Staircase Codes for Secret Sharing with Optimal Communication and Read Overheads
|
|
- Mervin Esmond Wilcox
- 5 years ago
- Views:
Transcription
1 Saircase Codes for Secre Sharing wih Opimal Communicaion and Read Overheads Rawad Biar, Salim El Rouayheb ECE Deparmen, IIT, Chicago Absrac We sudy he communicaion efficien secre sharing (CESS) problem A classical hreshold secre sharing scheme randomly encodes a secre ino n shares given o n paries, such ha any se of a leas, < n, paries can reconsruc he secre, and any se of a mos z, z <, colluding paries canno obain any informaion abou he secre A CESS scheme saisfies he previous properies of hreshold secre sharing In addiion, i has minimum communicaion and read coss when he user conacs d, d, shares The inuiion behind he possible savings on hese coss is ha he user is only ineresed in decoding he secre and does no have o decode he random keys involved in he encoding process In his paper, we inroduce wo explici consrucions of CESS codes called Saircase Codes The firs consrucion achieves opimal communicaion and read coss for a fixed d, d The second consrucion achieves opimal coss universally for all possible values of d, d n Boh consrucions can be designed over a field GF (q), for any prime power q > n I INTRODUCTION Consider he hreshold secre sharing (SS) problem ], 2] in which a dealer randomly encodes a secre ino n shares and disribue hem o n paries, such ha any se of a leas, < n, paries can reconsruc he secre, and any se of a mos z, z <, paries canno obain any informaion abou he secre For insance, le n = 4, = 2 and z = and le s be a secre uniformly disribued over GF (5) Then, he following 4 shares (s+k, s+2k, s+3k, s+4k ) form an SS scheme, wih k being a random symbol, called key, chosen uniformly a random from GF (5) and independenly of s A legiimae user can decode he secre by conacing any = 2 paries, downloading heir shares and invering he linear sysem Secrecy is ensured, in an informaion heoreic sense, because he secre is padded wih he key in each share Threshold secre sharing code consrucions have been exensively sudied in he lieraure, eg, ], 3] 7] The lieraure on secre sharing predominanly sudies non-hreshold secre sharing schemes, wih so-called general access srucures, eg, 8] ] and references wihin In his paper, we focus on he problem of communicaion (and read) efficien secre sharing (CESS) A CESS scheme saisfies he properies of hreshold secre sharing described in he previous paragraph In addiion, i has minimum communicaion and read overheads when he user conacs d, d, shares The communicaion overhead (CO) (respecively read overhead, RO) is defined as he exra amoun of informaion (beyond he secre size) ha Pary Pary 2 Pary 3 Pary 4 s + s 2 + k s + 2s 2 + 4k s + 3s 2 + 4k s + 4s 2 + k k + k 2 k + 2k 2 k + 3k 2 k + 4k 2 TABLE I THE STAIRCASE SECRET SHARING CODE FOR n = 4, = 2, z = AND d = 3 OVER GF (5) needs o be downloaded (respecively read) for a legiimae user conacing d paries o be able o decode he secre The CESS problem was inroduced by Wang and Wong in ] They focused on perfec CESS, where z =, and showed ha when d >, he user can download an amoun of informaion ha is less han shares and sill decode he secre Huang e al 2] sudied he CESS problem for all z < Before going ino more deails, we illusrae in Example how communicaion and read coss can be reduced The CESS code in his example belongs o he new family of Saircase codes which we inroduce in Secion III Example : Consider again he SS problem wih n = 4, = 2, z = We assume now ha he secre s is formed of 2 symbols s, s 2 over GF (5) and use wo keys k, k 2 drawn independenly and uniformly a random from GF (5) To consruc he Saircase code, he secre symbols and keys are arranged in a marix M as shown in () The marix M is muliplied by a 4 3 Vandermonde marix V o obain he marix C = V M The 4 rows of C form he 4 differen shares and give he Saircase code in Table I k 2 4 C = V M = s 2 k k () 4 M V The nomenclaure of Saircase codes comes from he posiion of he zero block marices in he general srucure of he marix M (see Table III) A legiimae user conacing any = 2 paries can decode he secre by downloading he wo conaced shares, ie, 4 symbols However, a user conacing d = 3 paries can decode he secre by downloading only 3 symbols, namely he firs symbol (in blue) of each conaced share The key idea here is ha he user is only ineresed in decoding he secre and no necessarily he keys When d = 3, he user decodes he secre and key k, whereas when d = = 2, he user has o decode he secre and boh of he keys This code acually /6/$3 26 IEEE 396
2 achieves he minimum CO and RO equal o symbol for d = 3 (and 2 symbols for d = = 2) given laer in (4) and (5) Secrecy is achieved because each z = pary canno obain any informaion abou s and s 2 Relaed work: Wang and Wong derived in ] a lower bound on CO for perfec CESS, where z = They consruced codes, using polynomial evaluaion over GF (q), where q > n + v and v = LCM{ +,, n}, which achieve minimum CO and RO universally for all d, d n Zhang e al 3] consruced CESS codes for he same parameers over GF (q), where q > n Recenly, Huang e al 2] generalized he lower bound on CO for any z, z < They consruced explici CESS codes for any z, z <, achieving he minimum CO and RO for d = n over GF (q), q > n(n z) Moreover, hey proved he achievabiliy of he lower bound on CO and RO universally for all possible values of d, d n using random linear code consrucions Conribuion: In his paper, we inroduce a new class of deerminisic linear CESS codes, called Saircase Codes, which generalizes he consrucion in Example We describe wo explici consrucions of Saircase codes The firs consrucion achieves minimum CO and RO for any given d The second is a universal consrucion ha achieves minimum CO and RO simulaneously for all possible values of d, d n Saircase codes require a small finie field GF (q) of size q > n, which is he same requiremen for Reed Solomon based SS codes 2 3] Organizaion: The paper is organized as follows In secion II, we formulae he problem and inroduce he noaion In secion III, we describe he Saircase code consrucion for fixed d Moreover, we give an example and prove ha his consrucion achieves minimum CO and RO (Theorem ) In secion IV, we give he consrucion for universal Saircase codes (Theorem 2) We conclude in secion V II SYSTEM MODEL We consider he CESS problem and follow he majoriy of he noaions in 2] A secre s of size k unis is formed of kα symbols ( uni = α symbols) The secre symbols are drawn independenly and uniformly a random from a finie alphabe, ypically a finie field A CESS code is a scheme ha randomly encodes he secre ino n shares w,, w n of uni size each, and disribue hem o n disinc paries A CESS code mus saisfy he following properies: ) Perfec secrecy: Any subse of z or less paries should no be able o obain any informaion abou he secre Le