Faster exact computation of rspr distance
|
|
- Theodora Boyd
- 5 years ago
- Views:
Transcription
1 DOI /s Faster exact comptation of rspr distance Zhi-Zhong Chen Ying Fan Lsheng Wang Springer Science+Bsiness Media New Yk 2013 Abstract De to hybridiation eents in eoltion, stdying two different genes of a set of species may yield two related bt different phylogenetic trees f the set of species. In this case, we want to measre the dissimilarity of the two trees. The rooted sbtree prne and regraft (rspr) distance of the two trees has been sed f this prpose, and many algithms and software tools hae been deeloped f compting the rspr distance of two gien phylogenetic trees. The preiosly fastest exact algithm f this problem rns in O ( d n ) time, where n and d are the nmber of leaes and the rspr distance of the inpt trees, respectiely. In this paper, we present a faster exact algithm which rns in O ( d n ) time. Or experiments show that the new algithm is significantly faster than the newest ersion (namely, 1.1.1) of the preiosly best software (namely, rspr) f RSPR distance. Keywds Phylogenetic tree rspr distance Fixed-parameter algithm Z.-Z. Chen (B) Diision of Infmation System Design, Tokyo Denki Uniersity, Ishiaka, Hatoyama, Hiki, Saitama , Japan chen@mail.dendai.ac.jp Y. Fan L. Wang Department of Compter Science, City Uniersity of Hong Kong, Tat Chee Aene, Kowloon, Hong Kong SAR yingying1988@gmail.com L. Wang cswangl@city.ed.hk
2 1 Introdction When stdying the eoltionary histy of a set of existing species, one can obtain a phylogenetic tree of the set of species with high confidence by looking at a segment of seqences a set of genes (Ma et al. 1999; Ma and Zhang 2011). When looking at another segment of seqences, a different phylogenetic tree can be obtained with high confidence, too. In this case, we want to measre the dissimilarity of the two trees. The rooted sbtree prne and regraft (rspr) distance of the two trees has been sed f this prpose (Hein et al. 1996). Unftnately, it is NP-hard to compte the rspr distance of two gien phylogenetic trees (Bdewich and Semple 2005; Hein et al. 1996). So, it is challenging to deelop programs that can compte the rspr distance of two gien trees of large rspr distance. Indeed, this has motiated researchers to design approximation algithms (Bonet et al. 2006; Bdewich et al. 2008; Hein et al. 1996; Rodriges et al. 2007) exact algithms (Bdewich and Semple 2005; W 2009; Whidden and Zeh 2009; Whidden et al. 2010), as well as heristic algithms (Beiko and Hamilton 2006; Goloboff 2007; Hill et al. 2010; MacLeod et al. 2005; Than et al. 2008), f compting the rspr distance of two gien trees. In particlar, Gasieniec et al. (1999) show that rspr distance is hard to approximate. The preiosly fastest exact algithm is de to Whidden et al. (2010) and rns in O ( d n ) time, where n and d are the nmber of leaes and the rspr distance of the inpt trees, respectiely. Recently, we hae shown that a fast exact algithm f rspr distance can be sed to speed p the comptation of hybridiation nmber and the constrction of minimm hybridiation netwks (Chen and Wang 2012). In this paper, we present a faster exact algithm which rns in O ( d n ) time. Or algithm bilds on Whidden et al. s bt reqires a nmber of new ideas. The main idea is to repeatedly find a pair of sibling leaes in one of the inpt trees me careflly. We hae implemented the algithm and also applied it to other related problems sch as the problem of compting the hybridiation nmber of two me phylogenetic trees. The experimental reslts are presented in Chen and Wang (2013), where a bg in the ersion of Whidden et al. s RSPR is also pointed ot. Sbseqently, Whidden et al. fixed the bg and released the newest ersion (namely, 1.1.1) of RSPR. Inthe release of the bggy ersion 1.1.0, they also conjectre that their algithm rns in O ( 2 d n ) time. Unftnately, the crected ersion is slower than and we dobt that their conjectre is tre. Indeed, the rnning time of the preiosly fastest algithm f rspr distance remained to be O ( d n ). Althogh the wst-case time bond O ( d n ) of new algithm may look marginally better than the wst-case time bond O ( d n ) of Whidden et al. s, experiments show that een when d is not large (say, d 50), new algithm is significantly faster than the newest ersion of Whidden et al. s RSPR f randomly generated instances. A possible explanation f this phenomenon is that the best case f algithm is not considered in Whidden em et al. s algithm and it occrs qite often when the inpt is randomly generated. The remainder of this paper is ganied as follows. In Sect. 2, we gie the basic definitions that will be sed throghot the paper. In Sect. 3, we sketch Whidden
3 et al. s algithm f rspr distance, becase new algithm f rspr distance will bild on theirs. In Sect. 4, we otline algithm f rspr distance. In Sect. 5, we detail a main step in algithm f rspr distance. In Sect. 6, we analye the time complexity of algithm f rspr distance. Finally, we compare the perfmance of new algithm with that of Whidden et al. s RSPR in Sect Preliminaries Throghot this paper, a rooted fest always means a directed acyclic graph in which eery node has in-degree at most 1 and ot-degree at most 2. Let F be a rooted fest. The roots (respectiely, leaes) of F are those nodes whose in-degrees (respectiely, ot-degrees) are 0. A leaf of F is a root leaf if it is also a root of F. Thesie of F, denoted by F, is the nmber of roots in F mins 1. A node of F is nifrcate if it has only one child in F. If a root of F is nifrcate, then contracting in F is the operation that modifies F by deleting. If a non-root node of F is nifrcate, then contracting in F is the operation that modifies F by first adding an edge from the parent of to the child of and then deleting. F conenience, we iew each node of F as an ancest and descendant of itself. F a node of F, thesbtree F of F rooted at is the sbgraph of F whose nodes are the descendants of in F and whose edges are those edges connecting two descendants of in F.If is a non-root node of F, then F is called a pendant sbtree of F. On the other hand, if is a root of F, then F is a component tree of F. F is a rooted tree if it has only one root. If and are two leaes in the same component tree of F, then the pendant sbtrees of F between and are the pendant sbtrees whose roots w satisfy that the (ndirected) path between and in F does not contain w bt contains the parent of w. IfU is a set of leaes in a component tree of F, then LCA F U denotes the lowest common ancest (LCA) of the leaes in U. A rooted binary fest is a rooted fest in which the ot-degree of eery non-leaf node is 2. Let F be a rooted binary fest. F is a rooted binary tree if it has only one root. If is a non-root node of F with parent p and sibling, then detaching the pendant sbtree with root is the operation that modifies F by first deleting the edge ( p, ) and then contracting p. A detaching operation on F is the operation of detaching a pendant sbtree of F. If is a root leaf of F, then eliminating from F is the operation that modifies F by simply deleting. On the other hand, if is a non-root leaf of F, then eliminating from F is the operation that modifies F by first detaching the sbtree rooted at and then deleting. A phylogenetic tree on a set X of species is a rooted binary tree whose leaf set is X. LetT 1 and T 2 be two phylogenetic trees on the same set X of species. If we can apply a seqence of detaching operations on each of T 1 and T 2 so that they become the same fest F, then we refer to F as an agreement fest (AF) of T 1 and T 2.A maximm agreement fest (MAF) of T 1 and T 2 is an agreement fest of T 1 and T 2 whose sie is minimied oer all agreement fests of T 1 and T 2. The sie of an MAF of T 1 and T 2 is called the rspr distance between T 1 and T 2.
