Query Complexity Lower Bounds for Reconstruction of Codes

Size: px
Start display at page:

Download "Query Complexity Lower Bounds for Reconstruction of Codes"

Transcription

1 Quey Complexity Lowe Bounds fo Reconstuction of Codes Souav Chakaboty Elda Fische Aie Matsliah Abstact We investigate the poblem of local econstuction, as defined by Saks and Seshadhi (2008), in the context of eo coecting codes. The fist poblem we addess is that of message econstuction, whee given an oacle access to a coupted encoding w {0, 1} n of some message x {0, 1} k ou goal is to pobabilistically ecove x (o some potion of it). This should be done by a pocedue (econstucto) that given an index i as input, pobes w at few locations and outputs the value of x i. The econstucto can (and indeed must) be andomized, but all its andomness is specified in advance by a single andom seed, such that with high pobability all k values x i fo 1 i k ae econstucted coectly. Using the econstucto as a filte allows to evaluate cetain classes of algoithms on x efficiently. Fo instance, in case of a paallel algoithm, one can initialize seveal copies of the econstucto with the same andom seed, and they can autonomously handle decoding equests while poducing outputs that ae consistent with the oiginal message x. Anothe example is that of adaptive queying algoithms, that need to know the value of some x i befoe deciding which index should be decoded next. The second poblem that we addess is codewod econstuction, which is similaly defined, but instead of econstucting the message ou goal is to econstuct the codewod itself, given an oacle access to its coupted vesion. Eo coecting codes that admit message and codewod econstuction can be obtained fom Locally Decodable Codes (LDC) and Self Coectible Codes (SCC) espectively. The main contibution of this pape is a poof that in tems of quey complexity, these ae close to be the best possible constuctions, even when we disegad the length of the encoding. 1 Intoduction Conside the following poblem: a lage data x {0, 1} k is stoed on a stoage device in encoded fom. A small faction of the stoed infomation may be coupted. Now suppose that we want to execute an algoithm M on x, but most likely M will need a only a small faction of x fo its execution. This can be the case if M is a single pocess in a lage paallelized system, o if M is a queying algoithm with limited memoy. M can even be adaptive, not knowing which bits of the input it will need in advance. Ideally, in all these cases M should have the ability to efficiently decode any bit of x only when the need aises. In paticula, decoding evey bit should be done by eading only a small faction of the coupted encoding w. To ensue coectness of the execution it is necessay that M succeeds (with high pobability) in coectly Centum Wiskunde & Infomatica, Amstedam. {souav.chakaboty, aiem}@cwi.nl Compute Science Faculty, Isael Institute of Technology (Technion). elda@cs.technion.ac.il. 1

2 decoding all bits that ae equied fo its execution. One way of ensuing this is to decode the whole message x in advance, but in many cases this may be vey inefficient, o even impossible. To pefom the above task, a message econstucto is equied, that can simulate quey access to x in a local manne. Concetely, message econstucto is an algoithm that can ecove the oiginal message x {0, 1} k fom a coupted encoding w {0, 1} n unde two main conditions: (locality) fo evey i [k] econstucting x i equies eading w only at vey few locations; (consistency) with high pobability, all indices i [k] should be econstucted coectly. When the consistency condition is weakened, so that only each index in itself is econstucted coectly with high pobability, the definition becomes equivalent to Local Decoding, as fomally defined in [KT00]. Infomally, a locally decodable code (LDC) is an eo-coecting code which allows to pobabilistically decode any symbol of an encoded message by pobing only few symbols of its coupted encoding. As in the case of LDCs, the main challenge in message econstuction is to find shot codes that allow econstuction of evey x i with as few queies to w as possible. Any q-quey LDC can be used fo O(q log k)-quey message econstuction, by simply epeating the local decoding pocedue O(log k) times (fo evey decoding equest x i ) and outputting the majoity vote. The epetition will educe the pobability of incoectly econstucting x i to 1/(3k), so that with pobability 2/3 all k indices ae econstucted coectly. Thus having O(1)-quey LDCs (e.g. the Hadamad code) immediately implies the existence of codes with an O(log k)-quey message econstucto. The question that immediately aises is whethe one can do bette, specifically in tems of quey complexity. The fist theoem of this pape (see Theoem 3.2) states that fo any encoding of any length, a non-adaptive message econstucto must make Ω(log k) queies pe decoding equest. Anothe family of eo coecting codes elated to LDCs ae self coectable codes (SCC) [BLR93]. In a q-quey self-coectable code the pobabilistic decode is equied to ecove an abitay symbol of the encoding itself. The second poblem that we study hee is of codewod econstuction, which is elated to SCCs in the same manne that message econstuction is elated to LDCs. Concetely, a codewod econstucto is an algoithm that can ecove a codewod y {0, 1} n fom its coupted vesion w {0, 1} n unde two main conditions: (locality) fo evey i [n] econstucting y i equies eading w only at vey few locations; (consistency) with high pobability, all indices i [n] should be econstucted coectly. Hee too, if the consistency condition is weakened, so that only each index in itself is econstucted coectly with high pobability, the definition becomes equivalent to self decoding; and any q-quey SCC can be used fo O(q log n)-quey codewod econstuction. Thus having O(1)-quey SCCs (e.g. the Hadamad code) immediately implies the existence of an O(log n)-quey codewod econstucto. The second theoem of this pape (see Theoem 3.4) gives lowe bounds on the quey complexity of codewod econstuction fo linea codes. Denoting by ˆn the numbe of distinct ows in the geneating matix of a linea code, Theoem 3.4 states that codewod econstuction equies Ω( log ˆn) queies pe decoding equest. Since essentially all known SCCs ae linea codes with ˆn = n, this bound is tight up to the squae oot. Futhemoe, a lowe bound on the quey complexity can neithe be stated fo geneal (non-linea) codes, no stated in tems of n alone. We elaboate on this in Remak 3.5 below. 2

3 1.1 Related wok Local econstuction Initially the model of online popety econstuction was intoduced in [ACCL08]. In this setting a data set f is given (we can think of it as a function f : [n] d N) which should have a specified stuctual popety P, but this popety may not hold due to unavoidable eos. The specific popety studied in [ACCL08] was monotonicity, and the goal of the econstucto was to constuct (online) a new function g that is monotone, but not vey fa fom the oiginal f. The authos developed such a econstucto, which given x [n] d could compute g(x) by queying f at only few locations. Howeve, the econstucto had to emembe its pevious answes in ode to be consistent with some fixed monotone function g, making it not suitable fo paallel o memoy-limited applications. This issue was addessed in [SS08], whee the authos pesented a puely local econstucto fo monotonicity, that could output g(x) based only on few inspections of f. Given a andom sting, the econstucto of [SS08] could locally econstuct g at any point x, such that all answes wee consistent with some function g, which fo most andom stings was monotone. Such a econstucto affods an obvious distibuted implementation: geneate one andom seed, and distibute it to each of the copies of the econstucto. Since they ae all deteministic, thei answes will be consistent. Local econstuction was also studied in the context of gaphs [KPS08, GGR98] and geometic poblems [CS06]. In paticula, [KPS08] studied the poblem of expande econstuction. Given an oacle access to a gaph that is close to being an expande, the algoithm of [KPS08] can simulate an oacle access to a coected gaph, that is an expande. Reconstuction in the context of patition poblems fo dense gaphs was implicitly studied in [GGR98]. Given a dense gaph G that is close to satisfying some patition popety (say k-coloability), the appoximate patitioning algoithm fom [GGR98] can be made into one that efficiently and locally econstucts a gaph G that satisfies the patition popety and is close to G. LDCs and SCCs Locally decodable codes wee explicitly defined in [KT00], but they wee extensively studied peviously in the context of self-coecting computation, wost-case to aveage-case eductions, andomness extaction, pobabilistically checkable poofs and pivate infomation etieval (see [Te04] fo a suvey). The initial constuctions of LDCs (and SCCs) wee based on Reed-Mulle codes and allowed to encode a k-bit message by a poly(log k)-quey LDC of length poly(k) [BFLS91, CKGS98]. Fo a fixed numbe of queies, the complexity of LDCs was fist studied in [KT00], and has since been the subject of a lage body of wok (see [Te04, Gas04] fo suveys). Until this day, thee is a nealy exponential gap between the best known uppe bounds on the length of q-quey LDCs [Yek08, Ef09] and the coesponding lowe bounds [KdW04, WdW05, Woo07], fo any constant q 3. While inteesting on its own, studying message econstuction can help us in undestanding the limitations of LDCs. If we view the local decoding algoithm as a deteministic algoithm that takes as input i [k] and a andom sting, then we equie that fo each i, most choices of lead to the coect decoding of the ith bit of the message. Fo message econstuction we swap the fo all i and fo most quantifies, and equie that fo most choices of, the algoithm coectly decodes all k bits of the encoded message. As we explained ealie, a constant quey LDC of polynomial length would imply the existence of O(log k)-quey 3

