Asymptotic and Exact Poissonized Variance in the Analysis of Random Digital Trees (joint with Hsien-Kuei Hwang and Vytas Zacharovas)
|
|
- Howard Hampton
- 5 years ago
- Views:
Transcription
1 Asymptotic and Exact Poissonized Variance in the Analysis of Random Digital Trees (joint with Hsien-Kuei Hwang and Vytas Zacharovas) Michael Fuchs Institute of Applied Mathematics National Chiao Tung University June 22nd, 2017 Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
2 Digital Trees Three standard types: Trie: René de la Briandais, 1959; PATRICIA Trie: Donald R. Morrison, 1968; Digital Search Tree: Coffman and Eve, Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
3 Digital Trees Three standard types: Trie: René de la Briandais, 1959; PATRICIA Trie: Donald R. Morrison, 1968; Digital Search Tree: Coffman and Eve, Example: R 1 =0010, R 2 =0011, R 3 =1100, R 4 =1010 Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
4 Digital Trees Three standard types: Trie: René de la Briandais, 1959; PATRICIA Trie: Donald R. Morrison, 1968; Digital Search Tree: Coffman and Eve, Example: R 1 =0010, R 2 =0011, R 3 =1100, R 4 = R 4 R R 1 R 2 Trie Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
5 Digital Trees Three standard types: Trie: René de la Briandais, 1959; PATRICIA Trie: Donald R. Morrison, 1968; Digital Search Tree: Coffman and Eve, Example: R 1 =0010, R 2 =0011, R 3 =1100, R 4 = R 4 R R 1 R 2 R 4 R R 1 R 2 PATRICIA trie Trie Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
6 Digital Trees Three standard types: Trie: René de la Briandais, 1959; PATRICIA Trie: Donald R. Morrison, 1968; Digital Search Tree: Coffman and Eve, Example: R 1 =0010, R 2 =0011, R 3 =1100, R 4 = R R 4 R R 2 R 3 0 R 1 R 2 R 4 R 3 R R 1 R 2 PATRICIA trie DST Trie Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
7 Random Digital Trees Bernoulli model: Bits are iid with P(bit = 1) = p and P(bit = 0) = q := 1 p. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
8 Random Digital Trees Bernoulli model: Bits are iid with P(bit = 1) = p and P(bit = 0) = q := 1 p. Gives two types: p = 1/2: symmetric digital tree; p 1/2: asymmetric digital tree. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
9 Random Digital Trees Bernoulli model: Bits are iid with Gives two types: P(bit = 1) = p and P(bit = 0) = q := 1 p. p = 1/2: symmetric digital tree; p 1/2: asymmetric digital tree. Bernoulli model is simple and prototypical but not very realistic! J. Clément, P. Flajolet, B. Vallée (2001). Dynamical sources in information theory: A general analysis of trie structures, Algorithmica, 29:1-2, Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
10 Shape Parameters Size S n Number of internal nodes in tries; for the other two standard types the size is deterministic. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
11 Shape Parameters Size S n Number of internal nodes in tries; for the other two standard types the size is deterministic. Path Lengths L n Internal path length, external path length, total path length, weighted path length, peripheral path lengths, etc. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
12 Shape Parameters Size S n Number of internal nodes in tries; for the other two standard types the size is deterministic. Path Lengths L n Internal path length, external path length, total path length, weighted path length, peripheral path lengths, etc. Depth Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
13 Shape Parameters Size S n Number of internal nodes in tries; for the other two standard types the size is deterministic. Path Lengths L n Internal path length, external path length, total path length, weighted path length, peripheral path lengths, etc. Depth Number of leaves and patterns Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
14 Shape Parameters Size S n Number of internal nodes in tries; for the other two standard types the size is deterministic. Path Lengths L n Internal path length, external path length, total path length, weighted path length, peripheral path lengths, etc. Depth Number of leaves and patterns External and Internal Profiles Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
15 Shape Parameters Size S n Number of internal nodes in tries; for the other two standard types the size is deterministic. Path Lengths L n Internal path length, external path length, total path length, weighted path length, peripheral path lengths, etc. Depth Number of leaves and patterns External and Internal Profiles Height Etc. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
16 Additive Shape Parameters X n+b d = XIn + X n I n + T n I n d = Binomial(n, p); Root 0 1 X n d = X n ; X n, X n, (I n, T n ) independent. T n toll-function. Size: I n Size: n I n Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
17 Additive Shape Parameters X n+b d = XIn + X n I n + T n I n d = Binomial(n, p); Root 0 1 X n d = X n ; X n, X n, (I n, T n ) independent. T n toll-function. Size: I n Size: n I n Thus, moments satisfy the recurrence: n ( ) n a n+b = p j q n j (a j + a n j ) + b n. j j=0 Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
18 Two (Main) Approaches Rice-Noerlund Method: Exercise 54 in Section of Knuth s book. Developed into a systematic tool by Flajolet & Sedgewick (1986, 1995). Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
