Staircase Codes for Secret Sharing with Optimal Communication and Read Overheads

Size: px
Start display at page:

Download "Staircase Codes for Secret Sharing with Optimal Communication and Read Overheads"

Transcription

1 Saircase Codes for Secre Sharing wih Opimal Communicaion and Read Overheads Rawad Biar, Salim El Rouayheb ECE Deparmen, IIT, Chicago Absrac We sudy he communicaion efficien secre sharing (CESS) problem A classical hreshold secre sharing scheme randomly encodes a secre ino n shares given o n paries, such ha any se of a leas, < n, paries can reconsruc he secre, and any se of a mos z, z <, colluding paries canno obain any informaion abou he secre A CESS scheme saisfies he previous properies of hreshold secre sharing In addiion, i has minimum communicaion and read coss when he user conacs d, d, shares The inuiion behind he possible savings on hese coss is ha he user is only ineresed in decoding he secre and does no have o decode he random keys involved in he encoding process In his paper, we inroduce wo explici consrucions of CESS codes called Saircase Codes The firs consrucion achieves opimal communicaion and read coss for a fixed d, d The second consrucion achieves opimal coss universally for all possible values of d, d n Boh consrucions can be designed over a field GF (q), for any prime power q > n I INTRODUCTION Consider he hreshold secre sharing (SS) problem ], 2] in which a dealer randomly encodes a secre ino n shares and disribue hem o n paries, such ha any se of a leas, < n, paries can reconsruc he secre, and any se of a mos z, z <, paries canno obain any informaion abou he secre For insance, le n = 4, = 2 and z = and le s be a secre uniformly disribued over GF (5) Then, he following 4 shares (s+k, s+2k, s+3k, s+4k ) form an SS scheme, wih k being a random symbol, called key, chosen uniformly a random from GF (5) and independenly of s A legiimae user can decode he secre by conacing any = 2 paries, downloading heir shares and invering he linear sysem Secrecy is ensured, in an informaion heoreic sense, because he secre is padded wih he key in each share Threshold secre sharing code consrucions have been exensively sudied in he lieraure, eg, ], 3] 7] The lieraure on secre sharing predominanly sudies non-hreshold secre sharing schemes, wih so-called general access srucures, eg, 8] ] and references wihin In his paper, we focus on he problem of communicaion (and read) efficien secre sharing (CESS) A CESS scheme saisfies he properies of hreshold secre sharing described in he previous paragraph In addiion, i has minimum communicaion and read overheads when he user conacs d, d, shares The communicaion overhead (CO) (respecively read overhead, RO) is defined as he exra amoun of informaion (beyond he secre size) ha Pary Pary 2 Pary 3 Pary 4 s + s 2 + k s + 2s 2 + 4k s + 3s 2 + 4k s + 4s 2 + k k + k 2 k + 2k 2 k + 3k 2 k + 4k 2 TABLE I THE STAIRCASE SECRET SHARING CODE FOR n = 4, = 2, z = AND d = 3 OVER GF (5) needs o be downloaded (respecively read) for a legiimae user conacing d paries o be able o decode he secre The CESS problem was inroduced by Wang and Wong in ] They focused on perfec CESS, where z =, and showed ha when d >, he user can download an amoun of informaion ha is less han shares and sill decode he secre Huang e al 2] sudied he CESS problem for all z < Before going ino more deails, we illusrae in Example how communicaion and read coss can be reduced The CESS code in his example belongs o he new family of Saircase codes which we inroduce in Secion III Example : Consider again he SS problem wih n = 4, = 2, z = We assume now ha he secre s is formed of 2 symbols s, s 2 over GF (5) and use wo keys k, k 2 drawn independenly and uniformly a random from GF (5) To consruc he Saircase code, he secre symbols and keys are arranged in a marix M as shown in () The marix M is muliplied by a 4 3 Vandermonde marix V o obain he marix C = V M The 4 rows of C form he 4 differen shares and give he Saircase code in Table I k 2 4 C = V M = s 2 k k () 4 M V The nomenclaure of Saircase codes comes from he posiion of he zero block marices in he general srucure of he marix M (see Table III) A legiimae user conacing any = 2 paries can decode he secre by downloading he wo conaced shares, ie, 4 symbols However, a user conacing d = 3 paries can decode he secre by downloading only 3 symbols, namely he firs symbol (in blue) of each conaced share The key idea here is ha he user is only ineresed in decoding he secre and no necessarily he keys When d = 3, he user decodes he secre and key k, whereas when d = = 2, he user has o decode he secre and boh of he keys This code acually /6/$3 26 IEEE 396

2 achieves he minimum CO and RO equal o symbol for d = 3 (and 2 symbols for d = = 2) given laer in (4) and (5) Secrecy is achieved because each z = pary canno obain any informaion abou s and s 2 Relaed work: Wang and Wong derived in ] a lower bound on CO for perfec CESS, where z = They consruced codes, using polynomial evaluaion over GF (q), where q > n + v and v = LCM{ +,, n}, which achieve minimum CO and RO universally for all d, d n Zhang e al 3] consruced CESS codes for he same parameers over GF (q), where q > n Recenly, Huang e al 2] generalized he lower bound on CO for any z, z < They consruced explici CESS codes for any z, z <, achieving he minimum CO and RO for d = n over GF (q), q > n(n z) Moreover, hey proved he achievabiliy of he lower bound on CO and RO universally for all possible values of d, d n using random linear code consrucions Conribuion: In his paper, we inroduce a new class of deerminisic linear CESS codes, called Saircase Codes, which generalizes he consrucion in Example We describe wo explici consrucions of Saircase codes The firs consrucion achieves minimum CO and RO for any given d The second is a universal consrucion ha achieves minimum CO and RO simulaneously for all possible values of d, d n Saircase codes require a small finie field GF (q) of size q > n, which is he same requiremen for Reed Solomon based SS codes 2 3] Organizaion: The paper is organized as follows In secion II, we formulae he problem and inroduce he noaion In secion III, we describe he Saircase code consrucion for fixed d Moreover, we give an example and prove ha his consrucion achieves minimum CO and RO (Theorem ) In secion IV, we give he consrucion for universal Saircase codes (Theorem 2) We conclude in secion V II SYSTEM MODEL We consider he CESS problem and follow he majoriy of he noaions in 2] A secre s of size k unis is formed of kα symbols ( uni = α symbols) The secre symbols are drawn independenly and uniformly a random from a finie alphabe, ypically a finie field A CESS code is a scheme ha randomly encodes he secre ino n shares w,, w n of uni size each, and disribue hem o n disinc paries A CESS code mus saisfy he following properies: ) Perfec secrecy: Any subse of z or less paries should no be able o obain any informaion abou he secre Le n] = {,, n}, and for any subse B n] denoe by W B he se of shares indexed by B, ie, W B = {w i ; i B} Then, he perfec secrecy condiion can be expressed as H(s W Z ) = H(s), Z n] s Z = z (2) Leas common muliple 2 However, he proposed consrucions require o divide he secre ino a cerain number of symbols α, which may no be necessary for SS codes 2) MDS: A user downloading any shares is able o recover he secre, ie, H(s W A ) =, A n] s A = (3) Equaions (2) and (3) imply ha he secre can be of a mos z unis (see 2, Proposiion ]) We will ake he secre o be of maximum size, ie, k = z unis 3) Minimum CO and RO: a user conacing any d paries, d n, is able o decode he secre by reading and downloading exacly k + CO(d) unis of informaion in oal from all he conaced shares, where CO(d) = kz d z (4) Here, H() denoes he enropy funcion Equaion (4) represens he achievable informaion heoreic lower bound 2, Theorem ] on he communicaion overhead, CO(d), needed o saisfy he consrains in (2) and (3), when he user conacs d shares Since he amoun of informaion read canno be less han he downloaded amoun, he following lower bound on RO holds, RO(d) CO(d) (5) We will refer o a CESS code described above as an (n, k, z, d) CESS code, where he hreshold is = k+z For insance, he code in Example is an (4,,, 3) CESS code We will also be ineresed in universal (n, k, z) CESS code ha achieves minimum CO(d) and RO(d) simulaneously for all possible values of d Noe ha he MDS consrain is subsumed by he minimum CO and RO consrain since i corresponds o he case of d = and CO() = z However, we will make his disincion for clariy of exposiion III STAIRCASE CODE CONSTRUCTION FOR FIXED d A Code consrucion Theorem : The (n, k, z, d) Saircase CESS code consrucion defined below over GF (q), q > n, saisfies he required MDS and perfec secrecy consrains given in (2) and (3), and achieves opimal communicaion and read overheads CO(d) and RO(d) given in (4) and (5) for any given d, d {k + z,, n} We describe he (n, k, z, d) Saircase code consrucion ha achieves opimal communicaion and read overheads CO(d) and RO(d) for any given d, k+z d n In his consrucion, we ake α = d z Hence, he secre s of size k unis is formed of k(d z) symbols s,, s kα, where s i GF (q) and q > n The symbols s i are arranged in an α k marix S The consrucion uses zα iid random keys drawn uniformly a random from GF (q) and independenly of he secre The keys are pariioned ino wo marices K and of dimensions z k and z (α k), respecively Le D be he ranspose S of he las (α k) rows of he marix K] 3 and le be he all zero square marix of dimensions (α k) (α k) Noe ha α k since d z + k The key ingredien of he 3 If α k z, ie, d 2z + k, hen D consiss of he ranspose of he las α k rows of K 397