4 message econstucto of polynomial ate. Thus constucting a O(log k)-quey message econstuctible code of polynomial ate can be an intemediate step towads constant-quey LDCs of polynomial length. Theoem 3.2 has also an inteesting intepetation in the theoy of Pivate Infomation Retieval (PIR) [CKGS98], following the tight connection between LDCs and PIRs [KT00]. 2 Peliminaies Fo α Σ n we denote by α i the i th symbol of α, and fo a subset I [n] we denote by α I the estiction of α to the indices in I. The Hamming distance, o simply the distance d(α, β) between two stings α, β Σ n is the numbe of indices i [n] such that α i β i. Given a set S Σ n and α Σ n, the distance of α fom S is defined as d(α, S) = min β S {d(α, β)}, whee as expected the minimum ove an empty set is defined to be +. Fo ɛ > 0 we say that α is ɛ-close to S if d(α, S) ɛ w. An [n, k, d] Σ code is a mapping C : Σ k Σ n such that fo evey x x Σ k, d(c(x), C(x )) d. Elements y C ae called codewods. The paamete k is called the message length (o the infomation length) of the code and n is called the block length o simply length of the code. Sometimes we will efe to C also as a subset of Σ n defined as C = {y : x Σ k s.t. y = C(x)}. Usually we will be inteested in some family C of codes C k k N, with functions n = n(k) and d = d(n), in which evey C k is an [n, k, d] Σ code. Wheneve the alphabet Σ is not specified it means that Σ = {0, 1}. With a slight abuse of notation, fo x Σ k we will denote by C(x) the mapping C k (x) given by the ight size code C k fom the family C. Similaly, fo n = n(k) and w Σ n we define the distance of w fom C as d(w, C) = d(w, C k ), which is the minimal distance between w and some same length codewod of C. If d(w, C) < d/2 then the minimum is achieved by a unique codewod y C, and we denote this codewod by D C (w). In this case the oiginal message is also well defined, and it will be denoted simply by C 1 (D C (w)). An [n, k, d] code C is linea if (fo all k) it has a geneating matix G {0, 1} n k such that 1 fo all x {0, 1} k, C(x) = Gx. We denote by R(C) the numbe of distinct non-zeo ows in C s geneating matix. 3 Definition of ou model and statement of main esults Hee we fomally define message and codewod econstuction, and state ou main esults. All ou definitions apply to non-adaptive algoithms, i.e. algoithms that base thei quey stategy solely on thei andom bits, while basing thei output on both andom bits and the answes to the queies. Fo claity of analysis we make the dependence on a andom sting of bits (assumed to be chosen unifomly and independently) explicit, and we estict 2 ou attention to families of [n, k, d] codes, whee Σ = {0, 1}. We disegad computation time consideations because all ou lowe bounds hold egadless of computation time. Definition 3.1 (Message Reconstuction) Let C be a family of [n, k, d] codes with d 2δn fo some fixed δ > 0, let q, ρ : N N and let ɛ be a fixed constant 3 satisfying 0 < ɛ < δ. A (q, ɛ, ρ) message econstucto 1 Hee and in the following we may identify {0, 1} with the field of two elements in the standad way. 2 Nevetheless, the bounds pesented in this pape genealize to lage alphabets as well. 3 Fo claity of pesentation ɛ will be consideed to be an absolute constant. Nevetheless, the bounds pesented hee have only logaithmic dependance on 1/ɛ. 4

5 fo C is a deteministic machine A, taking as inputs k, n = n(k) N, i [k] and a andom sting {0, 1} ρ(k), that fo evey w {0, 1} n satisfies the following: A geneates sets Q i, [n] of q = q(k) indices, and functions C i, : {0, 1} q {0, 1}. Let A w (i) {0, 1} denote C i, (w Qi, ), the value of C i, on w esticted to indices in Q i,, and let A w {0, 1} k denote the concatenation A w (1)A ] w (2) A w (k). If d(w, C) ɛ then P [A w = C 1 (D C (w)) 2/3. When it is not impotant, we will avoid mentioning explicitly the andom sting length ρ, and will simply use the tem (q, ɛ) message econstucto (o even q-quey message econstucto to mean a (q, Ω(1)) message econstucto). Fo abbeviation, we may also use A to denote the algoithm A that opeates with the fixed andom sting {0, 1} ρ. In this teminology, if a code C has a (q, ɛ) message econstucto then it is locally decodable with q queies, up to noise ate ɛ. On the othe hand, a code that is locally decodable with q queies (up to noise ate ɛ) has an (O(q log k), ɛ) message econstucto, and so the existence of constant quey LDCs implies that thee exist codes that have a (O(log k), Ω(1)) message econstucto. Ou fist esult shows that in tems of the numbe of queies this is essentially optimal, even fo abitaily long codes. Theoem 3.2 Thee ae no codes with an (o(log k), Ω(1)) message econstucto. Next we fomally define codewod econstuction. Notice that hee the quey complexity and the andomness of the algoithm ae mentioned in tems of n the block length, athe than k as in the definition of message econstuction. Definition 3.3 (Codewod Reconstuction) Let C, δ, q,ρ and ɛ be as in Definition 3.1. A (q, ɛ) codewod econstucto fo C is a deteministic machine A, taking as inputs k, n = n(k) N, i [n] and a andom sting {0, 1} ρ(n), that fo evey w {0, 1} n satisfies the following conditions: A geneates sets Q i, [n] of q = q(n) indices, and functions C i, : {0, 1} q {0, 1}. Let A w (i) {0, 1} denote C i, (w Qi, ), the value of C i, on w esticted to indices in Q i,, and let A w {0, 1} n denote the concatenation] A w (1)A w (2) A w (n). If d(w, C) ɛ then P [A w = D C (w) 2/3. Hee too, we may avoid mentioning ρ explicitly, and may use A to denote the algoithm A that opeates with the fixed andom sting. If a code C has a (q, ɛ) codewod econstucto then it is self-coectable with q queies, and convesely, any code that is self-coectable with q queies up to noise ate ɛ has an (O(q log n), ɛ) codewod econstucto. As stated ealie, constant quey SCCs exist, hence thee ae codes with an (O(log n), Ω(1)) codewod econstucto. In fact, essentially all known LDCs and SCCs ae linea codes, and futhemoe they satisfy R(C) = n (i.e., all ows in thei geneating matix ae distinct). So we actually have linea codes with an (O(log R(C)), Ω(1)) codewod econstucto. Ou second esult shows that in the case of linea codes one cannot get significantly bette than that. 5

6 Theoem 3.4 Thee ae no linea codes with an (o( log R(C)), Ω(1)) codewod econstucto. Remak 3.5 Fo geneal (non-linea) codes thee is no lowe bound on the quey complexity which is polylogaithmic in n. This follows fom a simple obsevation that if a code has a q-quey message econstucto then it also has a qk-quey codewod econstucto (in qk queies it is possible to decode the whole message and its encoding). So, fo example, Long Codes admit a codewod econstucto that makes only O(k log k) = O(log log n log log log n) queies. Futhemoe, even if we focus on linea codes only, stating the bound in Theoem 3.4 in tems of n (instead of R(C)) is impossible, since thee ae linea [n, k, d] codes that have a q-quey codewod econstucto, with q abitaily smalle than n. Fo example, let C be a linea [n, k, d ] code with a (q, ɛ) codewod econstucto, and define a new linea [n = tn, k, d = td ] code C as C(x) = C (x) C (x), namely, encoding x into t copies of C (x). Now fo any t (and hence abitaily lage n), C(x) has a (q, ɛ/2) codewod econstucto which picks a andom copy of C (x) fom the encoding, and simulates on it the oiginal codewod econstucto fo C. In the following coollay we use the fact that any linea code can be tansfomed into a systematic code 4 and combine Theoem 3.2 with Theoem 3.4. Coollay 3.6 Thee ae no linea codes with an (o(max{log k, log R(C)}), Ω(1)) codewod econstucto. 4 Poof of Theoem 3.2 [TODO: outline] Fix ɛ > 0. Let C be a family of [n, k, d] codes and let A be its (q, ɛ) message econstucto. Ou goal is to pove that q = Ω(log k). Recall that Q i, [n] denotes the set of indices queied by A on input i [k], given the andom sting. Fo j [n] we define I(j, ) = {i [k] : j Q i, }. Namely, I(j, ) is the set of indices whose econstucted value may depend on the j th bit of the eceived wod, given that the andom seed is. Similaly, fo a subset S [n] we define I(S, ) = {i [k] : S Q i, }. We call an index j [n] influential with espect to if I(j, ) > 10q, and non-influential othewise. Lemma 4.1 Fo any, thee ae at most k/10 influential indices in [n]. Poof. If thee ae moe than k/10 influential indices then n j=1 I(j, ) > ( k 10 )(10q) = kq. On the othe hand n j=1 I(j, ) = k i=1 Q i, kq, a contadiction. Lemma 4.2 Let A 0 [n] be the set of influential indices (with espect to ). Thee exists a patition A 1, A 2,..., A T of [n] \ A 0 into into T k pats such that fo all i [T ], I(A i, ) 10q. 4 A code C is systematic if C(x) [k] = x fo all x {0, 1} k. 6

7 Poof. Recall that j I(j, ) kq fom the pevious poof. Let us constuct a patition A1,..., A T of the non-influential indices as follows: A 1 contains the fist l 1 non-influential indices, whee l 1 is the maximal numbe fo which I(A 1 ) 10q (note that in paticula l 1 1); then A 2 contains the next l 2 non-influential indices, whee l 2 is the lagest numbe satisfying I(A 2 ) 10q and so on. We claim that in the end of this pocess T k. Assume that T > k. Conside the patition B 1,..., B T/2 of the non-influential indices whee B i = A 2i 1 A 2i. Notice that since T k + 1, thee ae at least k/2 pats in this patition. By the definition of A i s, all but at most one (the last) of the B i s satisfy I(B i ) > 10q. So we have n I(j, ) j=1 contadicting the fact n j=1 I(j, ) kq. T/2 i=1 I(B i, ) > (k/2)10q > kq Now let us define a distibution D ove eceived wods. We will use the notation x D to mean that x is chosen at andom accoding to D, and wheneve D is a set, we also use x D to mean that x is chosen unifomly at andom fom D. Wheneve the distibution o the set ae clea fom context we may omit thei specification. Recall that we need a distibution ove eceived wods that ae ɛ-close to C, on which evey deteministic message econstucto fails with pobability lage than 1/3. Instead, we define a distibution D that will povide a wod that is ɛ-close to C only with pobability 1 o(1). Howeve, this will be sufficient because we will show that any algoithm will with pobability at least 1 2 o(1) fail to econstuct the coect message, so that also if we condition on the 1 o(1) event we still get the same eo pobability estimate. A andom wod w D is geneated by picking a unifomly andom x {0, 1} k, setting y = C(x) and then obtaining w by flipping each of the bits of y with pobability ɛ/2, independently of the othe bits. In fact this will be a distibution ove w and x, but with some abuse of notation we will geneally omit x as with pobability 1 o(1) it is just the decoding the the codewod closest to w. We need the following fact about D. Lemma 4.3 Fo evey q log n, a subset Q [n] of size Q = q and α {0, 1} q, P [w w D Q = α] (ɛ/2)q. We shall pove that if the quey complexity of A is o(log k) then the pobability that A fails on w D is lage, namely, P w D, [Aw = C 1 (D C (w))] 1/2 + o(1). Fo w {0, 1} n, {0, 1} ρ and i [k] we say that A w (i) is detemined by w A 0 if A w (i) = A y (i) fo evey y {0, 1} n with y A 0 = w A 0. The next lemma says that fo most andom stings, the expected numbe of indices coectly detemined by the influential indices only is not vey lage, whee the expectation is taken ove w D. 7