19 Two (Main) Approaches Rice-Noerlund Method: Exercise 54 in Section of Knuth s book. Developed into a systematic tool by Flajolet & Sedgewick (1986, 1995). Two-stage Approach Introduced by Jacquet & Régnier (1988). Important contributions by Jacquet & Szpankowski (1998); Flajolet, Gourdon & Dumas (1995). Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
20 Two (Main) Approaches Rice-Noerlund Method: Exercise 54 in Section of Knuth s book. Developed into a systematic tool by Flajolet & Sedgewick (1986, 1995). Two-stage Approach Introduced by Jacquet & Régnier (1988). Important contributions by Jacquet & Szpankowski (1998); Flajolet, Gourdon & Dumas (1995). Poisson-Mellin- Newton cycle: Poisson GF a n Noerlund integral f(z) Mellin transform F (s) Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
21 Rice-Noerlund Method Lemma (Noerlund) Let C be a positive oriented, closed curve encircling 0,..., n and f(z) be analytic within C. Then, n ( ) n ( 1) k f(k) = 1 n!γ( s) f(s) k 2πi C Γ(n + 1 s) ds. k=0 Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
22 Rice-Noerlund Method Lemma (Noerlund) Let C be a positive oriented, closed curve encircling 0,..., n and f(z) be analytic within C. Then, n ( ) n ( 1) k f(k) = 1 n!γ( s) f(s) k 2πi C Γ(n + 1 s) ds. k=0 For additive trie parameters: where f(s) = F ( s) Γ( s) = G( s) (1 p s q s )Γ( s). F (s) = M e z a n z n /n!; s, n 0 G(s) = M e z b n z n /n!; s. n 0 Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
23 Mean of Size in Symmetric Tries (i) We have, f(s) = (s 1)/(1 2 1 s ). Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
24 Mean of Size in Symmetric Tries (i) We have, f(s) = (s 1)/(1 2 1 s ). Theorem For n 2, E(S n ) = n log 2 1 log 2 k 0 c k n! Γ(n + χ k ) 1, where with χ k = 2kπi/(log 2). c k = χ k Γ( 1 + χ k ). Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
25 Mean of Size in Symmetric Tries (i) We have, f(s) = (s 1)/(1 2 1 s ). Theorem For n 2, E(S n ) = n log 2 1 log 2 k 0 c k n! Γ(n + χ k ) 1, where with χ k = 2kπi/(log 2). c k = χ k Γ( 1 + χ k ). Note that n! Γ(n + χ k ) n1 χ k + (1 χ k)χ k n χ k +. 2 Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
26 Mean of Size in Symmetric Tries (ii) E(S n) n (n = 1,..., 1024) Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
27 Mean of Size in Symmetric Tries (ii) E(S n) n (n = 1,..., 1024) E(S n)+1 n (n = 1,..., 1024) Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
28 Variance via Rice-Noerlund Method Symmetric digital trees: done by Kirschenhofer & Prodinger & Szpankowski in a series of papers in the beginning of 90s. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
29 Variance via Rice-Noerlund Method Symmetric digital trees: done by Kirschenhofer & Prodinger & Szpankowski in a series of papers in the beginning of 90s. Second Moment Method: Use Rice-Noerlund twice for mean and second moment. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
30 Variance via Rice-Noerlund Method Symmetric digital trees: done by Kirschenhofer & Prodinger & Szpankowski in a series of papers in the beginning of 90s. Second Moment Method: Use Rice-Noerlund twice for mean and second moment. Compute the variance via Var(X) = E(X 2 ) (E(X)) 2. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
31 Variance via Rice-Noerlund Method Symmetric digital trees: done by Kirschenhofer & Prodinger & Szpankowski in a series of papers in the beginning of 90s. Second Moment Method: Use Rice-Noerlund twice for mean and second moment. Compute the variance via Var(X) = E(X 2 ) (E(X)) 2. Here, one needs identities of Ramanjuan: e.g. for α and β with αβ = π 2, we have 1 k(e 2αk 1) 1 4 log α + α 12 k 1 = k 1 1 k(e 2βk 1) 1 4 log β + β 12 Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
32 Variance of Size in Symmetric Tries (i) Theorem (Kirschenhofer & Prodinger) We have, Var(S n ) n log 2 G( 1 + χ k )n χ k, k Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
33 Variance of Size in Symmetric Tries (i) Theorem (Kirschenhofer & Prodinger) We have, where Var(S n ) n log 2 G( 1 + χ k )n χ k, k G( 1 + χ k ) = 3χ k Γ( 1 + χ k ) χ kγ(1 + χ k ) log 2 (1 χ k )(2 χ k )Γ(χ k ) 1 2 (χ k + j) ( χ ) k j 1 (j + 1)(2 j 1) j 1 2Γ(1 + χ k ) 5 χ k 4(1 χ k ) (χ k + j + 1) ( χ k 1) j 1 (j + 1)(2 j 1) j log 2 j+m=k j,m 0 χ j Γ( 1 + χ j )χ mγ(1 + χ m). Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
34 Variance of TPL in Symmetric DSTs (i) Theorem (Kirschenhofer, Prodinger, Szpankowski) We have, Var(L n ) n(c var + P (log 2 n)), where P (z) is a 1-periodic function with zero average value. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
35 Variance of TPL in Symmetric DSTs (i) Theorem (Kirschenhofer, Prodinger, Szpankowski) We have, Var(L n ) n(c var + P (log 2 n)), where P (z) is a 1-periodic function with zero average value. To describe C var we need the following: Let L = log 2, Q j = j i=1 (1 2 i ), Q(1) = lim j Q j. Put ω(z) = 1 Γ( 1 χ l )e 2lπiz ; L ψ(z) = 1 L l 0 ( l 0 1 χ l 2 ) Γ( χ l )e 2lπiz. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