3 consrucion is o arrange he secre and he keys in he d α marix M defined in Table II The inspiraion here is from he class of Produc Marix codes ha minimizes he repair bandwidh in disribued sorage sysems 4] D α S M = z K d α k α k k z α k TABLE II THE STRUCTURE OF THE MATRIX M THAT CONTAINS THE SECRET AND KEYS IN THE STAIRCASE CODE CONSTRUCTION FOR FIXED d Encoding: Le V be an n d Vandermonde marix over GF (q) The marix M is muliplied by V o obain he marix C = V M The n rows of C form he n differen shares, ie, w i = v i M, i =,, n, where v i is he i h row of V Decoding: A user conacing any = k + z paries downloads all he conaced shares A user conacing d paries, indexed by I n], downloads he firs k symbols ] from each conaced pary corresponding o v i S K, i I (he superscrip denoes he ranspose of a marix) Theorem guaranies ha he user will be able o decode he secre in boh cases B Example We give he deails of he consrucion of he (n, k, z, d) = (4,,, 3) CESS code of Example We ake α = d z = 2, hus he secre s is formed of kα = 2 symbols s, s 2 over GF (q), q = 5 > n = 4 The consrucion uses zα = 2 iid random keys k, k 2 drawn uniformly a random over GF (5) and independenly of he secre The keys are pariioned ino wo marices K and of dimensions z k = and z (α k) =, respecively The marix D is he ranspose of he las α k = row of K] Hence, we have, K = s D = k, = k 2, and S = The secre and he keys s 2 are arranged in an d α = 4 2 marix M Le V be an n d = 4 3 Vandermonde marix M and V are given again in (6) M = k s 2 k 2 and V = (6) k 4 The shares are he rows of he marix C = V M as given in Table I We wan o check ha his code saisfies he following properies ) Minimum CO and RO for d = 3: We check ha a user conacing d = 3 paries can reconsruc he secre wih minimum CO and RO For insance, if a user conacs he firs 3 paries and downloads he firs symbol of each conaced share, hen he downloaded daa is given by, 2 4 The marix on he lef is a 3 3 square s 2 k 3 4 Vandermonde marix, hence inverible Therefore, he user can decode he secre (and k ) This remains rue irrespecive of which 3 paries are conaced The user reads and downloads 3 symbols of size 3/α = 3/2 unis resuling in minimum overheads, CO(3) = RO(3) = 3/2 k = /2, as given in (4) and (5) 2) MDS: We check ha a user conacing = k + z = 2 paries can reconsruc he secre Suppose he user conacs paries and 2 and downloads all heir shares given ] by k s k 2 This sysem is equivalen o he k ] wo following sysems s and k ] ] k 2 k 2 The decoder uses he laer sysem o decode k and k 2 This is possible because he marix on he lef is a square Vandermonde marix, hence inverible Then, he decoder subracs he obained value of k from he former ] sysem ] s o obain again he following inverible sysem 2 s 2 The decoder hen decodes s and s 2 Again, his procedure is possible for any 2 conaced paries 3) Perfec secrecy: A a high level, perfec secrecy is achieved here because each symbol in a share is padded wih a leas one disinc key saisically independen of he secre, making he shares of any pary independen of he secre C Proof of Theorem Consider he (n, k, z, d) Saircase code defined above We prove Theorem by esablishing he following properies: ) Minimum CO(d) and RO(d): We prove ha a user conacing any d paries can reconsruc he secre while incurring minimum CO and RO A user conacing any d paries downloads he firs k symbols of each pary Le I n], I = d, be he se of indices of he conaced paries, hen he downloaded daa is given by V I S K ], where VI is a d d square Vandermonde marix formed of he rows of V indexed by I, hence inverible The user can always decode he secre (and he keys in K ) by invering V I The code is opimal on communicaion and read overheads CO(d) and RO(d), because he user only reads and downloads kd symbols of size kd/α = kd/(d z) unis resuling in an overhead of kd/α k = kz/α = kz/(d z) achieving he opimal CO(d) and RO(d) given in (4) and (5) 2) MDS propery: We prove ha a user conacing any = k + z paries and downloading all heir shares can reconsruc he secre Le I n], I =, be he se of indices of he conaced paries The informaion downloaded by he user is V I M and is given by V I S D K Firs, we show ha he user can decode he enries of D and The decoder considers he sysem V I D K2 ] ] = V I D K2 Recall ha he dimensions of he all zero sub-marix in D ] are (α k) (α k) Then, V I is a (k + z) (k + z) square Vandermonde marix formed by he firs (k + z) columns of V I Therefore, he user can always decode he enries of D and because V I is inverible Second, we prove ha he user can always decode he enries of S and hence reconsruc he 398