8 Definition 4.4 Fo a sting w {0, 1} n that is supposed to decode x {0, 1} k and fo evey {0, 1} ρ we set β w,x = 0 if thee is any index i such that A w (i) is detemined by w A 0 but does not match the value x i. If thee is no such index, then we set β w,x = {i [k] : A w (i) is detemined (coectly) by w A 0}. We call {0, 1} ρ typical if E w,x D [β w,x ] 2 3 k. Lemma 4.5 Let A be a message econstucto fo C. Then P [ is typical] > 1/2. The lemma is poved in Section 4.1. Fo evey andom sting {0, 1} ρ we denote by N(), 0 N() k, the expected numbe of coectly econstucted bits by ] A, whee the expectation is taken ove w D. Fomally, N() = E w D [k d(a w, C 1 (D C (w)). Futhemoe, given y D (by y D we mean y {0, 1} n that is in the suppot of D) and S [n] we denote by N(, y, S) the expected numbe of coectly econstucted bits by A, whee the expectation is taken ove w D conditioned on the event w S = y S. Fomally, N(, y, S) = E w D [k d(a w, C 1 (D C (w)) w S = y S ]. Lemma 4.6 Fo any typical, E y D [N(, y, A 0 )] k ) (1 (ɛ/2)q 3. Poof. By the definition of a typical, the expected numbe of bits whose econstucted value eithe depends on non-influential indices o is guaanteed to be always wong is at least k/3. Call these bits fee bits. This means that evey fee bit may be incoectly econstucted by A fo some assignment α to the non-influential indices (if it can be coectly econstucted at all). So, by Lemma 4.3 the pobability that A fails on a specific fee bit, taken ove w D, is at least (ɛ/2) q (We can assume that the econstucted value of each bit depends on at most q = log k log n of the non-influential indices, since othewise the quey complexity is not as advetised and we ae done). Hence by lineaity of expectation the expected numbe of fee bits that ae econstucted coectly by A, taken ove w D, is at most 2 3 k + k ( ( ɛ q ) ) 1 = k (1 3 2) (ɛ/2)q. 3 We now define sets of T + 1 andom vaiables foming Doob Matingales. Fo a fixed {0, 1} ρ, y D and evey t, 0 t T, we define H y, t N(, y, A 0 A t ), that is the expected numbe of bits econstucted coectly by A, whee the expectation is taken ove all w D that agee with y on indices A 0, A 1,..., A t. ) By Lemma 4.6, H (1,y (ɛ/2)q 3 fo all typical. On the othe hand, if A popely econstucts y then H,y T 0 k = k. Thus, fo evey typical we have [ ] [ ] [ P A y = C 1 (D C (y)) = P H,y y D y D T = k P H,y y D T H,y 0 k (ɛ/2)q ]. 3 8

9 By Lemma 4.2, T k and the influence I(A t, ) of each set A t, 1 t T, is bounded by 10q. Thus fo all 1 t < T we have H,y t+1 H,y t 10q. Now we can apply Azuma s Inequality, by which we get [ P H,y y D T H,y 0 k (ɛ/2)q ] ( k 2 (ɛ/2) 2q ) ( ) k(ɛ/2) 2q exp 3 9T (10q) 2 exp 900q 2 whee in the last inequality we used the fact that T k. This means that the pobability that A econstucts all k bits coectly with a typical is o(1), unless q = Ω(log k). Since a andom is typical with pobability at least 1/2, we conclude that unless q = Ω(log k), A fails on w D with oveall pobability 1/2 o(1). 4.1 Poof of Lemma 4.5 We need to pove that most andom stings satisfy E w,x D [β w,x ] 2 3k. To this end, we need the following auxiliay lemma, which is essentially an entopy pesevation agument. Lemma 4.7 Fo any two (possibly pobabilistic) algoithms given by thei functions, an encode E : {0, 1} k {0, 1} k/10 and a decode D : {0, 1} k/10 {0, 1} k, [ ] P x = D(E(x)) 2 9k/10,,x {0,1} k whee denotes the outcome of the andom coin flips of E and D. Futhemoe, the inequality holds even if E and D have shaed andomness. Poof. Let E, D be the two algoithms. Denote by E and D thei deteministic vesions opeating with a fixed andom seed. Fo evey possible, patition the set {0, 1} k into at most m 2 k/10 pats X1,..., X m such fo all i and x, y Xi we have E (x) = E (y). Obseve that fo evey fixed, and conditioned ove the event that a andom x falls in Xi, P x Xi [D (E (x)) = x] 1/ Xi, and clealy the pobability that x falls in Xi is exactly X i /2k. So we have [ ] P x = D (E (x)) P,x [ m i=1 ( X i 2 k )( 1 X i ) ] P [ m i=1 1/2 k] [ P 2 9k/10] 2 9k/10. Now conside the following encode/decode pai E, D coesponding to C and A. We will assume that E and D shae a andom sting, and descibe thei opeation fo evey possible. The encode E on x {0, 1} k computes y = C(x), convets y into w by flipping each bit with pobability ɛ/2 independently of the othe bits, and outputs E (x) w A 0 (the identity of the flipped bits is not pat of the shaed andomness). By definition of A 0, E (x) k/10 fo evey x and (If necessay, E (x) can be padded abitaily up to length k/10). Befoe defining the decode, let us denote by S z [k] the set of bits fo which the value is detemined by A, given that the assignment to the influential indices A 0 of the eceived wod equals z. The decode D on z {0, 1} k/10 constucts D (z) x {0, 1} k by econstucting x i accoding to A fo all i S z, and guessing x i {0, 1} unifomly at andom fo all othe indices i [k] \ Sz. We can now pove Lemma 4.5 by showing that the pai E, D defined above contadicts the statement of Lemma 4.7, unless fo most andom stings, E w,x D [β w,x ] 2 3k. We stat by obseving that the 9

10 distibutions E (x) : x {0, 1} k and w A 0 : w D ae identical fo evey. Theefoe, since fo evey [ ] [ ] the value β w,x depends only on w A 0 and x, we have E w,x D β w,x = E x {0,1} k fo all β ext(e(x)),x as well, whee ext(e (x)) {0, 1} n is any abitay sting (extension) whose estiction to A 0 equals to E (x). Now assume towads a contadiction that fo at least half of the andom stings, E w,x D [β w,x ] = E x {0,1} k[β ext(e(x)),x ] > 2 3 k. Since 0 β w,x k fo all w, x and, this means that fo at least half of the andom stings, P x {0,1} k[βext(e(x)),x k/2] > 1/6. Theefoe (taking into account that β ext(e(x)),x > 0 also implies that each of the bits not coectly detemined by A 0 obtains the coect value with pobability 1 2 independently of the othes), [ ] P x = D (E (x)) ( 1,x {0,1} k 2 )(1 6 )2 k/2 > 2 9k/10 contadicting Lemma Poof of Theoem 3.4 Fo the poof of Theoem 3.4 we use the Yao s Lemma and show that if we take a andom codewod and add andom noise to it then any detemistic codewod econstucto with quey complexity o( R(C)) is coect with pobability o(1). Ou goal is to find a set of indices S [n] with the popety: fo evey i S if E i is the event that the econstucto es on input i then the events E i (i S) ae independent. Since the econstucto is coect only if it does not e on any index so the pobability that the econstucto is coect goes down exponentially with the size of the set S. Using the famous Sunflowe Lemma we can guaantee a lage set S having the above popety, whee the size of S depends on the quey complexity of the econstucto. This intun gives the lowe bound on the quey complexity. Fix ɛ > 0. Let C be a family of linea [n, k, d] codes and let A be its (q, ɛ) codewod econstucto. Let G 1,..., G n {0, 1} k denote the ows of C s geneating matix G, satisfying C(x) i = G i, x (mod 2) fo evey x {0, 1} k and i [n], and let ˆn R(C) denote the numbe of distinct ows in G. We will show a distibution D ove eceived wods w {0, 1} n, such that if q = o( log ˆn) then fo any fixed andom sting, P w D [A w = D C (w)] < 2/3. D is defined similaly to the definition in Section 4, that is, a andom wod w D is geneated by picking a unifomly andom y C and then obtaining w by flipping each of the bits of y with pobability ɛ/2, independently of the othe bits. As we also mentioned in Section 4, w D is ɛ-close to C only with pobability 1 o(1), howeve this will be sufficient because we will show that fo any, A will fail to econstuct the coect codewod with pobability at least 1/2. Lemma 5.1 The following holds fo D and any linea code C: 10

