The Graph Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule

Size: px
Start display at page:

Download "The Graph Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule"

Transcription

1 The Grah Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule STEFAN D. BRUDA Deartment of Comuter Science Bisho s University Lennoxville, Quebec J1M 1Z7 CANADA bruda@cs.ubishos.ca htt://turing.ubishos.ca Abstract: We comlete the characterization of constant time comutations on arallel models with reconfigurable buses: We have shown reviously that directed reconfigurable multile bus machines (DRMBM) with olynomially bounded resources and running in constant time solve exactly the same roblems as nondeterministic logarithmic sace bounded Turing machines, that write conflict resolution rules such as Priority or even Combining do not add comutational ower over the Collision rule, and that a bus of width 1 (a wire) suffices for any constant time comutation on DRMBM. We now show that the same roerties hold for constant time comutations of directed reconfigurable networks (DRN). We then study the ower of the Collision rule in the general case, linking strongly its universality with the caability of the model to comute the grah accessibility roblem in constant time. Key-words: arallel comutation, real-time comutation, reconfigurable multile bus machine, reconfigurable network, CRCW conflict resolution rules, grah accessibility roblem 1 Introduction Previous work on arallel real-time comutations [4] has roduced a number of incidental results regarding models of arallel comutations with reconfigurable buses. Secifically, a tight characterization of constant time comutations on reconfigurable multile bus machines (RMBMs) was offered: DRMBMs and directed reconfigurable networks (DRNs) with constant running time have been found to have the same comutational ower, which in turn is the same ower as nondeterministic logarithmic sace bounded Turing machines. In addition, it was shown that in the case of constant time RMBM comutations there is no need for such owerful write conflict resolution rules as Priority or Combining as they do not add comutational ower over the easily imlementable Collision rule, that a unitary bus width is enough (i.e., a simle wire as bus will do for all constant time RMBM comutations), and that segmenting buses does not add comutational ower over fusing buses. Motivated by such a result we comlete in this aer the characterization of constant time comutations on models with reconfigurable buses. We find that such roerties (Collision being the most owerful resolution rule and unitary bus width being sufficient) hold for the other model with reconfigurable buses, namely This research was suorted by the Natural Sciences and Engineering Research Council of Canada and by the Fond québécois de recherche sur la nature et les technologies. the RN. We then study whether the Conflict resolution rule is generally (i.e., not only for constant time comutations) universal on DRMBMs and DRNs. We find that this is indeed the case, and we are able to do so in a more general setting. For indeed, the Collision rule is universal on any arallel model of comutation that is caable of comuting the grah accessibility roblem (GAP) in constant time. 2 Preliminaries Results roved elsewhere are introduced henceforth as Proositions, whereas results roved in this work are introduced as Theorems. Intermediate results are all Lemmata. GAP i,j denotes be the following roblem: Given a directed grah G = (V, E), V = {1, 2,..., n} (exressed e.g., by the (boolean) incidence matrix I), determine whether vertex j is accessible from vertex i. We denote by L [NL] the set of languages that are acceted by deterministic [nondeterministic] Turing machines that use at most O(log n) sace (not counting the inut tae) on any inut of length n [6]. For some language L NL there exists a nondeterministic Turing machine M = (K, Σ, δ, s 0 ) that accets L and uses O(log n) working sace. K is the set of states, Σ is the tae alhabet (we consider without loss of generality that Σ = {0, 1}), δ is the transition

2 relation, and s 0 is the initial state. M accets an inut string x iff M halts on x. A configuration of M working on inut x is defined as a tule (s, i, w, j), where s is the state, i and j are the ositions of the heads on inut and working tae, resectively, and w is the content of the working tae. There are oly(n) ossible configurations of M. For two configurations v 1 and v 2, we write v 1 v 2 iff v 2 can be obtained by alying δ exactly once on v 1 [6]. The set of ossible configurations of M working on x forms a directed grah G(M, x) = (V, E) as follows: V contains one vertex for each and every ossible configuration of M working on x, and (v 1, v 2 ) E iff v 1 v 2. It is clear that x L iff some configuration (h, i h, w h, j h ) is accessible in G(M, x) from the initial configuration (s 0, i 0, w 0, j 0 ). For any language L NL and for any x, determining whether x L can be reduced to the roblem of comuting GAP 1, V for G(M, x) = (V, E), where M is some NL Turing machine deciding L. The class of roblems in NL with the addition of (any kind of) real-time constraints is denoted by NL/rt [4]. We denote by rt-proc M (f) the class of those roblems solvable in real time by the arallel model of comutation M that uses f(n) rocessors (and also f(n) buses if alicable) for any inut of size n [3]. The following strongly suorted conjecture is then established. Claim 1 [4] rt-proc CRCW F-DRMBM (oly(n)) = NL/rt. Two main models with reconfigurable buses have been develoed in the literature: the reconfigurable network (or RN for short) [2] and the reconfigurable multile bus machine (or RMBM) [7]. 2.1 The RMBM An RMBM [7] consists of a set of rocessors and b buses. For each rocessor i and bus b there exists a switch controlled by rocessor i. Using these switches, a rocessor has access to the buses by being able to read or write from/to any bus. A rocessor may be able to segment a bus, obtaining thus two indeendent, shorter buses, and it is allowed to fuse any number of buses together by using a fuse line erendicular to and intersecting all the buses. DRMBM, the directed variant of RMBM, is identical to the undirected model, excet for the definition of fuse lines: Each rocessor features two fuse lines (down and u). Each of these fuse lines can be electrically connected to any bus. Assume that, at some given moment, buses i 1, i 2,..., i k are all connected to the down [u] fuse line of some rocessor. Then, a signal laced on bus i j is transmitted in one time unit to all the buses i l such that i l i j [i l i j ]. If some RMBM [DRMBM] is not allowed to segment buses, then this restricted variant is denoted by F-RMBM [F-DRMBM] (for fusing RMBM/DRMBM). The bus width of some RMBM (DRMBM, etc.) denotes the maximum size of a word that may be laced (and read) on (from) any bus in one comutational ste. For CRCW (concurrent read, concurrent write; as oosed to CREW for concurrent read, exclusive write) RMBMs, the most realistic conflict resolution rule is Collision, where two values simultaneously written on a bus result in the lacement of a secial, collision value on that bus. We consider for comleteness other conflict resolution rules such as Common, Arbitrary, Priority, and Combining. However, we find that all of these rules are in fact equivalent to the seemingly less owerful Collision rule (see Proosition 2.1(3)). We restrict only the Combining mode, requiring that the combining oeration be associative and comutable in nondeterministic linear sace. An RMBM (DRMBM, F-DRMBM, etc.) family R = (R n ) n 1 is a set containing one RMBM (DRMBM, F-DRMBM, etc.) construction for each n > 0. A family R solves a roblem P if, for any n, R n solves all inuts for P of size n. We say that some RMBM family R is a uniform RMBM family if there exists a Turing machine M that, given n, roduces the descrition of R n using O(log((n)b(n))) cells on its working tae. We henceforth dro the uniform qualifier, with the understanding that any RMBM family described in this aer is uniform. Assume that some family R = (R n ) solves a roblem P, and that each R n, n > 0, uses (n) rocessors, b(n) buses, and has a running time t(n). We say then that P RMBM((n), b(n), t(n)) (or P F-DRMBM((n), b(n), t(n)), etc.), and that R has size comlexity (n)b(n) and time comlexity t(n). It should be noted that a directed RMBM can simulate a nondirected RMBM by simly keeing all the u and down fuse lines synchronized with each other. 2.2 The Reconfigurable Network An RN [2] is a network of rocessors that can be reresented as a connected grah whose vertices are the rocessors and whose edges reresent fixed connec-