4 secre Recall ha D is he ranspose of he las α k rows of M ] S K By subracing he previously decoded ] enries of D from V I S K, he user obains V I M, where V I is defined above and M is a (k + z) k marix formed by he firs k + z rows of M Therefore, he user can always decode he enries of M because V I is inverible If k + z α, hen S is direcly obained since i is conained in M Oherwise, M consiss of he firs k + z rows of S The remaining rows of S are conained in D and were previously decoded In boh cases, he user can decode all he secre symbols s,, s kα 3) Perfec secrecy: We prove ha for any subse Z n], Z = z, he collecion of shares W Z indexed by Z does no reveal any informaion abou he secre as given in equaion (2), ie, H(s W z ) = H(s) To ha end, i suffices o prove ha H(K, W Z, s) = 5] Therefore, we need o show ha given he secre s as side informaion, any collecion W Z of z shares can decode all he random keys A collecion of W Z shares can be wrien as V Z S D K, where V Z is a z d marix corresponding o he rows of V indexed by Z This linear sysem can be divided ino wo sysems as follows, V Z S K ], (7) V Z D K2 ] (8) Given he secre as side informaion, ] i can be subraced from (7), which becomes V Z K = V Z K, where V Z is a z z square Vandermonde marix consising of he las z columns of V Z The enries of K can always be decoded because V Z is inverible Now ha K is decoded and we have S as side informaion, we can obain D as he las α k rows of ] S K Then, he enries of D are subraced from he second sysem o obain VZ, where VZ is a z z square Vandermonde marix consising of he (k + ) h o he (k +z) h columns of V Z Hence, he enries of can always be decoded because VZ is inverible Therefore, H(K, W Z, s) =, Z, Z n], Z = z and perfec secrecy is achieved IV UNIVERSAL STAIRCASE CODE CONSTRUCTION A Universal Code consrucion Theorem 2: The (n, k, z) Saircase CESS code consrucion defined below over GF (q), q > n, saisfies he required MDS and perfec secrecy consrains given in (2) and (3), and achieves opimal communicaion and read overheads CO(d) and RO(d) given in (4) and (5) simulaneously for all d, k + z d n The proof of Theorem 2 is omied and can be found in 5] We describe he (n, k, z) Saircase code consrucion menioned in Theorem 2, which achieves opimal communicaion and read overheads CO(d) and RO(d) simulaneously for all possible values of d, ie, k + z d n Le d = n, d 2 = n,, d h = k + z, wih h = n k z +, and α i = d i z, i =,, h Choose α = LCM(α, α 2,, α h ), ha is he leas common muliple of all he α i s excep for he las α h = k The secre s consiss of kα symbols s,, s kα over GF (q), q > n, arranged in an α kα/α marix S The consrucion uses zα iid random keys, drawn uniformly a random from GF (q) and independenly of he secre The keys are pariioned ino h marices K i, i =,, h, of respecive dimensions z kα/α i α i (ake α = ) The marix ] K K i consiss of he overhead of keys decoded by a user conacing d i paries We form h marices M i, i =,, h, as follows, M = S and M i = D α α i i n n K i z i, (9) z K n d i kα/α kα/α i α i where, D j is ] formed of he (n j + ) h row of M M 2 M j wrapped around o make a marix of dimensions α j+ kα/α j α j+ for j =,, h The s are he all zero marices used o complee he M i s o n rows The secre and he keys are arranged in he marix M = ] M M defined in Table III D D h 2 D K h M = S K 3 n α K saircase 2 K srucure M M 2 M 3 M h TABLE III THE STRUCTURE OF THE MATRIX M THAT CONTAINS THE SECRET AND KEYS IN THE UNIVERSAL STAIRCASE CODE CONSTRUCTION The marix M is characerized by a special srucure resuling from carefully choosing he enries of he D j s and placing he all zero sub-blocks in a saircase shape, giving hese codes heir name This saircase shape allows o achieve opimal communicaion and read overheads CO and RO for all possible d Encoding: The encoding is similar o he firs Saircase code consrucion The marix M is muliplied by an n n Vandermonde marix over GF (q) o obain he marix C = V M The n rows of C form he n differen shares Decoding: To reconsruc he secre, a user conacing any d j paries indexed by I n] downloads he firs kα/α j symbols from each conaced pary corresponding o v i M M j ], for all i I B Example of Universal Saircase code We describe here he consrucion of an (n, k, z) = (4,, ) universal Saircase code over GF (q), q = 5 > n = 4, by following he consrucion in Secion IV This example is explained in more deails in 5] We have d = 4, d 2 = 3, d 3 = 2 and α = 3, α 2 = 2, α 3 = and α = LCM(α, α 2 ) = LCM(3, 2) = 6 The secre s is formed of kα = 6 symbols over GF (5) The consrucion uses zα = 6 iid random keys drawn uniformly a random from GF (5) and independenly of he secre The secre symbols 399

5 and he random keys are arranged in he following marices, S = s 4 s 2 s 5, K = ] k k 2, K2 = ] k 3, and K3 = s 3 s ] 6 k4 k 5 k 6 To build he marix M which will be used for ] s s encoding he secre, we sar wih M = 2 s 3 k s 4 s 5 s 6 k 2 Then, D is he α 2 kα/α α 2 = 2 marix ha conains he symbols of he n h row of M, ie, D = ] k k 2 Therefore, M 2 = D ] = k k 2 k 3 ] Similarly, s 3 s 6 k 3 we have D 2 = ] s 3 s 6 k 3 and M3 = k 4 k 5 k 6 We obain M by concaenaing M, M 2 and M 3, M = s s 4 k s 3 s 6 k 3 s 2 s 5 k 2 k 4 k 5 k 6 s 3 s 6 k 3 k k 2 M M 2 M 3 () Here, V is he n n = 4 4 Vandermonde marix over GF (5) given in () The shares are given by he rows of he marix C = V M and shown in Table IV V = () 4 4 Pary Pary 2 s + s 2 + s 3 + k s + 2s 2 + 4s 3 + 3k s 4 + s 5 + s 6 + k 2 s 4 + 2s 5 + 4s 6 + 3k 2 k + k 2 + k 3 k + 2k 2 + 4k 3 s 3 + k 4 s 3 + 2k 4 s 6 + k 5 s 6 + 2k 5 k 3 + k 6 k 3 + 2k 6 Pary 3 Pary 4 s + 3s 2 + 4s 3 + 2k s + 4s 2 + s 3 + 4k s 4 + 3s 5 + 4s 6 + 2k 2 s 4 + 4s 5 + s 6 + 4k 2 k + 3k 2 + 4k 3 k + 4k 2 + k 3 s 3 + 3k 4 s 3 + 4k 4 s 6 + 3k 5 s 6 + 4k 5 k 3 + 3k 6 k 3 + 4k 6 TABLE IV AN EXAMPLE OF A UNIVERSAL STAIRCASE CODE FOR (n, k, z) = (4,, ) OVER GF (5) The decoding rules for each d follow he general rules described in he previous secion We check ha his code achieves minimum CO and RO simulaneously for d 2 = 3 and d = 4 Suppose a user conacs d 2 = 3 paries indexed by I n] The user reads and downloads he firs kα/α 2 = 3 symbols ] of each conaced share corresponding o V I M M 2 (in black and red), where VI is he marix formed by he rows of V indexed by I The user will be able o reconsruc he secre The resuling CO and RO are equal o 3/2 k = /2 unis achieving he opimal CO(d 2 ) and RO(d 2 ) given in (4) and (5) In he case when a user conacs d = 4 paries, he user reads and downloads he firs kα/α = 2 symbols of each conaced share corresponding o V I M (in black) The user can always decode he secre because V I here is a 4 4 square Vandermonde marix, hence inverible The resuling CO and RO are equal o /3 achieving he opimal CO(d ) and RO(d ) given in (4) and (5) V CONCLUSION We considered he communicaion efficien secre sharing (CESS) problem The goal is o minimize he communicaion and read overheads for a user ineresed in decoding he secre To ha end, we inroduced a new class of deerminisic linear CESS codes, called Saircase Codes We described wo explici consrucions of Saircase codes The firs consrucion achieves minimum overheads for any given number d of paries conaced by he user The second is a universal consrucion ha achieves minimum overheads simulaneously for all possible values of d The inroduced codes require a small finie field GF (q) of size q > n, which is he same requiremen for Reed Solomon based SS codes REFERENCES ] A Shamir, How o share a secre, Communicaions of he ACM, vol 22, no, pp 62 63, 979 2] G R Blakley, Safeguarding crypographic keys, in Proceedings of he Naional Compuer Conference, vol 48, pp 33 37, 979 3] R J McEliece and D V Sarwae, On sharing secres and Reed- Solomon codes, Communicaions of he ACM, vol 24, no 9, pp , 98 4] H-Y Chien, J Jinn-Ke, and Y-M Tseng, A pracical (, n) muli-secre sharing scheme, IEICE Transacions on Fundamenals of Elecronics, Communicaions and Compuer Sciences, vol 83, no 2, pp , 2 5] E D Karnin, J W Greene, and M E Hellman, On secre sharing sysems, IEEE Transacions on Informaion Theory, vol 29, no, pp 35 4, 983 6] C-P Lai and C Ding, Several generalizaions of Shamir s secre sharing scheme, Inernaional Journal of Foundaions of Compuer Science, vol 5, no 2, pp , 24 7] C-C Yang, T-Y Chang, and M-S Hwang, A (,n) muli-secre sharing scheme, Applied Mahemaics and Compuaion, vol 5, no 2, pp , 24 8] C Padró, Lecure noes in secre sharing, IACR Crypology eprin Archive, vol 22, p 674, 22 9] E F Brickell, Some ideal secre sharing schemes, in Advances in Crypology EUROCRYPT 89, pp , 99 ] R Cramer, I B Damgård, and J B Nielsen, Secure Mulipary Compuaion and Secre Sharing Cambridge, England: Cambridge Universiy Press, 25 ] H Wang and D S Wong, On secre reconsrucion in secre sharing schemes, IEEE Transacions on Informaion Theory, vol 54, pp , Jan 28 2] W Huang, M Langberg, J Kliewer, and J Bruck, Communicaion efficien secre sharing, arxiv preprin arxiv:55755, 25 3] Z Zhang, Y M Chee, S Ling, M Liu, and H Wang, Threshold changeable secre sharing schemes revisied, Theoreical Compuer Science, vol 48, pp 6 5, 22 4] K V Rashmi, N B Shah, and P V Kumar, Opimal exac-regeneraing codes for disribued sorage a he MSR and MBR poins via a producmarix consrucion, IEEE Transacions on Informaion Theory, vol 57, no 8, pp , 2 5] R Biar and S El Rouayheb, Saircase codes for secre sharing wih opimal communicaion and read overheads, arxiv preprin arxiv:52299, 25 4