11 1. Let T [n] and i [n] \ T be such that G i (the i th ow of C s geneating matix) is linealy independent of ows {G j : j T }. Then fo any α {0, 1} T, P w D:w T =α[d C(w) i = 1] = P w D:w T =α[d C(w) i = 0] = 1 2, whee w D : w T = α is shothand fo w D conditioned ove the event that w T = α. 2. Let S 1,..., S t [n] be disjoint sets with S i q log n fo all i [t]. Fo any sequence α i {0, 1} S i i [t] of patial assignments, [ ] P w w D Si = α i fo some i [t] 1 (1 (ɛ/2) q ) t. Poof. Fo the fist item, notice that since the codewods of C fom a linea subspace, fo evey i [n] we have P y C [y i = 1] = P y C [y i = 0] = 1/2. (Hee we assume without loss of geneality that C is not edundant, i.e. the geneating matix of C has no all-zeo ows.) Conditioning the above ove some estiction to y T has no affect on indices i that ae linealy independent of the indices in T. (This holds since the subset of C fomed by the estiction is a linea subspace as well.) Finally, in D the i th bit of y can be flipped with some pobability, but this has no affect since the pobability of y i being flipped is independent of the value y i. The second item follows fom definitions. Recall that Q i, [n] is the set of indices queied by A on input i [n] and andom sting. Fom this point on let us fix and pove that unless q max i [n] { Q i, } is of ode Ω( log ˆn), the pobability (ove w D) that A coectly econstucts w (into y = D C (w)) is less than 1/2. Since is fixed, we will make the notation shote by omitting the subscipt fom the sets Q i,. Ou poof has two steps. In the fist step we find a lage subset F [n] of indices, such that Q i Q j = Q i Q j fo all i, j, i, j F, and in addition, fo all i, j F the values D C (w) i, D C (w) j ae independent of w Qi Q. F is constucted by fist finding a lage sunflowe in the sets Q 1,..., Q n and then emoving j fom it the (not too many) bad petals that violate the above popety. In the second pat of the poof we show that given a lage enough set F as above, the pobability that A econstucts at least one of the indices in F incoectly is high. Definition 5.2 A sunflowe with t petals and a coe T is a collection of sets S 1,..., S t such that S i S j = T fo all i j. Note that a family of paiwise disjoint sets is a sunflowe (with an empty coe). Lemma 5.3 (Sunflowe Lemma [ER60]) Let Q be a family of n sets, each set having cadinality at most q. If n > q!(t 1) q then Q contains a sunflowe with t petals. In paticula, Q contains a sunflowe of size at least 1 q n1/q. Let R be a set of ˆn indices coesponding to ˆn distinct ows in G. Let Q = Q i i R be the family of sets queied by A on inputs i R. By definition, Q contains ˆn sets, each of size at most q. Fom Lemma

12 we can obtain a sunflowe S Q, S = Q i1,..., Q it, with t 1 q ˆn1/q petals. Let T [n] denote the coe of S. We define the span of the coe T as { } span(t ) = span{g i : i T } = α i G i (mod 2) : i, α i {0, 1} {0, 1} k. i T Since T q the span of T contains at most 2 q diffeent ows fom G. Next we fom a family S S of sets by emoving fom S evey petal Q ij fo which G ij belongs to the span of T. Namely, we set S {Q ij S : G ij / span(t )}. Notice that the esulting family S is a sunflowe as well, with the same coe T. Futhemoe, the size of S is at least t 1 q ˆn1/q 2 q. Intuitively, the quey sets in S coespond to those indices in R that ae independent of w T. We call these indices fee indices and denote thei set by F. Namely, F = {i : Q i S }. By the fist item of Lemma 5.1, fo evey fee index i F and all α {0, 1} T we have P w D:w T =α[d C(w) i = 1] = P w D:w T =α[d C(w) i = 0] = 1 2. (1) Now we can show that if q = o( log ˆn), then with pobability at least 1/2 one of the fee indices will be econstucted incoectly by A. Assume that the contay is tue, i.e. P w D [β w ] > 1/2, whee β w is the indicato of the event that A econstucts all fee indices coectly. This implies that thee exists an α {0, 1} T such that P [β w] > 1/2. (2) w D:w T =α If fo some i F the value of A w (i) is detemined by the fact that w T = α then by Equation 1 the pobability that A econstucts i incoectly is 1/2. So it must be the case that having w T = α does not detemine A w (i) fo any of the fee indices i, and in paticula, fo evey S i Q i \ T, Q i S thee must be an assignment α i to w Si fo which A econstucts i incoectly. Since the sets S i ae disjoint we can apply the second item of Lemma 5.1 by which the pobability that one of the fee indices is econstucted incoectly is at least 1 2 (1 (ɛ/2)q ) S 1 2 (1 (ɛ/2)q ) 1 q ˆn1/q 2 q 1 2 ( e (ɛ/2)q 1 q ˆn1/q 2 q). Notice that the above pobability is lage than 1/2 (in fact it is almost 1) if (ɛ/2) q 1 q ˆn1/q > 10, which is the case fo q = o( log ˆn). Hence a contadiction. 6 Extensions and open poblems 6.1 Reconstuction against andom noise In the usual definition of locally decodable codes (and self-econstuctible codes) it is assumed that the noise is advesaial, i.e. that the set of coupted locations is chosen in a wost case manne. Ou definition of message and codewod econstuction is against advesaial noise as well. But does econstuction become easie with andom noise? While both local decoding and self coection become tivial in the andom-noise model (via simple epetition codes), this is not the case fo econstuction. To see this conside the following eduction. 12

13 Claim 6.1 Let C be any code that has a q-quey message econstucto against andom noise, and let H be a p-quey LDC. Then the code H(C)(x) H(C(x)) (the LDC H composed with C) has an O(pq)-quey message econstucto (fo advesaial noise). We omit hee the fomal poof (since we did not even define econstuction against andom noise), but the idea is that the additional LDC encoding enables conveting advesaial noise into andom one. This is the case since by the definition of an LDC, evey bit can be decoded coectly with high pobability, whee without loss of geneality the pobability is taken only ove the andom coins of the local decode. Combining Claim 6.1 with Theoem 3.2, and using the fact that thee ae constant quey LDCs we get that message econstuction against andom noise equies Ω(log k) queies. The lowe bound fo codewod econstuction against andom noise can be deduced similaly. Since we do not know of any polynomial-length code with an O(log k)-quey message econstucto, the eal bound in Theoem 3.2 can be much highe fo efficient codes. On the othe hand, the epetition code, whose encoding is obtained by concatenating O(log k) copies of the oiginal message, has a tivial log k-quey message econstucto against andom noise. Thus fo andom noise ou lowe bound is optimal, iespective of the length of the code. 6.2 Patial econstuction In a moe geneal setting, we may equie that a message econstucto should decode coectly any t bits of the message, instead of all k. It is staightfowad to extend the lowe bound in Theoem 3.2 fo this genealization to Ω(log t). Similaly, if we equie that a codewod econstucto should decode coectly any t bits of the codewod instead of all n, then we can extend Theoem 3.4 to povide a lowe bound of Ω( log ˆt), whee ˆt is the numbe of distinct ows in the t ows coesponding to the decoded pat. 6.3 Open poblems While ou esults suggest that one cannot get message econstuctos that ae significantly moe queyefficient than the amplified vesions of constant-quey LDCs, it is inteesting question whethe this connection is bidiectional, i.e. whethe q-quey message econstuction implies O(q/ log k)-quey local decoding. Using the ecent 3-quey locally decodable codes of Yekhanin [Yek08] and Efemenko [Ef09] one obtains a code of sub-exponential length that has an O(log k)-quey message econstucto. Ae thee codes of polynomial length that have O(log k)-quey message econstuctos? In the case of a codewod econstuction, Theoem 3.4 says that fo any linea code the codewod econstucto must have quey complexity Ω( log ˆn). On the othe hand we have linea codes with O(log ˆn)-quey codewod econstucto. We expect the uppe bound to be the coect one, but we ae unable to close this gap. The ecent LDC constuctions of Yekhanin [Yek08] and Efemenko [Ef09] ae not known to be selfcoectable codes. Thus we do not yet know of any (geneal) code of sub-exponential length that has an O(log k)-quey codewod econstucto. 13

14 Acknowledgments Refeences [ACCL08] Ni Ailon, Benad Chazelle, Seshadhi Comandu, and Ding Liu. Popety-peseving data econstuction. Algoithmica, 51(2): , [BFLS91] [BLR93] László Babai, Lance Fotnow, Leonid A. Levin, and Maio Szegedy. Checking computations in polylogaithmic time. In STOC, pages 21 31, Manuel Blum, Michael Luby, and Ronitt Rubinfeld. Self-testing/coecting with applications to numeical poblems. J. Comput. Syst. Sci., 47(3): , [CKGS98] Benny Cho, Eyal Kushilevitz, Oded Goldeich, and Madhu Sudan. Pivate infomation etieval. J. ACM, 45(6): , [CS06] [Ef09] Benad Chazelle and C. Seshadhi. Online geometic econstuction. In Symposium on Computational Geomety, pages , Klim Efemenko. 3-quey locally decodable codes of subexponential length. In STOC, pages 39 44, [ER60] P. Edös and R. Rado. Intesection theoems fo systems of sets. J. London Math. Soc., 35:85 90, [Gas04] [GGR98] [KdW04] [KPS08] [KT00] William I. Gasach. A suvey on pivate infomation etieval (column: Computational complexity). Bulletin of the EATCS, 82:72 107, Oded Goldeich, Shafi Goldwasse, and Dana Ron. Popety testing and its connection to leaning and appoximation. J. ACM, 45(4): , Iodanis Keenidis and Ronald de Wolf. Exponential lowe bound fo 2-quey locally decodable codes via a quantum agument. J. Comput. Syst. Sci., 69(3): , Satyen Kale, Yuval Pees, and C. Seshadhi. Noise toleance of expandes and sublinea expande econstuction. In FOCS, pages , Jonathan Katz and Luca Tevisan. On the efficiency of local decoding pocedues fo eocoecting codes. In STOC, pages 80 86, [SS08] Michael E. Saks and C. Seshadhi. Paallel monotonicity econstuction. In SODA, pages , [Te04] [WdW05] Luca Tevisan. Some applications of coding theoy in computational complexity. Quadeni di Matematica, 13: , Stephanie Wehne and Ronald de Wolf. Impoved lowe bounds fo locally decodable codes and pivate infomation etieval. In ICALP, pages ,