3 tions between rocessors. Each edge incident to a rocessor corresonds to a (bidirectional) ort of the rocessor. A rocessor can internally artition its orts such that all the orts in the same block of that artition are electrically connected (or fused) together. Two or more edges that are connected together by a rocessor that fuses some of its orts form a bus which connects orts of various rocessors together. CREW, Common CRCW, Collision CRCW, etc. are defined as for the the RMBM model. The directed RN (DRN for short) is similar to the general RN, excet that the edges are directed. The concet of (uniform) RN family is identical to the concet of RMBM family. The class RN((n), t(n)) [DRN((n), t(n))] is the set of roblems solvable by RN [DRN] uniform families with (n) rocessors ((n) is also called the size comlexity) and t(n) running time. 2.3 RMBM and Small Sace Comutations The characterization of constant time RMBM comutations described in the introduction of this aer can be formally summarized as follows: Proosition 2.1 [4] 1. CRCW DRMBM(oly(n), oly(n), O(1)) = NL = CRCW F-DRMBM(oly(n), oly(n), O(1)) with Collision resolution rule and bus width DRMBM(oly(n), oly(n), O(1)) = DRN(oly(n), O(1)). 3. For any roblem P solvable in constant time by some (directed or nondirected) RMBM family using oly(n) rocessors and oly(n) buses, P CRCW F-DRMBM(oly(n), oly(n), O(1)) with Collision resolution rule and bus width 1. We shall determine a similar result for DRNs. We will adat for this urose two roofs used to derive Proosition 2.1. In order to make this aer self contained we include below these roofs. Lemma 2.2 [4] CRCW DRMBM(oly(n), oly(n), O(1)) NL, for any write conflict resolution rule and any bus width. Proof. Consider some R CRCW DRMBM(oly(n), oly(n), O(1)) erforming ste d of its comutation (d O(1)). We need to find an NL Turing machine M d that generates the descrition of R after ste d using O(log n) sace, and thus [5] an NL Turing machine M d that receives n (the number of rocessors in R) and some i, 1 i n, and oututs the (O(log n) long) descrition for rocessor i instead of the whole descrition. We establish the existence of M d (and thus M d ) by induction over d, and thus we comlete the roof. M 0 exists by the definition of a uniform RMBM family. We assume the existence of M d 1, M d 1 and show how M d is constructed. For each rocessor i and each bus k read by i during ste d, M d erforms (sequentially) the following comutation: M d maintains two words b and ρ, initially emty. For every j, 1 j oly(n), M d determines whether j writes on bus k. This imlies the comutation of GAP j,i (clearly comutable in nondeterministic O(log n) sace since it is NL-comlete [6]). The local configurations of fused and segmented buses at each rocessor (i.e., the edges of the grah for GAP j,i ) are obtained by calls to M d 1. The comutation of GAP j,i is necessary to ensure that we take j into account even when j does not write directly to bus k but instead to another bus that reaches bus k through fused buses. If j writes on bus k, then M d uses M d 1 to determine the value v written by j, and udates b and ρ as follows: (a) If b is emty, then it is set to v ( j is currently the only rocessor that writes to bus k), and ρ is set to j. Otherwise: (b) If R uses the Collision rule, the collision signal is laced in b. (c) If the conflict resolution rule is Priority, ρ and j are comared; if the latter denotes a rocessor with a larger riority, then b is set to v and ρ is set to j, otherwise, neither b nor ρ are modified; the Common and Arbitrary rules are handled similarly. (d) Finally, if R uses the Combining resolution rule with as combining oeration, b is set to the result of b v (since the oeration is associative, the final content of b is indeed the correct combination of all the values written on bus k). Once the content of bus k has been determined, the configuration of i is udated accordingly, b and ρ are reset to the emty word, and the same comutation is erformed for the next bus read by i or for the next rocessor. The whole comutation of M d clearly takes O(log n) sace. Lemma 2.3 [4] Let M = (K, Σ, δ, s 0 ) be an NL Turing machine that accets L NL. Then, given some word x, x = n, there exists a CREW or CRCW F-DRMBM algorithm that comutes G(M, x) (as an incidence matrix I) in O(1) time, and using oly(n) rocessors and oly(n) buses of width 1.

4 Proof. Put n = V (n = oly(n)). The RMBM algorithm uses n + (n 2 n ) rocessors: The first n rocessors i, 1 i n, contain x, i.e., each i contains x i, the i-th symbol of x; i does nothing but writes x i on bus i. We shall refer to the remaining n 2 n rocessors as, 1 i, j n. Each assembles first the configurations corresonding to vertices v i and v j of G(M, x) and then considers the otential edge (v i, v j ) corresonding to I. If such edge exists, then writes T rue to I, and F alse otherwise. There is no interrocessor communication between rocessors, thus any RMBM model is able to carry on this comutation. Clearly, given a configuration v i, can comute in constant time any configuration v l accessible in one ste from v i, as this imlies the comutation of at most a constant number (O(2 k )) of configurations. The whole algorithm runs thus in constant time. 3 The Characterization of Constant Time RN Comutations The generality of the Collision resolution rule is not limited to RMBM comutations. Indeed, the same roerty holds for constant time comutations on RN as well. We also find that a DRN is able to carry out any constant time comutation using only buses of width 1. The first main result of this aer is thus the DRN equivalent of Proosition 2.1, as follows: Theorem 3.1 For any roblem π solvable in constant time on some variant of RN, it holds that π CRCW DRN(oly(n), O(1)) with Collision resolution rule and bus width 1. The roof of Theorem 3.1 is based on the following intermediate results. Lemma 3.2 For any X {CRCW, CREW}, Y {D, ε}, and for any write conflict resolution rule, it holds that X Y RN(oly(n), O(1)) CRCW DRN(oly(n), O(1)) with the Collision resolution rule. Proof. First, note that CRCW DRN(oly(n), O(1)) = NL for the Collision resolution rule [2]. Thus, we comlete the roof by showing that, for any conflict resolution rule, CRCW DRN(oly(n), O(1)) NL. This result is however given by the roof of Lemma 2.2. Indeed, it is immediate that the Turing machines M d and M d, 0 d c for some constant c 1, rovided in the mentioned roof work in the case of a RN R just as well as for the RMBM simulation. The only difference is that buses are not numbered in the RN case. So, we first assign arbitrary (but unambiguous) sequence numbers for the RN buses as follows: There exists an O(log n) sace-bounded Turing machine that generates a descrition of R, since R belongs to a uniform RN family (in fact, such a Turing machine is M 0 ). Then, in order to find bus k, M d uses M 0 to generate the descrition of R until exactly k buses are generated. The descrition is discarded, excet for the last generated bus, which is considered to be bus k. Since M 0 is deterministic, it always generates the descrition in the same order. Thus, it is guaranteed that bus k is different from bus j if and only if k j. The roof of Lemma 2.2 follows then unchanged. The extra sace used in the rocess of generating bus k consists in two counters over the set of buses (one to kee the value k and the other one to count how many buses have been already generated). The counters take O(log n) sace each, since there are at most oly(n) rocessors, and (oly(n)) 2 = oly(n). Thus, the overall sace comlexity remains O(log n), as desired. Lemma 3.3 GAP 1,n CRCW DRN(n 2, O(1)) with Collision resolution rule and bus width 1. Proof. Let R be the DRN solving GAP 1,n instances of size n. Then, R uses n 2 rocessors (referred to as, 1 i, j n), connected in a mesh. That is, there exists a (directional) bus from only to (i+1)j if and only if i+1 n, and to i(j+1) if and only if j+1 n, as shown in Figure 1. As shown in the figure, we also denote by E, S, N, and W the orts of to the buses going to i(j+1), going to (i+1)j, coming from i(j 1), and coming from (i 1)j, resectively. We assume that the inut grah G = (V, E), V = n, is given by its incidence matrix I, and that each rocessor knows the value of I. The DRN R works as follows: Each rocessor, i < j fuses its W and S orts if and only if I = T rue. Analogously, each rocessor, i > j fuses its N and E orts if and only if I = T rue. Finally, each rocessor ii fuses all of its orts. Then, a signal is laced by 11 on both its outgoing buses. If nn receives some signal (either the original one emitted by 11 or the signal corresonding to a collision) the inut is acceted; otherwise, the inut is rejected.