4 3 Sketch of Whidden et al. s algithm f rspr distance In this section, we sketch the preiosly fastest algithm [de to Whidden et al. (2010)] f compting the rspr distance of two gien phylogenetic trees. Whidden et al. s algithm indeed soles the following problem (denoted by rsprdc, f conenience): Inpt (k, T 1, ), where k is a nonnegatie integer, T 1 is a phylogenetic tree on a set X of species, and is a rooted fest obtained from some phylogenetic tree T 2 on X by perfming ero me detaching operations. Otpt Yes if perfming k me detaching operations on leads to an AF of T 1 and T 2 ; no otherwise. Obiosly, to compte the rspr distance between two gien phylogenetic trees T 1 and T 2, it sffices to sole rsprdc on inpt (k, T 1, T 2 ) f k = 0, 1, 2, (in this der), ntil a yes is otptted. Note that the inpt integer k to rsprdc mst be nonnegatie. So, eery time befe we call an algithm A f rsprdc on an inpt (k, T 1, ), we need to check if k 0. If k 0, we proceed to call A on inpt (k, T 1, ); otherwise, we do not make the call. Howeer, in der to keep the description of A simpler, we do not explicitly mention this checking process when we describe A. Whidden et al. s algithm f rsprdc is recrsie and proceeds as follows. In the base case, k = 0 and it sffices to check if each component tree of is a pendant sbtree of T 1. If each component tree of is a pendant sbtree of T 1, then we otpt yes and stop. Otherwise, we otpt no and retrn. So, sppose that k > 0. Then, wheneer T 1 has two sibling leaes and sch that and are also sibling leaes in, we modify T 1 and by merging and into a single leaf (say, ). Meoer, wheneer has a root that is also a leaf, we modify T 1 and by eliminating from them. We repeat these two types of modifications of T 1 and ntil none of them is possible. After that, if becomes empty, then we can otpt yes and stop. Otherwise, we select two arbitrary sibling leaes and in T 1 and se them to distingish three cases as follows. Case 1: and are in different component trees of. In this case, in der to transfm T 1 and into identical fests, it sffices to try two choices to modify them, namely, by either eliminating eliminating. F each choice, we frther recrsiely sole rsprdc on inpt (k 1, T 1, ). So, we make two recrsie calls here. Case 2: and are in the same component tree of and either (I) and the parent of are siblings in (II) and the parent of are siblings in. See Fig. 1. In this case, if (I) [(respectiely, (II)] holds, then in der to transfm T 1 and into identical fests with the minimm nmber of detaching operations, it sffices to modify by detaching the sbtree rooted at the sibling w of (respectiely, ), and frther recrsiely sole rsprdc on inpt (k 1, T 1, ) Whidden et al. (2010). So, we make only one recrsie call here. Case 3: and are in the same component tree of and neither (I) n (II) in Case 2 holds. In this case, in der to transfm T 1 and into identical fests, it sffices to try three choices to modify them. The first two choices are the same as those in Case 1. In the third choice, we cont the nmber b of pendant sbtrees of
5 T 1 (1) w Fig. 1 The best case in Whidden et al. s algithm: 1 The sbtree of T 1 rooted at the parent of and, 2 The sbtree of rooted at the LCA of and, where each black triangle indicates a pendant sbtree of (2) w T 1 Fig. 2 The wst case in Whidden et al. s algithm, where each black triangle indicates a pendant sbtree of between and, modify by detaching the pendant sbtrees between and, and recrsiely sole rsprdc on inpt (k b, T 1, ). Note that b 2 and we make three recrsie calls here. Let t(k) be the time needed by the algithm to sole rsprdc on inpt (k, T 1, ). Whidden et al. (2010) show that t(k) = x k n, where n is the nmber of leaes in T 1 and x is the smallest real nmber satisfying the ineqality x 2 2x + 1. Intitiely speaking, this ineqality iginates from Case 3 aboe where b = 2 (see Fig. 2). Since x = 1 + 2, their algithm rns in O ( k n ) time. 4 Ideas f improing Whidden et al. s algithm Like Whidden et al. s Algithm, algithm f rsprdc will be recrsie. So, its exection on inpt (k, T 1, ) can be modeled by a tree Ɣ in which the root cresponds to (k, T 1, ), each other node cresponds to a recrsie call, and a recrsie call A is a child of another call B if and only if B calls A directly. We call Ɣ the search tree on inpt (k, T 1, ). F conenience, we define the sie of Ɣ to be the nmber of its nodes. The depth of a node in Ɣ is the distance between the root and in Ɣ. In particlar, the depth of the root is 0. The depth of Ɣ is the maximm depth of a node in Ɣ. In the remainder of this paper, s(k) denotes the maximm sie of a search tree of algithm on inpt (k, T 1, ), where the maximm is taken oer all T 1 and. Clearly, we hae s(0) = 1 and s(k) = 0 f k < 0. (4.1) To improe Whidden et al. s algithm, idea is to find two sibling leaes and in T 1 me careflly as follows. Step 1. Case 2 in Sect. 3 isthe best case in Whidden et al. s algithm becase we make only one recrsie call in this case. So, we first try to find two sibling leaes and (in T 1 ) satisfying the condition in the best case (cf. Fig. 1). If sch two sibling leaes and exist in T 1, then we se them to modify and frther recrsiely sole
6 Fig. 3 The best case in algithm T 1 p q q q rsprdc as in Case 2 of Whidden et al. s algithm. Clearly, the following ineqality holds in this case: s(k) s(k 1) + 1. (4.2) We hereafter assme that this case does not occr. Step 2. We then try to find two sibling leaes and (in T 1 ) sch that the sibling q of the parent of and in T 1 is also a leaf of T 1 and either (1) and q are sibling leaes in (2) and q are sibling leaes in (see Fig. 3). If sch two sibling leaes and exist in T 1, then we say that the best case in algithm occrs becase this case is essentially symmetric to the best case in Whidden et al. s algithm 1. So, if sch two sibling leaes and exist in T 1 and (1) [(respectiely, (2)] holds, then we can modify T 1 and by eliminating (respectiely, ) from them, and frther recrsiely sole rsprdc on inpt (k 1, T 1, ). Clearly, Ineqality 4.2 holds in this case. We hereafter assme that this case does not occr. Step 3. We try to find two sibling leaes and (in T 1 ) satisfying the condition in Case 1 of Whidden et al. s algithm. If sch two sibling leaes and exist in T 1, then we se them to modify T 1 and and frther recrsiely sole rsprdc as in Case 1 of Whidden et al. s algithm. Clearly, the following ineqality holds in this case: s(k) 2s(k 1) + 1. (4.3) We hereafter assme that this case does not occr. Step 4. We try to find two sibling leaes and (in T 1 ) sch that there are at least three pendant sbtrees of between and. If sch two sibling leaes and exist in T 1, then we se them to modify and frther recrsiely sole rsprdc as in Case 3 of Whidden et al. s algithm. Clearly, the following ineqality holds in this case: s(k) 2s(k 1) + s(k 3) + 1. (4.4) We hereafter assme that this case does not occr. Step 5. We select two sibling leaes and (in T 1 ) whose distance from the root of T 1 is maximied. By Steps 1, 3, and 4, has exactly two pendant sbtrees between and. Letq be the sibling of the parent of and in T 1. By choice of and, it follows that either q is a leaf both children and of q in T 1 are leaes (see Fig. 4). So, we hae two cases to consider. Since both cases are complicated, we detail them in the next section. 1 In other wds, we can se a similar argment of Whidden et al. (2010) to proe the crectness of the processing of T 1 and in this case.
7 Fig. 4 The two possible cases f two sibling leaes and farthest from the root T 1 p q T 1 p q Fig. 5 The two possible cases of f two sibling leaes in T 1, where each black triangle indicates a pendant sbtree of (1) (2) 5 Details of step 5 in Sect. 4 In this section, we detail Step 5 in Sect. 4. By the assmptions in Steps 1 throgh 4 in Sect. 4, we know that f two arbitrary sibling leaes and in T 1, = LCA F2 {,} satisfies exactly one of the following conditions: C1. is the grandparent of both and in [see Fig. 5(1)]. C2. is the parent of one of and and is the great-grandparent of the other in [see Fig. 5(2)]. Recall that in Step 5, we first select two sibling leaes and (in T 1 ) whose distance from the root of T 1 is maximied. Let p be the parent of and in T 1 and q be the sibling of p in T 1. By choice of and, it follows that either q is a leaf both children of q in T 1 are leaes (see Fig. 4). So, we hae two cases to consider. The difficlty is how to se and to modify T 1 and/ and frther recrsiely sole rsprdc. In Sect. 5.1, we detail how to do this in the case where q is a leaf. The other case is detailed in Sect When analying a case in the two sections, we always make the following assmption: Assmption 1 None of the preios cases occrs. 5.1 The case where q is a leaf Since and are sibling leaes in T 1, the assmptions in Steps 1 throgh 4 in Sect. 4 imply that and q are not sibling leaes in and neither are and q in. Since (respectiely, ) and q are not sibling leaes in, the (ndirected) path between (respectiely, ) and q contains at least three edges if q belongs to the component tree of that contains and. We can also assme that the distance from to is not shter than the distance from to, where = LCA F2 {,}. So, one of the following cases occrs. Case 1.1: q does not belong to the same component tree of as and (see Fig. 6). In this case, idea f speeding p Whidden et al. s algithm is as follows. Basically, we emlate Whidden et al. s algithm by sing the sibling pair (,) to try three different choices of modifying T 1 and. The first choice is to eliminate from T 1 and. A crcial point is that after the elimination of, we know that and
8 Fig. 6 The sbtrees of rooted at LCA F2 {,} and q in Case 1.1, where each black triangle indicates a pendant sbtree q q q become a new sibling pair of T 1 and they belong to different component trees of, implying that we need to se the pair (, q) to frther try two different choices of modifying T 1 and (namely, eliminating either q from T 1 and ). So, the first choice leads to two ways of modifying T 1 and one of which is to eliminate and from T 1 and and the other is to eliminate and q from T 1 and. Similarly, the second choice is to eliminate from T 1 and and it leads to two ways of modifying T 1 and one of which is to eliminate and from T 1 and and the other is to eliminate and q from T 1 and. Note that the first and the second choices lead to f ways of modifying T 1 and and hence lead to f recrsie calls. The really crcial point here is that the f recrsie calls can be redced to three, becase two of them are identical. Finally, the third choice is to modify by detaching the pendant sbtrees between and. In smmary, in der to transfm T 1 and into identical fests, it sffices to try the following f different choices to modify them and frther make recrsie calls: 1. We eliminate and from T 1 and, and then recrsiely sole rsprdc on inpt (k 2, T 1, ). 2. We eliminate and q from T 1 and, and then recrsiely sole rsprdc on inpt (k 2, T 1, ). 3. We eliminate and q from T 1 and, and then recrsiely sole rsprdc on inpt (k 2, T 1, ). 4. We detach the two pendant sbtrees of between and, and then recrsiely sole rsprdc on inpt (k 2, T 1, ). Clearly, the following ineqality holds in this case: s(k) 4s(k 2) + 1. (5.1) Case 1.2: LCA F2 {,} is not an ancest of q in (see Fig. 7). In this case, in der to transfm T 1 and into identical fests, it sffices to try f different choices to modify them and frther make recrsie calls: 1. We eliminate from T 1 and, and then recrsiely sole rsprdc on inpt (k 1, T 1, ). Fig. 7 A ption of in Case 1.2, where each ig-ag line indicates a path containing at least one edge and each black triangle indicates a pendant sbtree q q