36 C var = 28 3L l 1 l2 l (2 l 1) L l 1 2 ( 1) l+1 (l 5) L (l + 1)l(l 1)(2 l 1) l 3 2Q(1) L + l l Q l 1 2 l 1 + π2 2L L ( ) ( 1) l 2 l+1 2 L(1 2 l+1 )/2 1 L 1 2 l ( 1) r+1 r(r 1)(2 r+l 1) l 1 r 2 ( ) ( 1) r 2 r+1 2 ( j j+r+l+2 1 Q r+l 2 Q r 0 r ( l 1 ( l + 1 ) 2 l+1 2l i i=2 2 (1 2 l r ) 2 + 2l + 2 (1 2 1 l r ) 2 2 L l+1 ( l + 1 ) 2 j j=2 1 2 r+j L j=0 i r+i l r + 2 l+1 ( l + 1 ) L j j=1 l+1 ( l + 1 ) ( 1) i ) j (i + 1)(2 r+j+i 1) + l 1 ( l + 1 ) Qr 2 Q l r 1 1 r 2 l 3 r=2 l Q l 2 j 1 2[ωψ] 0 [ω 2 ] 0. j l+1 ) 1 2 r+j 1 Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
37 Bernoulli and Poisson Model Bernoulli Model: Digital tree is built from n records. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
38 Bernoulli and Poisson Model Bernoulli Model: Digital tree is built from n records. Poisson Model: Digital tree is built from Poi(n) records. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
39 Bernoulli and Poisson Model Bernoulli Model: Digital tree is built from n records. Poisson Model: Digital tree is built from Poi(n) records. We have, E(X Poi(n) ) = e n j 0 E(X j ) nj j! = f 1 (n). Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
40 Bernoulli and Poisson Model Bernoulli Model: Digital tree is built from n records. Poisson Model: Digital tree is built from Poi(n) records. We have, E(X Poi(n) ) = e n j 0 E(X j ) nj j! = f 1 (n). Poisson Heuristic: f 1 (n) sufficiently smooth = E(X Poi(n) ) E(X n ). Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
41 Poisson-Charlier Expansion Let f(z) = e z n 0 a n z n n!. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
42 Poisson-Charlier Expansion Let f(z) = e z n 0 a n z n n!. Lemma (F., Hwang, Zacharovas) Let f(z) be entire, then a n = j 0 τ j (n) j! f (j) (n), where τ j (n) = n![z n ](z n) j e z. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
43 Poisson-Charlier Expansion Let f(z) = e z n 0 a n z n n!. Lemma (F., Hwang, Zacharovas) Let f(z) be entire, then a n = j 0 τ j (n) j! f (j) (n), where τ j (n) = n![z n ](z n) j e z. τ 0 (z) τ 1 (z) τ 2 (z) τ 3 (z) τ 4 (z) τ 5 (z) 1 0 n 2n 3n(n 2) 4n(5n 6) Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
44 J S -admissibility We say f(z) J S α,β if (I) Uniformly for arg(z) ɛ, f(z) = O ( z α log β z ). (O) Uniformly for ɛ < arg(z) π, f(z) := e z ( f(z) = O e (1 ɛ) z ). Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
45 J S -admissibility We say f(z) J S α,β if (I) Uniformly for arg(z) ɛ, (O) Uniformly for ɛ < arg(z) π, Theorem (Jacquet & Szpankowski) If f(z) J S α,β, then f(z) = O ( z α log β z ). f(z) := e z f(z) = O ( e (1 ɛ) z ). a n j 0 τ j (n) j! f (j) (n). Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
46 Closure Properties of J S -admissibility Proposition Let α (0, 1). (i) z m, e αz J S. (ii) If f J S, then f(αz), z m f J S. (iii) If f, g J S, then f + g J S. (iv) If f, g, then f(αz) g((1 α)z) J S. (v) If f J S, then f J S. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
47 Closure Properties of J S -admissibility Proposition Let α (0, 1). (i) z m, e αz J S. (ii) If f J S, then f(αz), z m f J S. (iii) If f, g J S, then f + g J S. (iv) If f, g, then f(αz) g((1 α)z) J S. (v) If f J S, then f J S. Proposition Let b j=0 ( b j) f(z) (j) = 2 f(z/2) + g(z). Then, g(z) J S f(z) J S. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
48 Two Stage Approach for Tries (and PATRICIA Tries) Uses first poissonization: f(z) = e z n 0 a n z n n!. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
49 Two Stage Approach for Tries (and PATRICIA Tries) Uses first poissonization: f(z) = e z n 0 a n z n n!. f(z) satisfies: f(z) = 2 f(z/2) + g(z) which is solved with the Mellin transform: F (s) = 0 f(z)z s 1 dz = G(s) s. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
50 Two Stage Approach for Tries (and PATRICIA Tries) Uses first poissonization: f(z) = e z n 0 a n z n n!. f(z) satisfies: f(z) = 2 f(z/2) + g(z) which is solved with the Mellin transform: F (s) = 0 f(z)z s 1 dz = G(s) s. Asymptotics of f(z) is obtained via inverse Mellin transform (Flajolet & Gourdon & Dumas, 1995). Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
51 Two Stage Approach for Tries (and PATRICIA Tries) Uses first poissonization: f(z) = e z n 0 a n z n n!. f(z) satisfies: f(z) = 2 f(z/2) + g(z) which is solved with the Mellin transform: F (s) = 0 f(z)z s 1 dz = G(s) s. Asymptotics of f(z) is obtained via inverse Mellin transform (Flajolet & Gourdon & Dumas, 1995). Asymptotics of a n is obtained via (analytic) depoissonization (Jacquet & Szpankowski, 1998). Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
52 Asymptotic Poissonized Variances Let f 1 (z) = e z n 0 E(X n ) zn n!, f2 (z) = e z E(Xn) 2 zn n!. n 0 Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
53 Asymptotic Poissonized Variances Let f 1 (z) = e z n 0 E(X n ) zn n!, f2 (z) = e z E(Xn) 2 zn n!. n 0 Variance of Poisson model: Ṽ 1 (n) := Var(X Poi(n) ) = f 2 (n) f 1 (n) 2. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
54 Asymptotic Poissonized Variances Let f 1 (z) = e z n 0 E(X n ) zn n!, f2 (z) = e z E(Xn) 2 zn n!. n 0 Variance of Poisson model: Ṽ 1 (n) := Var(X Poi(n) ) = f 2 (n) f 1 (n) 2. However, for many shape parameters: Var(X n ) Ṽ1(n), i.e., Poisson model unsuitable for obtaining asymptotics of the variance! Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