5 11 21 n W S N E... Figure 1: A mesh of n n rocessors 1n nn It is immediate that R solves GAP 1,n, by an argument similar to the one for RMBM [4] (also note that a similar construction is resented and roved correct elsewhere [8]). In addition, the content of the signal received by nn is clearly immaterial, so a bus of width 1 suffices. Recall now that the grah G(M, x) is the grah of configurations of the Turing machine M working on inut x. Lemma 3.4 For any language L NL (with the associated NL Turing machine M acceting L), and given some word x, x = n, there exists a constant time CREW (and thus CRCW) DRN algorithm using oly(n) rocessors and buses of width 1 that comutes G(M, x) (as an incidence matrix I). Proof. This fact is obtained by the same argument as the one resented in the roof of Lemma 2.3. Indeed, excet for the distribution of inut x to rocessors, there is no interrocessor communication; as such, any arallel machine will do. Thus, the comutation of G(M, x) = (V, E) will be erformed by the same mesh of rocessors R deicted in Figure 1, this time of size n n (where n = V ). In addition, the desired inut distribution will be accomlished by n additional meshes identical to R. We will denote these meshes by R i, 1 i n. For any 1 i, j n and 1 k n, the rocessor at row i, column j in mesh R k [R], will be denoted by k [n+1 ]. Each rocessor k has two new orts U and D. There exists a bus connecting ort D of k to ort U of k+1 for any 1 k n. The n + 1 meshes and their interconnection are shown in Figure 2. At the beginning of the comutation, x k, the kth symbol of inut x, is stored in a register of rocessor k 11, 1 k n. We note from the roof of Lemma 2.3 that each rocessor n+1 of R is resonsible for checking the existence of a single edge (i, j) of G(M, x). In order to accomlish this, it needs only one symbol x h from x, namely the symbol scanned by the head of the inut tae in configuration i. We assume that all the rocessors k, 1 k n, know the configuration i (and thus the value of h ). It remains therefore to show now how x h reaches rocessor n+1 in constant time, for indeed, after this distribution is achieved, R is able to comute the incidence matrix I exactly as shown in the roof of Lemma 2.3. The set of n + 1 meshes erforms the following comutation: For all 1 k n and 1 i, j n, 1. Each k 11 broadcasts x k to all the rocessors in R k. To do this, all rocessors k fuse together their N, S, E, and W orts, and then k 11 laces x k on its outgoing buses. 2. Each k comares k and h, and writes T rue in one of its registers d if they are equal and F alse otherwise. 3. Each k fuses its U and D orts, thus forming i j vertical buses. 4. Each k for which d = T rue laces x k on its ort D. 5. Finally, each n+1 stores the value it receives on its U ort. This is the value of x h it needs in order to comute the element I of the incidence matrix. It is immediate that the above rocessing takes constant time. In addition, it is also immediate that exactly one rocessor writes on each vertical bus, and thus no concurrent write takes lace. Indeed, there exists exactly one rocessor k, 1 k n, such that k = h. Therefore, we realized the inut distribution. I is then comuted by rocessor n+1 without further communication, as shown in the roof of Lemma 2.3. The construction of the DRN algorithm that comutes I is therefore comlete. Clearly, buses of width 1 are enough for the whole rocessing, since x is a word over an alhabet with 2 symbols. Given Lemmata 3.3, 3.4, and 3.2 we can now rove our first main result.

6 R 1 R k 1 R k R k+1 R k+1 1 k 1 k U D n+1 Figure 2: A collection of n meshes connected together Proof of Theorem 3.1. That the Collision resolution rule is the most owerful follows from Lemma 3.2. It remains to be shown only that a bus width 1 suffices. Given some language L NL, let M be the (NL) Turing machine acceting L. For any inut x, the DRN algorithm that accets L works as follows: Using Lemma 3.4, it obtains the grah G(M, x) of the configurations of M working on x. Then, it alies the algorithm from Lemma 3.3 in order to determine whether vertex n (halting/acceting state) is accessible from vertex 1 (initial state) in G(M, x), and accets or rejects x, accordingly. In addition, note that the values I comuted by (and stored at) n+1 in the algorithm from Lemma 3.4 are in the right lace as inut for in the algorithm from Lemma 3.3 (that uses only the mesh R). It is immediate given the aforementioned lemmata that the resulting algorithm accets L and uses no more than oly(n) rocessors, and unitary width for all the buses. The roof is now comlete, since all the roblems solvable in constant time on RN are included in NL. 4 GAP and the Universality of Collision As far a constant time comutation is concerned, we note an aarent contrast between the ower of conflict resolution rules for models with reconfigurable buses (RMBM and RN) on one hand, and for shared memory models (PRAM) on the other hand. According to our results, Collision is the most owerful rule on RMBM and RN. By contrast, it is widely believed that the Combining CRCW PRAM is more owerful than the CRCW PRAM using the equivalent of a Collision resolution rule. To our knowledge however no roof on the matter exists to date. We believe that an investigation in this direction is an interesting ursuit. We also believe that the contrast between RN and PRAM is not only aarent (that is, we believe that the Combining CRCW PRAM is indeed more owerful than the Collision CRCW PRAM). The reason for our belief is that the ability of some model to comute GAP in constant time is central to the constant time universality of the Collision rule, and also determines that exactly all DRMBM and DRN comutations are in NL; we also note that GAP is NLcomlete [6]. In light of this motivation, consider the classes M <GAP, M GAP, and M >GAP of arallel models of comutations using olynomially bounded resources (rocessors and, if alicable, buses), such that: M <GAP contains exactly all the models that cannot comute GAP in constant time, and cannot comute in constant time any roblem not in NL. An examle of such a model is the Common CRCW PRAM [9] (and thus the less owerful PRAM variants). contains exactly all the models that can comute GAP in constant time, but cannot comute in constant time any roblem not in NL. This class includes the RMBM and RN. contains exactly all the models that can comute GAP in constant time and can comute in constant time at least one roblem not in NL. To our knowledge, no model has been roved to ertain to such a class, but a ossible candidate is the broadcast with selective reduction model [1]. M GAP M >GAP Our second main result is then formulated as follows: Theorem 4.1 The Collision resolution rule is universal on any model M M GAP M >GAP, in the following sense: For any R M with any write conflict resolution rule and t(n) running time for inut size n there exists an R M that erforms the same comutation as R in O(t(n)) time using the Collision resolution rule.

7 Proof. Suose that some machine R M comutes GAP i,j for a grah G with n vertices in constant time and using oly(n) rocessors and oly(n) buses (if alicable); R exists by definition. Given the log n restriction to the size of the registers of the articiating rocessors, a rocessor cannot hold but a constant number of edge descritions. We then assume without loss of generality that m rocessors hold information about the m edges in G. Since the whole comutation erformed by R comletes in constant time, it follows that the m rocessors holding the edge information are made to communicate with each other in constant time by using extra oly(m) resources. This aarently irrelevant roerty can be ut in a more interesting way: given some R M with m rocessors, there exists an R M that includes R such that (a) all the original rocessors from R communicate with each other in constant time in R, and (b) R uses at most oly(m) more resources than R. Call this roerty the constant-gap-constantcommunication roerty. Let now R M be some CRCW machine with olynomially bounded resources that uses the Combining resolution rule to erform its comutation. We then relace R with a variant that uses the Collision resolution rule and then we slit each ste i of the comutation into the following constant number of stes: 1. Each rocessor of R reads the content of external resources (buses, memory locations, etc.) as required and then erforms the rescribed comutation for ste i, excet that whenever wants to write to external resource k it also writes the same value into a dedicated resource k (there is one such a resource for each rocessor). Note that the Collision value might be laced in k. 2. A machine R g then finds which of the original resources hold a Collision value, and for each such a resource: (a) determines based on the configurations of the original rocessors which of these rocessors write into the resective resource, (b) comutes the resulting value to be laced into the resective resource (instead of the Collision signal), and (c) writes the comuted value into the resource. Clearly the running time of the combination R, R g, and the new resources k ut together is of the same order as the running time of the original R. Indeed, Ste (2.a) might imly reeated comutations of some GAP i,j, whilst ste (2.b) is comutable in logarithmic sace given that the Combining oeration is associative and comutable in linear sace. The whole rocess erformed by R g is thus achievable in nondeterministic logarithmic sace. On the other hand GAP i,j is NL-comlete, so R g can be a imlemented as a machine in M running in constant time. It is also immediate that, if R uses oly(n) rocessors and resources, then the combination also uses oly(n) resources. In addition to all of these, the rocessors from R g should be able to communicate in constant time with all the rocessors in R (to insect their configurations); this can be accomlished however with a oly(n) increase in resources according to the constant-gap-constant-communication roerty stated at the beginning of the roof. The result is then established for the Combining rule. The other conflict resolution rules are considered similarly in an immediate manner, and the theorem obviously holds for any machine that does not use a conflict resolution rule (i.e., a CREW machine). Given that both DRMBMs and DRNs are in M GAP, the following is an immediate consequence of Theorem 4.1 and comletes the characterization of models with reconfigurable buses: Corollary 4.2 The Collision resolution rule is universal on models with reconfigurable buses. That is: For any X {CRCW, CREW}, Y {D, ε}, Z {RN(oly(n), ), RMBM(oly(n), oly(n), )}, t : IN IN, and for any write conflict resolution rule, it holds that X Y Z(t(n)) X DZ(O(t(n))) with the Collision resolution rule. 4.1 GAP and Real-Time Comutations Comare the revious discussion on GAP with the following immediate generalization of Claim 1: Theorem 4.3 For any models of comutation M 1, M 2, and M 3 such that M 1 M <GAP, M 2 M GAP, and M 3 M <GAP, it holds that rt-proc M 1 (oly(n)) NL/rt (1) rt-proc M 2 (oly(n)) = NL/rt (2) rt-proc M 3 (oly(n)) NL/rt (3) Proof. Minor variations of the arguments used in [4] show that those comutations which can be erformed in constant time on M i, 1 i 3, can be erformed in the resence of however tight time constraints (and thus in real time in general). Then, Relations (1) and (3) follow immediately from Claim 1.