9 q q q (1) (2) (3) Fig. 8 (1) The sbtree of rooted at LCA F2 {,} in Case 1.3, (2) the sitation in Case 1.3 immediately after eliminating from, and (3) the sitation in Case 1.3 immediately after eliminating from, where each black triangle indicates a pendant sbtree 2. We eliminate and q from T 1 and, and then recrsiely sole rsprdc on inpt (k 2, T 1, ). 3. We first eliminate from T 1 and.letb be the nmber of pendant sbtrees of between and q. Note that b 2. We then detach the b pendant sbtrees of between and q. After that, we recrsiely sole rsprdc on inpt (k 1 b, T 1, ). 4. We detach the two pendant sbtrees of between and, and then recrsiely sole rsprdc on inpt (k 2, T 1, ). Clearly, the following ineqality holds in this case: s(k) s(k 1) + 2s(k 2) + s(k 3) + 1. (5.2) Case 1.3: The (ndirected) path between and q in contains exactly three edges and so does the (ndirected) path between and q in [(see Fig. 8(1)]. In der to transfm T 1 and into identical fests, it sffices to try three difference choices to modify them and frther make recrsie calls: 1. We first eliminate from T 1 and [see Fig. 8(2)]. Then, the best case in Whidden et al. s algithm occrs. Me precisely, we can frther detach the sbtree of rooted at the sibling of q. After that, we recrsiely sole rsprdc on inpt (k 2, T 1, ). 2. We first eliminate from T 1 and (see Fig. 8(3)]. Then, the best case in Whidden et al. s algithm occrs. Me precisely, we can frther detach the sbtree of rooted at the sibling of. After that, we recrsiely sole rsprdc on inpt (k 2, T 1, ). 3. We detach the two pendant sbtrees of between and, and frther recrsiely sole rsprdc on inpt (k 2, T 1, ). Clearly, the following ineqality holds in this case: s(k) 3s(k 2) + 1. (5.3) Case 1.4: The (ndirected) path P,q between and q in is not shter than the (ndirected) path between and q in (see Fig. 9). In this case, Assmption 1 implies that P, contains at least f edges, and we proceed as in Case 1.2. Case 1.5: The (ndirected) path between and q in is shter than the (ndirected) path P,q between and q in (see Fig. 10). In this case, Assmption 1
10 Fig. 9 A ption of in Case 1.4, where each ig-ag line indicates a path containing at least one edge and each black triangle indicates a pendant sbtree q q Fig. 10 A ption of in Case 1.5, where each ig-ag line indicates a path containing at least one edge and each black triangle indicates a pendant sbtree q q implies that P,q contains at least f edges. In der to transfm T 1 and into identical fests, it sffices to try f different choices to modify them and frther make recrsie calls: 1. We eliminate from T 1 and, and then recrsiely sole rsprdc on inpt (k 1, T 1, ). 2. We eliminate and q from T 1 and, and then recrsiely sole rsprdc on inpt (k 2, T 1, ). 3. We first eliminate from T 1 and.letb be the nmber of pendant sbtrees of between and q. Note that b 2. We then detach the b pendant sbtrees of between and q. After that, we recrsiely sole rsprdc on inpt (k 1 b, T 1, ). 4. We detach the two pendant sbtrees of between and, and then recrsiely soling rsprdc on inpt (k 2, T 1, ). Clearly, Ineqality 5.2 holds in this case. 5.2 The case where q is a non-leaf Let and be the children of q in T 1.Let = LCA F2 {,} and = LCA F2 {, }. By the assmptions in Steps 1 throgh 4 in Sect. 4, we know that Condition C1 C2 holds f and and also f and. We can also assme that the distance from to in is not shter than the distance from to in. Similarly, we can frther assme that the distance from to in is not shter than the distance from to in. So, one of the following cases occrs. Case 2.1: and belong to different component trees of (see Fig. 11). In this case, in der to transfm T 1 and into identical fests, it sffices to try eleen different choices to modify them and make recrsie calls as follows. 1. We modify T 1 and as follows. First, we eliminate and from T 1 and. Then, and become two sibling leaes in T 1. The crcial point is that and belong to different component trees in. We proceed to frther modify T 1 and in two different ways and accdingly make two recrsie calls as in Case 1 in Whidden et al. s algithm. In me detail, the two recrsie calls sole rsprdc on inpt
11 Fig. 11 The sbtrees of rooted at and in Case 2.1, where each black triangle indicates a pendant sbtree (k 3, T 1, ) and (k 3, T 1, ), respectiely. Intitiely speaking, we are able to aoid the wst case in Whidden et al. s algithm when processing the sibling leaes and. 2. We modify T 1 and similarly as in Item 1. The only difference is that we first eliminate and from T 1 and and then proceed to se the sibling leaes and to frther modify T 1 and in two different ways and accdingly make two recrsie calls as in Case 1 in Whidden et al. s algithm. 3. We modify T 1 and as follows. First, we eliminate from T 1 and. Then, we detach the two pendant sbtrees of between and. After these modifications, we recrsiely sole rsprdc on inpt (k 3, T 1, ). 4. We modify T 1 and as in Item 1. The only difference is that we first eliminate and from T 1 and and then proceed to se the sibling leaes and to frther modify T 1 and in two different ways and accdingly make two recrsie calls as in Case 1 in Whidden et al. s algithm. 5. We modify T 1 and similarly as in Item 1. The only difference is that we first eliminate and from T 1 and and then proceed to se the sibling leaes and to frther modify T 1 and in two different ways and accdingly make two recrsie calls as in Case 1 in Whidden et al. s algithm. 6. We modify T 1 and as follows. First, we eliminate from T 1 and. Then, we detach the two pendant sbtrees of between and. After these modifications, we recrsiely sole rsprdc on inpt (k 3, T 1, ). 7. We modify by detaching the two pendant sbtrees of between and.after these modifications, we recrsiely sole rsprdc on inpt (k 2, T 1, ). Clearly, the following ineqality holds in this case: s(k) s(k 2) + 10s(k 3) + 1. (5.4) Case 2.2: is neither an ancest n a descendant of in. In this case, we can frther assme that wheneer Condition C2 holds f and, it holds f and as well. See Fig. 12. We next distingish two sbcases as follows. Case 2.2.1: and are not siblings in Condition C1 holds f and. In this case, in der to transfm T 1 and into identical fests, it sffices to try fifteen different choices to modify them and make recrsie calls as follows.
12 (1) (2) Fig. 12 A ption of T 1 and in Case 2.2, where each black triangle indicates a pendant sbtree and each ig-ag line indicates a path containing at least one edge T 1 (1) (2) (3) Fig. 13 A ption of T 1 and in Case 2.2 immediately after eliminating and from T 1 and,where each black triangle indicates a pendant sbtree and each ig-ag line indicates a path containing at least one edge 1. We modify T 1 and as follows. First, we eliminate and from T 1 and (see Fig. 13). Then, and become two sibling leaes in T 1.Letb be the nmber of pendant sbtrees of between and. The crcial point is that b 3. We proceed to frther modify T 1 and in three different ways and accdingly make three recrsie calls as in Case 3 in Whidden et al. s algithm. In me detail, the three recrsie calls sole rsprdc on inpt (k 3, T 1, ), (k 3, T 1, ), and (k 2 b, T 1, ), respectiely. Intitiely speaking, we are able to aoid the wst case in Whidden et al. s algithm when processing the sibling leaes and. 2. We modify T 1 and similarly as in Item 1. The only difference is that we first eliminate and from T 1 and (so that and become siblings in T 1 and the nmber b of pendant sbtrees of between and is at least 4) and then proceed to se the sibling leaes and to frther modify T 1 and in three different ways and accdingly make three recrsie calls as in Case 3 in Whidden em et al. s algithm. 3. We modify T 1 and as follows. First, we eliminate from T 1 and. Then, we detach the two pendant sbtrees of between and. After these modifications, we recrsiely sole rsprdc on inpt (k 3, T 1, ). 4. We modify T 1 and similarly as in Item 1. The only difference is that we first eliminate and from T 1 and (so that and become siblings in T 1 and the nmber b of pendant sbtrees of between and is at least 4) and then proceed to se the sibling leaes and to frther modify T 1 and in three different ways and accdingly make three recrsie calls as in Case 3 in Whidden et al. s algithm. 5. We modify T 1 and similarly as in Item 1. The only difference is that we first eliminate and from T 1 and (so that and become siblings in T 1 and the
13 Fig. 14 A ption of T 1 and in Case 2.2.2, where each black triangle indicates a pendant sbtree T 1 nmber b of pendant sbtrees of between and is at least 4) and then proceed to se the sibling leaes and to frther modify T 1 and in three different ways and accdingly make three recrsie calls as in Case 3 in Whidden et al. s algithm. 6. We modify T 1 and as follows. First, we eliminate from T 1 and. Then, we detach the two pendant sbtrees of between and. After these modifications, we recrsiely sole rsprdc on inpt (k 3, T 1, ). 7. We modify by detaching the two pendant sbtrees of between and.after these modifications, we recrsiely sole rsprdc on inpt (k 2, T 1, ). Clearly, the following ineqality holds in this case: s(k) s(k 2) + 10s(k 3) + s(k 5) + 3s(k 6) + 1. (5.5) Case 2.2.2: and are siblings in and Condition C2 holds f and. In this case, in der to transfm T 1 and into identical fests, it sffices to try fifteen different choices to modify them and make recrsie calls as follows. 1. We modify T 1 and similarly as in Item 1 in Case The only difference is that after eliminating and from T 1 and, the nmber b of pendant sbtrees of between and is We modify T 1 and similarly as in Item 2 in Case The only difference is that after eliminating and from T 1 and, the nmber b of pendant sbtrees of between and is We modify T 1 and as follows. First, we eliminate from T 1 and. Then, we detach the two pendant sbtrees of between and.now, and are siblings in both T 1 and. So, we modify T 1 and by merging and into a single leaf (say, ). As can be seen from Fig. 14, the best case in Whidden et al. s algithm occrs. Me precisely, we can frther detach the sbtree of rooted at the sibling of. After that, we recrsiely sole rsprdc on inpt (k 4, T 1, ). 4. We modify T 1 and similarly as in Item 4 in Case The only difference is that after eliminating and from T 1 and, the nmber b of pendant sbtrees of between and is Same as Item 5 in Case Same as Item 6 in Case Same as Item 7 in Case Clearly, the following ineqality holds in this case: s(k) s(k 2) + 9s(k 3) + 2s(k 4) + 2s(k 5) + s(k 6) + 1. (5.6)
14 Fig. 15 Thesbtreeof rooted at = in Case 2.3 = = Fig. 16 Thesbtreeof rooted at LCA F2 {, } in Case 2.3. immediately after eliminating Fig. 17 Thesbtreeof rooted at in Case 2.4 Fig. 18 (1) The sbtree of rooted at LCA F2 {, } in Case 2.4 immediately after eliminating from T 1 and. (2) The sbtree of rooted at LCA F2 {, } in Case 2.4 immediately after eliminating and (1) (2) Case 2.3: = (see Fig. 15). In this case, in der to transfm T 1 and into identical fests, it sffices to try two different choices to modify them and make recrsie calls as follows. 1. We modify T 1 and as follows. First, we eliminate from T 1 and (see Fig. 16). Then, the best case in Whidden et al. s algithm occrs. Me precisely, we can frther modify T 1 and by eliminating. After that, we recrsiely sole rsprdc on inpt (k 2, T 1, ). Note that eliminating first and next is eqialent to eliminating first and next. 2. We modify by detaching the two pendant sbtrees of between and.after these modifications, we recrsiely sole rsprdc on inpt (k 2, T 1, ). Clearly, the following ineqality holds in this case: s(k) 2s(k 2) + 1. (5.7) Case 2.4: is a child of in and the sibling of in is (see Fig. 17). In this case, in der to transfm T 1 and into identical fests, it sffices to try fie different choices to modify them and make recrsie calls as follows. 1. We modify T 1 and as follows. First, we eliminate from T 1 and [(see Fig. 18(1)]. Then, the best case in Whidden et al. s algithm occrs. Me precisely, we can frther modify by detaching the sbtree rooted at the parent of.after that, we recrsiely sole rsprdc on inpt (k 2, T 1, ).