Staircase Codes for Secret Sharing with Optimal Communication and Read Overheads

Staircase Codes for Secret Sharing with Optimal Communication and Read Overheads 1 Staircase Codes for Secret Sharing with Optimal Communication and Read Overheads Rawad Bitar, Student Member, IEEE and Salim El Rouayheb, Member, IEEE Abstract We study the communication efficient secret

More information

T L. t=1. Proof of Lemma 1. Using the marginal cost accounting in Equation(4) and standard arguments. t )+Π RB. t )+K 1(Q RB

T L. t=1. Proof of Lemma 1. Using the marginal cost accounting in Equation(4) and standard arguments. t )+Π RB. t )+K 1(Q RB Elecronic Companion EC.1. Proofs of Technical Lemmas and Theorems LEMMA 1. Le C(RB) be he oal cos incurred by he RB policy. Then we have, T L E[C(RB)] 3 E[Z RB ]. (EC.1) Proof of Lemma 1. Using he marginal

More information

Chapter 2. First Order Scalar Equations

Chapter 2. First Order Scalar Equations Chaper. Firs Order Scalar Equaions We sar our sudy of differenial equaions in he same way he pioneers in his field did. We show paricular echniques o solve paricular ypes of firs order differenial equaions.

More information

t is a basis for the solution space to this system, then the matrix having these solutions as columns, t x 1 t, x 2 t,... x n t x 2 t...

t is a basis for the solution space to this system, then the matrix having these solutions as columns, t x 1 t, x 2 t,... x n t x 2 t... Mah 228- Fri Mar 24 5.6 Marix exponenials and linear sysems: The analogy beween firs order sysems of linear differenial equaions (Chaper 5) and scalar linear differenial equaions (Chaper ) is much sronger

More information

Inventory Analysis and Management. Multi-Period Stochastic Models: Optimality of (s, S) Policy for K-Convex Objective Functions

Inventory Analysis and Management. Multi-Period Stochastic Models: Optimality of (s, S) Policy for K-Convex Objective Functions Muli-Period Sochasic Models: Opimali of (s, S) Polic for -Convex Objecive Funcions Consider a seing similar o he N-sage newsvendor problem excep ha now here is a fixed re-ordering cos (> 0) for each (re-)order.

More information

11!Hí MATHEMATICS : ERDŐS AND ULAM PROC. N. A. S. of decomposiion, properly speaking) conradics he possibiliy of defining a counably addiive real-valu

11!Hí MATHEMATICS : ERDŐS AND ULAM PROC. N. A. S. of decomposiion, properly speaking) conradics he possibiliy of defining a counably addiive real-valu ON EQUATIONS WITH SETS AS UNKNOWNS BY PAUL ERDŐS AND S. ULAM DEPARTMENT OF MATHEMATICS, UNIVERSITY OF COLORADO, BOULDER Communicaed May 27, 1968 We shall presen here a number of resuls in se heory concerning

More information

Lecture 20: Riccati Equations and Least Squares Feedback Control

Lecture 20: Riccati Equations and Least Squares Feedback Control 34-5 LINEAR SYSTEMS Lecure : Riccai Equaions and Leas Squares Feedback Conrol 5.6.4 Sae Feedback via Riccai Equaions A recursive approach in generaing he marix-valued funcion W ( ) equaion for i for he

More information

ODEs II, Lecture 1: Homogeneous Linear Systems - I. Mike Raugh 1. March 8, 2004

ODEs II, Lecture 1: Homogeneous Linear Systems - I. Mike Raugh 1. March 8, 2004 ODEs II, Lecure : Homogeneous Linear Sysems - I Mike Raugh March 8, 4 Inroducion. In he firs lecure we discussed a sysem of linear ODEs for modeling he excreion of lead from he human body, saw how o ransform

More information

10. State Space Methods

10. State Space Methods . Sae Space Mehods. Inroducion Sae space modelling was briefly inroduced in chaper. Here more coverage is provided of sae space mehods before some of heir uses in conrol sysem design are covered in he

More information

Rainbow saturation and graph capacities

Rainbow saturation and graph capacities Rainbow sauraion and graph capaciies Dániel Korándi Absrac The -colored rainbow sauraion number rsa (n, F ) is he minimum size of a -edge-colored graph on n verices ha conains no rainbow copy of F, bu

More information

Energy Storage Benchmark Problems

Energy Storage Benchmark Problems Energy Sorage Benchmark Problems Daniel F. Salas 1,3, Warren B. Powell 2,3 1 Deparmen of Chemical & Biological Engineering 2 Deparmen of Operaions Research & Financial Engineering 3 Princeon Laboraory

More information

SUBSPACES OF MATRICES WITH SPECIAL RANK PROPERTIES

SUBSPACES OF MATRICES WITH SPECIAL RANK PROPERTIES SUBSPACES OF MATRICES WITH SPECIAL RANK PROPERTIES JEAN-GUILLAUME DUMAS, ROD GOW, GARY MCGUIRE, AND JOHN SHEEKEY Absrac. Le K be a field and le V be a vecor space of finie dimension n over K. We invesigae

More information

PENALIZED LEAST SQUARES AND PENALIZED LIKELIHOOD

PENALIZED LEAST SQUARES AND PENALIZED LIKELIHOOD PENALIZED LEAST SQUARES AND PENALIZED LIKELIHOOD HAN XIAO 1. Penalized Leas Squares Lasso solves he following opimizaion problem, ˆβ lasso = arg max β R p+1 1 N y i β 0 N x ij β j β j (1.1) for some 0.

More information

We just finished the Erdős-Stone Theorem, and ex(n, F ) (1 1/(χ(F ) 1)) ( n

We just finished the Erdős-Stone Theorem, and ex(n, F ) (1 1/(χ(F ) 1)) ( n Lecure 3 - Kövari-Sós-Turán Theorem Jacques Versraëe jacques@ucsd.edu We jus finished he Erdős-Sone Theorem, and ex(n, F ) ( /(χ(f ) )) ( n 2). So we have asympoics when χ(f ) 3 bu no when χ(f ) = 2 i.e.

More information

Anonymity in Shared Symmetric Key Primitives

Anonymity in Shared Symmetric Key Primitives Anonymiy in Shared Symmeric Key Primiives Gregory M. Zaverucha and Douglas R. Sinson David R. Cherion School of Compuer Science Universiy of Waerloo Waerloo ON, N2L 3G1, Canada {gzaveruc, dsinson}@uwaerloo.ca

More information

Stability and Bifurcation in a Neural Network Model with Two Delays

Stability and Bifurcation in a Neural Network Model with Two Delays Inernaional Mahemaical Forum, Vol. 6, 11, no. 35, 175-1731 Sabiliy and Bifurcaion in a Neural Nework Model wih Two Delays GuangPing Hu and XiaoLing Li School of Mahemaics and Physics, Nanjing Universiy

More information

A High-Rate MSR Code With Polynomial Sub-Packetization Level

A High-Rate MSR Code With Polynomial Sub-Packetization Level A High-Rae MSR Code Wih Polynomial Sub-Packeizaion Level Birenjih Sasidharan, Gaurav Kumar Agarwal, and P Vijay Kumar Deparmen of Elecrical Communicaion Engineering, Indian Insiue of Science, Bangalore

More information

Math 315: Linear Algebra Solutions to Assignment 6

Math 315: Linear Algebra Solutions to Assignment 6 Mah 35: Linear Algebra s o Assignmen 6 # Which of he following ses of vecors are bases for R 2? {2,, 3, }, {4,, 7, 8}, {,,, 3}, {3, 9, 4, 2}. Explain your answer. To generae he whole R 2, wo linearly independen

More information

ERROR LOCATING CODES AND EXTENDED HAMMING CODE. Pankaj Kumar Das. 1. Introduction and preliminaries

ERROR LOCATING CODES AND EXTENDED HAMMING CODE. Pankaj Kumar Das. 1. Introduction and preliminaries MATEMATIČKI VESNIK MATEMATIQKI VESNIK 70, 1 (2018), 89 94 March 2018 research paper originalni nauqni rad ERROR LOCATING CODES AND EXTENDED HAMMING CODE Pankaj Kumar Das Absrac. Error-locaing codes, firs