15 [Woo07] [Yek08] David P. Wooduff. New lowe bounds fo geneal locally decodable codes. Electonic Colloquium on Computational Complexity (ECCC), 14(006), Segey Yekhanin. Towads 3-quey locally decodable codes of subexponential length. J. ACM, 55(1),

Stanford University CS259Q: Quantum Computing Handout 8 Luca Trevisan October 18, 2012

Stanford University CS259Q: Quantum Computing Handout 8 Luca Trevisan October 18, 2012 Stanfod Univesity CS59Q: Quantum Computing Handout 8 Luca Tevisan Octobe 8, 0 Lectue 8 In which we use the quantum Fouie tansfom to solve the peiod-finding poblem. The Peiod Finding Poblem Let f : {0,...,

More information

ON INDEPENDENT SETS IN PURELY ATOMIC PROBABILITY SPACES WITH GEOMETRIC DISTRIBUTION. 1. Introduction. 1 r r. r k for every set E A, E \ {0},

ON INDEPENDENT SETS IN PURELY ATOMIC PROBABILITY SPACES WITH GEOMETRIC DISTRIBUTION. 1. Introduction. 1 r r. r k for every set E A, E \ {0}, ON INDEPENDENT SETS IN PURELY ATOMIC PROBABILITY SPACES WITH GEOMETRIC DISTRIBUTION E. J. IONASCU and A. A. STANCU Abstact. We ae inteested in constucting concete independent events in puely atomic pobability

More information

Probablistically Checkable Proofs

Probablistically Checkable Proofs Lectue 12 Pobablistically Checkable Poofs May 13, 2004 Lectue: Paul Beame Notes: Chis Re 12.1 Pobablisitically Checkable Poofs Oveview We know that IP = PSPACE. This means thee is an inteactive potocol

More information

10/04/18. P [P(x)] 1 negl(n).

10/04/18. P [P(x)] 1 negl(n). Mastemath, Sping 208 Into to Lattice lgs & Cypto Lectue 0 0/04/8 Lectues: D. Dadush, L. Ducas Scibe: K. de Boe Intoduction In this lectue, we will teat two main pats. Duing the fist pat we continue the

More information

Lifting Private Information Retrieval from Two to any Number of Messages

Lifting Private Information Retrieval from Two to any Number of Messages Lifting Pivate Infomation Retieval fom Two to any umbe of Messages Rafael G.L. D Oliveia, Salim El Rouayheb ECE, Rutges Univesity, Piscataway, J Emails: d746@scaletmail.utges.edu, salim.elouayheb@utges.edu

More information

Deterministic vs Non-deterministic Graph Property Testing

Deterministic vs Non-deterministic Graph Property Testing Deteministic vs Non-deteministic Gaph Popety Testing Lio Gishboline Asaf Shapia Abstact A gaph popety P is said to be testable if one can check whethe a gaph is close o fa fom satisfying P using few andom

More information

Math 301: The Erdős-Stone-Simonovitz Theorem and Extremal Numbers for Bipartite Graphs

Math 301: The Erdős-Stone-Simonovitz Theorem and Extremal Numbers for Bipartite Graphs Math 30: The Edős-Stone-Simonovitz Theoem and Extemal Numbes fo Bipatite Gaphs May Radcliffe The Edős-Stone-Simonovitz Theoem Recall, in class we poved Tuán s Gaph Theoem, namely Theoem Tuán s Theoem Let

More information

New problems in universal algebraic geometry illustrated by boolean equations

New problems in universal algebraic geometry illustrated by boolean equations New poblems in univesal algebaic geomety illustated by boolean equations axiv:1611.00152v2 [math.ra] 25 Nov 2016 Atem N. Shevlyakov Novembe 28, 2016 Abstact We discuss new poblems in univesal algebaic

More information

On the Locality of Codeword Symbols

On the Locality of Codeword Symbols On the Locality of Codewod Symbols Paikshit Gopalan Micosoft Reseach paik@micosoft.com Cheng Huang Micosoft Reseach chengh@micosoft.com Segey Yekhanin Micosoft Reseach yekhanin@micosoft.com Huseyin Simitci

More information

Lecture 18: Graph Isomorphisms

Lecture 18: Graph Isomorphisms INFR11102: Computational Complexity 22/11/2018 Lectue: Heng Guo Lectue 18: Gaph Isomophisms 1 An Athu-Melin potocol fo GNI Last time we gave a simple inteactive potocol fo GNI with pivate coins. We will

More information

A STUDY OF HAMMING CODES AS ERROR CORRECTING CODES

A STUDY OF HAMMING CODES AS ERROR CORRECTING CODES AGU Intenational Jounal of Science and Technology A STUDY OF HAMMING CODES AS ERROR CORRECTING CODES Ritu Ahuja Depatment of Mathematics Khalsa College fo Women, Civil Lines, Ludhiana-141001, Punjab, (India)

More information

C/CS/Phys C191 Shor s order (period) finding algorithm and factoring 11/12/14 Fall 2014 Lecture 22

C/CS/Phys C191 Shor s order (period) finding algorithm and factoring 11/12/14 Fall 2014 Lecture 22 C/CS/Phys C9 Sho s ode (peiod) finding algoithm and factoing /2/4 Fall 204 Lectue 22 With a fast algoithm fo the uantum Fouie Tansfom in hand, it is clea that many useful applications should be possible.

More information

6 Matrix Concentration Bounds

6 Matrix Concentration Bounds 6 Matix Concentation Bounds Concentation bounds ae inequalities that bound pobabilities of deviations by a andom vaiable fom some value, often its mean. Infomally, they show the pobability that a andom

More information

A Bijective Approach to the Permutational Power of a Priority Queue

A Bijective Approach to the Permutational Power of a Priority Queue A Bijective Appoach to the Pemutational Powe of a Pioity Queue Ia M. Gessel Kuang-Yeh Wang Depatment of Mathematics Bandeis Univesity Waltham, MA 02254-9110 Abstact A pioity queue tansfoms an input pemutation

More information

Syntactical content of nite approximations of partial algebras 1 Wiktor Bartol Inst. Matematyki, Uniw. Warszawski, Warszawa (Poland)

Syntactical content of nite approximations of partial algebras 1 Wiktor Bartol Inst. Matematyki, Uniw. Warszawski, Warszawa (Poland) Syntactical content of nite appoximations of patial algebas 1 Wikto Batol Inst. Matematyki, Uniw. Waszawski, 02-097 Waszawa (Poland) batol@mimuw.edu.pl Xavie Caicedo Dep. Matematicas, Univ. de los Andes,

More information

Fractional Zero Forcing via Three-color Forcing Games

Fractional Zero Forcing via Three-color Forcing Games Factional Zeo Focing via Thee-colo Focing Games Leslie Hogben Kevin F. Palmowski David E. Robeson Michael Young May 13, 2015 Abstact An -fold analogue of the positive semidefinite zeo focing pocess that

More information

3.1 Random variables

3.1 Random variables 3 Chapte III Random Vaiables 3 Random vaiables A sample space S may be difficult to descibe if the elements of S ae not numbes discuss how we can use a ule by which an element s of S may be associated

More information

4/18/2005. Statistical Learning Theory

4/18/2005. Statistical Learning Theory Statistical Leaning Theoy Statistical Leaning Theoy A model of supevised leaning consists of: a Envionment - Supplying a vecto x with a fixed but unknown pdf F x (x b Teache. It povides a desied esponse

More information

Brief summary of functional analysis APPM 5440 Fall 2014 Applied Analysis

Brief summary of functional analysis APPM 5440 Fall 2014 Applied Analysis Bief summay of functional analysis APPM 5440 Fall 014 Applied Analysis Stephen Becke, stephen.becke@coloado.edu Standad theoems. When necessay, I used Royden s and Keyzsig s books as a efeence. Vesion

More information

Surveillance Points in High Dimensional Spaces

Surveillance Points in High Dimensional Spaces Société de Calcul Mathématique SA Tools fo decision help since 995 Suveillance Points in High Dimensional Spaces by Benad Beauzamy Januay 06 Abstact Let us conside any compute softwae, elying upon a lage

More information

A solution to a problem of Grünbaum and Motzkin and of Erdős and Purdy about bichromatic configurations of points in the plane

A solution to a problem of Grünbaum and Motzkin and of Erdős and Purdy about bichromatic configurations of points in the plane A solution to a poblem of Günbaum and Motzkin and of Edős and Pudy about bichomatic configuations of points in the plane Rom Pinchasi July 29, 2012 Abstact Let P be a set of n blue points in the plane,

More information

Fall 2014 Randomized Algorithms Oct 8, Lecture 3

Fall 2014 Randomized Algorithms Oct 8, Lecture 3 Fall 204 Randomized Algoithms Oct 8, 204 Lectue 3 Pof. Fiedich Eisenband Scibes: Floian Tamè In this lectue we will be concened with linea pogamming, in paticula Clakson s Las Vegas algoithm []. The main

More information

ON THE INVERSE SIGNED TOTAL DOMINATION NUMBER IN GRAPHS. D.A. Mojdeh and B. Samadi

ON THE INVERSE SIGNED TOTAL DOMINATION NUMBER IN GRAPHS. D.A. Mojdeh and B. Samadi Opuscula Math. 37, no. 3 (017), 447 456 http://dx.doi.og/10.7494/opmath.017.37.3.447 Opuscula Mathematica ON THE INVERSE SIGNED TOTAL DOMINATION NUMBER IN GRAPHS D.A. Mojdeh and B. Samadi Communicated

More information

Lecture 28: Convergence of Random Variables and Related Theorems

Lecture 28: Convergence of Random Variables and Related Theorems EE50: Pobability Foundations fo Electical Enginees July-Novembe 205 Lectue 28: Convegence of Random Vaiables and Related Theoems Lectue:. Kishna Jagannathan Scibe: Gopal, Sudhasan, Ajay, Swamy, Kolla An