n] = {,, n}, and for any subse B n] denoe by W B he se of shares indexed by B, ie, W B = {w i ; i B} Then, he perfec secrecy condiion can be expressed as H(s W Z ) = H(s), Z n] s Z = z (2) Leas common muliple 2 However, he proposed consrucions require o divide he secre ino a cerain number of symbols α, which may no be necessary for SS codes 2) MDS: A user downloading any shares is able o recover he secre, ie, H(s W A ) =, A n] s A = (3) Equaions (2) and (3) imply ha he secre can be of a mos z unis (see 2, Proposiion ]) We will ake he secre o be of maximum size, ie, k = z unis 3) Minimum CO and RO: a user conacing any d paries, d n, is able o decode he secre by reading and downloading exacly k + CO(d) unis of informaion in oal from all he conaced shares, where CO(d) = kz d z (4) Here, H() denoes he enropy funcion Equaion (4) represens he achievable informaion heoreic lower bound 2, Theorem ] on he communicaion overhead, CO(d), needed o saisfy he consrains in (2) and (3), when he user conacs d shares Since he amoun of informaion read canno be less han he downloaded amoun, he following lower bound on RO holds, RO(d) CO(d) (5) We will refer o a CESS code described above as an (n, k, z, d) CESS code, where he hreshold is = k+z For insance, he code in Example is an (4,,, 3) CESS code We will also be ineresed in universal (n, k, z) CESS code ha achieves minimum CO(d) and RO(d) simulaneously for all possible values of d Noe ha he MDS consrain is subsumed by he minimum CO and RO consrain since i corresponds o he case of d = and CO() = z However, we will make his disincion for clariy of exposiion III STAIRCASE CODE CONSTRUCTION FOR FIXED d A Code consrucion Theorem : The (n, k, z, d) Saircase CESS code consrucion defined below over GF (q), q > n, saisfies he required MDS and perfec secrecy consrains given in (2) and (3), and achieves opimal communicaion and read overheads CO(d) and RO(d) given in (4) and (5) for any given d, d {k + z,, n} We describe he (n, k, z, d) Saircase code consrucion ha achieves opimal communicaion and read overheads CO(d) and RO(d) for any given d, k+z d n In his consrucion, we ake α = d z Hence, he secre s of size k unis is formed of k(d z) symbols s,, s kα, where s i GF (q) and q > n The symbols s i are arranged in an α k marix S The consrucion uses zα iid random keys drawn uniformly a random from GF (q) and independenly of he secre The keys are pariioned ino wo marices K and of dimensions z k and z (α k), respecively Le D be he ranspose S of he las (α k) rows of he marix K] 3 and le be he all zero square marix of dimensions (α k) (α k) Noe ha α k since d z + k The key ingredien of he 3 If α k z, ie, d 2z + k, hen D consiss of he ranspose of he las α k rows of K 397
3 consrucion is o arrange he secre and he keys in he d α marix M defined in Table II The inspiraion here is from he class of Produc Marix codes ha minimizes he repair bandwidh in disribued sorage sysems 4] D α S M = z K d α k α k k z α k TABLE II THE STRUCTURE OF THE MATRIX M THAT CONTAINS THE SECRET AND KEYS IN THE STAIRCASE CODE CONSTRUCTION FOR FIXED d Encoding: Le V be an n d Vandermonde marix over GF (q) The marix M is muliplied by V o obain he marix C = V M The n rows of C form he n differen shares, ie, w i = v i M, i =,, n, where v i is he i h row of V Decoding: A user conacing any = k + z paries downloads all he conaced shares A user conacing d paries, indexed by I n], downloads he firs k symbols ] from each conaced pary corresponding o v i S K, i I (he superscrip denoes he ranspose of a marix) Theorem guaranies ha he user will be able o decode he secre in boh cases B Example We give he deails of he consrucion of he (n, k, z, d) = (4,,, 3) CESS code of Example We ake α = d z = 2, hus he secre s is formed of kα = 2 symbols s, s 2 over GF (q), q = 5 > n = 4 The consrucion uses zα = 2 iid random keys k, k 2 drawn uniformly a random over GF (5) and independenly of he secre The keys are pariioned ino wo marices K and of dimensions z k = and z (α k) =, respecively The marix D is he ranspose of he las α k = row of K] Hence, we have, K = s D = k, = k 2, and S = The secre and he keys s 2 are arranged in an d α = 4 2 marix M Le V be an n d = 4 3 Vandermonde marix M and V are given again in (6) M = k s 2 k 2 and V = (6) k 4 The shares are he rows of he marix C = V M as given in Table I We wan o check ha his code saisfies he following properies ) Minimum CO and RO for d = 3: We check ha a user conacing d = 3 paries can reconsruc he secre wih minimum CO and RO For insance, if a user conacs he firs 3 paries and downloads he firs symbol of each conaced share, hen he downloaded daa is given by, 2 4 The marix on he lef is a 3 3 square s 2 k 3 4 Vandermonde marix, hence inverible Therefore, he user can decode he secre (and k ) This remains rue irrespecive of which 3 paries are conaced The user reads and downloads 3 symbols of size 3/α = 3/2 unis resuling in minimum overheads, CO(3) = RO(3) = 3/2 k = /2, as given in (4) and (5) 2) MDS: We check ha a user conacing = k + z = 2 paries can reconsruc he secre Suppose he user conacs paries and 2 and downloads all heir shares given ] by k s k 2 This sysem is equivalen o he k ] wo following sysems s and k ] ] k 2 k 2 The decoder uses he laer sysem o decode k and k 2 This is possible because he marix on he lef is a square Vandermonde marix, hence inverible Then, he decoder subracs he obained value of k from he former ] sysem ] s o obain again he following inverible sysem 2 s 2 The decoder hen decodes s and s 2 Again, his procedure is possible for any 2 conaced paries 3) Perfec secrecy: A a high level, perfec secrecy is achieved here because each symbol in a share is padded wih a leas one disinc key saisically independen of he secre, making he shares of any pary independen of he secre C Proof of Theorem Consider he (n, k, z, d) Saircase code defined above We prove Theorem by esablishing he following properies: ) Minimum CO(d) and RO(d): We prove ha a user conacing any d paries can reconsruc he secre while incurring minimum CO and RO A user conacing any d paries downloads he firs k symbols of each pary Le I n], I = d, be he se of indices of he conaced paries, hen he downloaded daa is given by V I S K ], where VI is a d d square Vandermonde marix formed of he rows of V indexed by I, hence inverible The user can always decode he secre (and he keys in K ) by invering V I The code is opimal on communicaion and read overheads CO(d) and RO(d), because he user only reads and downloads kd symbols of size kd/α = kd/(d z) unis resuling in an overhead of kd/α k = kz/α = kz/(d z) achieving he opimal CO(d) and RO(d) given in (4) and (5) 2) MDS propery: We prove ha a user conacing any = k + z paries and downloading all heir shares can reconsruc he secre Le I n], I =, be he se of indices of he conaced paries The informaion downloaded by he user is V I M and is given by V I S D K Firs, we show ha he user can decode he enries of D and The decoder considers he sysem V I D K2 ] ] = V I D K2 Recall ha he dimensions of he all zero sub-marix in D ] are (α k) (α k) Then, V I is a (k + z) (k + z) square Vandermonde marix formed by he firs (k + z) columns of V I Therefore, he user can always decode he enries of D and because V I is inverible Second, we prove ha he user can always decode he enries of S and hence reconsruc he 398