8 By the same argument, rt-proc M 2 (oly(n)) rt-proc CRCW F-DRMBM (oly(n)) holds as well. The equality (and thus Relation (2)) is given by the arguments that suort Claim 1 [4]. Thus, the characterization of real-time comutations established by Claim 1 does hold in fact for any machines that are able to comute GAP in constant time. The characterization resented in Theorem 4.3 emhasizes in fact the strength of Claim 1. Indeed, as noted above, no model more owerful than the RMBM is known to exist. That is, according to the current body of knowledge, M >GAP =. Unless this relation is found to be false, it follows from Claim 1 that no roblem outside NL can be solved in real time in general, not only as far as RMBM comutations are concerned. 5 Conclusions We found that there exists a very strong similarity between the two models with reconfigurable buses, the RN and the RMBM: Not only they solve the same roblems (namely, exactly all the roblems in NL), but in both cases (a) the smallest ossible bus width is enough for all roblems, and (b) the Collision resolution rule is the most owerful (even as owerful as the Combining rule). Furthermore, we showed that Collision is the most owerful on DRNs and DRMBMs for any running time. According to our results, the discussion regarding the ractical feasibility of rules like Priority or Combining on satially distributed resources such as buses is no longer of interest. Indeed, such rules are not only of questionable feasibility, but also not necessary! We also noted the central role of the grah accessibility roblem (GAP) for the DRN and DRMBM results obtained here and also reviously [4]. In fact, the universality of the Collision rule on models with reconfigurable buses was established as a consequence of our more general result that the Collision rule is universal on any model of arallel comutation that is able to comute GAP in constant time. Having found that Collision is universal on all the models from M GAP and given that GAP is not comutable in constant time on models from M <GAP, we believe that the Collision resolution rule is not universal on any model from M <GAP. We also exect that a lesser conflict resolution rule is universal on models in M >GAP (if any). Showing (or disroving) this is an intriguing oen roblem. References: [1] S. G. AKL AND G. R. GUENTHER, Broadcasting with selective reduction, in Proceedings of the IFIP Congress, 1989, [2] Y. BEN-ASHER, K.-J. LANGE, D. PELEG, AND A. SCHUSTER, The comlexity of reconfiguring network models, Information and Comutation, 121 (1995), [3] S. D. BRUDA AND S. G. AKL, Pursuit and evasion on a ring: An infinite hierarchy for arallel real-time systems, Theory of Comuting Systems, 34 (2001), For an extended version see htt://turing.ubishos.ca/home/bruda/- aers/ursuit. [4], On the relation between arallel real-time comutations and logarithmic sace, in Proceedings of the IASTED International Conference on Parallel and Distributed Comuting and Systems, Cambridge, MA, Nov. 2002, For an extended version see htt://turing.ubishos.ca/- home/bruda/aers/nlogsace. [5] R. GREENLAW, H. J. HOOVER, AND W. L. RUZO, Limits to Parallel Comutation: P- Comleteness Theory, Oxford University Press, New York, NY, [6] A. SZEPIETOWSKI, Turing Machines with Sublogarithmic Sace, Sringer Lecture Notes in Comuter Science 843, [7] J. L. TRAHAN, R. VAIDYANATHAN, AND R. K. THIRUCHELVAN, On the ower of segmenting and fusing buses, Journal of Parallel and Distributed Comuting, 34 (1996), [8] B.-F. WANG AND G.-H. CHEN, Constant time algorithms for the transitive closure and some related grah roblems on rocessor arrays with reconfigurable bus systems, IEEE Transactions on Parallel and Distributed Systems, 1 (1990), [9], Two-dimensional rocessor array with a reconfigurable bus system is at least as owerful as CRCW model, Information Processing Letters, 36 (1990),

Combinatorics of topmost discs of multi-peg Tower of Hanoi problem

Combinatorics of topmost discs of multi-peg Tower of Hanoi problem Combinatorics of tomost discs of multi-eg Tower of Hanoi roblem Sandi Klavžar Deartment of Mathematics, PEF, Unversity of Maribor Koroška cesta 160, 000 Maribor, Slovenia Uroš Milutinović Deartment of

More information

Outline. CS21 Decidability and Tractability. Regular expressions and FA. Regular expressions and FA. Regular expressions and FA

Outline. CS21 Decidability and Tractability. Regular expressions and FA. Regular expressions and FA. Regular expressions and FA Outline CS21 Decidability and Tractability Lecture 4 January 14, 2019 FA and Regular Exressions Non-regular languages: Puming Lemma Pushdown Automata Context-Free Grammars and Languages January 14, 2019

More information

A Parallel Algorithm for Minimization of Finite Automata

A Parallel Algorithm for Minimization of Finite Automata A Parallel Algorithm for Minimization of Finite Automata B. Ravikumar X. Xiong Deartment of Comuter Science University of Rhode Island Kingston, RI 02881 E-mail: fravi,xiongg@cs.uri.edu Abstract In this

More information

1-way quantum finite automata: strengths, weaknesses and generalizations

1-way quantum finite automata: strengths, weaknesses and generalizations 1-way quantum finite automata: strengths, weaknesses and generalizations arxiv:quant-h/9802062v3 30 Se 1998 Andris Ambainis UC Berkeley Abstract Rūsiņš Freivalds University of Latvia We study 1-way quantum

More information

Approximating min-max k-clustering

Approximating min-max k-clustering Aroximating min-max k-clustering Asaf Levin July 24, 2007 Abstract We consider the roblems of set artitioning into k clusters with minimum total cost and minimum of the maximum cost of a cluster. The cost

More information

Lecture 9: Connecting PH, P/poly and BPP

Lecture 9: Connecting PH, P/poly and BPP Comutational Comlexity Theory, Fall 010 Setember Lecture 9: Connecting PH, P/oly and BPP Lecturer: Kristoffer Arnsfelt Hansen Scribe: Martin Sergio Hedevang Faester Although we do not know how to searate

More information

Parallelism and Locality in Priority Queues. A. Ranade S. Cheng E. Deprit J. Jones S. Shih. University of California. Berkeley, CA 94720

Parallelism and Locality in Priority Queues. A. Ranade S. Cheng E. Deprit J. Jones S. Shih. University of California. Berkeley, CA 94720 Parallelism and Locality in Priority Queues A. Ranade S. Cheng E. Derit J. Jones S. Shih Comuter Science Division University of California Berkeley, CA 94720 Abstract We exlore two ways of incororating

More information

MATH 2710: NOTES FOR ANALYSIS

MATH 2710: NOTES FOR ANALYSIS MATH 270: NOTES FOR ANALYSIS The main ideas we will learn from analysis center around the idea of a limit. Limits occurs in several settings. We will start with finite limits of sequences, then cover infinite

More information

Elementary Analysis in Q p

Elementary Analysis in Q p Elementary Analysis in Q Hannah Hutter, May Szedlák, Phili Wirth November 17, 2011 This reort follows very closely the book of Svetlana Katok 1. 1 Sequences and Series In this section we will see some