55 Asymptotic Poissonized Variances Let f 1 (z) = e z n 0 E(X n ) zn n!, f2 (z) = e z E(Xn) 2 zn n!. n 0 Variance of Poisson model: Ṽ 1 (n) := Var(X Poi(n) ) = f 2 (n) f 1 (n) 2. However, for many shape parameters: Var(X n ) Ṽ1(n), i.e., Poisson model unsuitable for obtaining asymptotics of the variance! F., Hwang, Zacharovas (2010): Ṽ 2 (z) := f 2 (z) f 1 (z) 2 z f 1(z) 2. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
56 Ṽ 1 (z) vs. Ṽ 2 (z) Ṽ 1 (z) Ṽ 2 (z) depth; leader/loser selection; Paper-Stone-Scissors and variants; approximate counting; corner parking; partial match queries in k-d digital trees; node profile of asymmetric digital trees. size; path length; occurrence of pattern; node profile of symmetric digital trees; Wiener and Steiner index. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
57 Variance of TPL in Symmetric DSTs (ii) Theorem (F., Hwang, Zacharovas) We, have Var(L n ) n(c var + P (log 2 n)), where P (z) is a 1-periodic function with zero average value and C var = Q(1) L j,h,l 0 ( 1) j 2 (j+1 2 ) Q j Q h Q l 2 h+l ϕ(2 j h + 2 j l ), where ϕ(x) := { (x log x 1)/(x 1) 2, if x 1; 1/2, if x = 1. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
58 C var = 28 3L l 1 l2 l (2 l 1) L l 1 2 ( 1) l+1 (l 5) L (l + 1)l(l 1)(2 l 1) l 3 2Q(1) L + l l Q l 1 2 l 1 + π2 2L L ( ) ( 1) l 2 l+1 2 L(1 2 l+1 )/2 1 L 1 2 l ( 1) r+1 r(r 1)(2 r+l 1) l 1 r 2 ( ) ( 1) r 2 r+1 2 ( j j+r+l+2 1 Q r+l 2 Q r 0 r ( l 1 ( l + 1 ) 2 l+1 2l i i=2 2 (1 2 l r ) 2 + 2l + 2 (1 2 1 l r ) 2 2 L l+1 ( l + 1 ) 2 j j=2 1 2 r+j L j=0 i r+i l r + 2 l+1 ( l + 1 ) L j j=1 l+1 ( l + 1 ) ( 1) i ) j (i + 1)(2 r+j+i 1) + l 1 ( l + 1 ) Qr 2 Q l r 1 1 r 2 l 3 r=2 l Q l 2 j 1 2[ωψ] 0 [ω 2 ] 0. j l+1 ) 1 2 r+j 1 Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
59 General Framework for Symmmetric Tries Consider X n d = XIn + X n I n + T n and let g 1 (z) = e z n 0 and W 2 (z) := g 2 (z) g 1 (z) 2 z g 1 (z). E(T n ) zn n!, g 2(z) = e z E(Tn) 2 zn n! n 0 Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
60 General Framework for Symmmetric Tries Consider X n d = XIn + X n I n + T n and let g 1 (z) = e z n 0 and W 2 (z) := g 2 (z) g 1 (z) 2 z g 1 (z). E(T n ) zn n!, g 2(z) = e z E(Tn) 2 zn n! n 0 Theorem (F., Hwang, Zacharovas) Let g 1, W 2 J S α,β with α < 1 and g 2 J S. Then, E(X n ) np 1 (log 2 n), Var(X n ) np 2 (log 2 n), where P 1, P 2 are 1-periodic, computable functions. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
61 Variance of Size in Symmetric Tries (ii) Theorem (F., Hwang, Zacharovas) We have, where Var(S n ) n log 2 G( 1 + χ k )n χ k, k G( 1 + χ k ) = χ kγ( 1 + χ k )(1 + χ k ) ( 1) j j(j(j + χ k ) 1)Γ(j + χ k ) (j + 1)!(2 j 1) j 1 with χ k = 2kπi/(log 2). Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
62 Exact Poissonized Variance Question: why not using the PGF of the variance, i.e., Ṽ (z) := e z n 0 Var(X n ) zn n!? Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
63 Exact Poissonized Variance Question: why not using the PGF of the variance, i.e., Ṽ (z) := e z n 0 Var(X n ) zn n!? Recall that Then, σ 2 n = 2 1 n where σ 2 n = Var(X n ). X n d = XIn + X n I n + T n. n ( ) n σj 2 + Var(T n ) j j=0 n ( ) n + 2 n (E(X j ) + E(X n j ) E(X n ) + E(T n )) 2, j j=0 Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
64 Poissonization of the Variance Recurrence Set W (z) := e z n 0 Var(T n ) zn n!. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
65 Poissonization of the Variance Recurrence Set Proposition We have, W (z) := e z n 0 Var(T n ) zn n!. Ṽ (z) = 2Ṽ (z/2) + W (z) + h(z), where h(z) =2( f 1 f 1 )(z/2) + 2 f 1 (z/2) 2 ( f 1 f 1 )(z) + 2( f 1 g 1 )(z) ( g 1 g 1 )(z). Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
66 Poissonization of the Variance Recurrence Set Proposition We have, W (z) := e z n 0 Var(T n ) zn n!. Ṽ (z) = 2Ṽ (z/2) + W (z) + h(z), where h(z) =2( f 1 f 1 )(z/2) + 2 f 1 (z/2) 2 ( f 1 f 1 )(z) + 2( f 1 g 1 )(z) ( g 1 g 1 )(z). Here, f g denotes the Hadamard product of f and g. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
67 Closure Property of Hadamard Product Proposition (F., Hwang, Zacharovas) If f(z) = e z n 0 are both J S -admissible, then is also J S -admissible. z n a n n!, g(z) = z n e z b n n! n 0 ( f g)(z) = e z n 0 a n b n z n n! Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
68 Closure Property of Hadamard Product Proposition (F., Hwang, Zacharovas) If f(z) = e z n 0 are both J S -admissible, then is also J S -admissible. z n a n n!, g(z) = z n e z b n n! n 0 ( f g)(z) = e z n 0 Proof uses the integral representation ( f g)(z 2 ) = e z2 ue u2 4πi 0 ξ =1 a n b n z n n! e zuξ+zu ξ f(zuξ) g(zu ξ) dξ ξ du. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
69 An IFF Condition for J S -admissibility Theorem (Jacquet) f J S iff there exists an analytic extension α(z) of a n with α(z) = O(z p ), for some p > 0, as z, in a cone {z : arg(z) ɛ}. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
70 An IFF Condition for J S -admissibility Theorem (Jacquet) f J S iff there exists an analytic extension α(z) of a n with α(z) = O(z p ), for some p > 0, as z, in a cone {z : arg(z) ɛ}. Was proved in two stages: Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