15 Fig. 19 A ption of in Case 2.6 (1) (2) Fig. 20 (1) The sbtree of rooted at LCA F2 {, } in Case 2.6 immediately after eliminating from T 1 and, and (2) the sbtree of rooted at LCA F2 {, } in Case 2.6 immediately after eliminating and 2. We modify T 1 and as follows. First, we eliminate and from T 1 and [see Fig. 18(2)]. Then, the best case in Whidden et al. s algithm occrs. Me precisely, we can frther modify by detaching the sbtree rooted at the sibling of. After that, we recrsiely sole rsprdc on inpt (k 3, T 1, ). 3. We modify T 1 and by eliminating and from T 1 and. We then recrsiely sole rsprdc on inpt (k 2, T 1, ). 4. We modify T 1 and by eliminating from T 1 and. We then modify by detaching the two pendant sbtrees of between and. After the modification, we recrsiely sole rsprdc on inpt (k 3, T 1, ). 5. We modify by detaching the two pendant sbtrees of between and.after the modification, we recrsiely sole rsprdc on inpt (k 2, T 1, ). Clearly, the following ineqality holds in this case: s(k) 3s(k 2) + 2s(k 3) + 1. (5.8) Case 2.5: is a child of in and the sibling of in is. This case is similar to Case 2.4. Case 2.6: is a child of in and the sibling of in is not (see Fig. 19). In this case, in der to transfm T 1 and into identical fests, it sffices to try fie different choices to modify them and make recrsie calls as follows. 1. We modify T 1 and as follows. First, we eliminate from T 1 and [see Fig. 20(1)]. Then, the best case in Whidden et al. s algithm occrs. Me precisely, we can frther modify by detaching the sbtree rooted at the parent of. After that, we recrsiely sole rsprdc on inpt (k 2, T 1, ). 2. We modify T 1 and as follows. First, we eliminate and from T 1 and [(see Fig. 20(2)]. Then, the best case in Whidden et al. s algithm occrs. Me precisely, we can frther modify by detaching the sbtree rooted at the sibling of. After that, we recrsiely sole rsprdc on inpt (k 3, T 1, ).
16 Fig. 21 All possibilities of the relatie locations of,,,,, and in in Case 2.8, where each black triangle indicates a pendant sbtree and each ig-ag line indicates a path containing at least one edge 3. We modify T 1 and by eliminating and from T 1 and. We then recrsiely sole rsprdc on inpt (k 2, T 1, ). 4. We modify T 1 and by eliminating from T 1 and. We then modify by detaching the two pendant sbtrees of between and. After the modification, we recrsiely sole rsprdc on inpt (k 3, T 1, ). 5. We modify by detaching the two pendant sbtrees of between and.after the modification, we recrsiely sole rsprdc on inpt (k 2, T 1, ). Clearly, Ineqality 5.8 holds in this case. Case 2.7: is a child of in and the sibling of in is not. This case is similar to Case 2.6. Case 2.8: There is a directed path P from to in and P contains at least two edges. Then, Fig. 21 shows all possibilities of the relatie locations of,,,,, and in. Note that each ig-ag line in the figre indicates a path containing at least one edge. Depending on whether each sch path contains one, two, at least three edges, we distingish seeral sbcases as follows. Case 2.8.1: The sibling of in is and Condition C1 holds f and (see Fig. 22). Obiosly, if the sitation in Fig. 22(2) occrs, then by switching and, we come to the sitation in Fig. 22(1). So, withot loss of generality, we may assme that the sibling of in is always. Now, in der to transfm T 1 and into identical fests, it sffices to try eleen different choices to modify them and make recrsie calls as follows. 1. We modify T 1 and as follows. First, we eliminate and from T 1 and. Then, and become two sibling leaes in T 1. The crcial point is that there are three pendant sbtrees of between and. We proceed to frther modify T 1 and in three different ways and accdingly make three recrsie calls as in Case 3 in Whidden et al. s algithm. In me detail, the three recrsie calls sole rsprdc on inpt (k 3, T 1, ), (k 3, T 1, ), and (k 5, T 1, ), respectiely. Intitiely
17 (1) (2) (3) Fig. 22 Thesbtreeof rooted at LCA F2 {, } in Case T 1 (1) (2) Fig. 23 (1) The sbtree of T 1 rooted at {, } in Case immediately after merging the sbtree rooted at the paren of and into a single leaf, and (2) the sbtree of rooted at LCA F2 {, } in Case immediately after detaching the pendant sbtrees of between and and frther merging the sbtree rooted at the parent of and into a single leaf speaking, we are able to aoid the wst case in Whidden et al. s algithm when processing the sibling leaes and. 2. We modify T 1 and by eliminating and from them, and then recrsiely sole rsprdc on inpt (k 2, T 1, ). 3. We modify by first eliminating and then detaching the two pendant sbtrees of between and. We frther recrsiely sole rsprdc on inpt (k 3, T 1, ). 4. We modify T 1 and similarly as in Item 1. The only difference is that we first eliminate and from T 1 and and then proceed to se the sibling leaes and to frther modify T 1 and in three different ways and accdingly make three recrsie calls as in Case 3 in Whidden et al. s algithm. 5. We modify T 1 and by eliminating and from them, and then recrsiely sole rsprdc on inpt (k 2, T 1, ). 6. We modify T 1 and by first eliminating from them and then detaching the two pendant sbtrees of between and. We frther recrsiely sole rsprdc on inpt (k 3, T 1, ). 7. We modify T 1 and as follows. First, we detach the two pendant sbtrees of between and. Then, the sbtree of T 1 rooted at the parent of and is identical to the sbtree of rooted at the parent of and. So, we can modify T 1 and by merging the sbtree into a single leaf (say, ). Now, the sitation is as shown in Fig. 23. As can be seen from Fig. 23, the best case in algithm occrs and so we can frther modify T 1 and by eliminating. After that, we recrsiely sole rsprdc on inpt (k 3, T 1, ).
18 (1) Fig. 24 Thesbtreeof rooted at LCA F2 {, } in Case (2) (3) Fig. 25 The sitation in Case immediately after eliminating and from T 1 and T 1 Clearly, the following ineqality holds in this case: s(k) 2s(k 2) + 7s(k 3) + 2s(k 5) + 1. (5.9) Case 2.8.2: The sibling of in is, and Condition C2 holds f and (see Fig. 24). Obiosly, if the sitation in Fig. 24(2) occrs, then by switching and, we come to the sitation in Fig. 24(1). So, withot loss of generality, we may assme that the sibling of in is always. Now, in der to transfm T 1 and into identical fests, it sffices to try nine different choices to modify them and make recrsie calls as follows. 1. We modify T 1 and by eliminating and from them, and then recrsiely sole rsprdc on inpt (k 2, T 1, ). 2. We modify T 1 and as follows. First, we eliminate and from them. Then, the sitation is as shown in Fig. 25. As can be seen from Fig. 25, the best case in Whidden et al. s algithm occrs and so we can frther modify by detaching the sbtree rooted at the sibling of. After that, we recrsiely sole rsprdc on inpt (k 3, T 1, ). 3. We modify by first eliminating and then detaching the two pendant sbtrees of between and. We frther recrsiely sole rsprdc on inpt (k 3, T 1, ). 4. We modify T 1 and as follows. First, we eliminate and from T 1 and. Then, and become two sibling leaes in T 1. The crcial point is that there are three pendant sbtrees of between and. We proceed to frther modify T 1 and in three different ways and accdingly make three recrsie calls as in Case 3 in Whidden et al. s algithm. In me detail, the three recrsie calls sole rsprdc on inpt (k 3, T 1, ), (k 3, T 1, ), and (k 5, T 1, ), respectiely. Intitiely speaking, we are able to aoid the wst case in Whidden et al. s algithm when processing the sibling leaes and.
19 Fig. 26 Thesbtreeof rooted at LCA F2 {, } in Case We modify T 1 and by eliminating and from them, and then recrsiely sole rsprdc on inpt (k 2, T 1, ). 6. We modify by first eliminating and then detaching the two pendant sbtrees of between and. We frther recrsiely sole rsprdc on inpt (k 3, T 1, ). 7. We modify T 1 and as follows. First, we detach the two pendant sbtrees of between and. Then, the sbtree of T 1 rooted at the parent of and is identical to the sbtree of rooted at the parent of and. So, we can modify T 1 and by merging the sbtree into a single leaf (say, ). Now, the sitation is as shown in Fig. 23. As can be seen from Fig. 23, the best case in algithm occrs and so we can frther modify T 1 and by eliminating. After that, we recrsiely sole rsprdc on inpt (k 3, T 1, ). Clearly, the following ineqality holds in this case: s(k) 2s(k 2) + 6s(k 3) + s(k 5) + 1. (5.10) Case 2.8.3: is a grandchild of in, the sibling of in is neither n, and Condition C1 holds f and (see Fig. 26). In this case, in der to transfm T 1 and into identical fests, it sffices to try seenteen different choices to modify them and make recrsie calls as follows. 1. We modify T 1 and as follows. First, we eliminate and from T 1 and. Then, and become two sibling leaes in T 1. The crcial point is that there are three pendant sbtrees of between and. We proceed to frther modify T 1 and in three different ways and accdingly make three recrsie calls as in Case 3 in Whidden et al. s algithm. In me detail, the three recrsie calls sole rsprdc on inpt (k 3, T 1, ), (k 3, T 1, ), and (k 5, T 1, ), respectiely. Intitiely speaking, we are able to aoid the wst case in Whidden et al. s algithm when processing the sibling leaes and. 2. We modify T 1 and similarly as in Item 1. The only difference is that we first eliminate and from T 1 and and then proceed to se the sibling leaes and to frther modify T 1 and in three different ways and accdingly make three recrsie calls as in Case 3 in Whidden et al. s algithm. 3. We modify by first eliminating and then detaching the two pendant sbtrees of between and. We frther recrsiely sole rsprdc on inpt (k 3, T 1, ). 4. We modify T 1 and similarly as in Item 1. The only difference is that we first eliminate and from T 1 and and then proceed to se the sibling leaes and to frther modify T 1 and in three different ways and accdingly make three recrsie calls as in Case 3 in Whidden et al. s algithm.