More information

arxiv: v1 [math.co] 1 Apr 2011

arxiv: v1 [math.co] 1 Apr 2011 Weight enumeation of codes fom finite spaces Relinde Juius Octobe 23, 2018 axiv:1104.0172v1 [math.co] 1 Ap 2011 Abstact We study the genealized and extended weight enumeato of the - ay Simplex code and

More information

Information Retrieval Advanced IR models. Luca Bondi

Information Retrieval Advanced IR models. Luca Bondi Advanced IR models Luca Bondi Advanced IR models 2 (LSI) Pobabilistic Latent Semantic Analysis (plsa) Vecto Space Model 3 Stating point: Vecto Space Model Documents and queies epesented as vectos in the

More information

On the ratio of maximum and minimum degree in maximal intersecting families

On the ratio of maximum and minimum degree in maximal intersecting families On the atio of maximum and minimum degee in maximal intesecting families Zoltán Lóánt Nagy Lale Özkahya Balázs Patkós Máté Vize Septembe 5, 011 Abstact To study how balanced o unbalanced a maximal intesecting

More information

Quasi-Randomness and the Distribution of Copies of a Fixed Graph

Quasi-Randomness and the Distribution of Copies of a Fixed Graph Quasi-Randomness and the Distibution of Copies of a Fixed Gaph Asaf Shapia Abstact We show that if a gaph G has the popety that all subsets of vetices of size n/4 contain the coect numbe of tiangles one

More information

On the ratio of maximum and minimum degree in maximal intersecting families

On the ratio of maximum and minimum degree in maximal intersecting families On the atio of maximum and minimum degee in maximal intesecting families Zoltán Lóánt Nagy Lale Özkahya Balázs Patkós Máté Vize Mach 6, 013 Abstact To study how balanced o unbalanced a maximal intesecting

More information

Journal of Inequalities in Pure and Applied Mathematics

Journal of Inequalities in Pure and Applied Mathematics Jounal of Inequalities in Pue and Applied Mathematics COEFFICIENT INEQUALITY FOR A FUNCTION WHOSE DERIVATIVE HAS A POSITIVE REAL PART S. ABRAMOVICH, M. KLARIČIĆ BAKULA AND S. BANIĆ Depatment of Mathematics

More information

The Substring Search Problem

The Substring Search Problem The Substing Seach Poblem One algoithm which is used in a vaiety of applications is the family of substing seach algoithms. These algoithms allow a use to detemine if, given two chaacte stings, one is

More information

Solution to HW 3, Ma 1a Fall 2016

Solution to HW 3, Ma 1a Fall 2016 Solution to HW 3, Ma a Fall 206 Section 2. Execise 2: Let C be a subset of the eal numbes consisting of those eal numbes x having the popety that evey digit in the decimal expansion of x is, 3, 5, o 7.

More information

6 PROBABILITY GENERATING FUNCTIONS

6 PROBABILITY GENERATING FUNCTIONS 6 PROBABILITY GENERATING FUNCTIONS Cetain deivations pesented in this couse have been somewhat heavy on algeba. Fo example, detemining the expectation of the Binomial distibution (page 5.1 tuned out to

More information

Relating Branching Program Size and. Formula Size over the Full Binary Basis. FB Informatik, LS II, Univ. Dortmund, Dortmund, Germany

Relating Branching Program Size and. Formula Size over the Full Binary Basis. FB Informatik, LS II, Univ. Dortmund, Dortmund, Germany Relating Banching Pogam Size and omula Size ove the ull Binay Basis Matin Saueho y Ingo Wegene y Ralph Wechne z y B Infomatik, LS II, Univ. Dotmund, 44 Dotmund, Gemany z ankfut, Gemany sauehof/wegene@ls.cs.uni-dotmund.de

More information

A Converse to Low-Rank Matrix Completion

A Converse to Low-Rank Matrix Completion A Convese to Low-Rank Matix Completion Daniel L. Pimentel-Alacón, Robet D. Nowak Univesity of Wisconsin-Madison Abstact In many pactical applications, one is given a subset Ω of the enties in a d N data

More information

Temporal-Difference Learning

Temporal-Difference Learning .997 Decision-Making in Lage-Scale Systems Mach 17 MIT, Sping 004 Handout #17 Lectue Note 13 1 Tempoal-Diffeence Leaning We now conside the poblem of computing an appopiate paamete, so that, given an appoximation

More information

The Chromatic Villainy of Complete Multipartite Graphs

The Chromatic Villainy of Complete Multipartite Graphs Rocheste Institute of Technology RIT Schola Wos Theses Thesis/Dissetation Collections 8--08 The Chomatic Villainy of Complete Multipatite Gaphs Anna Raleigh an9@it.edu Follow this and additional wos at:

More information

HOW TO TEACH THE FUNDAMENTALS OF INFORMATION SCIENCE, CODING, DECODING AND NUMBER SYSTEMS?

HOW TO TEACH THE FUNDAMENTALS OF INFORMATION SCIENCE, CODING, DECODING AND NUMBER SYSTEMS? 6th INTERNATIONAL MULTIDISCIPLINARY CONFERENCE HOW TO TEACH THE FUNDAMENTALS OF INFORMATION SCIENCE, CODING, DECODING AND NUMBER SYSTEMS? Cecília Sitkuné Göömbei College of Nyíegyháza Hungay Abstact: The

More information

On the Poisson Approximation to the Negative Hypergeometric Distribution

On the Poisson Approximation to the Negative Hypergeometric Distribution BULLETIN of the Malaysian Mathematical Sciences Society http://mathusmmy/bulletin Bull Malays Math Sci Soc (2) 34(2) (2011), 331 336 On the Poisson Appoximation to the Negative Hypegeometic Distibution

More information

Encapsulation theory: radial encapsulation. Edmund Kirwan *

Encapsulation theory: radial encapsulation. Edmund Kirwan * Encapsulation theoy: adial encapsulation. Edmund Kiwan * www.edmundkiwan.com Abstact This pape intoduces the concept of adial encapsulation, wheeby dependencies ae constained to act fom subsets towads

More information

SUFFICIENT CONDITIONS FOR MAXIMALLY EDGE-CONNECTED AND SUPER-EDGE-CONNECTED GRAPHS DEPENDING ON THE CLIQUE NUMBER

SUFFICIENT CONDITIONS FOR MAXIMALLY EDGE-CONNECTED AND SUPER-EDGE-CONNECTED GRAPHS DEPENDING ON THE CLIQUE NUMBER Discussiones Mathematicae Gaph Theoy 39 (019) 567 573 doi:10.7151/dmgt.096 SUFFICIENT CONDITIONS FOR MAXIMALLY EDGE-CONNECTED AND SUPER-EDGE-CONNECTED GRAPHS DEPENDING ON THE CLIQUE NUMBER Lutz Volkmann

More information

THE CONE THEOREM JOEL A. TROPP. Abstract. We prove a fixed point theorem for functions which are positive with respect to a cone in a Banach space.

THE CONE THEOREM JOEL A. TROPP. Abstract. We prove a fixed point theorem for functions which are positive with respect to a cone in a Banach space. THE ONE THEOEM JOEL A. TOPP Abstact. We pove a fixed point theoem fo functions which ae positive with espect to a cone in a Banach space. 1. Definitions Definition 1. Let X be a eal Banach space. A subset

More information

Additive Approximation for Edge-Deletion Problems

Additive Approximation for Edge-Deletion Problems Additive Appoximation fo Edge-Deletion Poblems Noga Alon Asaf Shapia Benny Sudakov Abstact A gaph popety is monotone if it is closed unde emoval of vetices and edges. In this pape we conside the following

More information

arxiv: v1 [math.nt] 12 May 2017

arxiv: v1 [math.nt] 12 May 2017 SEQUENCES OF CONSECUTIVE HAPPY NUMBERS IN NEGATIVE BASES HELEN G. GRUNDMAN AND PAMELA E. HARRIS axiv:1705.04648v1 [math.nt] 12 May 2017 ABSTRACT. Fo b 2 and e 2, let S e,b : Z Z 0 be the function taking

More information

An intersection theorem for four sets

An intersection theorem for four sets An intesection theoem fo fou sets Dhuv Mubayi Novembe 22, 2006 Abstact Fix integes n, 4 and let F denote a family of -sets of an n-element set Suppose that fo evey fou distinct A, B, C, D F with A B C

More information

COLLAPSING WALLS THEOREM

COLLAPSING WALLS THEOREM COLLAPSING WALLS THEOREM IGOR PAK AND ROM PINCHASI Abstact. Let P R 3 be a pyamid with the base a convex polygon Q. We show that when othe faces ae collapsed (otated aound the edges onto the plane spanned

More information

Classical Worm algorithms (WA)

Classical Worm algorithms (WA) Classical Wom algoithms (WA) WA was oiginally intoduced fo quantum statistical models by Pokof ev, Svistunov and Tupitsyn (997), and late genealized to classical models by Pokof ev and Svistunov (200).

More information

Exploration of the three-person duel

Exploration of the three-person duel Exploation of the thee-peson duel Andy Paish 15 August 2006 1 The duel Pictue a duel: two shootes facing one anothe, taking tuns fiing at one anothe, each with a fixed pobability of hitting his opponent.