71 An IFF Condition for J S -admissibility Theorem (Jacquet) f J S iff there exists an analytic extension α(z) of a n with α(z) = O(z p ), for some p > 0, as z, in a cone {z : arg(z) ɛ}. Was proved in two stages: If : Jacquet & Szpankowski (1999); Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
72 An IFF Condition for J S -admissibility Theorem (Jacquet) f J S iff there exists an analytic extension α(z) of a n with α(z) = O(z p ), for some p > 0, as z, in a cone {z : arg(z) ɛ}. Was proved in two stages: If : Jacquet & Szpankowski (1999); Only If : Jacquet (2014). Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
73 An IFF Condition for J S -admissibility Theorem (Jacquet) f J S iff there exists an analytic extension α(z) of a n with α(z) = O(z p ), for some p > 0, as z, in a cone {z : arg(z) ɛ}. Was proved in two stages: If : Jacquet & Szpankowski (1999); Only If : Jacquet (2014). Corollary If f, g are J S -admissible, then f g is J S -admissible. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
74 Asymptotic Expansion for Hadamard Product Theorem If f, g J S, then ( f g)(z) n 0 z k k! f (k) (z) g (k) (z). Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
75 Asymptotic Expansion for Hadamard Product Theorem If f, g J S, then ( f g)(z) n 0 z k k! f (k) (z) g (k) (z). We have, where with Ṽ (z) = 2Ṽ (z/2) + W (z) + h(z), h(z) k 2 c ( k z ) k (k) f 1 (z/2) 2 k! 2 c k = 2(1 2 1 k ). Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
76 General Framework for Symmetric Tries - Revisited d Recall: X n = XIn + Xn I n + T n. Theorem (F., Hwang, Zacharovas) Let g 1, W 2 J S α,β with α < 1 and g 2 J S. Then, E(X n ) np 1 (log 2 n), Var(X n ) np 2 (log 2 n), where P 1, P 2 are 1-periodic, computable functions. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
77 General Framework for Symmetric Tries - Revisited d Recall: X n = XIn + Xn I n + T n. Theorem (F., Hwang, Zacharovas) Let g 1, W 2 J S α,β with α < 1 and g 2 J S. Then, E(X n ) np 1 (log 2 n), Var(X n ) np 2 (log 2 n), where P 1, P 2 are 1-periodic, computable functions. Theorem Let g 1, W J S α,β with α < 1. Then, E(X n ) np 1 (log 2 n), Var(X n ) np 2 (log 2 n), where P 1, P 2 are 1-periodic, computable functions. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
78 Variance of Size in Symmetric Tries (iii) Theorem We have, where Var(S n ) 1 log 2 P 1(n) 1 1 log 2 2 k! P k(n), k 2 P k (n) = l d k,l n! Γ(n + k 1 + χ l ) with d 1,l as before and for k 2 d k,l = j χ j Γ(k 1 + χ j )χ l j Γ(k 1 + χ l j ). Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
79 Variance of Size in Symmetric Tries (iii) Theorem We have, where Var(S n ) 1 log 2 P 1(n) 1 1 log 2 2 k! P k(n), k 2 P k (n) = l d k,l n! Γ(n + k 1 + χ l ) with d 1,l as before and for k 2 d k,l = j χ j Γ(k 1 + χ j )χ l j Γ(k 1 + χ l j ). Remark: Similar results for other (additive) shape parameters of symmetric tries and PATRICIA tries. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
80 Identity for Hadamard Product Theorem Under assumptions which include J S -admissibility, we have ( f g)(z) = k 0 z k k! f (k) (z) g (k) (z). Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
81 Identity for Hadamard Product Theorem Under assumptions which include J S -admissibility, we have ( f g)(z) = k 0 z k k! f (k) (z) g (k) (z). Equivalently, we have: ( )( τ j (n) f (j) (n) j! j 0 = j 0 j 0 ) τ j (n) g (j) (n) j! ( ) (j) τ j (n) n k j! k! f (k) (n) g(k)(n). k 0 Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
82 A Quick Proof (i) Let f(z) = A m m! zm, g(z) = B m m! zm. m 0 m 0 Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
83 A Quick Proof (i) Let Then, f(z) = A m m! zm, g(z) = B m m! zm. m 0 m 0 ( j 0 τ j (n) j! = j 0 f (j) (n) )( j 0 ) τ j (n) g (j) (n) j! ( τ j (n) n k j! k! f (k) (n) g(k)(n) k 0 ) (j) can be rewritten to ( ( ) )( n A m m 0 m n 0 m n ( ) n )B m = n![z n ]e z z k m k! f (k) (z) g (k) (z). k 0 Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
84 A Quick Proof (ii) Note that n![z n ]e z k! f (k) (z) g (k) (z) = n! 1 k! [zn ]z k e z f (k) (z) g (k) (z) k 0 k 0 z k Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
85 A Quick Proof (ii) Note that z k n![z n ]e z k! f (k) (z) g (k) (z) = n! k 0 k 0 1 = n! k! 0 k n i 1 +i 2 +i 3 =n k 1 k! [zn ]z k e z f (k) (z) g (k) (z) A i2 +kb i3 +k i 1!i 2!i 3! Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
86 A Quick Proof (ii) Note that z k n![z n ]e z k! f (k) (z) g (k) (z) = n! k 0 k 0 1 = n! k! = 0 k n ( 0 m n i 1 +i 2 +i 3 =n k ( ) n m A m )( 1 k! [zn ]z k e z f (k) (z) g (k) (z) A i2 +kb i3 +k i 1!i 2!i 3! ( ) n )B m m 0 m n Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
87 A Quick Proof (ii) Note that z k n![z n ]e z k! f (k) (z) g (k) (z) = n! k 0 k 0 1 = n! k! = 0 k n ( 0 m n and this is true since ( )( ) n n = s t 0 k n i 1 +i 2 +i 3 =n k ( ) n m A m )( 1 k! [zn ]z k e z f (k) (z) g (k) (z) A i2 +kb i3 +k i 1!i 2!i 3! ( ) n )B m m 0 m n ( )( n n k ) k s k, t k, n + k s t which counts twice the number of ways of choosing a set of size s and t from a set of size n. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
88 Exact vs. Asymptotic Poissonized Variance Recall Ṽ (z) = e z n 0 Var(X n ) zn n!. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