20 T 1 Fig. 27 The sitation in Case immediately after detaching the pendant sbtrees of between and and frther merging the identical sbtree of T 1 and rooted at the parent of and into a single leaf T 1 T 1 (1) Fig. 28 (1) The sitation in Item 7a of Case immediately after eliminating from T 1 and.(2)the sitation in Item 7b of Case immediately after eliminating from T 1 and (2) 5. We modify T 1 and similarly as in Item 1. The only difference is that we first eliminate and from T 1 and and then proceed to se the sibling leaes and to frther modify T 1 and in three different ways and accdingly make three recrsie calls as in Case 3 in Whidden et al. s algithm. 6. We modify by first eliminating and then detaching the two pendant sbtrees of between and. We frther recrsiely sole rsprdc on inpt (k 3, T 1, ). 7. We modify T 1 and as follows. First, we detach the two pendant sbtrees of between and. Then, the sbtree of T 1 rooted at the parent of and is identical to the sbtree of rooted at the parent of and. So, we can modify T 1 and by merging the sbtree into a single leaf (say, ). Now, the sitation is as shown in Fig. 27. We frther try three different choices to modify T 1 and as follows. (a) We eliminate from T 1 and. Then, the sitation is as shown in Fig. 28(1). As can be seen from Fig. 28(1), the best case in Whidden et al. s algithm occrs and so we can frther modify by detaching the sbtree rooted at the sibling of. After that, we recrsiely sole rsprdc on inpt (k 4, T 1, ). (b) We eliminate from T 1 and. Then, the sitation is as shown in Fig. 28(2). As can be seen from Fig. 28(2), the best case in Whidden et al. s algithm occrs and so we can frther modify by detaching the sbtree rooted at the sibling of. After that, we recrsiely sole rsprdc on inpt (k 4, T 1, ). (c) We modify by detaching the two pendant sbtrees between and.after that, we recrsiely sole rsprdc on inpt (k 4, T 1, ). Clearly, the following ineqality holds in this case: s(k) 10s(k 3) + 3s(k 4) + 4s(k 5) + 1. (5.11) Case 2.8.4: is a grandchild of in, the sibling of in is neither n, and Condition C2 holds f and (see Fig. 29). In this case, in der to transfm T 1 and into identical fests, it sffices to try thirteen different choices to modify them and make recrsie calls as follows.
21 Fig. 29 Thesbtreeof rooted at LCA F2 {, } in Case We modify T 1 and by eliminating and from them, and then recrsiely sole rsprdc on inpt (k 2, T 1, ). 2. We modify T 1 and by eliminating and from them, and then recrsiely sole rsprdc on inpt (k 2, T 1, ). 3. We modify by first eliminating and then detaching the two pendant sbtrees of between and. We frther recrsiely sole rsprdc on inpt (k 3, T 1, ). 4. We modify T 1 and as follows. First, we eliminate and from T 1 and. Then, and become two sibling leaes in T 1. The crcial point is that there are three pendant sbtrees of between and. We proceed to frther modify T 1 and in three different ways and accdingly make three recrsie calls as in Case 3 in Whidden et al. s algithm. In me detail, the three recrsie calls sole rsprdc on inpt (k 3, T 1, ), (k 3, T 1, ), and (k 5, T 1, ), respectiely. Intitiely speaking, we are able to aoid the wst case in Whidden et al. s algithm when processing the sibling leaes and. 5. We modify T 1 and similarly as in Item 4. The only difference is that we first eliminate and from T 1 and and then proceed to se the sibling leaes and to frther modify T 1 and in three different ways and accdingly make three recrsie calls as in Case 3 in Whidden et al. s algithm. 6. We modify by first eliminating and then detaching the two pendant sbtrees of between and. We frther recrsiely sole rsprdc on inpt (k 3, T 1, ). 7. We modify T 1 and as follows. First, we detach the two pendant sbtrees of between and. Then, the sbtree of T 1 rooted at the parent of and is identical to the sbtree of rooted at the parent of and. So, we can modify T 1 and by merging the sbtree into a single leaf (say, ). Now, the sitation is as shown in Fig. 27. Ths, we can proceed to frther modify T 1 and in three different ways and accdingly make three recrsie calls as in Items 7a throgh 7c in Case Clearly, the following ineqality holds in this case: s(k) 2s(k 2) + 6s(k 3) + 3s(k 4) + 2s(k 5) + 1. (5.12) Case 2.8.5: The sibling of the parent y of in is, neither n is a descendant of y, and Condition C1 holds f and (see Fig. 30). Obiosly, if the sitation in Fig. 30(2) occrs, then by switching and, we come to the sitation in Fig. 30(1). So, withot loss of generality, we may assme that the sibling of the parent of in is always. Now, in der to transfm T 1 and into identical fests, it sffices to try seenteen different choices to modify them and make recrsie calls as follows.
22 y y y (1) Fig. 30 Thesbtreeof rooted at LCA F2 {, } in Case (2) (3) 1. We modify T 1 and as follows. First, we eliminate and from T 1 and. Then, and become two sibling leaes in T 1. The crcial point is that there are f pendant sbtrees of between and. We proceed to frther modify T 1 and in three different ways and accdingly make three recrsie calls as in Case 3 in Whidden et al. s algithm. In me detail, the three recrsie calls sole rsprdc on inpt (k 3, T 1, ), (k 3, T 1, ), and (k 6, T 1, ), respectiely. Intitiely speaking, we are able to aoid the wst case in Whidden et al. s algithm when processing the sibling leaes and. 2. We modify T 1 and as follows. First, we eliminate and from T 1 and. Then, and become two sibling leaes in T 1. The crcial point is that there are three pendant sbtrees of between and. We proceed to frther modify T 1 and in three different ways and accdingly make three recrsie calls as in Case 3 in Whidden et al. s algithm. In me detail, the three recrsie calls sole rsprdc on inpt (k 3, T 1, ), (k 3, T 1, ), and (k 5, T 1, ), respectiely. Intitiely speaking, we are able to aoid the wst case in Whidden et al. s algithm when processing the sibling leaes and. 3. We modify by first eliminating and then detaching the two pendant sbtrees of between and. We frther recrsiely sole rsprdc on inpt (k 3, T 1, ). 4. We modify T 1 and similarly as in Item 1. The only difference is that we first eliminate and from T 1 and and then proceed to se the sibling leaes and to frther modify T 1 and in three different ways and accdingly make three recrsie calls as in Case 3 in Whidden et al. s algithm. 5. We modify T 1 and similarly as in Item 2. The only difference is that we first eliminate and from T 1 and and then proceed to se the sibling leaes and to frther modify T 1 and in three different ways and accdingly make three recrsie calls as in Case 3 in Whidden et al. s algithm. 6. We modify T 1 and by first eliminating from them and then detaching the two pendant sbtrees of between and. We frther recrsiely sole rsprdc on inpt (k 3, T 1, ). 7. We modify T 1 and as follows. First, we detach the two pendant sbtrees of between and. Then, the sbtree of T 1 rooted at the parent of and is identical to the sbtree of rooted at the parent of and. So, we can modify T 1 and by merging the sbtree into a single leaf (say, ). Now, the sitation is as shown in Fig. 31. We frther try three different choices to modify T 1 and as follows.