More information

Some Ramsey results for the n-cube

Some Ramsey results for the n-cube Some Ramsey resuls for he n-cube Ron Graham Universiy of California, San Diego Jozsef Solymosi Universiy of Briish Columbia, Vancouver, Canada Absrac In his noe we esablish a Ramsey-ype resul for cerain

More information

Final Spring 2007

Final Spring 2007 .615 Final Spring 7 Overview The purpose of he final exam is o calculae he MHD β limi in a high-bea oroidal okamak agains he dangerous n = 1 exernal ballooning-kink mode. Effecively, his corresponds o

More information

Martingales Stopping Time Processes

Martingales Stopping Time Processes IOSR Journal of Mahemaics (IOSR-JM) e-issn: 2278-5728, p-issn: 2319-765. Volume 11, Issue 1 Ver. II (Jan - Feb. 2015), PP 59-64 www.iosrjournals.org Maringales Sopping Time Processes I. Fulaan Deparmen

More information

Optimal Paired Choice Block Designs. Supplementary Material

Optimal Paired Choice Block Designs. Supplementary Material Saisica Sinica: Supplemen Opimal Paired Choice Block Designs Rakhi Singh 1, Ashish Das 2 and Feng-Shun Chai 3 1 IITB-Monash Research Academy, Mumbai, India 2 Indian Insiue of Technology Bombay, Mumbai,

More information

Lecture Notes 2. The Hilbert Space Approach to Time Series

Lecture Notes 2. The Hilbert Space Approach to Time Series Time Series Seven N. Durlauf Universiy of Wisconsin. Basic ideas Lecure Noes. The Hilber Space Approach o Time Series The Hilber space framework provides a very powerful language for discussing he relaionship

More information

Expert Advice for Amateurs

Expert Advice for Amateurs Exper Advice for Amaeurs Ernes K. Lai Online Appendix - Exisence of Equilibria The analysis in his secion is performed under more general payoff funcions. Wihou aking an explici form, he payoffs of he

More information

Notes on Kalman Filtering

Notes on Kalman Filtering Noes on Kalman Filering Brian Borchers and Rick Aser November 7, Inroducion Daa Assimilaion is he problem of merging model predicions wih acual measuremens of a sysem o produce an opimal esimae of he curren

More information

Applying Genetic Algorithms for Inventory Lot-Sizing Problem with Supplier Selection under Storage Capacity Constraints

Applying Genetic Algorithms for Inventory Lot-Sizing Problem with Supplier Selection under Storage Capacity Constraints IJCSI Inernaional Journal of Compuer Science Issues, Vol 9, Issue 1, No 1, January 2012 wwwijcsiorg 18 Applying Geneic Algorihms for Invenory Lo-Sizing Problem wih Supplier Selecion under Sorage Capaciy

More information

GMM - Generalized Method of Moments

GMM - Generalized Method of Moments GMM - Generalized Mehod of Momens Conens GMM esimaion, shor inroducion 2 GMM inuiion: Maching momens 2 3 General overview of GMM esimaion. 3 3. Weighing marix...........................................

More information

STATE-SPACE MODELLING. A mass balance across the tank gives:

STATE-SPACE MODELLING. A mass balance across the tank gives: B. Lennox and N.F. Thornhill, 9, Sae Space Modelling, IChemE Process Managemen and Conrol Subjec Group Newsleer STE-SPACE MODELLING Inroducion: Over he pas decade or so here has been an ever increasing

More information

GCD AND LCM-LIKE IDENTITIES FOR IDEALS IN COMMUTATIVE RINGS

GCD AND LCM-LIKE IDENTITIES FOR IDEALS IN COMMUTATIVE RINGS GCD AND LCM-LIKE IDENTITIES FOR IDEALS IN COMMUTATIVE RINGS D. D. ANDERSON, SHUZO IZUMI, YASUO OHNO, AND MANABU OZAKI Absrac. Le A 1,..., A n n 2 be ideals of a commuaive ring R. Le Gk resp., Lk denoe

More information

Západočeská Univerzita v Plzni, Czech Republic and Groupe ESIEE Paris, France

Západočeská Univerzita v Plzni, Czech Republic and Groupe ESIEE Paris, France ADAPTIVE SIGNAL PROCESSING USING MAXIMUM ENTROPY ON THE MEAN METHOD AND MONTE CARLO ANALYSIS Pavla Holejšovsá, Ing. *), Z. Peroua, Ing. **), J.-F. Bercher, Prof. Assis. ***) Západočesá Univerzia v Plzni,

More information

Chapter 6. Systems of First Order Linear Differential Equations

Chapter 6. Systems of First Order Linear Differential Equations Chaper 6 Sysems of Firs Order Linear Differenial Equaions We will only discuss firs order sysems However higher order sysems may be made ino firs order sysems by a rick shown below We will have a sligh

More information

Diebold, Chapter 7. Francis X. Diebold, Elements of Forecasting, 4th Edition (Mason, Ohio: Cengage Learning, 2006). Chapter 7. Characterizing Cycles

Diebold, Chapter 7. Francis X. Diebold, Elements of Forecasting, 4th Edition (Mason, Ohio: Cengage Learning, 2006). Chapter 7. Characterizing Cycles Diebold, Chaper 7 Francis X. Diebold, Elemens of Forecasing, 4h Ediion (Mason, Ohio: Cengage Learning, 006). Chaper 7. Characerizing Cycles Afer compleing his reading you should be able o: Define covariance

More information

Robust estimation based on the first- and third-moment restrictions of the power transformation model

Robust estimation based on the first- and third-moment restrictions of the power transformation model h Inernaional Congress on Modelling and Simulaion, Adelaide, Ausralia, 6 December 3 www.mssanz.org.au/modsim3 Robus esimaion based on he firs- and hird-momen resricions of he power ransformaion Nawaa,

More information

On the Infinitude of Covering Systems with Least Modulus Equal to 2

On the Infinitude of Covering Systems with Least Modulus Equal to 2 Annals of Pure and Applied Mahemaics Vol. 4, No. 2, 207, 307-32 ISSN: 2279-087X (P), 2279-0888(online) Published on 23 Sepember 207 www.researchmahsci.org DOI: hp://dx.doi.org/0.22457/apam.v4n2a3 Annals

More information

Chapter 3 Boundary Value Problem

Chapter 3 Boundary Value Problem Chaper 3 Boundary Value Problem A boundary value problem (BVP) is a problem, ypically an ODE or a PDE, which has values assigned on he physical boundary of he domain in which he problem is specified. Le

More information

Introduction to Probability and Statistics Slides 4 Chapter 4

Introduction to Probability and Statistics Slides 4 Chapter 4 Inroducion o Probabiliy and Saisics Slides 4 Chaper 4 Ammar M. Sarhan, asarhan@mahsa.dal.ca Deparmen of Mahemaics and Saisics, Dalhousie Universiy Fall Semeser 8 Dr. Ammar Sarhan Chaper 4 Coninuous Random

More information

INDEPENDENT SETS IN GRAPHS WITH GIVEN MINIMUM DEGREE

INDEPENDENT SETS IN GRAPHS WITH GIVEN MINIMUM DEGREE INDEPENDENT SETS IN GRAPHS WITH GIVEN MINIMUM DEGREE JAMES ALEXANDER, JONATHAN CUTLER, AND TIM MINK Absrac The enumeraion of independen ses in graphs wih various resricions has been a opic of much ineres

More information

CHAPTER 2 Signals And Spectra

CHAPTER 2 Signals And Spectra CHAPER Signals And Specra Properies of Signals and Noise In communicaion sysems he received waveform is usually caegorized ino he desired par conaining he informaion, and he undesired par. he desired par

More information

Mathematical Theory and Modeling ISSN (Paper) ISSN (Online) Vol 3, No.3, 2013

Mathematical Theory and Modeling ISSN (Paper) ISSN (Online) Vol 3, No.3, 2013 Mahemaical Theory and Modeling ISSN -580 (Paper) ISSN 5-05 (Online) Vol, No., 0 www.iise.org The ffec of Inverse Transformaion on he Uni Mean and Consan Variance Assumpions of a Muliplicaive rror Model

More information

Learning a Class from Examples. Training set X. Class C 1. Class C of a family car. Output: Input representation: x 1 : price, x 2 : engine power

Learning a Class from Examples. Training set X. Class C 1. Class C of a family car. Output: Input representation: x 1 : price, x 2 : engine power Alpaydin Chaper, Michell Chaper 7 Alpaydin slides are in urquoise. Ehem Alpaydin, copyrigh: The MIT Press, 010. alpaydin@boun.edu.r hp://www.cmpe.boun.edu.r/ ehem/imle All oher slides are based on Michell.