More information

Chapter 5 Linear Equations: Basic Theory and Practice

Chapter 5 Linear Equations: Basic Theory and Practice Chapte 5 inea Equations: Basic Theoy and actice In this chapte and the next, we ae inteested in the linea algebaic equation AX = b, (5-1) whee A is an m n matix, X is an n 1 vecto to be solved fo, and

More information

9.1 The multiplicative group of a finite field. Theorem 9.1. The multiplicative group F of a finite field is cyclic.

9.1 The multiplicative group of a finite field. Theorem 9.1. The multiplicative group F of a finite field is cyclic. Chapte 9 Pimitive Roots 9.1 The multiplicative goup of a finite fld Theoem 9.1. The multiplicative goup F of a finite fld is cyclic. Remak: In paticula, if p is a pime then (Z/p) is cyclic. In fact, this

More information

Method for Approximating Irrational Numbers

Method for Approximating Irrational Numbers Method fo Appoximating Iational Numbes Eic Reichwein Depatment of Physics Univesity of Califonia, Santa Cuz June 6, 0 Abstact I will put foth an algoithm fo poducing inceasingly accuate ational appoximations

More information

The Erdős-Hajnal conjecture for rainbow triangles

The Erdős-Hajnal conjecture for rainbow triangles The Edős-Hajnal conjectue fo ainbow tiangles Jacob Fox Andey Ginshpun János Pach Abstact We pove that evey 3-coloing of the edges of the complete gaph on n vetices without a ainbow tiangle contains a set

More information

On the Quasi-inverse of a Non-square Matrix: An Infinite Solution

On the Quasi-inverse of a Non-square Matrix: An Infinite Solution Applied Mathematical Sciences, Vol 11, 2017, no 27, 1337-1351 HIKARI Ltd, wwwm-hikaicom https://doiog/1012988/ams20177273 On the Quasi-invese of a Non-squae Matix: An Infinite Solution Ruben D Codeo J

More information

q i i=1 p i ln p i Another measure, which proves a useful benchmark in our analysis, is the chi squared divergence of p, q, which is defined by

q i i=1 p i ln p i Another measure, which proves a useful benchmark in our analysis, is the chi squared divergence of p, q, which is defined by CSISZÁR f DIVERGENCE, OSTROWSKI S INEQUALITY AND MUTUAL INFORMATION S. S. DRAGOMIR, V. GLUŠČEVIĆ, AND C. E. M. PEARCE Abstact. The Ostowski integal inequality fo an absolutely continuous function is used

More information

A Crash Course in (2 2) Matrices

A Crash Course in (2 2) Matrices A Cash Couse in ( ) Matices Seveal weeks woth of matix algeba in an hou (Relax, we will only stuy the simplest case, that of matices) Review topics: What is a matix (pl matices)? A matix is a ectangula

More information

Pushdown Automata (PDAs)

Pushdown Automata (PDAs) CHAPTER 2 Context-Fee Languages Contents Context-Fee Gammas definitions, examples, designing, ambiguity, Chomsky nomal fom Pushdown Automata definitions, examples, euivalence with context-fee gammas Non-Context-Fee

More information

Analytical Solutions for Confined Aquifers with non constant Pumping using Computer Algebra

Analytical Solutions for Confined Aquifers with non constant Pumping using Computer Algebra Poceedings of the 006 IASME/SEAS Int. Conf. on ate Resouces, Hydaulics & Hydology, Chalkida, Geece, May -3, 006 (pp7-) Analytical Solutions fo Confined Aquifes with non constant Pumping using Compute Algeba

More information

ASTR415: Problem Set #6

ASTR415: Problem Set #6 ASTR45: Poblem Set #6 Cuan D. Muhlbege Univesity of Mayland (Dated: May 7, 27) Using existing implementations of the leapfog and Runge-Kutta methods fo solving coupled odinay diffeential equations, seveal

More information

CSCE 478/878 Lecture 4: Experimental Design and Analysis. Stephen Scott. 3 Building a tree on the training set Introduction. Outline.

CSCE 478/878 Lecture 4: Experimental Design and Analysis. Stephen Scott. 3 Building a tree on the training set Introduction. Outline. In Homewok, you ae (supposedly) Choosing a data set 2 Extacting a test set of size > 3 3 Building a tee on the taining set 4 Testing on the test set 5 Repoting the accuacy (Adapted fom Ethem Alpaydin and

More information

A Multivariate Normal Law for Turing s Formulae

A Multivariate Normal Law for Turing s Formulae A Multivaiate Nomal Law fo Tuing s Fomulae Zhiyi Zhang Depatment of Mathematics and Statistics Univesity of Noth Caolina at Chalotte Chalotte, NC 28223 Abstact This pape establishes a sufficient condition

More information

Unobserved Correlation in Ascending Auctions: Example And Extensions

Unobserved Correlation in Ascending Auctions: Example And Extensions Unobseved Coelation in Ascending Auctions: Example And Extensions Daniel Quint Univesity of Wisconsin Novembe 2009 Intoduction In pivate-value ascending auctions, the winning bidde s willingness to pay

More information

Likelihood vs. Information in Aligning Biopolymer Sequences. UCSD Technical Report CS Timothy L. Bailey

Likelihood vs. Information in Aligning Biopolymer Sequences. UCSD Technical Report CS Timothy L. Bailey Likelihood vs. Infomation in Aligning Biopolyme Sequences UCSD Technical Repot CS93-318 Timothy L. Bailey Depatment of Compute Science and Engineeing Univesity of Califonia, San Diego 1 Febuay, 1993 ABSTRACT:

More information

Light Time Delay and Apparent Position

Light Time Delay and Apparent Position Light Time Delay and ppaent Position nalytical Gaphics, Inc. www.agi.com info@agi.com 610.981.8000 800.220.4785 Contents Intoduction... 3 Computing Light Time Delay... 3 Tansmission fom to... 4 Reception

More information

Multiple Criteria Secretary Problem: A New Approach

Multiple Criteria Secretary Problem: A New Approach J. Stat. Appl. Po. 3, o., 9-38 (04 9 Jounal of Statistics Applications & Pobability An Intenational Jounal http://dx.doi.og/0.785/jsap/0303 Multiple Citeia Secetay Poblem: A ew Appoach Alaka Padhye, and

More information

QIP Course 10: Quantum Factorization Algorithm (Part 3)

QIP Course 10: Quantum Factorization Algorithm (Part 3) QIP Couse 10: Quantum Factoization Algoithm (Pat 3 Ryutaoh Matsumoto Nagoya Univesity, Japan Send you comments to yutaoh.matsumoto@nagoya-u.jp Septembe 2018 @ Tokyo Tech. Matsumoto (Nagoya U. QIP Couse

More information

arxiv: v1 [math.co] 4 May 2017

arxiv: v1 [math.co] 4 May 2017 On The Numbe Of Unlabeled Bipatite Gaphs Abdullah Atmaca and A Yavuz Ouç axiv:7050800v [mathco] 4 May 207 Abstact This pape solves a poblem that was stated by M A Haison in 973 [] This poblem, that has

More information

Upper Bounds for Tura n Numbers. Alexander Sidorenko

Upper Bounds for Tura n Numbers. Alexander Sidorenko jounal of combinatoial theoy, Seies A 77, 134147 (1997) aticle no. TA962739 Uppe Bounds fo Tua n Numbes Alexande Sidoenko Couant Institute of Mathematical Sciences, New Yok Univesity, 251 Mece Steet, New

More information

Functions Defined on Fuzzy Real Numbers According to Zadeh s Extension

Functions Defined on Fuzzy Real Numbers According to Zadeh s Extension Intenational Mathematical Foum, 3, 2008, no. 16, 763-776 Functions Defined on Fuzzy Real Numbes Accoding to Zadeh s Extension Oma A. AbuAaqob, Nabil T. Shawagfeh and Oma A. AbuGhneim 1 Mathematics Depatment,

More information

Construction and Analysis of Boolean Functions of 2t + 1 Variables with Maximum Algebraic Immunity

Construction and Analysis of Boolean Functions of 2t + 1 Variables with Maximum Algebraic Immunity Constuction and Analysis of Boolean Functions of 2t + 1 Vaiables with Maximum Algebaic Immunity Na Li and Wen-Feng Qi Depatment of Applied Mathematics, Zhengzhou Infomation Engineeing Univesity, Zhengzhou,

More information

EM Boundary Value Problems

EM Boundary Value Problems EM Bounday Value Poblems 10/ 9 11/ By Ilekta chistidi & Lee, Seung-Hyun A. Geneal Desciption : Maxwell Equations & Loentz Foce We want to find the equations of motion of chaged paticles. The way to do

More information

Secret Exponent Attacks on RSA-type Schemes with Moduli N = p r q

Secret Exponent Attacks on RSA-type Schemes with Moduli N = p r q Secet Exponent Attacks on RSA-type Schemes with Moduli N = p q Alexande May Faculty of Compute Science, Electical Engineeing and Mathematics Univesity of Padebon 33102 Padebon, Gemany alexx@uni-padebon.de

More information

Using Laplace Transform to Evaluate Improper Integrals Chii-Huei Yu

Using Laplace Transform to Evaluate Improper Integrals Chii-Huei Yu Available at https://edupediapublicationsog/jounals Volume 3 Issue 4 Febuay 216 Using Laplace Tansfom to Evaluate Impope Integals Chii-Huei Yu Depatment of Infomation Technology, Nan Jeon Univesity of

More information

EQUI-PARTITIONING OF HIGHER-DIMENSIONAL HYPER-RECTANGULAR GRID GRAPHS

EQUI-PARTITIONING OF HIGHER-DIMENSIONAL HYPER-RECTANGULAR GRID GRAPHS EQUI-PARTITIONING OF HIGHER-DIMENSIONAL HYPER-RECTANGULAR GRID GRAPHS ATHULA GUNAWARDENA AND ROBERT R MEYER Abstact A d-dimensional gid gaph G is the gaph on a finite subset in the intege lattice Z d in

More information

Enumerating permutation polynomials

Enumerating permutation polynomials Enumeating pemutation polynomials Theodoulos Gaefalakis a,1, Giogos Kapetanakis a,, a Depatment of Mathematics and Applied Mathematics, Univesity of Cete, 70013 Heaklion, Geece Abstact We conside thoblem

More information

On decompositions of complete multipartite graphs into the union of two even cycles

On decompositions of complete multipartite graphs into the union of two even cycles On decompositions of complete multipatite gaphs into the union of two even cycles A. Su, J. Buchanan, R. C. Bunge, S. I. El-Zanati, E. Pelttai, G. Rasmuson, E. Spaks, S. Tagais Depatment of Mathematics

More information

Matrix Colorings of P 4 -sparse Graphs

Matrix Colorings of P 4 -sparse Graphs Diplomabeit Matix Coloings of P 4 -spase Gaphs Chistoph Hannnebaue Januay 23, 2010 Beteue: Pof. D. Winfied Hochstättle FenUnivesität in Hagen Fakultät fü Mathematik und Infomatik Contents Intoduction iii

More information

Goodness-of-fit for composite hypotheses.