23 T 1 Fig. 31 The sitation in Case immediately after detaching the pendant sbtrees of between and and frther merging the identical sbtree of T 1 and rooted at the parent of and into a single leaf Fig. 32 The sitation in Item 7b of Case immediately after eliminating from T 1 and T 1 y y y (1) Fig. 33 Thesbtreeof rooted at LCA F2 {, } in Case (2) (3) (a) We eliminate from T 1 and. After that, we recrsiely sole rsprdc on inpt (k 3, T 1, ). (b) We eliminate from T 1 and. Then, the sitation is as shown in Fig. 32.As can be seen from Fig. 32, the best case in Whidden et al. s algithm occrs and so we can frther modify by detaching the sbtree rooted at the sibling of. After that, we recrsiely sole rsprdc on inpt (k 4, T 1, ). (c) We modify by detaching the two pendant sbtrees between and.after that, we recrsiely sole rsprdc on inpt (k 4, T 1, ). Clearly, the following ineqality holds in this case: s(k) 11s(k 3) + 2s(k 4) + 2s(k 5) + 2s(k 6) + 1. (5.13) Case 2.8.6: The sibling of the parent y of in is, neither n is a descendant of y, and Condition C2 holds f and (see Fig. 33). Obiosly, if the sitation in Fig. 33(2) occrs, then by switching and, we come to the sitation in Fig. 33(1). So, withot loss of generality, we may assme that the sibling of the parent of in is always. Now, in der to transfm T 1 and into identical fests, it sffices to try fifteen different choices to modify them and make recrsie calls as follows. 1. We modify T 1 and as follows. First, we eliminate and from T 1 and. Then, and become two sibling leaes in T 1. The crcial point is that there are three
The Minimal Estrada Index of Trees with Two Maximum Degree Vertices
MATCH Commnications in Mathematical and in Compter Chemistry MATCH Commn. Math. Compt. Chem. 64 (2010) 799-810 ISSN 0340-6253 The Minimal Estrada Index of Trees with Two Maximm Degree Vertices Jing Li
More informationarxiv: v1 [cs.dm] 27 Jun 2017 Darko Dimitrov a, Zhibin Du b, Carlos M. da Fonseca c,d
Forbidden branches in trees with minimal atom-bond connectiity index Agst 23, 2018 arxi:1706.086801 [cs.dm] 27 Jn 2017 Darko Dimitro a, Zhibin D b, Carlos M. da Fonseca c,d a Hochschle für Technik nd Wirtschaft
More informationMinimal Obstructions for Partial Representations of Interval Graphs
Minimal Obstrctions for Partial Representations of Interal Graphs Pael Klaík Compter Science Institte Charles Uniersity in Prage Czech Repblic klaik@ik.mff.cni.cz Maria Samell Department of Theoretical
More informationMinimizing Intra-Edge Crossings in Wiring Diagrams and Public Transportation Maps
Minimizing Intra-Edge Crossings in Wiring Diagrams and Pblic Transportation Maps Marc Benkert 1, Martin Nöllenbrg 1, Takeaki Uno 2, and Alexander Wolff 1 1 Department of Compter Science, Karlsrhe Uniersity,
More informationChords in Graphs. Department of Mathematics Texas State University-San Marcos San Marcos, TX Haidong Wu
AUSTRALASIAN JOURNAL OF COMBINATORICS Volme 32 (2005), Pages 117 124 Chords in Graphs Weizhen G Xingde Jia Department of Mathematics Texas State Uniersity-San Marcos San Marcos, TX 78666 Haidong W Department
More informationSpanning Trees with Many Leaves in Graphs without Diamonds and Blossoms
Spanning Trees ith Many Leaes in Graphs ithot Diamonds and Blossoms Pal Bonsma Florian Zickfeld Technische Uniersität Berlin, Fachbereich Mathematik Str. des 7. Jni 36, 0623 Berlin, Germany {bonsma,zickfeld}@math.t-berlin.de
More informationConnectivity and Menger s theorems
Connectiity and Menger s theorems We hae seen a measre of connectiity that is based on inlnerability to deletions (be it tcs or edges). There is another reasonable measre of connectiity based on the mltiplicity
More informationWe automate the bivariate change-of-variables technique for bivariate continuous random variables with
INFORMS Jornal on Compting Vol. 4, No., Winter 0, pp. 9 ISSN 09-9856 (print) ISSN 56-558 (online) http://dx.doi.org/0.87/ijoc.046 0 INFORMS Atomating Biariate Transformations Jeff X. Yang, John H. Drew,
More informationVectors in Rn un. This definition of norm is an extension of the Pythagorean Theorem. Consider the vector u = (5, 8) in R 2
MATH 307 Vectors in Rn Dr. Neal, WKU Matrices of dimension 1 n can be thoght of as coordinates, or ectors, in n- dimensional space R n. We can perform special calclations on these ectors. In particlar,
More informationGRAY CODES FAULTING MATCHINGS
Uniersity of Ljbljana Institte of Mathematics, Physics and Mechanics Department of Mathematics Jadranska 19, 1000 Ljbljana, Sloenia Preprint series, Vol. 45 (2007), 1036 GRAY CODES FAULTING MATCHINGS Darko
More informationGraphs and Networks Lecture 5. PageRank. Lecturer: Daniel A. Spielman September 20, 2007
Graphs and Networks Lectre 5 PageRank Lectrer: Daniel A. Spielman September 20, 2007 5.1 Intro to PageRank PageRank, the algorithm reportedly sed by Google, assigns a nmerical rank to eery web page. More
More informationSimpler Testing for Two-page Book Embedding of Partitioned Graphs
Simpler Testing for Two-page Book Embedding of Partitioned Graphs Seok-Hee Hong 1 Hiroshi Nagamochi 2 1 School of Information Technologies, Uniersity of Sydney, seokhee.hong@sydney.ed.a 2 Department of
More informationarxiv: v1 [math.co] 25 Sep 2016
arxi:1609.077891 [math.co] 25 Sep 2016 Total domination polynomial of graphs from primary sbgraphs Saeid Alikhani and Nasrin Jafari September 27, 2016 Department of Mathematics, Yazd Uniersity, 89195-741,
More informationRestricted cycle factors and arc-decompositions of digraphs. J. Bang-Jensen and C. J. Casselgren
Restricted cycle factors and arc-decompositions of digraphs J. Bang-Jensen and C. J. Casselgren REPORT No. 0, 0/04, spring ISSN 0-467X ISRN IML-R- -0-/4- -SE+spring Restricted cycle factors and arc-decompositions
More information1 The space of linear transformations from R n to R m :
Math 540 Spring 20 Notes #4 Higher deriaties, Taylor s theorem The space of linear transformations from R n to R m We hae discssed linear transformations mapping R n to R m We can add sch linear transformations
More informationc 2009 Society for Industrial and Applied Mathematics
SIAM J. DISCRETE MATH. Vol., No., pp. 8 86 c 009 Society for Indstrial and Applied Mathematics THE SURVIVING RATE OF A GRAPH FOR THE FIREFIGHTER PROBLEM CAI LEIZHEN AND WANG WEIFAN Abstract. We consider
More informationANOVA INTERPRETING. It might be tempting to just look at the data and wing it
Introdction to Statistics in Psychology PSY 2 Professor Greg Francis Lectre 33 ANalysis Of VAriance Something erss which thing? ANOVA Test statistic: F = MS B MS W Estimated ariability from noise and mean
More informationOnline Stochastic Matching: New Algorithms and Bounds
Online Stochastic Matching: New Algorithms and Bonds Brian Brbach, Karthik A. Sankararaman, Araind Sriniasan, and Pan X Department of Compter Science, Uniersity of Maryland, College Park, MD 20742, USA
More information1. Tractable and Intractable Computational Problems So far in the course we have seen many problems that have polynomial-time solutions; that is, on
. Tractable and Intractable Comptational Problems So far in the corse we have seen many problems that have polynomial-time soltions; that is, on a problem instance of size n, the rnning time T (n) = O(n
More informationFundamental Algorithms
Fundamental Algithms Chapter 4: AVL Trees Jan Křetínský Winter 2016/17 Chapter 4: AVL Trees, Winter 2016/17 1 Part I AVL Trees (Adelson-Velsky and Landis, 1962) Chapter 4: AVL Trees, Winter 2016/17 2 Binary
More informationLecture 3. (2) Last time: 3D space. The dot product. Dan Nichols January 30, 2018
Lectre 3 The dot prodct Dan Nichols nichols@math.mass.ed MATH 33, Spring 018 Uniersity of Massachsetts Janary 30, 018 () Last time: 3D space Right-hand rle, the three coordinate planes 3D coordinate system:
More informationXihe Li, Ligong Wang and Shangyuan Zhang
Indian J. Pre Appl. Math., 49(1): 113-127, March 2018 c Indian National Science Academy DOI: 10.1007/s13226-018-0257-8 THE SIGNLESS LAPLACIAN SPECTRAL RADIUS OF SOME STRONGLY CONNECTED DIGRAPHS 1 Xihe
More informationAxiomatizing the Cyclic Interval Calculus
Axiomatizing the Cyclic Interal Calcls Jean-François Condotta CRIL-CNRS Uniersité d Artois 62300 Lens (France) condotta@cril.ni-artois.fr Gérard Ligozat LIMSI-CNRS Uniersité de Paris-Sd 91403 Orsay (France)
More informationarxiv: v1 [math.co] 10 Nov 2010
arxi:1011.5001 [math.co] 10 No 010 The Fractional Chromatic Nmber of Triangle-free Graphs with 3 Linyan L Xing Peng Noember 1, 010 Abstract Let G be any triangle-free graph with maximm degree 3. Staton
More informationOn the tree cover number of a graph
On the tree cover nmber of a graph Chassidy Bozeman Minerva Catral Brendan Cook Oscar E. González Carolyn Reinhart Abstract Given a graph G, the tree cover nmber of the graph, denoted T (G), is the minimm
More informationA Note on Arboricity of 2-edge-connected Cubic Graphs
Ξ44 Ξ6fi ψ ) 0 Vol.44, No.6 205ff. ADVANCES IN MATHEMATICS(CHINA) No., 205 A Note on Arboricity of 2-edge-connected Cbic Graphs HAO Rongxia,, LAI Hongjian 2, 3, LIU Haoyang 4 doi: 0.845/sxjz.204056b (.
More informationThe Brauer Manin obstruction
The Braer Manin obstrction Martin Bright 17 April 2008 1 Definitions Let X be a smooth, geometrically irredcible ariety oer a field k. Recall that the defining property of an Azmaya algebra A is that,
More informationA Note on Johnson, Minkoff and Phillips Algorithm for the Prize-Collecting Steiner Tree Problem
A Note on Johnson, Minkoff and Phillips Algorithm for the Prize-Collecting Steiner Tree Problem Palo Feofiloff Cristina G. Fernandes Carlos E. Ferreira José Coelho de Pina September 04 Abstract The primal-dal
More informationUpper Bounds on the Spanning Ratio of Constrained Theta-Graphs
Upper Bonds on the Spanning Ratio of Constrained Theta-Graphs Prosenjit Bose and André van Renssen School of Compter Science, Carleton University, Ottaa, Canada. jit@scs.carleton.ca, andre@cg.scs.carleton.ca
More informationA New Method for Calculating of Electric Fields Around or Inside Any Arbitrary Shape Electrode Configuration
Proceedings of the 5th WSEAS Int. Conf. on Power Systems and Electromagnetic Compatibility, Corf, Greece, Agst 3-5, 005 (pp43-48) A New Method for Calclating of Electric Fields Arond or Inside Any Arbitrary
More information7.3 AVL-Trees. Definition 15. Lemma 16. AVL-trees are binary search trees that fulfill the following balance condition.