4 secre Recall ha D is he ranspose of he las α k rows of M ] S K By subracing he previously decoded ] enries of D from V I S K, he user obains V I M, where V I is defined above and M is a (k + z) k marix formed by he firs k + z rows of M Therefore, he user can always decode he enries of M because V I is inverible If k + z α, hen S is direcly obained since i is conained in M Oherwise, M consiss of he firs k + z rows of S The remaining rows of S are conained in D and were previously decoded In boh cases, he user can decode all he secre symbols s,, s kα 3) Perfec secrecy: We prove ha for any subse Z n], Z = z, he collecion of shares W Z indexed by Z does no reveal any informaion abou he secre as given in equaion (2), ie, H(s W z ) = H(s) To ha end, i suffices o prove ha H(K, W Z, s) = 5] Therefore, we need o show ha given he secre s as side informaion, any collecion W Z of z shares can decode all he random keys A collecion of W Z shares can be wrien as V Z S D K, where V Z is a z d marix corresponding o he rows of V indexed by Z This linear sysem can be divided ino wo sysems as follows, V Z S K ], (7) V Z D K2 ] (8) Given he secre as side informaion, ] i can be subraced from (7), which becomes V Z K = V Z K, where V Z is a z z square Vandermonde marix consising of he las z columns of V Z The enries of K can always be decoded because V Z is inverible Now ha K is decoded and we have S as side informaion, we can obain D as he las α k rows of ] S K Then, he enries of D are subraced from he second sysem o obain VZ, where VZ is a z z square Vandermonde marix consising of he (k + ) h o he (k +z) h columns of V Z Hence, he enries of can always be decoded because VZ is inverible Therefore, H(K, W Z, s) =, Z, Z n], Z = z and perfec secrecy is achieved IV UNIVERSAL STAIRCASE CODE CONSTRUCTION A Universal Code consrucion Theorem 2: The (n, k, z) Saircase CESS code consrucion defined below over GF (q), q > n, saisfies he required MDS and perfec secrecy consrains given in (2) and (3), and achieves opimal communicaion and read overheads CO(d) and RO(d) given in (4) and (5) simulaneously for all d, k + z d n The proof of Theorem 2 is omied and can be found in 5] We describe he (n, k, z) Saircase code consrucion menioned in Theorem 2, which achieves opimal communicaion and read overheads CO(d) and RO(d) simulaneously for all possible values of d, ie, k + z d n Le d = n, d 2 = n,, d h = k + z, wih h = n k z +, and α i = d i z, i =,, h Choose α = LCM(α, α 2,, α h ), ha is he leas common muliple of all he α i s excep for he las α h = k The secre s consiss of kα symbols s,, s kα over GF (q), q > n, arranged in an α kα/α marix S The consrucion uses zα iid random keys, drawn uniformly a random from GF (q) and independenly of he secre The keys are pariioned ino h marices K i, i =,, h, of respecive dimensions z kα/α i α i (ake α = ) The marix ] K K i consiss of he overhead of keys decoded by a user conacing d i paries We form h marices M i, i =,, h, as follows, M = S and M i = D α α i i n n K i z i, (9) z K n d i kα/α kα/α i α i where, D j is ] formed of he (n j + ) h row of M M 2 M j wrapped around o make a marix of dimensions α j+ kα/α j α j+ for j =,, h The s are he all zero marices used o complee he M i s o n rows The secre and he keys are arranged in he marix M = ] M M defined in Table III D D h 2 D K h M = S K 3 n α K saircase 2 K srucure M M 2 M 3 M h TABLE III THE STRUCTURE OF THE MATRIX M THAT CONTAINS THE SECRET AND KEYS IN THE UNIVERSAL STAIRCASE CODE CONSTRUCTION The marix M is characerized by a special srucure resuling from carefully choosing he enries of he D j s and placing he all zero sub-blocks in a saircase shape, giving hese codes heir name This saircase shape allows o achieve opimal communicaion and read overheads CO and RO for all possible d Encoding: The encoding is similar o he firs Saircase code consrucion The marix M is muliplied by an n n Vandermonde marix over GF (q) o obain he marix C = V M The n rows of C form he n differen shares Decoding: To reconsruc he secre, a user conacing any d j paries indexed by I n] downloads he firs kα/α j symbols from each conaced pary corresponding o v i M M j ], for all i I B Example of Universal Saircase code We describe here he consrucion of an (n, k, z) = (4,, ) universal Saircase code over GF (q), q = 5 > n = 4, by following he consrucion in Secion IV This example is explained in more deails in 5] We have d = 4, d 2 = 3, d 3 = 2 and α = 3, α 2 = 2, α 3 = and α = LCM(α, α 2 ) = LCM(3, 2) = 6 The secre s is formed of kα = 6 symbols over GF (5) The consrucion uses zα = 6 iid random keys drawn uniformly a random from GF (5) and independenly of he secre The secre symbols 399
5 and he random keys are arranged in he following marices, S = s 4 s 2 s 5, K = ] k k 2, K2 = ] k 3, and K3 = s 3 s ] 6 k4 k 5 k 6 To build he marix M which will be used for ] s s encoding he secre, we sar wih M = 2 s 3 k s 4 s 5 s 6 k 2 Then, D is he α 2 kα/α α 2 = 2 marix ha conains he symbols of he n h row of M, ie, D = ] k k 2 Therefore, M 2 = D ] = k k 2 k 3 ] Similarly, s 3 s 6 k 3 we have D 2 = ] s 3 s 6 k 3 and M3 = k 4 k 5 k 6 We obain M by concaenaing M, M 2 and M 3, M = s s 4 k s 3 s 6 k 3 s 2 s 5 k 2 k 4 k 5 k 6 s 3 s 6 k 3 k k 2 M M 2 M 3 () Here, V is he n n = 4 4 Vandermonde marix over GF (5) given in () The shares are given by he rows of he marix C = V M and shown in Table IV V = () 4 4 Pary Pary 2 s + s 2 + s 3 + k s + 2s 2 + 4s 3 + 3k s 4 + s 5 + s 6 + k 2 s 4 + 2s 5 + 4s 6 + 3k 2 k + k 2 + k 3 k + 2k 2 + 4k 3 s 3 + k 4 s 3 + 2k 4 s 6 + k 5 s 6 + 2k 5 k 3 + k 6 k 3 + 2k 6 Pary 3 Pary 4 s + 3s 2 + 4s 3 + 2k s + 4s 2 + s 3 + 4k s 4 + 3s 5 + 4s 6 + 2k 2 s 4 + 4s 5 + s 6 + 4k 2 k + 3k 2 + 4k 3 k + 4k 2 + k 3 s 3 + 3k 4 s 3 + 4k 4 s 6 + 3k 5 s 6 + 4k 5 k 3 + 3k 6 k 3 + 4k 6 TABLE IV AN EXAMPLE OF A UNIVERSAL STAIRCASE CODE FOR (n, k, z) = (4,, ) OVER GF (5) The decoding rules for each d follow he general rules described in he previous secion We check ha his code achieves minimum CO and RO simulaneously for d 2 = 3 and d = 4 Suppose a user conacs d 2 = 3 paries indexed by I n] The user reads and downloads he firs kα/α 2 = 3 symbols ] of each conaced share corresponding o V I M M 2 (in black and red), where VI is he marix formed by he rows of V indexed by I The user will be able o reconsruc he secre The resuling CO and RO are equal o 3/2 k = /2 unis achieving he opimal CO(d 2 ) and RO(d 2 ) given in (4) and (5) In he case when a user conacs d = 4 paries, he user reads and downloads he firs kα/α = 2 symbols of each conaced share corresponding o V I M (in black) The user can always decode he secre because V I here is a 4 4 square Vandermonde marix, hence inverible The resuling CO and RO are equal o /3 achieving he opimal CO(d ) and RO(d ) given in (4) and (5) V CONCLUSION We considered he communicaion efficien secre sharing (CESS) problem The goal is o minimize he communicaion and read overheads for a user ineresed in decoding he secre To ha end, we inroduced a new class of deerminisic linear CESS codes, called Saircase Codes We described wo explici consrucions of Saircase codes The firs consrucion achieves minimum overheads for any given number d of paries conaced by he user The second is a universal consrucion ha achieves minimum overheads simulaneously for all possible values of d The inroduced codes require a small finie field GF (q) of size q > n, which is he same requiremen for Reed Solomon based SS codes REFERENCES ] A Shamir, How o share a secre, Communicaions of he ACM, vol 22, no, pp 62 63, 979 2] G R Blakley, Safeguarding crypographic keys, in Proceedings of he Naional Compuer Conference, vol 48, pp 33 37, 979 3] R J McEliece and D V Sarwae, On sharing secres and Reed- Solomon codes, Communicaions of he ACM, vol 24, no 9, pp , 98 4] H-Y Chien, J Jinn-Ke, and Y-M Tseng, A pracical (, n) muli-secre sharing scheme, IEICE Transacions on Fundamenals of Elecronics, Communicaions and Compuer Sciences, vol 83, no 2, pp , 2 5] E D Karnin, J W Greene, and M E Hellman, On secre sharing sysems, IEEE Transacions on Informaion Theory, vol 29, no, pp 35 4, 983 6] C-P Lai and C Ding, Several generalizaions of Shamir s secre sharing scheme, Inernaional Journal of Foundaions of Compuer Science, vol 5, no 2, pp , 24 7] C-C Yang, T-Y Chang, and M-S Hwang, A (,n) muli-secre sharing scheme, Applied Mahemaics and Compuaion, vol 5, no 2, pp , 24 8] C Padró, Lecure noes in secre sharing, IACR Crypology eprin Archive, vol 22, p 674, 22 9] E F Brickell, Some ideal secre sharing schemes, in Advances in Crypology EUROCRYPT 89, pp , 99 ] R Cramer, I B Damgård, and J B Nielsen, Secure Mulipary Compuaion and Secre Sharing Cambridge, England: Cambridge Universiy Press, 25 ] H Wang and D S Wong, On secre reconsrucion in secre sharing schemes, IEEE Transacions on Informaion Theory, vol 54, pp , Jan 28 2] W Huang, M Langberg, J Kliewer, and J Bruck, Communicaion efficien secre sharing, arxiv preprin arxiv:55755, 25 3] Z Zhang, Y M Chee, S Ling, M Liu, and H Wang, Threshold changeable secre sharing schemes revisied, Theoreical Compuer Science, vol 48, pp 6 5, 22 4] K V Rashmi, N B Shah, and P V Kumar, Opimal exac-regeneraing codes for disribued sorage a he MSR and MBR poins via a producmarix consrucion, IEEE Transacions on Informaion Theory, vol 57, no 8, pp , 2 5] R Biar and S El Rouayheb, Saircase codes for secre sharing wih opimal communicaion and read overheads, arxiv preprin arxiv:52299, 25 4
Staircase Codes for Secret Sharing with Optimal Communication and Read Overheads
1 Staircase Codes for Secret Sharing with Optimal Communication and Read Overheads Rawad Bitar, Student Member, IEEE and Salim El Rouayheb, Member, IEEE Abstract We study the communication efficient secret
More informationT L. t=1. Proof of Lemma 1. Using the marginal cost accounting in Equation(4) and standard arguments. t )+Π RB. t )+K 1(Q RB
Elecronic Companion EC.1. Proofs of Technical Lemmas and Theorems LEMMA 1. Le C(RB) be he oal cos incurred by he RB policy. Then we have, T L E[C(RB)] 3 E[Z RB ]. (EC.1) Proof of Lemma 1. Using he marginal
More informationChapter 2. First Order Scalar Equations
Chaper. Firs Order Scalar Equaions We sar our sudy of differenial equaions in he same way he pioneers in his field did. We show paricular echniques o solve paricular ypes of firs order differenial equaions.
More informationt is a basis for the solution space to this system, then the matrix having these solutions as columns, t x 1 t, x 2 t,... x n t x 2 t...
Mah 228- Fri Mar 24 5.6 Marix exponenials and linear sysems: The analogy beween firs order sysems of linear differenial equaions (Chaper 5) and scalar linear differenial equaions (Chaper ) is much sronger
More informationInventory Analysis and Management. Multi-Period Stochastic Models: Optimality of (s, S) Policy for K-Convex Objective Functions
Muli-Period Sochasic Models: Opimali of (s, S) Polic for -Convex Objecive Funcions Consider a seing similar o he N-sage newsvendor problem excep ha now here is a fixed re-ordering cos (> 0) for each (re-)order.
More information11!Hí MATHEMATICS : ERDŐS AND ULAM PROC. N. A. S. of decomposiion, properly speaking) conradics he possibiliy of defining a counably addiive real-valu
ON EQUATIONS WITH SETS AS UNKNOWNS BY PAUL ERDŐS AND S. ULAM DEPARTMENT OF MATHEMATICS, UNIVERSITY OF COLORADO, BOULDER Communicaed May 27, 1968 We shall presen here a number of resuls in se heory concerning
More informationLecture 20: Riccati Equations and Least Squares Feedback Control
34-5 LINEAR SYSTEMS Lecure : Riccai Equaions and Leas Squares Feedback Conrol 5.6.4 Sae Feedback via Riccai Equaions A recursive approach in generaing he marix-valued funcion W ( ) equaion for i for he
More informationODEs II, Lecture 1: Homogeneous Linear Systems - I. Mike Raugh 1. March 8, 2004
ODEs II, Lecure : Homogeneous Linear Sysems - I Mike Raugh March 8, 4 Inroducion. In he firs lecure we discussed a sysem of linear ODEs for modeling he excreion of lead from he human body, saw how o ransform
More information10. State Space Methods
. Sae Space Mehods. Inroducion Sae space modelling was briefly inroduced in chaper. Here more coverage is provided of sae space mehods before some of heir uses in conrol sysem design are covered in he
More informationRainbow saturation and graph capacities
Rainbow sauraion and graph capaciies Dániel Korándi Absrac The -colored rainbow sauraion number rsa (n, F ) is he minimum size of a -edge-colored graph on n verices ha conains no rainbow copy of F, bu
More informationEnergy Storage Benchmark Problems
Energy Sorage Benchmark Problems Daniel F. Salas 1,3, Warren B. Powell 2,3 1 Deparmen of Chemical & Biological Engineering 2 Deparmen of Operaions Research & Financial Engineering 3 Princeon Laboraory
More informationSUBSPACES OF MATRICES WITH SPECIAL RANK PROPERTIES
SUBSPACES OF MATRICES WITH SPECIAL RANK PROPERTIES JEAN-GUILLAUME DUMAS, ROD GOW, GARY MCGUIRE, AND JOHN SHEEKEY Absrac. Le K be a field and le V be a vecor space of finie dimension n over K. We invesigae
More informationPENALIZED LEAST SQUARES AND PENALIZED LIKELIHOOD
PENALIZED LEAST SQUARES AND PENALIZED LIKELIHOOD HAN XIAO 1. Penalized Leas Squares Lasso solves he following opimizaion problem, ˆβ lasso = arg max β R p+1 1 N y i β 0 N x ij β j β j (1.1) for some 0.