Goodness-of-fit for composite hypotheses. Section 11 Goodness-of-fit fo composite hypotheses. Example. Let us conside a Matlab example. Let us geneate 50 obsevations fom N(1, 2): X=nomnd(1,2,50,1); Then, unning a chi-squaed goodness-of-fit test

More information

Pearson s Chi-Square Test Modifications for Comparison of Unweighted and Weighted Histograms and Two Weighted Histograms

Pearson s Chi-Square Test Modifications for Comparison of Unweighted and Weighted Histograms and Two Weighted Histograms Peason s Chi-Squae Test Modifications fo Compaison of Unweighted and Weighted Histogams and Two Weighted Histogams Univesity of Akueyi, Bogi, v/noduslód, IS-6 Akueyi, Iceland E-mail: nikolai@unak.is Two

More information

Central Coverage Bayes Prediction Intervals for the Generalized Pareto Distribution

Central Coverage Bayes Prediction Intervals for the Generalized Pareto Distribution Statistics Reseach Lettes Vol. Iss., Novembe Cental Coveage Bayes Pediction Intevals fo the Genealized Paeto Distibution Gyan Pakash Depatment of Community Medicine S. N. Medical College, Aga, U. P., India

More information

β β β β β B B B B o (i) (ii) (iii)

β β β β β B B B B o (i) (ii) (iii) Output-Sensitive Algoithms fo Unifom Patitions of Points Pankaj K. Agawal y Binay K. Bhattachaya z Sandeep Sen x Octobe 19, 1999 Abstact We conside the following one and two-dimensional bucketing poblems:

More information

CERFACS 42 av. Gaspard Coriolis, Toulouse, Cedex 1, France. Available at Date: April 2, 2008.

CERFACS 42 av. Gaspard Coriolis, Toulouse, Cedex 1, France. Available at   Date: April 2, 2008. ON THE BLOCK TRIANGULAR FORM OF SYMMETRIC MATRICES IAIN S. DUFF and BORA UÇAR Technical Repot: No: TR/PA/08/26 CERFACS 42 av. Gaspad Coiolis, 31057 Toulouse, Cedex 1, Fance. Available at http://www.cefacs.f/algo/epots/

More information

NOTE. Some New Bounds for Cover-Free Families

NOTE. Some New Bounds for Cover-Free Families Jounal of Combinatoial Theoy, Seies A 90, 224234 (2000) doi:10.1006jcta.1999.3036, available online at http:.idealibay.com on NOTE Some Ne Bounds fo Cove-Fee Families D. R. Stinson 1 and R. Wei Depatment

More information

ONE-POINT CODES USING PLACES OF HIGHER DEGREE

ONE-POINT CODES USING PLACES OF HIGHER DEGREE ONE-POINT CODES USING PLACES OF HIGHER DEGREE GRETCHEN L. MATTHEWS AND TODD W. MICHEL DEPARTMENT OF MATHEMATICAL SCIENCES CLEMSON UNIVERSITY CLEMSON, SC 29634-0975 U.S.A. E-MAIL: GMATTHE@CLEMSON.EDU, TMICHEL@CLEMSON.EDU

More information

16 Modeling a Language by a Markov Process

16 Modeling a Language by a Markov Process K. Pommeening, Language Statistics 80 16 Modeling a Language by a Makov Pocess Fo deiving theoetical esults a common model of language is the intepetation of texts as esults of Makov pocesses. This model

More information

We give improved upper bounds for the number of primitive solutions of the Thue inequality

We give improved upper bounds for the number of primitive solutions of the Thue inequality NUMBER OF SOLUTIONS OF CUBIC THUE INEQUALITIES WITH POSITIVE DISCRIMINANT N SARADHA AND DIVYUM SHARMA Abstact Let F(X, Y) be an ieducible binay cubic fom with intege coefficients and positive disciminant

More information

I. CONSTRUCTION OF THE GREEN S FUNCTION

I. CONSTRUCTION OF THE GREEN S FUNCTION I. CONSTRUCTION OF THE GREEN S FUNCTION The Helmohltz equation in 4 dimensions is 4 + k G 4 x, x = δ 4 x x. In this equation, G is the Geen s function and 4 efes to the dimensionality. In the vey end,

More information

Lecture 8 - Gauss s Law

Lecture 8 - Gauss s Law Lectue 8 - Gauss s Law A Puzzle... Example Calculate the potential enegy, pe ion, fo an infinite 1D ionic cystal with sepaation a; that is, a ow of equally spaced chages of magnitude e and altenating sign.

More information

2 S. Gao and M. A. Shokollahi opeations in Fq, and usually we will use the \Soft O" notation to ignoe logaithmic factos: g = O(n) ~ means that g = O(n

2 S. Gao and M. A. Shokollahi opeations in Fq, and usually we will use the \Soft O notation to ignoe logaithmic factos: g = O(n) ~ means that g = O(n Computing Roots of Polynomials ove Function Fields of Cuves Shuhong Gao 1 and M. Amin Shokollahi 2 1 Depatment of Mathematical Sciences, Clemson Univesity, Clemson, SC 29634 USA 2 Bell Labs, Rm. 2C-353,

More information

MATH 220: SECOND ORDER CONSTANT COEFFICIENT PDE. We consider second order constant coefficient scalar linear PDEs on R n. These have the form

MATH 220: SECOND ORDER CONSTANT COEFFICIENT PDE. We consider second order constant coefficient scalar linear PDEs on R n. These have the form MATH 220: SECOND ORDER CONSTANT COEFFICIENT PDE ANDRAS VASY We conside second ode constant coefficient scala linea PDEs on R n. These have the fom Lu = f L = a ij xi xj + b i xi + c i whee a ij b i and

More information

This aticle was oiginally published in a jounal published by Elsevie, the attached copy is povided by Elsevie fo the autho s benefit fo the benefit of the autho s institution, fo non-commecial eseach educational

More information

working pages for Paul Richards class notes; do not copy or circulate without permission from PGR 2004/11/3 10:50

working pages for Paul Richards class notes; do not copy or circulate without permission from PGR 2004/11/3 10:50 woking pages fo Paul Richads class notes; do not copy o ciculate without pemission fom PGR 2004/11/3 10:50 CHAPTER7 Solid angle, 3D integals, Gauss s Theoem, and a Delta Function We define the solid angle,

More information

CALCULUS II Vectors. Paul Dawkins

CALCULUS II Vectors. Paul Dawkins CALCULUS II Vectos Paul Dawkins Table of Contents Peface... ii Vectos... 3 Intoduction... 3 Vectos The Basics... 4 Vecto Aithmetic... 8 Dot Poduct... 13 Coss Poduct... 21 2007 Paul Dawkins i http://tutoial.math.lama.edu/tems.aspx

More information

Bounds on the performance of back-to-front airplane boarding policies

Bounds on the performance of back-to-front airplane boarding policies Bounds on the pefomance of bac-to-font aiplane boading policies Eitan Bachmat Michael Elin Abstact We povide bounds on the pefomance of bac-to-font aiplane boading policies. In paticula, we show that no

More information

Compactly Supported Radial Basis Functions

Compactly Supported Radial Basis Functions Chapte 4 Compactly Suppoted Radial Basis Functions As we saw ealie, compactly suppoted functions Φ that ae tuly stictly conditionally positive definite of ode m > do not exist The compact suppot automatically

More information

Do Managers Do Good With Other People s Money? Online Appendix

Do Managers Do Good With Other People s Money? Online Appendix Do Manages Do Good With Othe People s Money? Online Appendix Ing-Haw Cheng Haison Hong Kelly Shue Abstact This is the Online Appendix fo Cheng, Hong and Shue 2013) containing details of the model. Datmouth

More information

Encapsulation theory: the transformation equations of absolute information hiding.

Encapsulation theory: the transformation equations of absolute information hiding. 1 Encapsulation theoy: the tansfomation equations of absolute infomation hiding. Edmund Kiwan * www.edmundkiwan.com Abstact This pape descibes how the potential coupling of a set vaies as the set is tansfomed,

More information

Parameter identification in Markov chain choice models

Parameter identification in Markov chain choice models Poceedings of Machine Leaning Reseach 76:1 11, 2017 Algoithmic Leaning Theoy 2017 Paamete identification in Makov chain choice models Aushi Gupta Daniel Hsu Compute Science Depatment Columbia Univesity

More information

Efficiency Loss in a Network Resource Allocation Game

Efficiency Loss in a Network Resource Allocation Game Efficiency Loss in a Netwok Resouce Allocation Game Ramesh Johai johai@mit.edu) John N. Tsitsiklis jnt@mit.edu) June 11, 2004 Abstact We exploe the popeties of a congestion game whee uses of a congested

More information

Internet Appendix for A Bayesian Approach to Real Options: The Case of Distinguishing Between Temporary and Permanent Shocks

Internet Appendix for A Bayesian Approach to Real Options: The Case of Distinguishing Between Temporary and Permanent Shocks Intenet Appendix fo A Bayesian Appoach to Real Options: The Case of Distinguishing Between Tempoay and Pemanent Shocks Steven R. Genadie Gaduate School of Business, Stanfod Univesity Andey Malenko Gaduate

More information

New lower bounds for the independence number of sparse graphs and hypergraphs

New lower bounds for the independence number of sparse graphs and hypergraphs New lowe bounds fo the independence numbe of spase gaphs and hypegaphs Kunal Dutta, Dhuv Mubayi, and C.R. Subamanian May 23, 202 Abstact We obtain new lowe bounds fo the independence numbe of K -fee gaphs

More information