More information

Multi-Operation Multi-Machine Scheduling

Multi-Operation Multi-Machine Scheduling Multi-Oeration Multi-Machine Scheduling Weizhen Mao he College of William and Mary, Williamsburg VA 3185, USA Abstract. In the multi-oeration scheduling that arises in industrial engineering, each job

More information

Matching Partition a Linked List and Its Optimization

Matching Partition a Linked List and Its Optimization Matching Partition a Linked List and Its Otimization Yijie Han Deartment of Comuter Science University of Kentucky Lexington, KY 40506 ABSTRACT We show the curve O( n log i + log (i) n + log i) for the

More information

Mobius Functions, Legendre Symbols, and Discriminants

Mobius Functions, Legendre Symbols, and Discriminants Mobius Functions, Legendre Symbols, and Discriminants 1 Introduction Zev Chonoles, Erick Knight, Tim Kunisky Over the integers, there are two key number-theoretic functions that take on values of 1, 1,

More information

Topic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar

Topic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar 15-859(M): Randomized Algorithms Lecturer: Anuam Guta Toic: Lower Bounds on Randomized Algorithms Date: Setember 22, 2004 Scribe: Srinath Sridhar 4.1 Introduction In this lecture, we will first consider

More information

For q 0; 1; : : : ; `? 1, we have m 0; 1; : : : ; q? 1. The set fh j(x) : j 0; 1; ; : : : ; `? 1g forms a basis for the tness functions dened on the i

For q 0; 1; : : : ; `? 1, we have m 0; 1; : : : ; q? 1. The set fh j(x) : j 0; 1; ; : : : ; `? 1g forms a basis for the tness functions dened on the i Comuting with Haar Functions Sami Khuri Deartment of Mathematics and Comuter Science San Jose State University One Washington Square San Jose, CA 9519-0103, USA khuri@juiter.sjsu.edu Fax: (40)94-500 Keywords:

More information

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Technical Sciences and Alied Mathematics MODELING THE RELIABILITY OF CISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Cezar VASILESCU Regional Deartment of Defense Resources Management

More information

Bond Computing Systems: a Biologically Inspired and High-level Dynamics Model for Pervasive Computing

Bond Computing Systems: a Biologically Inspired and High-level Dynamics Model for Pervasive Computing Bond Comuting Systems: a Biologically Insired and High-level Dynamics Model for Pervasive Comuting Linmin Yang 1, Zhe Dang 1, and Oscar H. Ibarra 2 1 School of Electrical Engineering and Comuter Science

More information

On the capacity of the general trapdoor channel with feedback

On the capacity of the general trapdoor channel with feedback On the caacity of the general tradoor channel with feedback Jui Wu and Achilleas Anastasooulos Electrical Engineering and Comuter Science Deartment University of Michigan Ann Arbor, MI, 48109-1 email:

More information

The Fekete Szegő theorem with splitting conditions: Part I

The Fekete Szegő theorem with splitting conditions: Part I ACTA ARITHMETICA XCIII.2 (2000) The Fekete Szegő theorem with slitting conditions: Part I by Robert Rumely (Athens, GA) A classical theorem of Fekete and Szegő [4] says that if E is a comact set in the

More information

Convex Optimization methods for Computing Channel Capacity

Convex Optimization methods for Computing Channel Capacity Convex Otimization methods for Comuting Channel Caacity Abhishek Sinha Laboratory for Information and Decision Systems (LIDS), MIT sinhaa@mit.edu May 15, 2014 We consider a classical comutational roblem

More information

1. INTRODUCTION. Fn 2 = F j F j+1 (1.1)

1. INTRODUCTION. Fn 2 = F j F j+1 (1.1) CERTAIN CLASSES OF FINITE SUMS THAT INVOLVE GENERALIZED FIBONACCI AND LUCAS NUMBERS The beautiful identity R.S. Melham Deartment of Mathematical Sciences, University of Technology, Sydney PO Box 23, Broadway,

More information

Radial Basis Function Networks: Algorithms

Radial Basis Function Networks: Algorithms Radial Basis Function Networks: Algorithms Introduction to Neural Networks : Lecture 13 John A. Bullinaria, 2004 1. The RBF Maing 2. The RBF Network Architecture 3. Comutational Power of RBF Networks 4.

More information

Solved Problems. (a) (b) (c) Figure P4.1 Simple Classification Problems First we draw a line between each set of dark and light data points.

Solved Problems. (a) (b) (c) Figure P4.1 Simple Classification Problems First we draw a line between each set of dark and light data points. Solved Problems Solved Problems P Solve the three simle classification roblems shown in Figure P by drawing a decision boundary Find weight and bias values that result in single-neuron ercetrons with the

More information

Analysis of some entrance probabilities for killed birth-death processes

Analysis of some entrance probabilities for killed birth-death processes Analysis of some entrance robabilities for killed birth-death rocesses Master s Thesis O.J.G. van der Velde Suervisor: Dr. F.M. Sieksma July 5, 207 Mathematical Institute, Leiden University Contents Introduction

More information

p-adic Measures and Bernoulli Numbers

p-adic Measures and Bernoulli Numbers -Adic Measures and Bernoulli Numbers Adam Bowers Introduction The constants B k in the Taylor series exansion t e t = t k B k k! k=0 are known as the Bernoulli numbers. The first few are,, 6, 0, 30, 0,

More information

Shadow Computing: An Energy-Aware Fault Tolerant Computing Model

Shadow Computing: An Energy-Aware Fault Tolerant Computing Model Shadow Comuting: An Energy-Aware Fault Tolerant Comuting Model Bryan Mills, Taieb Znati, Rami Melhem Deartment of Comuter Science University of Pittsburgh (bmills, znati, melhem)@cs.itt.edu Index Terms

More information

Strong Matching of Points with Geometric Shapes

Strong Matching of Points with Geometric Shapes Strong Matching of Points with Geometric Shaes Ahmad Biniaz Anil Maheshwari Michiel Smid School of Comuter Science, Carleton University, Ottawa, Canada December 9, 05 In memory of Ferran Hurtado. Abstract

More information

Positive decomposition of transfer functions with multiple poles

Positive decomposition of transfer functions with multiple poles Positive decomosition of transfer functions with multile oles Béla Nagy 1, Máté Matolcsi 2, and Márta Szilvási 1 Deartment of Analysis, Technical University of Budaest (BME), H-1111, Budaest, Egry J. u.

More information

ON THE LEAST SIGNIFICANT p ADIC DIGITS OF CERTAIN LUCAS NUMBERS

ON THE LEAST SIGNIFICANT p ADIC DIGITS OF CERTAIN LUCAS NUMBERS #A13 INTEGERS 14 (014) ON THE LEAST SIGNIFICANT ADIC DIGITS OF CERTAIN LUCAS NUMBERS Tamás Lengyel Deartment of Mathematics, Occidental College, Los Angeles, California lengyel@oxy.edu Received: 6/13/13,

More information

Technical Report No On the Relation Between Parallel Real-Time Computations and Sublogarithmic Space Stefan D. Bruda and Selim G. Akl Depart

Technical Report No On the Relation Between Parallel Real-Time Computations and Sublogarithmic Space Stefan D. Bruda and Selim G. Akl Depart Technical Report No. 2001-446 On the Relation Between Parallel Real-Time Computations and Sublogarithmic Space Stefan D. Bruda and Selim G. Akl Department of Computing and Information Science Queen's University

More information

Additive results for the generalized Drazin inverse in a Banach algebra

Additive results for the generalized Drazin inverse in a Banach algebra Additive results for the generalized Drazin inverse in a Banach algebra Dragana S. Cvetković-Ilić Dragan S. Djordjević and Yimin Wei* Abstract In this aer we investigate additive roerties of the generalized

More information

4. Score normalization technical details We now discuss the technical details of the score normalization method.

4. Score normalization technical details We now discuss the technical details of the score normalization method. SMT SCORING SYSTEM This document describes the scoring system for the Stanford Math Tournament We begin by giving an overview of the changes to scoring and a non-technical descrition of the scoring rules

More information

Distributed Rule-Based Inference in the Presence of Redundant Information

Distributed Rule-Based Inference in the Presence of Redundant Information istribution Statement : roved for ublic release; distribution is unlimited. istributed Rule-ased Inference in the Presence of Redundant Information June 8, 004 William J. Farrell III Lockheed Martin dvanced