More informationWe just finished the Erdős-Stone Theorem, and ex(n, F ) (1 1/(χ(F ) 1)) ( n
Lecure 3 - Kövari-Sós-Turán Theorem Jacques Versraëe jacques@ucsd.edu We jus finished he Erdős-Sone Theorem, and ex(n, F ) ( /(χ(f ) )) ( n 2). So we have asympoics when χ(f ) 3 bu no when χ(f ) = 2 i.e.
More informationAnonymity in Shared Symmetric Key Primitives
Anonymiy in Shared Symmeric Key Primiives Gregory M. Zaverucha and Douglas R. Sinson David R. Cherion School of Compuer Science Universiy of Waerloo Waerloo ON, N2L 3G1, Canada {gzaveruc, dsinson}@uwaerloo.ca
More informationStability and Bifurcation in a Neural Network Model with Two Delays
Inernaional Mahemaical Forum, Vol. 6, 11, no. 35, 175-1731 Sabiliy and Bifurcaion in a Neural Nework Model wih Two Delays GuangPing Hu and XiaoLing Li School of Mahemaics and Physics, Nanjing Universiy
More informationA High-Rate MSR Code With Polynomial Sub-Packetization Level
A High-Rae MSR Code Wih Polynomial Sub-Packeizaion Level Birenjih Sasidharan, Gaurav Kumar Agarwal, and P Vijay Kumar Deparmen of Elecrical Communicaion Engineering, Indian Insiue of Science, Bangalore
More informationMath 315: Linear Algebra Solutions to Assignment 6
Mah 35: Linear Algebra s o Assignmen 6 # Which of he following ses of vecors are bases for R 2? {2,, 3, }, {4,, 7, 8}, {,,, 3}, {3, 9, 4, 2}. Explain your answer. To generae he whole R 2, wo linearly independen
More informationERROR LOCATING CODES AND EXTENDED HAMMING CODE. Pankaj Kumar Das. 1. Introduction and preliminaries
MATEMATIČKI VESNIK MATEMATIQKI VESNIK 70, 1 (2018), 89 94 March 2018 research paper originalni nauqni rad ERROR LOCATING CODES AND EXTENDED HAMMING CODE Pankaj Kumar Das Absrac. Error-locaing codes, firs
More informationSome Ramsey results for the n-cube
Some Ramsey resuls for he n-cube Ron Graham Universiy of California, San Diego Jozsef Solymosi Universiy of Briish Columbia, Vancouver, Canada Absrac In his noe we esablish a Ramsey-ype resul for cerain
More informationFinal Spring 2007
.615 Final Spring 7 Overview The purpose of he final exam is o calculae he MHD β limi in a high-bea oroidal okamak agains he dangerous n = 1 exernal ballooning-kink mode. Effecively, his corresponds o
More informationMartingales Stopping Time Processes
IOSR Journal of Mahemaics (IOSR-JM) e-issn: 2278-5728, p-issn: 2319-765. Volume 11, Issue 1 Ver. II (Jan - Feb. 2015), PP 59-64 www.iosrjournals.org Maringales Sopping Time Processes I. Fulaan Deparmen
More informationOptimal Paired Choice Block Designs. Supplementary Material
Saisica Sinica: Supplemen Opimal Paired Choice Block Designs Rakhi Singh 1, Ashish Das 2 and Feng-Shun Chai 3 1 IITB-Monash Research Academy, Mumbai, India 2 Indian Insiue of Technology Bombay, Mumbai,
More informationLecture Notes 2. The Hilbert Space Approach to Time Series
Time Series Seven N. Durlauf Universiy of Wisconsin. Basic ideas Lecure Noes. The Hilber Space Approach o Time Series The Hilber space framework provides a very powerful language for discussing he relaionship
More informationExpert Advice for Amateurs
Exper Advice for Amaeurs Ernes K. Lai Online Appendix - Exisence of Equilibria The analysis in his secion is performed under more general payoff funcions. Wihou aking an explici form, he payoffs of he
More informationNotes on Kalman Filtering
Noes on Kalman Filering Brian Borchers and Rick Aser November 7, Inroducion Daa Assimilaion is he problem of merging model predicions wih acual measuremens of a sysem o produce an opimal esimae of he curren
More informationApplying Genetic Algorithms for Inventory Lot-Sizing Problem with Supplier Selection under Storage Capacity Constraints
IJCSI Inernaional Journal of Compuer Science Issues, Vol 9, Issue 1, No 1, January 2012 wwwijcsiorg 18 Applying Geneic Algorihms for Invenory Lo-Sizing Problem wih Supplier Selecion under Sorage Capaciy
More informationGMM - Generalized Method of Moments
GMM - Generalized Mehod of Momens Conens GMM esimaion, shor inroducion 2 GMM inuiion: Maching momens 2 3 General overview of GMM esimaion. 3 3. Weighing marix...........................................
More informationSTATE-SPACE MODELLING. A mass balance across the tank gives:
B. Lennox and N.F. Thornhill, 9, Sae Space Modelling, IChemE Process Managemen and Conrol Subjec Group Newsleer STE-SPACE MODELLING Inroducion: Over he pas decade or so here has been an ever increasing
More informationGCD AND LCM-LIKE IDENTITIES FOR IDEALS IN COMMUTATIVE RINGS
GCD AND LCM-LIKE IDENTITIES FOR IDEALS IN COMMUTATIVE RINGS D. D. ANDERSON, SHUZO IZUMI, YASUO OHNO, AND MANABU OZAKI Absrac. Le A 1,..., A n n 2 be ideals of a commuaive ring R. Le Gk resp., Lk denoe
More informationZápadočeská Univerzita v Plzni, Czech Republic and Groupe ESIEE Paris, France
ADAPTIVE SIGNAL PROCESSING USING MAXIMUM ENTROPY ON THE MEAN METHOD AND MONTE CARLO ANALYSIS Pavla Holejšovsá, Ing. *), Z. Peroua, Ing. **), J.-F. Bercher, Prof. Assis. ***) Západočesá Univerzia v Plzni,
More informationChapter 6. Systems of First Order Linear Differential Equations
Chaper 6 Sysems of Firs Order Linear Differenial Equaions We will only discuss firs order sysems However higher order sysems may be made ino firs order sysems by a rick shown below We will have a sligh
More informationDiebold, Chapter 7. Francis X. Diebold, Elements of Forecasting, 4th Edition (Mason, Ohio: Cengage Learning, 2006). Chapter 7. Characterizing Cycles
Diebold, Chaper 7 Francis X. Diebold, Elemens of Forecasing, 4h Ediion (Mason, Ohio: Cengage Learning, 006). Chaper 7. Characerizing Cycles Afer compleing his reading you should be able o: Define covariance