More information

Vehicle Arrival Models : Headway

Vehicle Arrival Models : Headway Chaper 12 Vehicle Arrival Models : Headway 12.1 Inroducion Modelling arrival of vehicle a secion of road is an imporan sep in raffic flow modelling. I has imporan applicaion in raffic flow simulaion where

More information

Math Week 14 April 16-20: sections first order systems of linear differential equations; 7.4 mass-spring systems.

Math Week 14 April 16-20: sections first order systems of linear differential equations; 7.4 mass-spring systems. Mah 2250-004 Week 4 April 6-20 secions 7.-7.3 firs order sysems of linear differenial equaions; 7.4 mass-spring sysems. Mon Apr 6 7.-7.2 Sysems of differenial equaions (7.), and he vecor Calculus we need

More information

THE MATRIX-TREE THEOREM

THE MATRIX-TREE THEOREM THE MATRIX-TREE THEOREM 1 The Marix-Tree Theorem. The Marix-Tree Theorem is a formula for he number of spanning rees of a graph in erms of he deerminan of a cerain marix. We begin wih he necessary graph-heoreical

More information

IMPLICIT AND INVERSE FUNCTION THEOREMS PAUL SCHRIMPF 1 OCTOBER 25, 2013

IMPLICIT AND INVERSE FUNCTION THEOREMS PAUL SCHRIMPF 1 OCTOBER 25, 2013 IMPLICI AND INVERSE FUNCION HEOREMS PAUL SCHRIMPF 1 OCOBER 25, 213 UNIVERSIY OF BRIISH COLUMBIA ECONOMICS 526 We have exensively sudied how o solve sysems of linear equaions. We know how o check wheher

More information

di Bernardo, M. (1995). A purely adaptive controller to synchronize and control chaotic systems.

di Bernardo, M. (1995). A purely adaptive controller to synchronize and control chaotic systems. di ernardo, M. (995). A purely adapive conroller o synchronize and conrol chaoic sysems. hps://doi.org/.6/375-96(96)8-x Early version, also known as pre-prin Link o published version (if available):.6/375-96(96)8-x

More information

EE 315 Notes. Gürdal Arslan CLASS 1. (Sections ) What is a signal?

EE 315 Notes. Gürdal Arslan CLASS 1. (Sections ) What is a signal? EE 35 Noes Gürdal Arslan CLASS (Secions.-.2) Wha is a signal? In his class, a signal is some funcion of ime and i represens how some physical quaniy changes over some window of ime. Examples: velociy of

More information

A Specification Test for Linear Dynamic Stochastic General Equilibrium Models

A Specification Test for Linear Dynamic Stochastic General Equilibrium Models Journal of Saisical and Economeric Mehods, vol.1, no.2, 2012, 65-70 ISSN: 2241-0384 (prin), 2241-0376 (online) Scienpress Ld, 2012 A Specificaion Tes for Linear Dynamic Sochasic General Equilibrium Models

More information

On Multicomponent System Reliability with Microshocks - Microdamages Type of Components Interaction

On Multicomponent System Reliability with Microshocks - Microdamages Type of Components Interaction On Mulicomponen Sysem Reliabiliy wih Microshocks - Microdamages Type of Componens Ineracion Jerzy K. Filus, and Lidia Z. Filus Absrac Consider a wo componen parallel sysem. The defined new sochasic dependences

More information

Let us start with a two dimensional case. We consider a vector ( x,

Let us start with a two dimensional case. We consider a vector ( x, Roaion marices We consider now roaion marices in wo and hree dimensions. We sar wih wo dimensions since wo dimensions are easier han hree o undersand, and one dimension is a lile oo simple. However, our

More information

Bidimensional Sand Pile and Ice Pile Models

Bidimensional Sand Pile and Ice Pile Models Bidimensional Sand Pile and Ice Pile Models Enrica Duchi, Robero Manaci, Ha Duong Phan, Dominiue Rossin To cie his version: Enrica Duchi, Robero Manaci, Ha Duong Phan, Dominiue Rossin. Bidimensional Sand

More information

Longest Common Prefixes

Longest Common Prefixes Longes Common Prefixes The sandard ordering for srings is he lexicographical order. I is induced by an order over he alphabe. We will use he same symbols (,

More information

An Introduction to Backward Stochastic Differential Equations (BSDEs) PIMS Summer School 2016 in Mathematical Finance.

An Introduction to Backward Stochastic Differential Equations (BSDEs) PIMS Summer School 2016 in Mathematical Finance. 1 An Inroducion o Backward Sochasic Differenial Equaions (BSDEs) PIMS Summer School 2016 in Mahemaical Finance June 25, 2016 Chrisoph Frei cfrei@ualbera.ca This inroducion is based on Touzi [14], Bouchard

More information

Application of a Stochastic-Fuzzy Approach to Modeling Optimal Discrete Time Dynamical Systems by Using Large Scale Data Processing

Application of a Stochastic-Fuzzy Approach to Modeling Optimal Discrete Time Dynamical Systems by Using Large Scale Data Processing Applicaion of a Sochasic-Fuzzy Approach o Modeling Opimal Discree Time Dynamical Sysems by Using Large Scale Daa Processing AA WALASZE-BABISZEWSA Deparmen of Compuer Engineering Opole Universiy of Technology

More information

5. Stochastic processes (1)

5. Stochastic processes (1) Lec05.pp S-38.45 - Inroducion o Teleraffic Theory Spring 2005 Conens Basic conceps Poisson process 2 Sochasic processes () Consider some quaniy in a eleraffic (or any) sysem I ypically evolves in ime randomly

More information

18 Biological models with discrete time

18 Biological models with discrete time 8 Biological models wih discree ime The mos imporan applicaions, however, may be pedagogical. The elegan body of mahemaical heory peraining o linear sysems (Fourier analysis, orhogonal funcions, and so

More information

R t. C t P t. + u t. C t = αp t + βr t + v t. + β + w t

R t. C t P t. + u t. C t = αp t + βr t + v t. + β + w t Exercise 7 C P = α + β R P + u C = αp + βr + v (a) (b) C R = α P R + β + w (c) Assumpions abou he disurbances u, v, w : Classical assumions on he disurbance of one of he equaions, eg. on (b): E(v v s P,

More information

Notes for Lecture 17-18

Notes for Lecture 17-18 U.C. Berkeley CS278: Compuaional Complexiy Handou N7-8 Professor Luca Trevisan April 3-8, 2008 Noes for Lecure 7-8 In hese wo lecures we prove he firs half of he PCP Theorem, he Amplificaion Lemma, up

More information

Optimal Server Assignment in Multi-Server

Optimal Server Assignment in Multi-Server Opimal Server Assignmen in Muli-Server 1 Queueing Sysems wih Random Conneciviies Hassan Halabian, Suden Member, IEEE, Ioannis Lambadaris, Member, IEEE, arxiv:1112.1178v2 [mah.oc] 21 Jun 2013 Yannis Viniois,

More information

ACE 562 Fall Lecture 4: Simple Linear Regression Model: Specification and Estimation. by Professor Scott H. Irwin

ACE 562 Fall Lecture 4: Simple Linear Regression Model: Specification and Estimation. by Professor Scott H. Irwin ACE 56 Fall 005 Lecure 4: Simple Linear Regression Model: Specificaion and Esimaion by Professor Sco H. Irwin Required Reading: Griffihs, Hill and Judge. "Simple Regression: Economic and Saisical Model