More information

GIVEN an input sequence x 0,..., x n 1 and the

GIVEN an input sequence x 0,..., x n 1 and the 1 Running Max/Min Filters using 1 + o(1) Comarisons er Samle Hao Yuan, Member, IEEE, and Mikhail J. Atallah, Fellow, IEEE Abstract A running max (or min) filter asks for the maximum or (minimum) elements

More information

Solution sheet ξi ξ < ξ i+1 0 otherwise ξ ξ i N i,p 1 (ξ) + where 0 0

Solution sheet ξi ξ < ξ i+1 0 otherwise ξ ξ i N i,p 1 (ξ) + where 0 0 Advanced Finite Elements MA5337 - WS7/8 Solution sheet This exercise sheets deals with B-slines and NURBS, which are the basis of isogeometric analysis as they will later relace the olynomial ansatz-functions

More information

RANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES

RANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES RANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES AARON ZWIEBACH Abstract. In this aer we will analyze research that has been recently done in the field of discrete

More information

4 th Week. Relativizations and Hierarchies

4 th Week. Relativizations and Hierarchies 4 th Week Relativizations and Hierarchies Synosis. Oracle Turing Machines and Relativization The Polynomial Hierarchy Generic Oracles Collasing Recursive Oracles The Hierarchy Aril 30, 2018. 23:59 Course

More information

Brownian Motion and Random Prime Factorization

Brownian Motion and Random Prime Factorization Brownian Motion and Random Prime Factorization Kendrick Tang June 4, 202 Contents Introduction 2 2 Brownian Motion 2 2. Develoing Brownian Motion.................... 2 2.. Measure Saces and Borel Sigma-Algebras.........

More information

Feedback-error control

Feedback-error control Chater 4 Feedback-error control 4.1 Introduction This chater exlains the feedback-error (FBE) control scheme originally described by Kawato [, 87, 8]. FBE is a widely used neural network based controller

More information

Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models

Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models Ketan N. Patel, Igor L. Markov and John P. Hayes University of Michigan, Ann Arbor 48109-2122 {knatel,imarkov,jhayes}@eecs.umich.edu

More information

Proof Nets and Boolean Circuits

Proof Nets and Boolean Circuits Proof Nets and Boolean Circuits Kazushige Terui terui@nii.ac.j National Institute of Informatics, Tokyo 14/07/04, Turku.1/44 Motivation (1) Proofs-as-Programs (Curry-Howard) corresondence: Proofs = Programs

More information

Applications to stochastic PDE

Applications to stochastic PDE 15 Alications to stochastic PE In this final lecture we resent some alications of the theory develoed in this course to stochastic artial differential equations. We concentrate on two secific examles:

More information

A randomized sorting algorithm on the BSP model

A randomized sorting algorithm on the BSP model A randomized sorting algorithm on the BSP model Alexandros V. Gerbessiotis a, Constantinos J. Siniolakis b a CS Deartment, New Jersey Institute of Technology, Newark, NJ 07102, USA b The American College

More information

Solvability and Number of Roots of Bi-Quadratic Equations over p adic Fields

Solvability and Number of Roots of Bi-Quadratic Equations over p adic Fields Malaysian Journal of Mathematical Sciences 10(S February: 15-35 (016 Secial Issue: The 3 rd International Conference on Mathematical Alications in Engineering 014 (ICMAE 14 MALAYSIAN JOURNAL OF MATHEMATICAL

More information

By Evan Chen OTIS, Internal Use

By Evan Chen OTIS, Internal Use Solutions Notes for DNY-NTCONSTRUCT Evan Chen January 17, 018 1 Solution Notes to TSTST 015/5 Let ϕ(n) denote the number of ositive integers less than n that are relatively rime to n. Prove that there

More information

GOOD MODELS FOR CUBIC SURFACES. 1. Introduction

GOOD MODELS FOR CUBIC SURFACES. 1. Introduction GOOD MODELS FOR CUBIC SURFACES ANDREAS-STEPHAN ELSENHANS Abstract. This article describes an algorithm for finding a model of a hyersurface with small coefficients. It is shown that the aroach works in

More information

Computer arithmetic. Intensive Computation. Annalisa Massini 2017/2018

Computer arithmetic. Intensive Computation. Annalisa Massini 2017/2018 Comuter arithmetic Intensive Comutation Annalisa Massini 7/8 Intensive Comutation - 7/8 References Comuter Architecture - A Quantitative Aroach Hennessy Patterson Aendix J Intensive Comutation - 7/8 3

More information

A Qualitative Event-based Approach to Multiple Fault Diagnosis in Continuous Systems using Structural Model Decomposition

A Qualitative Event-based Approach to Multiple Fault Diagnosis in Continuous Systems using Structural Model Decomposition A Qualitative Event-based Aroach to Multile Fault Diagnosis in Continuous Systems using Structural Model Decomosition Matthew J. Daigle a,,, Anibal Bregon b,, Xenofon Koutsoukos c, Gautam Biswas c, Belarmino

More information

Sums of independent random variables

Sums of independent random variables 3 Sums of indeendent random variables This lecture collects a number of estimates for sums of indeendent random variables with values in a Banach sace E. We concentrate on sums of the form N γ nx n, where

More information

A Special Case Solution to the Perspective 3-Point Problem William J. Wolfe California State University Channel Islands

A Special Case Solution to the Perspective 3-Point Problem William J. Wolfe California State University Channel Islands A Secial Case Solution to the Persective -Point Problem William J. Wolfe California State University Channel Islands william.wolfe@csuci.edu Abstract In this aer we address a secial case of the ersective

More information

Network Configuration Control Via Connectivity Graph Processes

Network Configuration Control Via Connectivity Graph Processes Network Configuration Control Via Connectivity Grah Processes Abubakr Muhammad Deartment of Electrical and Systems Engineering University of Pennsylvania Philadelhia, PA 90 abubakr@seas.uenn.edu Magnus

More information

A generalization of Amdahl's law and relative conditions of parallelism

A generalization of Amdahl's law and relative conditions of parallelism A generalization of Amdahl's law and relative conditions of arallelism Author: Gianluca Argentini, New Technologies and Models, Riello Grou, Legnago (VR), Italy. E-mail: gianluca.argentini@riellogrou.com

More information

Uniformly best wavenumber approximations by spatial central difference operators: An initial investigation

Uniformly best wavenumber approximations by spatial central difference operators: An initial investigation Uniformly best wavenumber aroximations by satial central difference oerators: An initial investigation Vitor Linders and Jan Nordström Abstract A characterisation theorem for best uniform wavenumber aroximations

More information

19th Bay Area Mathematical Olympiad. Problems and Solutions. February 28, 2017

19th Bay Area Mathematical Olympiad. Problems and Solutions. February 28, 2017 th Bay Area Mathematical Olymiad February, 07 Problems and Solutions BAMO- and BAMO- are each 5-question essay-roof exams, for middle- and high-school students, resectively. The roblems in each exam are

More information

P Systems with Minimal Insertion and Deletion

P Systems with Minimal Insertion and Deletion P Systems with Minimal Insertion and Deletion Artiom Alhazov,, Alexander Krassovitskiy, Yurii Rogozhin,, Sergey Verlan 4 IEC, Deartment of Information Engineering, Graduate School of Engineering Hiroshima

More information

MA3H1 TOPICS IN NUMBER THEORY PART III

MA3H1 TOPICS IN NUMBER THEORY PART III MA3H1 TOPICS IN NUMBER THEORY PART III SAMIR SIKSEK 1. Congruences Modulo m In quadratic recirocity we studied congruences of the form x 2 a (mod ). We now turn our attention to situations where is relaced

More information

Universal Finite Memory Coding of Binary Sequences

Universal Finite Memory Coding of Binary Sequences Deartment of Electrical Engineering Systems Universal Finite Memory Coding of Binary Sequences Thesis submitted towards the degree of Master of Science in Electrical and Electronic Engineering in Tel-Aviv

More information

Math 4400/6400 Homework #8 solutions. 1. Let P be an odd integer (not necessarily prime). Show that modulo 2,