More informationRobust estimation based on the first- and third-moment restrictions of the power transformation model
h Inernaional Congress on Modelling and Simulaion, Adelaide, Ausralia, 6 December 3 www.mssanz.org.au/modsim3 Robus esimaion based on he firs- and hird-momen resricions of he power ransformaion Nawaa,
More informationOn the Infinitude of Covering Systems with Least Modulus Equal to 2
Annals of Pure and Applied Mahemaics Vol. 4, No. 2, 207, 307-32 ISSN: 2279-087X (P), 2279-0888(online) Published on 23 Sepember 207 www.researchmahsci.org DOI: hp://dx.doi.org/0.22457/apam.v4n2a3 Annals
More informationChapter 3 Boundary Value Problem
Chaper 3 Boundary Value Problem A boundary value problem (BVP) is a problem, ypically an ODE or a PDE, which has values assigned on he physical boundary of he domain in which he problem is specified. Le
More informationIntroduction to Probability and Statistics Slides 4 Chapter 4
Inroducion o Probabiliy and Saisics Slides 4 Chaper 4 Ammar M. Sarhan, asarhan@mahsa.dal.ca Deparmen of Mahemaics and Saisics, Dalhousie Universiy Fall Semeser 8 Dr. Ammar Sarhan Chaper 4 Coninuous Random
More informationINDEPENDENT SETS IN GRAPHS WITH GIVEN MINIMUM DEGREE
INDEPENDENT SETS IN GRAPHS WITH GIVEN MINIMUM DEGREE JAMES ALEXANDER, JONATHAN CUTLER, AND TIM MINK Absrac The enumeraion of independen ses in graphs wih various resricions has been a opic of much ineres
More informationCHAPTER 2 Signals And Spectra
CHAPER Signals And Specra Properies of Signals and Noise In communicaion sysems he received waveform is usually caegorized ino he desired par conaining he informaion, and he undesired par. he desired par
More informationMathematical Theory and Modeling ISSN (Paper) ISSN (Online) Vol 3, No.3, 2013
Mahemaical Theory and Modeling ISSN -580 (Paper) ISSN 5-05 (Online) Vol, No., 0 www.iise.org The ffec of Inverse Transformaion on he Uni Mean and Consan Variance Assumpions of a Muliplicaive rror Model
More informationLearning a Class from Examples. Training set X. Class C 1. Class C of a family car. Output: Input representation: x 1 : price, x 2 : engine power
Alpaydin Chaper, Michell Chaper 7 Alpaydin slides are in urquoise. Ehem Alpaydin, copyrigh: The MIT Press, 010. alpaydin@boun.edu.r hp://www.cmpe.boun.edu.r/ ehem/imle All oher slides are based on Michell.
More informationVehicle Arrival Models : Headway
Chaper 12 Vehicle Arrival Models : Headway 12.1 Inroducion Modelling arrival of vehicle a secion of road is an imporan sep in raffic flow modelling. I has imporan applicaion in raffic flow simulaion where
More informationMath Week 14 April 16-20: sections first order systems of linear differential equations; 7.4 mass-spring systems.
Mah 2250-004 Week 4 April 6-20 secions 7.-7.3 firs order sysems of linear differenial equaions; 7.4 mass-spring sysems. Mon Apr 6 7.-7.2 Sysems of differenial equaions (7.), and he vecor Calculus we need
More informationTHE MATRIX-TREE THEOREM
THE MATRIX-TREE THEOREM 1 The Marix-Tree Theorem. The Marix-Tree Theorem is a formula for he number of spanning rees of a graph in erms of he deerminan of a cerain marix. We begin wih he necessary graph-heoreical
More informationIMPLICIT AND INVERSE FUNCTION THEOREMS PAUL SCHRIMPF 1 OCTOBER 25, 2013
IMPLICI AND INVERSE FUNCION HEOREMS PAUL SCHRIMPF 1 OCOBER 25, 213 UNIVERSIY OF BRIISH COLUMBIA ECONOMICS 526 We have exensively sudied how o solve sysems of linear equaions. We know how o check wheher
More informationdi Bernardo, M. (1995). A purely adaptive controller to synchronize and control chaotic systems.
di ernardo, M. (995). A purely adapive conroller o synchronize and conrol chaoic sysems. hps://doi.org/.6/375-96(96)8-x Early version, also known as pre-prin Link o published version (if available):.6/375-96(96)8-x
More informationEE 315 Notes. Gürdal Arslan CLASS 1. (Sections ) What is a signal?
EE 35 Noes Gürdal Arslan CLASS (Secions.-.2) Wha is a signal? In his class, a signal is some funcion of ime and i represens how some physical quaniy changes over some window of ime. Examples: velociy of
More informationA Specification Test for Linear Dynamic Stochastic General Equilibrium Models
Journal of Saisical and Economeric Mehods, vol.1, no.2, 2012, 65-70 ISSN: 2241-0384 (prin), 2241-0376 (online) Scienpress Ld, 2012 A Specificaion Tes for Linear Dynamic Sochasic General Equilibrium Models
More informationOn Multicomponent System Reliability with Microshocks - Microdamages Type of Components Interaction
On Mulicomponen Sysem Reliabiliy wih Microshocks - Microdamages Type of Componens Ineracion Jerzy K. Filus, and Lidia Z. Filus Absrac Consider a wo componen parallel sysem. The defined new sochasic dependences
More informationLet us start with a two dimensional case. We consider a vector ( x,
Roaion marices We consider now roaion marices in wo and hree dimensions. We sar wih wo dimensions since wo dimensions are easier han hree o undersand, and one dimension is a lile oo simple. However, our
More informationBidimensional Sand Pile and Ice Pile Models
Bidimensional Sand Pile and Ice Pile Models Enrica Duchi, Robero Manaci, Ha Duong Phan, Dominiue Rossin To cie his version: Enrica Duchi, Robero Manaci, Ha Duong Phan, Dominiue Rossin. Bidimensional Sand
More informationLongest Common Prefixes
Longes Common Prefixes The sandard ordering for srings is he lexicographical order. I is induced by an order over he alphabe. We will use he same symbols (,
More informationAn Introduction to Backward Stochastic Differential Equations (BSDEs) PIMS Summer School 2016 in Mathematical Finance.
