homepage: wwweleviercom/locate/camwa Sharp algebraic

More information

Memoryle Strategie in Concurrent Game with Reachability Objective Λ Krihnendu Chatterjee y Luca de Alfaro x Thoma A. Henzinger y;z y EECS, Univerity o

Memoryle Strategie in Concurrent Game with Reachability Objective Λ Krihnendu Chatterjee y Luca de Alfaro x Thoma A. Henzinger y;z y EECS, Univerity o Memoryle Strategie in Concurrent Game with Reachability Objective Krihnendu Chatterjee, Luca de Alfaro and Thoma A. Henzinger Report No. UCB/CSD-5-1406 Augut 2005 Computer Science Diviion (EECS) Univerity

More information

CONTROL SYSTEMS, ROBOTICS AND AUTOMATION Vol. VIII Decoupling Control - M. Fikar

CONTROL SYSTEMS, ROBOTICS AND AUTOMATION Vol. VIII Decoupling Control - M. Fikar DECOUPLING CONTROL M. Fikar Department of Proce Control, Faculty of Chemical and Food Technology, Slovak Univerity of Technology in Bratilava, Radlinkého 9, SK-812 37 Bratilava, Slovakia Keyword: Decoupling:

More information