Math 4400/6400 Homework #8 solutions. 1. Let P be an odd integer (not necessarily prime). Show that modulo 2, MATH 4400 roblems. Math 4400/6400 Homework # solutions 1. Let P be an odd integer not necessarily rime. Show that modulo, { P 1 0 if P 1, 7 mod, 1 if P 3, mod. Proof. Suose that P 1 mod. Then we can write

More information

Lilian Markenzon 1, Nair Maria Maia de Abreu 2* and Luciana Lee 3

Lilian Markenzon 1, Nair Maria Maia de Abreu 2* and Luciana Lee 3 Pesquisa Oeracional (2013) 33(1): 123-132 2013 Brazilian Oerations Research Society Printed version ISSN 0101-7438 / Online version ISSN 1678-5142 www.scielo.br/oe SOME RESULTS ABOUT THE CONNECTIVITY OF

More information

Towards understanding the Lorenz curve using the Uniform distribution. Chris J. Stephens. Newcastle City Council, Newcastle upon Tyne, UK

Towards understanding the Lorenz curve using the Uniform distribution. Chris J. Stephens. Newcastle City Council, Newcastle upon Tyne, UK Towards understanding the Lorenz curve using the Uniform distribution Chris J. Stehens Newcastle City Council, Newcastle uon Tyne, UK (For the Gini-Lorenz Conference, University of Siena, Italy, May 2005)

More information

Opposite-quadrant depth in the plane

Opposite-quadrant depth in the plane Oosite-quadrant deth in the lane Hervé Brönnimann Jonathan Lenchner János Pach Comuter and Information Science, Polytechnic University, Brooklyn, NY 1101, hbr@oly.edu IBM T. J. Watson Research Center,

More information

A Note on Guaranteed Sparse Recovery via l 1 -Minimization

A Note on Guaranteed Sparse Recovery via l 1 -Minimization A Note on Guaranteed Sarse Recovery via l -Minimization Simon Foucart, Université Pierre et Marie Curie Abstract It is roved that every s-sarse vector x C N can be recovered from the measurement vector

More information

On a Markov Game with Incomplete Information

On a Markov Game with Incomplete Information On a Markov Game with Incomlete Information Johannes Hörner, Dinah Rosenberg y, Eilon Solan z and Nicolas Vieille x{ January 24, 26 Abstract We consider an examle of a Markov game with lack of information

More information

HENSEL S LEMMA KEITH CONRAD

HENSEL S LEMMA KEITH CONRAD HENSEL S LEMMA KEITH CONRAD 1. Introduction In the -adic integers, congruences are aroximations: for a and b in Z, a b mod n is the same as a b 1/ n. Turning information modulo one ower of into similar

More information

THE SET CHROMATIC NUMBER OF RANDOM GRAPHS

THE SET CHROMATIC NUMBER OF RANDOM GRAPHS THE SET CHROMATIC NUMBER OF RANDOM GRAPHS ANDRZEJ DUDEK, DIETER MITSCHE, AND PAWE L PRA LAT Abstract. In this aer we study the set chromatic number of a random grah G(n, ) for a wide range of = (n). We

More information

CSE 599d - Quantum Computing When Quantum Computers Fall Apart

CSE 599d - Quantum Computing When Quantum Computers Fall Apart CSE 599d - Quantum Comuting When Quantum Comuters Fall Aart Dave Bacon Deartment of Comuter Science & Engineering, University of Washington In this lecture we are going to begin discussing what haens to

More information

Multiplicity of weak solutions for a class of nonuniformly elliptic equations of p-laplacian type

Multiplicity of weak solutions for a class of nonuniformly elliptic equations of p-laplacian type Nonlinear Analysis 7 29 536 546 www.elsevier.com/locate/na Multilicity of weak solutions for a class of nonuniformly ellitic equations of -Lalacian tye Hoang Quoc Toan, Quô c-anh Ngô Deartment of Mathematics,

More information

On Doob s Maximal Inequality for Brownian Motion

On Doob s Maximal Inequality for Brownian Motion Stochastic Process. Al. Vol. 69, No., 997, (-5) Research Reort No. 337, 995, Det. Theoret. Statist. Aarhus On Doob s Maximal Inequality for Brownian Motion S. E. GRAVERSEN and G. PESKIR If B = (B t ) t

More information

The Euler Phi Function

The Euler Phi Function The Euler Phi Function 7-3-2006 An arithmetic function takes ositive integers as inuts and roduces real or comlex numbers as oututs. If f is an arithmetic function, the divisor sum Dfn) is the sum of the

More information

An Analysis of Reliable Classifiers through ROC Isometrics

An Analysis of Reliable Classifiers through ROC Isometrics An Analysis of Reliable Classifiers through ROC Isometrics Stijn Vanderlooy s.vanderlooy@cs.unimaas.nl Ida G. Srinkhuizen-Kuyer kuyer@cs.unimaas.nl Evgueni N. Smirnov smirnov@cs.unimaas.nl MICC-IKAT, Universiteit

More information

The inverse Goldbach problem

The inverse Goldbach problem 1 The inverse Goldbach roblem by Christian Elsholtz Submission Setember 7, 2000 (this version includes galley corrections). Aeared in Mathematika 2001. Abstract We imrove the uer and lower bounds of the

More information

Online Appendix to Accompany AComparisonof Traditional and Open-Access Appointment Scheduling Policies

Online Appendix to Accompany AComparisonof Traditional and Open-Access Appointment Scheduling Policies Online Aendix to Accomany AComarisonof Traditional and Oen-Access Aointment Scheduling Policies Lawrence W. Robinson Johnson Graduate School of Management Cornell University Ithaca, NY 14853-6201 lwr2@cornell.edu

More information

Deriving Indicator Direct and Cross Variograms from a Normal Scores Variogram Model (bigaus-full) David F. Machuca Mory and Clayton V.

Deriving Indicator Direct and Cross Variograms from a Normal Scores Variogram Model (bigaus-full) David F. Machuca Mory and Clayton V. Deriving ndicator Direct and Cross Variograms from a Normal Scores Variogram Model (bigaus-full) David F. Machuca Mory and Clayton V. Deutsch Centre for Comutational Geostatistics Deartment of Civil &

More information

An Overview of Witt Vectors

An Overview of Witt Vectors An Overview of Witt Vectors Daniel Finkel December 7, 2007 Abstract This aer offers a brief overview of the basics of Witt vectors. As an alication, we summarize work of Bartolo and Falcone to rove that

More information

Intrinsic Approximation on Cantor-like Sets, a Problem of Mahler

Intrinsic Approximation on Cantor-like Sets, a Problem of Mahler Intrinsic Aroximation on Cantor-like Sets, a Problem of Mahler Ryan Broderick, Lior Fishman, Asaf Reich and Barak Weiss July 200 Abstract In 984, Kurt Mahler osed the following fundamental question: How

More information

Numerical Linear Algebra

Numerical Linear Algebra Numerical Linear Algebra Numerous alications in statistics, articularly in the fitting of linear models. Notation and conventions: Elements of a matrix A are denoted by a ij, where i indexes the rows and

More information

Estimation of the large covariance matrix with two-step monotone missing data

Estimation of the large covariance matrix with two-step monotone missing data Estimation of the large covariance matrix with two-ste monotone missing data Masashi Hyodo, Nobumichi Shutoh 2, Takashi Seo, and Tatjana Pavlenko 3 Deartment of Mathematical Information Science, Tokyo

More information

Improvement on the Decay of Crossing Numbers

Improvement on the Decay of Crossing Numbers Grahs and Combinatorics 2013) 29:365 371 DOI 10.1007/s00373-012-1137-3 ORIGINAL PAPER Imrovement on the Decay of Crossing Numbers Jakub Černý Jan Kynčl Géza Tóth Received: 24 Aril 2007 / Revised: 1 November

More information

PARTITIONS AND (2k + 1) CORES. 1. Introduction

PARTITIONS AND (2k + 1) CORES. 1. Introduction PARITY RESULTS FOR BROKEN k DIAMOND PARTITIONS AND 2k + CORES SILVIU RADU AND JAMES A. SELLERS Abstract. In this aer we rove several new arity results for broken k-diamond artitions introduced in 2007

More information

1 1 c (a) 1 (b) 1 Figure 1: (a) First ath followed by salesman in the stris method. (b) Alternative ath. 4. D = distance travelled closing the loo. Th