1 An Inroducion o Backward Sochasic Differenial Equaions (BSDEs) PIMS Summer School 2016 in Mahemaical Finance June 25, 2016 Chrisoph Frei cfrei@ualbera.ca This inroducion is based on Touzi [14], Bouchard
More informationApplication of a Stochastic-Fuzzy Approach to Modeling Optimal Discrete Time Dynamical Systems by Using Large Scale Data Processing
Applicaion of a Sochasic-Fuzzy Approach o Modeling Opimal Discree Time Dynamical Sysems by Using Large Scale Daa Processing AA WALASZE-BABISZEWSA Deparmen of Compuer Engineering Opole Universiy of Technology
More information5. Stochastic processes (1)
Lec05.pp S-38.45 - Inroducion o Teleraffic Theory Spring 2005 Conens Basic conceps Poisson process 2 Sochasic processes () Consider some quaniy in a eleraffic (or any) sysem I ypically evolves in ime randomly
More information18 Biological models with discrete time
8 Biological models wih discree ime The mos imporan applicaions, however, may be pedagogical. The elegan body of mahemaical heory peraining o linear sysems (Fourier analysis, orhogonal funcions, and so
More informationR t. C t P t. + u t. C t = αp t + βr t + v t. + β + w t
Exercise 7 C P = α + β R P + u C = αp + βr + v (a) (b) C R = α P R + β + w (c) Assumpions abou he disurbances u, v, w : Classical assumions on he disurbance of one of he equaions, eg. on (b): E(v v s P,
More informationNotes for Lecture 17-18
U.C. Berkeley CS278: Compuaional Complexiy Handou N7-8 Professor Luca Trevisan April 3-8, 2008 Noes for Lecure 7-8 In hese wo lecures we prove he firs half of he PCP Theorem, he Amplificaion Lemma, up
More informationOptimal Server Assignment in Multi-Server
Opimal Server Assignmen in Muli-Server 1 Queueing Sysems wih Random Conneciviies Hassan Halabian, Suden Member, IEEE, Ioannis Lambadaris, Member, IEEE, arxiv:1112.1178v2 [mah.oc] 21 Jun 2013 Yannis Viniois,
More informationACE 562 Fall Lecture 4: Simple Linear Regression Model: Specification and Estimation. by Professor Scott H. Irwin
ACE 56 Fall 005 Lecure 4: Simple Linear Regression Model: Specificaion and Esimaion by Professor Sco H. Irwin Required Reading: Griffihs, Hill and Judge. "Simple Regression: Economic and Saisical Model
More informationAlmost Sure Degrees of Truth and Finite Model Theory of Łukasiewicz Fuzzy Logic
Almos Sure Degrees of Truh and Finie odel Theory of Łukasiewicz Fuzzy Logic Rober Kosik Insiue of Informaion Business, Vienna Universiy of Economics and Business Adminisraion, Wirschafsuniversiä Wien,
More informationComputer-Aided Analysis of Electronic Circuits Course Notes 3
Gheorghe Asachi Technical Universiy of Iasi Faculy of Elecronics, Telecommunicaions and Informaion Technologies Compuer-Aided Analysis of Elecronic Circuis Course Noes 3 Bachelor: Telecommunicaion Technologies
More information1 Review of Zero-Sum Games
COS 5: heoreical Machine Learning Lecurer: Rob Schapire Lecure #23 Scribe: Eugene Brevdo April 30, 2008 Review of Zero-Sum Games Las ime we inroduced a mahemaical model for wo player zero-sum games. Any
More informationINTRODUCTION TO MACHINE LEARNING 3RD EDITION
ETHEM ALPAYDIN The MIT Press, 2014 Lecure Slides for INTRODUCTION TO MACHINE LEARNING 3RD EDITION alpaydin@boun.edu.r hp://www.cmpe.boun.edu.r/~ehem/i2ml3e CHAPTER 2: SUPERVISED LEARNING Learning a Class
More informationStopping Set Elimination for LDPC Codes
Sopping Se Eliminaion for LDPC Codes Anxiao (Andrew) Jiang, Pulakesh Upadhyaya, Ying Wang, Krishna R. Narayanan Hongchao Zhou, Jin Sima, and Jehoshua Bruck Compuer Science and Engineering Deparmen, Texas
More informationSingle-Pass-Based Heuristic Algorithms for Group Flexible Flow-shop Scheduling Problems
Single-Pass-Based Heurisic Algorihms for Group Flexible Flow-shop Scheduling Problems PEI-YING HUANG, TZUNG-PEI HONG 2 and CHENG-YAN KAO, 3 Deparmen of Compuer Science and Informaion Engineering Naional
More informationFamilies with no matchings of size s
Families wih no machings of size s Peer Franl Andrey Kupavsii Absrac Le 2, s 2 be posiive inegers. Le be an n-elemen se, n s. Subses of 2 are called families. If F ( ), hen i is called - uniform. Wha is
More informationPhysics 235 Chapter 2. Chapter 2 Newtonian Mechanics Single Particle
Chaper 2 Newonian Mechanics Single Paricle In his Chaper we will review wha Newon s laws of mechanics ell us abou he moion of a single paricle. Newon s laws are only valid in suiable reference frames,
More informationMath 334 Fall 2011 Homework 11 Solutions
Dec. 2, 2 Mah 334 Fall 2 Homework Soluions Basic Problem. Transform he following iniial value problem ino an iniial value problem for a sysem: u + p()u + q() u g(), u() u, u () v. () Soluion. Le v u. Then
More information6.2 Transforms of Derivatives and Integrals.
SEC. 6.2 Transforms of Derivaives and Inegrals. ODEs 2 3 33 39 23. Change of scale. If l( f ()) F(s) and c is any 33 45 APPLICATION OF s-shifting posiive consan, show ha l( f (c)) F(s>c)>c (Hin: In Probs.
More informationA New Perturbative Approach in Nonlinear Singularity Analysis
Journal of Mahemaics and Saisics 7 (: 49-54, ISSN 549-644 Science Publicaions A New Perurbaive Approach in Nonlinear Singulariy Analysis Ta-Leung Yee Deparmen of Mahemaics and Informaion Technology, The
More information2. Nonlinear Conservation Law Equations
. Nonlinear Conservaion Law Equaions One of he clear lessons learned over recen years in sudying nonlinear parial differenial equaions is ha i is generally no wise o ry o aack a general class of nonlinear
More informationAn introduction to the theory of SDDP algorithm
An inroducion o he heory of SDDP algorihm V. Leclère (ENPC) Augus 1, 2014 V. Leclère Inroducion o SDDP Augus 1, 2014 1 / 21 Inroducion Large scale sochasic problem are hard o solve. Two ways of aacking
More informationCharacterization of Gamma Hemirings by Generalized Fuzzy Gamma Ideals
Available a hp://pvamu.edu/aam Appl. Appl. Mah. ISSN: 1932-9466 Vol. 10, Issue 1 (June 2015), pp. 495-520 Applicaions and Applied Mahemaics: An Inernaional Journal (AAM) Characerizaion of Gamma Hemirings
More informationOutline. lse-logo. Outline. Outline. 1 Wald Test. 2 The Likelihood Ratio Test. 3 Lagrange Multiplier Tests
Ouline Ouline Hypohesis Tes wihin he Maximum Likelihood Framework There are hree main frequenis approaches o inference wihin he Maximum Likelihood framework: he Wald es, he Likelihood Raio es and he Lagrange
More informationTesting the Random Walk Model. i.i.d. ( ) r
he random walk heory saes: esing he Random Walk Model µ ε () np = + np + Momen Condiions where where ε ~ i.i.d he idea here is o es direcly he resricions imposed by momen condiions. lnp lnp µ ( lnp lnp
More informationRetrieval Models. Boolean and Vector Space Retrieval Models. Common Preprocessing Steps. Boolean Model. Boolean Retrieval Model
1 Boolean and Vecor Space Rerieval Models Many slides in his secion are adaped from Prof. Joydeep Ghosh (UT ECE) who in urn adaped hem from Prof. Dik Lee (Univ. of Science and Tech, Hong Kong) Rerieval
More informationDecentralized Stochastic Control with Partial History Sharing: A Common Information Approach
1 Decenralized Sochasic Conrol wih Parial Hisory Sharing: A Common Informaion Approach Ashuosh Nayyar, Adiya Mahajan and Demoshenis Tenekezis arxiv:1209.1695v1 [cs.sy] 8 Sep 2012 Absrac A general model
More informationTutorial Sheet #2 discrete vs. continuous functions, periodicity, sampling
2.39 Tuorial Shee #2 discree vs. coninuous uncions, periodiciy, sampling We will encouner wo classes o signals in his class, coninuous-signals and discree-signals. The disinc mahemaical properies o each,
More informationThe Optimal Stopping Time for Selling an Asset When It Is Uncertain Whether the Price Process Is Increasing or Decreasing When the Horizon Is Infinite
American Journal of Operaions Research, 08, 8, 8-9 hp://wwwscirporg/journal/ajor ISSN Online: 60-8849 ISSN Prin: 60-8830 The Opimal Sopping Time for Selling an Asse When I Is Uncerain Wheher he Price Process
More informationFailure of the work-hamiltonian connection for free energy calculations. Abstract
Failure of he work-hamilonian connecion for free energy calculaions Jose M. G. Vilar 1 and J. Miguel Rubi 1 Compuaional Biology Program, Memorial Sloan-Keering Cancer Cener, 175 York Avenue, New York,
More informationOverview. COMP14112: Artificial Intelligence Fundamentals. Lecture 0 Very Brief Overview. Structure of this course
OMP: Arificial Inelligence Fundamenals Lecure 0 Very Brief Overview Lecurer: Email: Xiao-Jun Zeng x.zeng@mancheser.ac.uk Overview This course will focus mainly on probabilisic mehods in AI We shall presen
More informationSOME MORE APPLICATIONS OF THE HAHN-BANACH THEOREM
SOME MORE APPLICATIONS OF THE HAHN-BANACH THEOREM FRANCISCO JAVIER GARCÍA-PACHECO, DANIELE PUGLISI, AND GUSTI VAN ZYL Absrac We give a new proof of he fac ha equivalen norms on subspaces can be exended
More informationThe expectation value of the field operator.