Definition 15 AVL-trees are binary search trees that fulfill the following balance condition. F eery node height(left sub-tree()) height(right sub-tree()) 1. Lemma 16 An AVL-tree of height h contains at
More informationComplexity of the Cover Polynomial
Complexity of the Coer Polynomial Marks Bläser and Holger Dell Comptational Complexity Grop Saarland Uniersity, Germany {mblaeser,hdell}@cs.ni-sb.de Abstract. The coer polynomial introdced by Chng and
More information4.2 First-Order Logic
64 First-Order Logic and Type Theory The problem can be seen in the two qestionable rles In the existential introdction, the term a has not yet been introdced into the derivation and its se can therefore
More informationGraph-Modeled Data Clustering: Fixed-Parameter Algorithms for Clique Generation
Graph-Modeled Data Clstering: Fied-Parameter Algorithms for Cliqe Generation Jens Gramm Jiong Go Falk Hüffner Rolf Niedermeier Wilhelm-Schickard-Institt für Informatik, Universität Tübingen, Sand 13, D-72076
More informationLecture Notes On THEORY OF COMPUTATION MODULE - 2 UNIT - 2
BIJU PATNAIK UNIVERSITY OF TECHNOLOGY, ODISHA Lectre Notes On THEORY OF COMPUTATION MODULE - 2 UNIT - 2 Prepared by, Dr. Sbhend Kmar Rath, BPUT, Odisha. Tring Machine- Miscellany UNIT 2 TURING MACHINE
More informationCubic graphs have bounded slope parameter
Cbic graphs have bonded slope parameter B. Keszegh, J. Pach, D. Pálvölgyi, and G. Tóth Agst 25, 2009 Abstract We show that every finite connected graph G with maximm degree three and with at least one
More informationStudy on the Mathematic Model of Product Modular System Orienting the Modular Design
Natre and Science, 2(, 2004, Zhong, et al, Stdy on the Mathematic Model Stdy on the Mathematic Model of Prodct Modlar Orienting the Modlar Design Shisheng Zhong 1, Jiang Li 1, Jin Li 2, Lin Lin 1 (1. College
More informationarxiv: v2 [cs.dc] 2 Apr 2016
Sbgraph Conting: Color Coding Beyond Trees Venkatesan T. Chakaravarthy 1, Michael Kapralov 2, Prakash Mrali 1, Fabrizio Petrini 3, Xiny Qe 3, Yogish Sabharwal 1, and Barch Schieber 3 arxiv:1602.04478v2
More informationLecture 5 November 6, 2012
Hypercbe problems Lectre 5 Noember 6, 2012 Lectrer: Petr Gregor Scribe by: Kryštof Měkta Updated: Noember 22, 2012 1 Partial cbes A sbgraph H of G is isometric if d H (, ) = d G (, ) for eery, V (H); that
More informationInformation Source Detection in the SIR Model: A Sample Path Based Approach
Information Sorce Detection in the SIR Model: A Sample Path Based Approach Kai Zh and Lei Ying School of Electrical, Compter and Energy Engineering Arizona State University Tempe, AZ, United States, 85287
More informationMinimum-Latency Beaconing Schedule in Multihop Wireless Networks
This fll text paper was peer reiewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the IEEE INFOCOM 009 proceedings Minimm-Latency Beaconing Schedle in Mltihop
More informationA Note on Irreducible Polynomials and Identity Testing
A Note on Irrecible Polynomials an Ientity Testing Chanan Saha Department of Compter Science an Engineering Inian Institte of Technology Kanpr Abstract We show that, given a finite fiel F q an an integer
More informationKey words. partially ordered sets, dimension, planar maps, planar graphs, convex polytopes
SIAM J. DISCRETE MATH. c 1997 Societ for Indstrial and Applied Mathematics Vol. 10, No. 4, pp. 515 528, Noember 1997 001 THE ORDER DIMENSION O PLANAR MAPS GRAHAM R. BRIGHTWELL AND WILLIAM T. TROTTER Abstract.
More informationThe Real Stabilizability Radius of the Multi-Link Inverted Pendulum
Proceedings of the 26 American Control Conference Minneapolis, Minnesota, USA, Jne 14-16, 26 WeC123 The Real Stabilizability Radis of the Mlti-Link Inerted Pendlm Simon Lam and Edward J Daison Abstract
More informationSelf-induced stochastic resonance in excitable systems
Self-indced stochastic resonance in excitable systems Cyrill B. Mrato Department of Mathematical Sciences, New Jersey Institte of Technology, Newark, NJ 7 Eric Vanden-Eijnden Corant Institte of Mathematical
More informationChange of Variables. (f T) JT. f = U
Change of Variables 4-5-8 The change of ariables formla for mltiple integrals is like -sbstittion for single-ariable integrals. I ll gie the general change of ariables formla first, and consider specific
More informationWeak ε-nets for Axis-Parallel Boxes in d-space
Weak ε-nets for Axis-Parallel Boxes in d-space Esther Ezra May 25, 2009 Abstract In this note we show the existence of weak ε-nets of size O /ε loglog /ε for point sets and axis-parallel boxes in R d.
More informationDecoder Error Probability of MRD Codes
Decoder Error Probability of MRD Codes Maximilien Gadolea Department of Electrical and Compter Engineering Lehigh University Bethlehem, PA 18015 USA E-mail: magc@lehighed Zhiyan Yan Department of Electrical
More informationReduction of over-determined systems of differential equations
Redction of oer-determined systems of differential eqations Maim Zaytse 1) 1, ) and Vyachesla Akkerman 1) Nclear Safety Institte, Rssian Academy of Sciences, Moscow, 115191 Rssia ) Department of Mechanical
More informationA generalized Alon-Boppana bound and weak Ramanujan graphs
A generalized Alon-Boppana bond and weak Ramanjan graphs Fan Chng Abstract A basic eigenvale bond de to Alon and Boppana holds only for reglar graphs. In this paper we give a generalized Alon-Boppana bond
More informationDistributed Weighted Vertex Cover via Maximal Matchings
Distribted Weighted Vertex Coer ia Maximal Matchings FABRIZIO GRANDONI Uniersità di Roma Tor Vergata JOCHEN KÖNEMANN Uniersity of Waterloo and ALESSANDRO PANCONESI Sapienza Uniersità di Roma In this paper
More informationThe Linear Quadratic Regulator
10 The Linear Qadratic Reglator 10.1 Problem formlation This chapter concerns optimal control of dynamical systems. Most of this development concerns linear models with a particlarly simple notion of optimality.
More informationOn relative errors of floating-point operations: optimal bounds and applications
On relative errors of floating-point operations: optimal bonds and applications Clade-Pierre Jeannerod, Siegfried M. Rmp To cite this version: Clade-Pierre Jeannerod, Siegfried M. Rmp. On relative errors
More informationNew Regularized Algorithms for Transductive Learning
New Reglarized Algorithms for Transdctie Learning Partha Pratim Talkdar and Koby Crammer Compter & Information Science Department Uniersity of Pennsylania Philadelphia, PA 19104 {partha,crammer}@cis.penn.ed
More informationDirect linearization method for nonlinear PDE s and the related kernel RBFs
Direct linearization method for nonlinear PDE s and the related kernel BFs W. Chen Department of Informatics, Uniersity of Oslo, P.O.Box 1080, Blindern, 0316 Oslo, Norway Email: wenc@ifi.io.no Abstract
More informationTESTING MEANS. we want to test. but we need to know if 2 1 = 2 2 if it is, we use the methods described last time pooled estimate of variance
Introdction to Statistics in Psychology PSY Profess Greg Francis Lectre 6 Hypothesis testing f two sample case Planning a replication stdy TESTING MENS we want to test H : µ µ H a : µ µ 6 bt we need to
More informationMeasure and Conquer: A Simple O( n ) Independent Set Algorithm
Measre an Conqer: A Simple O(2 0.288n ) Inepenent Set Algorithm Feor V. Fomin Fabrizio Granoni Dieter Kratsch Abstract For more than 30 years Dais-Ptnam-style exponentialtime backtracking algorithms hae
More informationConvergence analysis of ant colony learning
Delft University of Technology Delft Center for Systems and Control Technical report 11-012 Convergence analysis of ant colony learning J van Ast R Babška and B De Schtter If yo want to cite this report
More informationA generalized Alon-Boppana bound and weak Ramanujan graphs
A generalized Alon-Boppana bond and weak Ramanjan graphs Fan Chng Department of Mathematics University of California, San Diego La Jolla, CA, U.S.A. fan@csd.ed Sbmitted: Feb 0, 206; Accepted: Jne 22, 206;
More informationarxiv: v2 [math.co] 28 May 2014
Algorithmic Aspects of Reglar Graph Covers with Applications to Planar Graphs Jiří Fiala 1, Pavel Klavík 2, Jan Kratochvíl 1, and Roman Nedela 3 arxiv:1402.3774v2 [math.co] 28 May 2014 1 Department of
More informationRelativity II. The laws of physics are identical in all inertial frames of reference. equivalently
Relatiity II I. Henri Poincare's Relatiity Principle In the late 1800's, Henri Poincare proposed that the principle of Galilean relatiity be expanded to inclde all physical phenomena and not jst mechanics.
More informationNetwork Farthest-Point Diagrams and their Application to Feed-Link Network Extension
Network Farthest-Point Diagrams and their Alication to Feed-Link Network Extension Prosenjit Bose Kai Dannies Jean-Lo De Carfel Christoh Doell Carsten Grimm Anil Maheshwari Stefan Schirra Michiel Smid
More informationOn oriented arc-coloring of subcubic graphs
On oriented arc-coloring of sbcbic graphs Alexandre Pinlo Alexandre.Pinlo@labri.fr LaBRI, Université Bordeax I, 351, Cors de la Libération, 33405 Talence, France Janary 17, 2006 Abstract. A homomorphism
More informationDecoder Error Probability of MRD Codes
Decoder Error Probability of MRD Codes Maximilien Gadolea Department of Electrical and Compter Engineering Lehigh University Bethlehem, PA 18015 USA E-mail: magc@lehigh.ed Zhiyan Yan Department of Electrical
More informationModelling, Simulation and Control of Quadruple Tank Process
Modelling, Simlation and Control of Qadrple Tan Process Seran Özan, Tolgay Kara and Mehmet rıcı,, Electrical and electronics Engineering Department, Gaziantep Uniersity, Gaziantep, Trey bstract Simple
More informationSystem identification of buildings equipped with closed-loop control devices
System identification of bildings eqipped with closed-loop control devices Akira Mita a, Masako Kamibayashi b a Keio University, 3-14-1 Hiyoshi, Kohok-k, Yokohama 223-8522, Japan b East Japan Railway Company
More informationChapter 4 Supervised learning:
Chapter 4 Spervised learning: Mltilayer Networks II Madaline Other Feedforward Networks Mltiple adalines of a sort as hidden nodes Weight change follows minimm distrbance principle Adaptive mlti-layer
More informationON TRANSIENT DYNAMICS, OFF-EQUILIBRIUM BEHAVIOUR AND IDENTIFICATION IN BLENDED MULTIPLE MODEL STRUCTURES
ON TRANSIENT DYNAMICS, OFF-EQUILIBRIUM BEHAVIOUR AND IDENTIFICATION IN BLENDED MULTIPLE MODEL STRUCTURES Roderick Mrray-Smith Dept. of Compting Science, Glasgow Uniersity, Glasgow, Scotland. rod@dcs.gla.ac.k
More informationu P(t) = P(x,y) r v t=0 4/4/2006 Motion ( F.Robilliard) 1
y g j P(t) P(,y) r t0 i 4/4/006 Motion ( F.Robilliard) 1 Motion: We stdy in detail three cases of motion: 1. Motion in one dimension with constant acceleration niform linear motion.. Motion in two dimensions
More informationUniversal Scheme for Optimal Search and Stop
Universal Scheme for Optimal Search and Stop Sirin Nitinawarat Qalcomm Technologies, Inc. 5775 Morehose Drive San Diego, CA 92121, USA Email: sirin.nitinawarat@gmail.com Vengopal V. Veeravalli Coordinated
More informationPredicting Popularity of Twitter Accounts through the Discovery of Link-Propagating Early Adopters
Predicting Poplarity of Titter Acconts throgh the Discoery of Link-Propagating Early Adopters Daichi Imamori Gradate School of Informatics, Kyoto Uniersity Sakyo, Kyoto 606-850 Japan imamori@dl.soc.i.kyoto-.ac.jp
More informationClassify by number of ports and examine the possible structures that result. Using only one-port elements, no more than two elements can be assembled.