1 1 c (a) 1 (b) 1 Figure 1: (a) First ath followed by salesman in the stris method. (b) Alternative ath. 4. D = distance travelled closing the loo. Th 18.415/6.854 Advanced Algorithms ovember 7, 1996 Euclidean TSP (art I) Lecturer: Michel X. Goemans MIT These notes are based on scribe notes by Marios Paaefthymiou and Mike Klugerman. 1 Euclidean TSP Consider

More information

18.312: Algebraic Combinatorics Lionel Levine. Lecture 12

18.312: Algebraic Combinatorics Lionel Levine. Lecture 12 8.3: Algebraic Combinatorics Lionel Levine Lecture date: March 7, Lecture Notes by: Lou Odette This lecture: A continuation of the last lecture: comutation of µ Πn, the Möbius function over the incidence

More information

Dimension Characterizations of Complexity Classes

Dimension Characterizations of Complexity Classes Dimension Characterizations of Comlexity Classes Xiaoyang Gu Jack H. Lutz Abstract We use derandomization to show that sequences of ositive sace-dimension in fact, even ositive k-dimension for suitable

More information

Various Proofs for the Decrease Monotonicity of the Schatten s Power Norm, Various Families of R n Norms and Some Open Problems

Various Proofs for the Decrease Monotonicity of the Schatten s Power Norm, Various Families of R n Norms and Some Open Problems Int. J. Oen Problems Comt. Math., Vol. 3, No. 2, June 2010 ISSN 1998-6262; Coyright c ICSRS Publication, 2010 www.i-csrs.org Various Proofs for the Decrease Monotonicity of the Schatten s Power Norm, Various

More information

DISCRIMINANTS IN TOWERS

DISCRIMINANTS IN TOWERS DISCRIMINANTS IN TOWERS JOSEPH RABINOFF Let A be a Dedekind domain with fraction field F, let K/F be a finite searable extension field, and let B be the integral closure of A in K. In this note, we will

More information

Fault Tolerant Quantum Computing Robert Rogers, Thomas Sylwester, Abe Pauls

Fault Tolerant Quantum Computing Robert Rogers, Thomas Sylwester, Abe Pauls CIS 410/510, Introduction to Quantum Information Theory Due: June 8th, 2016 Sring 2016, University of Oregon Date: June 7, 2016 Fault Tolerant Quantum Comuting Robert Rogers, Thomas Sylwester, Abe Pauls

More information

Topic 7: Using identity types

Topic 7: Using identity types Toic 7: Using identity tyes June 10, 2014 Now we would like to learn how to use identity tyes and how to do some actual mathematics with them. By now we have essentially introduced all inference rules

More information

Convexification of Generalized Network Flow Problem with Application to Power Systems

Convexification of Generalized Network Flow Problem with Application to Power Systems 1 Convexification of Generalized Network Flow Problem with Alication to Power Systems Somayeh Sojoudi and Javad Lavaei + Deartment of Comuting and Mathematical Sciences, California Institute of Technology

More information

#A47 INTEGERS 15 (2015) QUADRATIC DIOPHANTINE EQUATIONS WITH INFINITELY MANY SOLUTIONS IN POSITIVE INTEGERS

#A47 INTEGERS 15 (2015) QUADRATIC DIOPHANTINE EQUATIONS WITH INFINITELY MANY SOLUTIONS IN POSITIVE INTEGERS #A47 INTEGERS 15 (015) QUADRATIC DIOPHANTINE EQUATIONS WITH INFINITELY MANY SOLUTIONS IN POSITIVE INTEGERS Mihai Ciu Simion Stoilow Institute of Mathematics of the Romanian Academy, Research Unit No. 5,

More information

Finding Shortest Hamiltonian Path is in P. Abstract

Finding Shortest Hamiltonian Path is in P. Abstract Finding Shortest Hamiltonian Path is in P Dhananay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune, India bstract The roblem of finding shortest Hamiltonian ath in a eighted comlete grah belongs

More information

Frequency-Weighted Robust Fault Reconstruction Using a Sliding Mode Observer

Frequency-Weighted Robust Fault Reconstruction Using a Sliding Mode Observer Frequency-Weighted Robust Fault Reconstruction Using a Sliding Mode Observer C.P. an + F. Crusca # M. Aldeen * + School of Engineering, Monash University Malaysia, 2 Jalan Kolej, Bandar Sunway, 4650 Petaling,

More information

On Line Parameter Estimation of Electric Systems using the Bacterial Foraging Algorithm

On Line Parameter Estimation of Electric Systems using the Bacterial Foraging Algorithm On Line Parameter Estimation of Electric Systems using the Bacterial Foraging Algorithm Gabriel Noriega, José Restreo, Víctor Guzmán, Maribel Giménez and José Aller Universidad Simón Bolívar Valle de Sartenejas,

More information

c Copyright by Helen J. Elwood December, 2011

c Copyright by Helen J. Elwood December, 2011 c Coyright by Helen J. Elwood December, 2011 CONSTRUCTING COMPLEX EQUIANGULAR PARSEVAL FRAMES A Dissertation Presented to the Faculty of the Deartment of Mathematics University of Houston In Partial Fulfillment

More information

Uncorrelated Multilinear Principal Component Analysis for Unsupervised Multilinear Subspace Learning

Uncorrelated Multilinear Principal Component Analysis for Unsupervised Multilinear Subspace Learning TNN-2009-P-1186.R2 1 Uncorrelated Multilinear Princial Comonent Analysis for Unsuervised Multilinear Subsace Learning Haiing Lu, K. N. Plataniotis and A. N. Venetsanooulos The Edward S. Rogers Sr. Deartment

More information

Elementary theory of L p spaces

Elementary theory of L p spaces CHAPTER 3 Elementary theory of L saces 3.1 Convexity. Jensen, Hölder, Minkowski inequality. We begin with two definitions. A set A R d is said to be convex if, for any x 0, x 1 2 A x = x 0 + (x 1 x 0 )

More information

The non-stochastic multi-armed bandit problem

The non-stochastic multi-armed bandit problem Submitted for journal ublication. The non-stochastic multi-armed bandit roblem Peter Auer Institute for Theoretical Comuter Science Graz University of Technology A-8010 Graz (Austria) auer@igi.tu-graz.ac.at

More information

On the Toppling of a Sand Pile

On the Toppling of a Sand Pile Discrete Mathematics and Theoretical Comuter Science Proceedings AA (DM-CCG), 2001, 275 286 On the Toling of a Sand Pile Jean-Christohe Novelli 1 and Dominique Rossin 2 1 CNRS, LIFL, Bâtiment M3, Université

More information

Model checking, verification of CTL. One must verify or expel... doubts, and convert them into the certainty of YES [Thomas Carlyle]

Model checking, verification of CTL. One must verify or expel... doubts, and convert them into the certainty of YES [Thomas Carlyle] Chater 5 Model checking, verification of CTL One must verify or exel... doubts, and convert them into the certainty of YES or NO. [Thomas Carlyle] 5. The verification setting Page 66 We introduce linear

More information

PRIME NUMBERS YANKI LEKILI

PRIME NUMBERS YANKI LEKILI PRIME NUMBERS YANKI LEKILI We denote by N the set of natural numbers:,2,..., These are constructed using Peano axioms. We will not get into the hilosohical questions related to this and simly assume the

More information

Sets of Real Numbers

Sets of Real Numbers Chater 4 Sets of Real Numbers 4. The Integers Z and their Proerties In our revious discussions about sets and functions the set of integers Z served as a key examle. Its ubiquitousness comes from the fact

More information

s v 0 q 0 v 1 q 1 v 2 (q 2) v 3 q 3 v 4

s v 0 q 0 v 1 q 1 v 2 (q 2) v 3 q 3 v 4 Discrete Adative Transmission for Fading Channels Lang Lin Λ, Roy D. Yates, Predrag Sasojevic WINLAB, Rutgers University 7 Brett Rd., NJ- fllin, ryates, sasojevg@winlab.rutgers.edu Abstract In this work

More information

Probabilistic Algorithms

Probabilistic Algorithms Probabilistic Algorithms Klaus Sutner Carnegie Mellon University Fall 2017 1 Some Probabilistic Algorithms Probabilistic Primality Testing RP and BPP Where Are We? 3 Examle 1: Order Statistics 4 We have

More information