More information

Almost Sure Degrees of Truth and Finite Model Theory of Łukasiewicz Fuzzy Logic

Almost Sure Degrees of Truth and Finite Model Theory of Łukasiewicz Fuzzy Logic Almos Sure Degrees of Truh and Finie odel Theory of Łukasiewicz Fuzzy Logic Rober Kosik Insiue of Informaion Business, Vienna Universiy of Economics and Business Adminisraion, Wirschafsuniversiä Wien,

More information

Computer-Aided Analysis of Electronic Circuits Course Notes 3

Computer-Aided Analysis of Electronic Circuits Course Notes 3 Gheorghe Asachi Technical Universiy of Iasi Faculy of Elecronics, Telecommunicaions and Informaion Technologies Compuer-Aided Analysis of Elecronic Circuis Course Noes 3 Bachelor: Telecommunicaion Technologies

More information

1 Review of Zero-Sum Games

1 Review of Zero-Sum Games COS 5: heoreical Machine Learning Lecurer: Rob Schapire Lecure #23 Scribe: Eugene Brevdo April 30, 2008 Review of Zero-Sum Games Las ime we inroduced a mahemaical model for wo player zero-sum games. Any

More information

INTRODUCTION TO MACHINE LEARNING 3RD EDITION

INTRODUCTION TO MACHINE LEARNING 3RD EDITION ETHEM ALPAYDIN The MIT Press, 2014 Lecure Slides for INTRODUCTION TO MACHINE LEARNING 3RD EDITION alpaydin@boun.edu.r hp://www.cmpe.boun.edu.r/~ehem/i2ml3e CHAPTER 2: SUPERVISED LEARNING Learning a Class

More information

Stopping Set Elimination for LDPC Codes

Stopping Set Elimination for LDPC Codes Sopping Se Eliminaion for LDPC Codes Anxiao (Andrew) Jiang, Pulakesh Upadhyaya, Ying Wang, Krishna R. Narayanan Hongchao Zhou, Jin Sima, and Jehoshua Bruck Compuer Science and Engineering Deparmen, Texas

More information

Single-Pass-Based Heuristic Algorithms for Group Flexible Flow-shop Scheduling Problems

Single-Pass-Based Heuristic Algorithms for Group Flexible Flow-shop Scheduling Problems Single-Pass-Based Heurisic Algorihms for Group Flexible Flow-shop Scheduling Problems PEI-YING HUANG, TZUNG-PEI HONG 2 and CHENG-YAN KAO, 3 Deparmen of Compuer Science and Informaion Engineering Naional

More information

Families with no matchings of size s

Families with no matchings of size s Families wih no machings of size s Peer Franl Andrey Kupavsii Absrac Le 2, s 2 be posiive inegers. Le be an n-elemen se, n s. Subses of 2 are called families. If F ( ), hen i is called - uniform. Wha is

More information

Physics 235 Chapter 2. Chapter 2 Newtonian Mechanics Single Particle

Physics 235 Chapter 2. Chapter 2 Newtonian Mechanics Single Particle Chaper 2 Newonian Mechanics Single Paricle In his Chaper we will review wha Newon s laws of mechanics ell us abou he moion of a single paricle. Newon s laws are only valid in suiable reference frames,

More information

Math 334 Fall 2011 Homework 11 Solutions

Math 334 Fall 2011 Homework 11 Solutions Dec. 2, 2 Mah 334 Fall 2 Homework Soluions Basic Problem. Transform he following iniial value problem ino an iniial value problem for a sysem: u + p()u + q() u g(), u() u, u () v. () Soluion. Le v u. Then

More information

6.2 Transforms of Derivatives and Integrals.

6.2 Transforms of Derivatives and Integrals. SEC. 6.2 Transforms of Derivaives and Inegrals. ODEs 2 3 33 39 23. Change of scale. If l( f ()) F(s) and c is any 33 45 APPLICATION OF s-shifting posiive consan, show ha l( f (c)) F(s>c)>c (Hin: In Probs.

More information

A New Perturbative Approach in Nonlinear Singularity Analysis

A New Perturbative Approach in Nonlinear Singularity Analysis Journal of Mahemaics and Saisics 7 (: 49-54, ISSN 549-644 Science Publicaions A New Perurbaive Approach in Nonlinear Singulariy Analysis Ta-Leung Yee Deparmen of Mahemaics and Informaion Technology, The

More information

2. Nonlinear Conservation Law Equations

2. Nonlinear Conservation Law Equations . Nonlinear Conservaion Law Equaions One of he clear lessons learned over recen years in sudying nonlinear parial differenial equaions is ha i is generally no wise o ry o aack a general class of nonlinear

More information

An introduction to the theory of SDDP algorithm

An introduction to the theory of SDDP algorithm An inroducion o he heory of SDDP algorihm V. Leclère (ENPC) Augus 1, 2014 V. Leclère Inroducion o SDDP Augus 1, 2014 1 / 21 Inroducion Large scale sochasic problem are hard o solve. Two ways of aacking

More information

Characterization of Gamma Hemirings by Generalized Fuzzy Gamma Ideals

Characterization of Gamma Hemirings by Generalized Fuzzy Gamma Ideals Available a hp://pvamu.edu/aam Appl. Appl. Mah. ISSN: 1932-9466 Vol. 10, Issue 1 (June 2015), pp. 495-520 Applicaions and Applied Mahemaics: An Inernaional Journal (AAM) Characerizaion of Gamma Hemirings

More information

Outline. lse-logo. Outline. Outline. 1 Wald Test. 2 The Likelihood Ratio Test. 3 Lagrange Multiplier Tests

Outline. lse-logo. Outline. Outline. 1 Wald Test. 2 The Likelihood Ratio Test. 3 Lagrange Multiplier Tests Ouline Ouline Hypohesis Tes wihin he Maximum Likelihood Framework There are hree main frequenis approaches o inference wihin he Maximum Likelihood framework: he Wald es, he Likelihood Raio es and he Lagrange

More information

Testing the Random Walk Model. i.i.d. ( ) r

Testing the Random Walk Model. i.i.d. ( ) r he random walk heory saes: esing he Random Walk Model µ ε () np = + np + Momen Condiions where where ε ~ i.i.d he idea here is o es direcly he resricions imposed by momen condiions. lnp lnp µ ( lnp lnp

More information

Retrieval Models. Boolean and Vector Space Retrieval Models. Common Preprocessing Steps. Boolean Model. Boolean Retrieval Model

Retrieval Models. Boolean and Vector Space Retrieval Models. Common Preprocessing Steps. Boolean Model. Boolean Retrieval Model 1 Boolean and Vecor Space Rerieval Models Many slides in his secion are adaped from Prof. Joydeep Ghosh (UT ECE) who in urn adaped hem from Prof. Dik Lee (Univ. of Science and Tech, Hong Kong) Rerieval

More information

Decentralized Stochastic Control with Partial History Sharing: A Common Information Approach

Decentralized Stochastic Control with Partial History Sharing: A Common Information Approach 1 Decenralized Sochasic Conrol wih Parial Hisory Sharing: A Common Informaion Approach Ashuosh Nayyar, Adiya Mahajan and Demoshenis Tenekezis arxiv:1209.1695v1 [cs.sy] 8 Sep 2012 Absrac A general model

More information

Tutorial Sheet #2 discrete vs. continuous functions, periodicity, sampling

Tutorial Sheet #2 discrete vs. continuous functions, periodicity, sampling 2.39 Tuorial Shee #2 discree vs. coninuous uncions, periodiciy, sampling We will encouner wo classes o signals in his class, coninuous-signals and discree-signals. The disinc mahemaical properies o each,

More information

The Optimal Stopping Time for Selling an Asset When It Is Uncertain Whether the Price Process Is Increasing or Decreasing When the Horizon Is Infinite

The Optimal Stopping Time for Selling an Asset When It Is Uncertain Whether the Price Process Is Increasing or Decreasing When the Horizon Is Infinite American Journal of Operaions Research, 08, 8, 8-9 hp://wwwscirporg/journal/ajor ISSN Online: 60-8849 ISSN Prin: 60-8830 The Opimal Sopping Time for Selling an Asse When I Is Uncerain Wheher he Price Process

More information

Failure of the work-hamiltonian connection for free energy calculations. Abstract

Failure of the work-hamiltonian connection for free energy calculations. Abstract Failure of he work-hamilonian connecion for free energy calculaions Jose M. G. Vilar 1 and J. Miguel Rubi 1 Compuaional Biology Program, Memorial Sloan-Keering Cancer Cener, 175 York Avenue, New York,

More information

Overview. COMP14112: Artificial Intelligence Fundamentals. Lecture 0 Very Brief Overview. Structure of this course

Overview. COMP14112: Artificial Intelligence Fundamentals. Lecture 0 Very Brief Overview. Structure of this course OMP: Arificial Inelligence Fundamenals Lecure 0 Very Brief Overview Lecurer: Email: Xiao-Jun Zeng x.zeng@mancheser.ac.uk Overview This course will focus mainly on probabilisic mehods in AI We shall presen

More information

SOME MORE APPLICATIONS OF THE HAHN-BANACH THEOREM

SOME MORE APPLICATIONS OF THE HAHN-BANACH THEOREM SOME MORE APPLICATIONS OF THE HAHN-BANACH THEOREM FRANCISCO JAVIER GARCÍA-PACHECO, DANIELE PUGLISI, AND GUSTI VAN ZYL Absrac We give a new proof of he fac ha equivalen norms on subspaces can be exended

More information

The expectation value of the field operator.