The expecaion value of he field operaor. Dan Solomon Universiy of Illinois Chicago, IL dsolom@uic.edu June, 04 Absrac. Much of he mahemaical developmen of quanum field heory has been in suppor of deermining
More informationLogic in computer science
Logic in compuer science Logic plays an imporan role in compuer science Logic is ofen called he calculus of compuer science Logic plays a similar role in compuer science o ha played by calculus in he physical
More informationOn Boundedness of Q-Learning Iterates for Stochastic Shortest Path Problems
MATHEMATICS OF OPERATIONS RESEARCH Vol. 38, No. 2, May 2013, pp. 209 227 ISSN 0364-765X (prin) ISSN 1526-5471 (online) hp://dx.doi.org/10.1287/moor.1120.0562 2013 INFORMS On Boundedness of Q-Learning Ieraes
More informationRecursive Least-Squares Fixed-Interval Smoother Using Covariance Information based on Innovation Approach in Linear Continuous Stochastic Systems
8 Froniers in Signal Processing, Vol. 1, No. 1, July 217 hps://dx.doi.org/1.2266/fsp.217.112 Recursive Leas-Squares Fixed-Inerval Smooher Using Covariance Informaion based on Innovaion Approach in Linear
More informationACE 562 Fall Lecture 5: The Simple Linear Regression Model: Sampling Properties of the Least Squares Estimators. by Professor Scott H.
ACE 56 Fall 005 Lecure 5: he Simple Linear Regression Model: Sampling Properies of he Leas Squares Esimaors by Professor Sco H. Irwin Required Reading: Griffihs, Hill and Judge. "Inference in he Simple
More informationGENERALIZATION OF THE FORMULA OF FAA DI BRUNO FOR A COMPOSITE FUNCTION WITH A VECTOR ARGUMENT
Inerna J Mah & Mah Sci Vol 4, No 7 000) 48 49 S0670000970 Hindawi Publishing Corp GENERALIZATION OF THE FORMULA OF FAA DI BRUNO FOR A COMPOSITE FUNCTION WITH A VECTOR ARGUMENT RUMEN L MISHKOV Received
More informationLecture Notes 3: Quantitative Analysis in DSGE Models: New Keynesian Model
Lecure Noes 3: Quaniaive Analysis in DSGE Models: New Keynesian Model Zhiwei Xu, Email: xuzhiwei@sju.edu.cn The moneary policy plays lile role in he basic moneary model wihou price sickiness. We now urn
More informationThe minimum number of nonnegative edges in hypergraphs
The minimum number of nonnegaive edges in hypergraphs Hao Huang DIMACS Rugers Universiy New Brunswic, USA huanghao@mahiasedu Benny Sudaov Deparmen of Mahemaics ETH 8092 Zurich, Swizerland benjaminsudaov@mahehzch
More informationMixing times and hitting times: lecture notes
Miing imes and hiing imes: lecure noes Yuval Peres Perla Sousi 1 Inroducion Miing imes and hiing imes are among he mos fundamenal noions associaed wih a finie Markov chain. A variey of ools have been developed
More informationLinear Response Theory: The connection between QFT and experiments
Phys540.nb 39 3 Linear Response Theory: The connecion beween QFT and experimens 3.1. Basic conceps and ideas Q: How do we measure he conduciviy of a meal? A: we firs inroduce a weak elecric field E, and
More informationMatrix Versions of Some Refinements of the Arithmetic-Geometric Mean Inequality
Marix Versions of Some Refinemens of he Arihmeic-Geomeric Mean Inequaliy Bao Qi Feng and Andrew Tonge Absrac. We esablish marix versions of refinemens due o Alzer ], Carwrigh and Field 4], and Mercer 5]
More informationA NOTE ON THE STRUCTURE OF BILATTICES. A. Avron. School of Mathematical Sciences. Sackler Faculty of Exact Sciences. Tel Aviv University
A NOTE ON THE STRUCTURE OF BILATTICES A. Avron School of Mahemaical Sciences Sacler Faculy of Exac Sciences Tel Aviv Universiy Tel Aviv 69978, Israel The noion of a bilaice was rs inroduced by Ginsburg
More informationd 1 = c 1 b 2 - b 1 c 2 d 2 = c 1 b 3 - b 1 c 3
and d = c b - b c c d = c b - b c c This process is coninued unil he nh row has been compleed. The complee array of coefficiens is riangular. Noe ha in developing he array an enire row may be divided or
More informationChapter 2. Models, Censoring, and Likelihood for Failure-Time Data
Chaper 2 Models, Censoring, and Likelihood for Failure-Time Daa William Q. Meeker and Luis A. Escobar Iowa Sae Universiy and Louisiana Sae Universiy Copyrigh 1998-2008 W. Q. Meeker and L. A. Escobar. Based
More informationApproximation algorithms for capacitated stochastic inventory systems with setup costs
Approximaion algorihms for capaciaed sochasic invenory sysems wih seup coss The MIT Faculy has made his aricle openly available. Please share how his access benefis you. Your sory maers. Ciaion As Published
More informationcontrol properties under both Gaussian and burst noise conditions. In the ~isappointing in comparison with convolutional code systems designed
535 SOFT-DECSON THRESHOLD DECODNG OF CONVOLUTONAL CODES R.M.F. Goodman*, B.Sc., Ph.D. W.H. Ng*, M.S.E.E. Sunnnary Exising majoriy-decision hreshold decoders have so far been limied o his paper a new mehod
More informationError Correction and Partial Information Rewriting for Flash Memories
Error Correcion and Parial Informaion Rewriing for Flash Memories Yue Li, Anxiao (Andrew) Jiang, and Jehoshua Bruck Texas A&M Universiy, College Saion, TX 7783, USA California Insiue of Technology, Pasadena,
More information