Jnction elements in network models. Classify by nmber of ports and examine the possible strctres that reslt. Using only one-port elements, no more than two elements can be assembled. Combining two two-ports
More informationCOMPLEXITY AND APPROXIMABILITY OF THE COVER POLYNOMIAL
COMPLEXITY AND APPROXIMABILITY OF THE COVER POLYNOMIAL Marks Bläser, Holger Dell, and Mahmod Foz Abstract. The coer polynomial and its geometric ersion introdced by Chng & Graham and D Antona & Mnarini,
More informationOn the Total Duration of Negative Surplus of a Risk Process with Two-step Premium Function
Aailable at http://pame/pages/398asp ISSN: 93-9466 Vol, Isse (December 7), pp 7 (Preiosly, Vol, No ) Applications an Applie Mathematics (AAM): An International Jornal Abstract On the Total Dration of Negatie
More informationIntrodction In the three papers [NS97], [SG96], [SGN97], the combined setp or both eedback and alt detection lter design problem has been considered.
Robst Falt Detection in Open Loop s. losed Loop Henrik Niemann Jakob Stostrp z Version: Robst_FDI4.tex { Printed 5h 47m, Febrar 9, 998 Abstract The robstness aspects o alt detection and isolation (FDI)
More informationPHASE PLANE DIAGRAMS OF DIFFERENCE EQUATIONS. 1. Introduction
PHASE PLANE DIAGRAMS OF DIFFERENCE EQUATIONS TANYA DEWLAND, JEROME WESTON, AND RACHEL WEYRENS Abstract. We will be determining qalitatie featres of a discrete dynamical system of homogeneos difference
More informationUNCERTAINTY FOCUSED STRENGTH ANALYSIS MODEL
8th International DAAAM Baltic Conference "INDUSTRIAL ENGINEERING - 19-1 April 01, Tallinn, Estonia UNCERTAINTY FOCUSED STRENGTH ANALYSIS MODEL Põdra, P. & Laaneots, R. Abstract: Strength analysis is a
More informationPROBABILISTIC APPROACHES TO STABILITY AND DEFORMATION PROBLEMS IN BRACED EXCAVATION
Clemson Uniersity TigerPrints All Dissertations Dissertations 12-2011 PROBABILISTIC APPROACHES TO STABILITY AND DEFORMATION PROBLEMS IN BRACED EXCAVATION Zhe Lo Clemson Uniersity, jerry8256@gmail.com Follow
More informationOptimal Control of a Heterogeneous Two Server System with Consideration for Power and Performance
Optimal Control of a Heterogeneos Two Server System with Consideration for Power and Performance by Jiazheng Li A thesis presented to the University of Waterloo in flfilment of the thesis reqirement for
More informationAn Explicit Lower Bound of 5n o(n) for Boolean Circuits
An Eplicit Lower Bound of 5n o(n) for Boolean Circuits Kazuo Iwama, Oded Lachish, Hiroki Morizumi, and Ran Raz Graduate School of Informatics, Kyoto Uniersity, Kyoto, JAPAN {iwama, morizumi}@kuis.kyoto-u.ac.jp
More informationEE2 Mathematics : Functions of Multiple Variables
EE2 Mathematics : Fnctions of Mltiple Variables http://www2.imperial.ac.k/ nsjones These notes are not identical word-for-word with m lectres which will be gien on the blackboard. Some of these notes ma
More informationModel (In-)Validation from a H and µ perspective
Model (In-)Validation from a H and µ perspectie Wolfgang Reinelt Department of Electrical Engineering Linköping Uniersity, S-581 83 Linköping, Seden WWW: http://.control.isy.li.se/~olle/ Email: olle@isy.li.se
More informationMATH2715: Statistical Methods
MATH275: Statistical Methods Exercises III (based on lectres 5-6, work week 4, hand in lectre Mon 23 Oct) ALL qestions cont towards the continos assessment for this modle. Q. If X has a niform distribtion
More informationConstrained tri-connected planar straight line graphs
Constrained tri-connected lanar straight line grahs Marwan Al-Jbeh Gill Bareet Mashhood Ishae Diane L. Soaine Csaba D. Tóth Andrew Winslow Abstract It is known that for any set V of n 4 oints in the lane,
More informationHADAMARD-PERRON THEOREM
HADAMARD-PERRON THEOREM CARLANGELO LIVERANI. Invariant manifold of a fixed point He we will discss the simplest possible case in which the existence of invariant manifolds arises: the Hadamard-Perron theorem.
More informationTo pose an abstract computational problem on graphs that has a huge list of applications in web technologies
Talk Objectie Large Scale Graph Algorithms A Gide to Web Research: Lectre 2 Yry Lifshits Steklo Institte of Mathematics at St.Petersbrg To pose an abstract comptational problem on graphs that has a hge
More informationPrediction of Transmission Distortion for Wireless Video Communication: Analysis
Prediction of Transmission Distortion for Wireless Video Commnication: Analysis Zhifeng Chen and Dapeng W Department of Electrical and Compter Engineering, University of Florida, Gainesville, Florida 326
More informationLinear Strain Triangle and other types of 2D elements. By S. Ziaei Rad
Linear Strain Triangle and other tpes o D elements B S. Ziaei Rad Linear Strain Triangle (LST or T6 This element is also called qadratic trianglar element. Qadratic Trianglar Element Linear Strain Triangle
More informationFive Basic Concepts of Axiomatic Rewriting Theory
Fie Basic Concepts of Axiomatic Rewriting Theory Pal-André Melliès Institt de Recherche en Informatiqe Fondamentale (IRIF) CNRS, Uniersité Paris Diderot Abstract In this inited talk, I will reiew fie basic
More informationGradient Projection Anti-windup Scheme on Constrained Planar LTI Systems. Justin Teo and Jonathan P. How
1 Gradient Projection Anti-windp Scheme on Constrained Planar LTI Systems Jstin Teo and Jonathan P. How Technical Report ACL1 1 Aerospace Controls Laboratory Department of Aeronatics and Astronatics Massachsetts
More informationAsymptotic Gauss Jacobi quadrature error estimation for Schwarz Christoffel integrals
Jornal of Approximation Theory 146 2007) 157 173 www.elseier.com/locate/jat Asymptotic Gass Jacobi qadratre error estimation for Schwarz Christoffel integrals Daid M. Hogh EC-Maths, Coentry Uniersity,
More informationWHEN studying the evolutionary history of a set of
372 IEEE/ACM TRANSACTIONS ON COMPUTATIONAL BIOLOGY AND BIOINFORMATICS, VOL. 9, NO. 2, MARCH/APRIL 2012 Algorithms for Reticulate Networks of Multiple Phylogenetic Trees Zhi-Zhong Chen and Lusheng Wang
More informationIN this paper we consider simple, finite, connected and
INTERNATIONAL JOURNAL OF MATHEMATICS AND SCIENTIFIC COMPUTING (ISSN: -5), VOL., NO., -Eqitable Labeling for Some Star and Bistar Related Graphs S.K. Vaidya and N.H. Shah Abstract In this paper we proe
More informationReaction-Diusion Systems with. 1-Homogeneous Non-linearity. Matthias Buger. Mathematisches Institut der Justus-Liebig-Universitat Gieen
Reaction-Dision Systems ith 1-Homogeneos Non-linearity Matthias Bger Mathematisches Institt der Jsts-Liebig-Uniersitat Gieen Arndtstrae 2, D-35392 Gieen, Germany Abstract We describe the dynamics of a
More informationJumping Boxes. Representing lambda-calculus boxes by jumps. Beniamino Accattoli 1 and Stefano Guerrini 2
mping Boxes Representing lambda-calcls boxes by jmps Beniamino Accattoli 1 and Stefano Gerrini 2 1 Dip. di Informatica e Sistemistica A. Rberti. Sapienza Uniersità di Roma. Via Ariosto, 25-00185 Roma,
More informationCuckoo hashing: Further analysis
Information Processing Letters 86 (2003) 215 219 www.elsevier.com/locate/ipl Cckoo hashing: Frther analysis Lc Devroye,PatMorin School of Compter Science, McGill University, 3480 University Street, Montreal,
More informationLinear Algebra and its Applications
Linear Algebra and its Applications 435 (2011) 2065 2076 Contents lists aailable at ScienceDirect Linear Algebra and its Applications jornal homepage: www.elseier.com/locate/laa On the Estrada and Laplacian
More informationWorst-case analysis of the LPT algorithm for single processor scheduling with time restrictions
OR Spectrm 06 38:53 540 DOI 0.007/s009-06-043-5 REGULAR ARTICLE Worst-case analysis of the LPT algorithm for single processor schedling with time restrictions Oliver ran Fan Chng Ron Graham Received: Janary
More informationIntrodction Finite elds play an increasingly important role in modern digital commnication systems. Typical areas of applications are cryptographic sc
A New Architectre for a Parallel Finite Field Mltiplier with Low Complexity Based on Composite Fields Christof Paar y IEEE Transactions on Compters, Jly 996, vol 45, no 7, pp 856-86 Abstract In this paper
More informationLinear System Theory (Fall 2011): Homework 1. Solutions
Linear System Theory (Fall 20): Homework Soltions De Sep. 29, 20 Exercise (C.T. Chen: Ex.3-8). Consider a linear system with inpt and otpt y. Three experiments are performed on this system sing the inpts
More information