89 Exact vs. Asymptotic Poissonized Variance Recall Ṽ (z) = e z n 0 Var(X n ) zn n!. Corollary We have, Ṽ (z) = f 2 (z) k 0 z k (k) f 1 (z) 2. k! Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
90 Exact vs. Asymptotic Poissonized Variance Recall Corollary We have, Ṽ (z) = e z n 0 Ṽ (z) = f 2 (z) k 0 Var(X n ) zn n!. z k (k) f 1 (z) 2. k! This gives: Ṽ (z) = f 2 (z) f 1 (z) 2 z }{{} f 1(z) 2 =Ṽ1(z) } {{ } =Ṽ2(z) z2 2 f 1 (z) 2 Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
91 Summary Poisson-Mellin- Newton cycle: Poisson GF a n Noerlund integral f(z) Mellin transform F (s) Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
92 Summary Poisson-Mellin- Newton cycle: Poisson GF a n Noerlund integral f(z) Mellin transform F (s) We used exact poissonized variance in contrast to asymptotic poissonized variances. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
93 Summary Poisson-Mellin- Newton cycle: Poisson GF a n Noerlund integral f(z) Mellin transform F (s) We used exact poissonized variance in contrast to asymptotic poissonized variances. This yields general frameworks for asymptotics of mean and variance of additive shape parameter in tries and PATRICIA tries under natural conditions. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
94 Summary Poisson-Mellin- Newton cycle: Poisson GF a n Noerlund integral f(z) Mellin transform F (s) We used exact poissonized variance in contrast to asymptotic poissonized variances. This yields general frameworks for asymptotics of mean and variance of additive shape parameter in tries and PATRICIA tries under natural conditions. This also yields full asymptotic expansions of the variance for symmetric tries and PATRICIA tries. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
95 Inverse Mellin and De-poissonization Combined Formally, we have a n = n! e z f(z) 2πi z =r z n+1 Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
96 Inverse Mellin and De-poissonization Combined Formally, we have a n = n! 2πi = n! 2πi z =r z =r e z f(z) z n+1 e z z n+1 ( 1 2πi (c) F (s)z s ds ) dz Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
97 Inverse Mellin and De-poissonization Combined Formally, we have a n = n! 2πi = n! 2πi = n! 2πi z =r e z f(z) z n+1 e z z =r z n+1 (c) ( 1 2πi ( 1 F (s) 2πi (c) z =r F (s)z s ds ) e z z n s 1 dz dz ) ds Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
98 Inverse Mellin and De-poissonization Combined Formally, we have a n = n! 2πi = n! 2πi = n! 2πi = 1 2πi z =r e z f(z) z n+1 e z z =r z n+1 (c) (c) ( 1 2πi ( 1 F (s) 2πi F (s) Γ(s) (c) z =r n!γ(s) Γ(n s) ds F (s)z s ds ) e z z n s 1 dz dz ) ds Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
99 Inverse Mellin and De-poissonization Combined Formally, we have a n = n! 2πi = n! 2πi = n! 2πi = 1 2πi z =r e z f(z) z n+1 e z z =r z n+1 (c) (c) ( 1 2πi ( 1 F (s) 2πi F (s) Γ(s) (c) z =r n!γ(s) Γ(n s) ds which after s s is the Noerlund integral. F (s)z s ds ) e z z n s 1 dz dz ) ds Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
100 Inverse Mellin and De-poissonization Combined Formally, we have a n = n! 2πi = n! 2πi = n! 2πi = 1 2πi z =r e z f(z) z n+1 e z z =r z n+1 (c) (c) ( 1 2πi ( 1 F (s) 2πi F (s) Γ(s) (c) z =r n!γ(s) Γ(n s) ds which after s s is the Noerlund integral. F (s)z s ds ) e z z n s 1 dz Remark: justification needs e.g. polynomial growth of F ( s)/γ( s)! dz ) ds Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
101 Variance of Size in Symmetric Tries (iv) Recall Ṽ (z) = 2Ṽ (z/2) + h(z) where h(z) = k 2 c ( k z ) k (k) f 1 (z/2) 2. k! 2 Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
102 Variance of Size in Symmetric Tries (iv) Recall Ṽ (z) = 2Ṽ (z/2) + h(z) where For the size: h(z) = j,l 1 h(z) = k 2 2 j+l 2 e z 2 j z 2 l k 2 c ( k z ) k (k) f 1 (z/2) 2. k! 2 2 (j+l 1)k c ( k z k z ) ( z ) k! 2 j k l k + 1 Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
103 Variance of Size in Symmetric Tries (iv) Recall Ṽ (z) = 2Ṽ (z/2) + h(z) where For the size: h(z) = j,l 1 h(z) = k 2 2 j+l 2 e z 2 j z 2 l k 2 c ( k z ) k (k) f 1 (z/2) 2. k! 2 2 (j+l 1)k c ( k z k z ) ( z ) k! 2 j k l k + 1 From this one obtains an explicit expression for the Mellin transform! Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
104 Variance of Size in Symmetric Tries (iv) Recall Ṽ (z) = 2Ṽ (z/2) + h(z) where For the size: h(z) = j,l 1 h(z) = k 2 2 j+l 2 e z 2 j z 2 l k 2 c ( k z ) k (k) f 1 (z/2) 2. k! 2 2 (j+l 1)k c ( k z k z ) ( z ) k! 2 j k l k + 1 From this one obtains an explicit expression for the Mellin transform! Lemma M [ h(z); s]/γ( s) is of polynomial growth on R(s) > 0. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
105 Variance of Size in Symmetric Tries (v) Start with: 1 2πi (3/2) M [ h(z); s] n!γ( s) (1 2 1 s )Γ( s) Γ(n + 1 s) Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
106 Variance of Size in Symmetric Tries (v) Start with: 1 2πi (3/2) M [ h(z); s] n!γ( s) (1 2 1 s )Γ( s) Γ(n + 1 s) Moving the line of integration to: Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
107 Variance of Size in Symmetric Tries (v) Start with: 1 2πi (3/2) M [ h(z); s] n!γ( s) (1 2 1 s )Γ( s) Γ(n + 1 s) Moving the line of integration to: + : gives Var(S n ); Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