The expectation value of the field operator. The expecaion value of he field operaor. Dan Solomon Universiy of Illinois Chicago, IL dsolom@uic.edu June, 04 Absrac. Much of he mahemaical developmen of quanum field heory has been in suppor of deermining

More information

Logic in computer science

Logic in computer science Logic in compuer science Logic plays an imporan role in compuer science Logic is ofen called he calculus of compuer science Logic plays a similar role in compuer science o ha played by calculus in he physical

More information

On Boundedness of Q-Learning Iterates for Stochastic Shortest Path Problems

On Boundedness of Q-Learning Iterates for Stochastic Shortest Path Problems MATHEMATICS OF OPERATIONS RESEARCH Vol. 38, No. 2, May 2013, pp. 209 227 ISSN 0364-765X (prin) ISSN 1526-5471 (online) hp://dx.doi.org/10.1287/moor.1120.0562 2013 INFORMS On Boundedness of Q-Learning Ieraes

More information

Recursive Least-Squares Fixed-Interval Smoother Using Covariance Information based on Innovation Approach in Linear Continuous Stochastic Systems

Recursive Least-Squares Fixed-Interval Smoother Using Covariance Information based on Innovation Approach in Linear Continuous Stochastic Systems 8 Froniers in Signal Processing, Vol. 1, No. 1, July 217 hps://dx.doi.org/1.2266/fsp.217.112 Recursive Leas-Squares Fixed-Inerval Smooher Using Covariance Informaion based on Innovaion Approach in Linear

More information

ACE 562 Fall Lecture 5: The Simple Linear Regression Model: Sampling Properties of the Least Squares Estimators. by Professor Scott H.

ACE 562 Fall Lecture 5: The Simple Linear Regression Model: Sampling Properties of the Least Squares Estimators. by Professor Scott H. ACE 56 Fall 005 Lecure 5: he Simple Linear Regression Model: Sampling Properies of he Leas Squares Esimaors by Professor Sco H. Irwin Required Reading: Griffihs, Hill and Judge. "Inference in he Simple

More information

GENERALIZATION OF THE FORMULA OF FAA DI BRUNO FOR A COMPOSITE FUNCTION WITH A VECTOR ARGUMENT

GENERALIZATION OF THE FORMULA OF FAA DI BRUNO FOR A COMPOSITE FUNCTION WITH A VECTOR ARGUMENT Inerna J Mah & Mah Sci Vol 4, No 7 000) 48 49 S0670000970 Hindawi Publishing Corp GENERALIZATION OF THE FORMULA OF FAA DI BRUNO FOR A COMPOSITE FUNCTION WITH A VECTOR ARGUMENT RUMEN L MISHKOV Received

More information

Lecture Notes 3: Quantitative Analysis in DSGE Models: New Keynesian Model

Lecture Notes 3: Quantitative Analysis in DSGE Models: New Keynesian Model Lecure Noes 3: Quaniaive Analysis in DSGE Models: New Keynesian Model Zhiwei Xu, Email: xuzhiwei@sju.edu.cn The moneary policy plays lile role in he basic moneary model wihou price sickiness. We now urn

More information

The minimum number of nonnegative edges in hypergraphs

The minimum number of nonnegative edges in hypergraphs The minimum number of nonnegaive edges in hypergraphs Hao Huang DIMACS Rugers Universiy New Brunswic, USA huanghao@mahiasedu Benny Sudaov Deparmen of Mahemaics ETH 8092 Zurich, Swizerland benjaminsudaov@mahehzch

More information

Mixing times and hitting times: lecture notes

Mixing times and hitting times: lecture notes Miing imes and hiing imes: lecure noes Yuval Peres Perla Sousi 1 Inroducion Miing imes and hiing imes are among he mos fundamenal noions associaed wih a finie Markov chain. A variey of ools have been developed

More information

Linear Response Theory: The connection between QFT and experiments

Linear Response Theory: The connection between QFT and experiments Phys540.nb 39 3 Linear Response Theory: The connecion beween QFT and experimens 3.1. Basic conceps and ideas Q: How do we measure he conduciviy of a meal? A: we firs inroduce a weak elecric field E, and

More information

Matrix Versions of Some Refinements of the Arithmetic-Geometric Mean Inequality

Matrix Versions of Some Refinements of the Arithmetic-Geometric Mean Inequality Marix Versions of Some Refinemens of he Arihmeic-Geomeric Mean Inequaliy Bao Qi Feng and Andrew Tonge Absrac. We esablish marix versions of refinemens due o Alzer ], Carwrigh and Field 4], and Mercer 5]

More information

A NOTE ON THE STRUCTURE OF BILATTICES. A. Avron. School of Mathematical Sciences. Sackler Faculty of Exact Sciences. Tel Aviv University

A NOTE ON THE STRUCTURE OF BILATTICES. A. Avron. School of Mathematical Sciences. Sackler Faculty of Exact Sciences. Tel Aviv University A NOTE ON THE STRUCTURE OF BILATTICES A. Avron School of Mahemaical Sciences Sacler Faculy of Exac Sciences Tel Aviv Universiy Tel Aviv 69978, Israel The noion of a bilaice was rs inroduced by Ginsburg

More information

d 1 = c 1 b 2 - b 1 c 2 d 2 = c 1 b 3 - b 1 c 3

d 1 = c 1 b 2 - b 1 c 2 d 2 = c 1 b 3 - b 1 c 3 and d = c b - b c c d = c b - b c c This process is coninued unil he nh row has been compleed. The complee array of coefficiens is riangular. Noe ha in developing he array an enire row may be divided or

More information

Chapter 2. Models, Censoring, and Likelihood for Failure-Time Data

Chapter 2. Models, Censoring, and Likelihood for Failure-Time Data Chaper 2 Models, Censoring, and Likelihood for Failure-Time Daa William Q. Meeker and Luis A. Escobar Iowa Sae Universiy and Louisiana Sae Universiy Copyrigh 1998-2008 W. Q. Meeker and L. A. Escobar. Based

More information

Approximation algorithms for capacitated stochastic inventory systems with setup costs

Approximation algorithms for capacitated stochastic inventory systems with setup costs Approximaion algorihms for capaciaed sochasic invenory sysems wih seup coss The MIT Faculy has made his aricle openly available. Please share how his access benefis you. Your sory maers. Ciaion As Published

More information

control properties under both Gaussian and burst noise conditions. In the ~isappointing in comparison with convolutional code systems designed

control properties under both Gaussian and burst noise conditions. In the ~isappointing in comparison with convolutional code systems designed 535 SOFT-DECSON THRESHOLD DECODNG OF CONVOLUTONAL CODES R.M.F. Goodman*, B.Sc., Ph.D. W.H. Ng*, M.S.E.E. Sunnnary Exising majoriy-decision hreshold decoders have so far been limied o his paper a new mehod

More information

Error Correction and Partial Information Rewriting for Flash Memories

Error Correction and Partial Information Rewriting for Flash Memories Error Correcion and Parial Informaion Rewriing for Flash Memories Yue Li, Anxiao (Andrew) Jiang, and Jehoshua Bruck Texas A&M Universiy, College Saion, TX 7783, USA California Insiue of Technology, Pasadena,

More information