108 Variance of Size in Symmetric Tries (v) Start with: 1 2πi (3/2) M [ h(z); s] n!γ( s) (1 2 1 s )Γ( s) Γ(n + 1 s) Moving the line of integration to: + : gives Var(S n ); inside (0, 1): gives main term in the asymptotics of Var(S n ). Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
109 Variance of Size in Symmetric Tries (v) Start with: 1 2πi (3/2) M [ h(z); s] n!γ( s) (1 2 1 s )Γ( s) Γ(n + 1 s) Moving the line of integration to: + : gives Var(S n ); inside (0, 1): gives main term in the asymptotics of Var(S n ). Rice-Noerlund method for variance without cancellations! Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
110 Variance of Size in Symmetric Tries (v) Start with: 1 2πi (3/2) M [ h(z); s] n!γ( s) (1 2 1 s )Γ( s) Γ(n + 1 s) Moving the line of integration to: + : gives Var(S n ); inside (0, 1): gives main term in the asymptotics of Var(S n ). Rice-Noerlund method for variance without cancellations! Longer expansions by moving the line beyond the imaginary axis but for this we need polynomial growth beyond R(s) > 0 Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
111 Variance of Size in Symmetric Tries (v) Start with: 1 2πi (3/2) M [ h(z); s] n!γ( s) (1 2 1 s )Γ( s) Γ(n + 1 s) Moving the line of integration to: + : gives Var(S n ); inside (0, 1): gives main term in the asymptotics of Var(S n ). Rice-Noerlund method for variance without cancellations! Longer expansions by moving the line beyond the imaginary axis but for this we need polynomial growth beyond R(s) > 0 tameness of M [ h(z); s]/γ( s)? (Vallée; 2017) Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
112 Open Problems How to show e.g. Var(S n ) 1 log 2 P 1(n) 1 1 log 2 2 k! P k(n) k 2 via the Rice-Noerlund method? Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
113 Open Problems How to show e.g. Var(S n ) 1 log 2 P 1(n) 1 1 log 2 2 k! P k(n) k 2 via the Rice-Noerlund method? Does the above hold as identity? Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
114 Open Problems How to show e.g. Var(S n ) 1 log 2 P 1(n) 1 1 log 2 2 k! P k(n) k 2 via the Rice-Noerlund method? Does the above hold as identity? For this one would need polynomial growth of M [ h(z); s]/γ( s) on C (when staying uniformly away from the singularities). Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
115 Open Problems How to show e.g. Var(S n ) 1 log 2 P 1(n) 1 1 log 2 2 k! P k(n) k 2 via the Rice-Noerlund method? Does the above hold as identity? For this one would need polynomial growth of M [ h(z); s]/γ( s) on C (when staying uniformly away from the singularities). Conditions on T n X n d = XIn + X n I n + T n such that Var(X n ) can be obtained with Rice-Noerlund method? Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
116 Open Problems How to show e.g. Var(S n ) 1 log 2 P 1(n) 1 1 log 2 2 k! P k(n) k 2 via the Rice-Noerlund method? Does the above hold as identity? For this one would need polynomial growth of M [ h(z); s]/γ( s) on C (when staying uniformly away from the singularities). Conditions on T n X n d = XIn + X n I n + T n such that Var(X n ) can be obtained with Rice-Noerlund method? B. Vallée has a general framework for mean but how about variance? Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40
Approximate Counting via the Poisson-Laplace-Mellin Method (joint with Chung-Kuei Lee and Helmut Prodinger)
Approximate Counting via the Poisson-Laplace-Mellin Method (joint with Chung-Kuei Lee and Helmut Prodinger) Michael Fuchs Department of Applied Mathematics National Chiao Tung University Hsinchu, Taiwan
More informationDependence between Path Lengths and Size in Random Trees (joint with H.-H. Chern, H.-K. Hwang and R. Neininger)
Dependence between Path Lengths and Size in Random Trees (joint with H.-H. Chern, H.-K. Hwang and R. Neininger) Michael Fuchs Institute of Applied Mathematics National Chiao Tung University Hsinchu, Taiwan
More informationAsymptotic variance of random symmetric digital search trees
Discrete Mathematics and Theoretical Computer Science DMTCS vol. :,, 3 66 Asymptotic variance of random symmetric digital search trees Hsien-Kuei Hwang, Michael Fuchs and Vytas Zacharovas Institute of
More informationThe variance for partial match retrievals in k-dimensional bucket digital trees
The variance for partial match retrievals in k-dimensional ucket digital trees Michael FUCHS Department of Applied Mathematics National Chiao Tung University January 12, 21 Astract The variance of partial
More informationROSENA R.X. DU AND HELMUT PRODINGER. Dedicated to Philippe Flajolet ( )
ON PROTECTED NODES IN DIGITAL SEARCH TREES ROSENA R.X. DU AND HELMUT PRODINGER Dedicated to Philippe Flajolet (98 2) Abstract. Recently, 2-protected nodes were studied in the context of ordered trees and
More informationThe Subtree Size Profile of Plane-oriented Recursive Trees
The Subtree Size Profile of Plane-oriented Recursive Trees Michael Fuchs Department of Applied Mathematics National Chiao Tung University Hsinchu, Taiwan ANALCO11, January 22nd, 2011 Michael Fuchs (NCTU)
More informationA Note on a Problem Posed by D. E. Knuth on a Satisfiability Recurrence
A Note on a Problem Posed by D. E. Knuth on a Satisfiability Recurrence Dedicated to Philippe Flajolet 1948-2011 July 4, 2013 Philippe Jacquet Charles Knessl 1 Wojciech Szpankowski 2 Bell Labs Dept. Math.
More informationForty years of tree enumeration
October 24, 206 Canada John Moon (Alberta) Counting labelled trees Canadian mathematical monographs What is our subject? Asymptotic enumeration or Probabilistic combinatorics? What is our subject? Asymptotic
More informationAnalytic Depoissonization and Its Applications
Analytic Depoissonization and Its Applications W. Szpankowski Department of Computer Science Purdue University W. Lafayette, IN 47907 April 29, 2008 AofA and IT logos This research is supported by NSF
More informationThe Moments of the Profile in Random Binary Digital Trees
Journal of mathematics and computer science 6(2013)176-190 The Moments of the Profile in Random Binary Digital Trees Ramin Kazemi and Saeid Delavar Department of Statistics, Imam Khomeini International
More informationOn the number of subtrees on the fringe of random trees (partly joint with Huilan Chang)
On the number of subtrees on the fringe of random trees (partly joint with Huilan Chang) Michael Fuchs Institute of Applied Mathematics National Chiao Tung University Hsinchu, Taiwan April 16th, 2008 Michael
More informationPROBABILISTIC BEHAVIOR OF ASYMMETRIC LEVEL COMPRESSED TRIES
PROBABILISTIC BEAVIOR OF ASYMMETRIC LEVEL COMPRESSED TRIES Luc Devroye Wojcieh Szpankowski School of Computer Science Department of Computer Sciences McGill University Purdue University 3450 University
More informationCombinatorial/probabilistic analysis of a class of search-tree functionals
Combinatorial/probabilistic analysis of a class of search-tree functionals Jim Fill jimfill@jhu.edu http://www.mts.jhu.edu/ fill/ Mathematical Sciences The Johns Hopkins University Joint Statistical Meetings;
More informationAnalytic Depoissonization and Its Applications Λ
Analytic Depoissonization and Its Applications Λ W. Szpankowski y Department of Computer Science Purdue University W. Lafayette, IN 47907 May 31, 2003 Λ This research is supported by NSF and NIH. y Joint
More informationNUMBER OF SYMBOL COMPARISONS IN QUICKSORT
NUMBER OF SYMBOL COMPARISONS IN QUICKSORT Brigitte Vallée (CNRS and Université de Caen, France) Joint work with Julien Clément, Jim Fill and Philippe Flajolet Plan of the talk. Presentation of the study
More informationProbabilistic analysis of the asymmetric digital search trees
Int. J. Nonlinear Anal. Appl. 6 2015 No. 2, 161-173 ISSN: 2008-6822 electronic http://dx.doi.org/10.22075/ijnaa.2015.266 Probabilistic analysis of the asymmetric digital search trees R. Kazemi a,, M. Q.
More informationFrom the Discrete to the Continuous, and Back... Philippe Flajolet INRIA, France
From the Discrete to the Continuous, and Back... Philippe Flajolet INRIA, France 1 Discrete structures in... Combinatorial mathematics Computer science: data structures & algorithms Information and communication
More informationAVERAGE-CASE ANALYSIS OF COUSINS IN m-ary TRIES
J. Appl. Prob. 45, 888 9 (28) Printed in England Applied Probability Trust 28 AVERAGE-CASE ANALYSIS OF COUSINS IN m-ary TRIES HOSAM M. MAHMOUD, The George Washington University MARK DANIEL WARD, Purdue
More informationMOMENTS OF HYPERGEOMETRIC HURWITZ ZETA FUNCTIONS
MOMENTS OF HYPERGEOMETRIC HURWITZ ZETA FUNCTIONS ABDUL HASSEN AND HIEU D. NGUYEN Abstract. This paper investigates a generalization the classical Hurwitz zeta function. It is shown that many of the properties
More informationLAWS OF LARGE NUMBERS AND TAIL INEQUALITIES FOR RANDOM TRIES AND PATRICIA TREES
LAWS OF LARGE NUMBERS AND TAIL INEQUALITIES FOR RANDOM TRIES AND PATRICIA TREES Luc Devroye School of Computer Science McGill University Montreal, Canada H3A 2K6 luc@csmcgillca June 25, 2001 Abstract We
More informationDigital Trees and Memoryless Sources: from Arithmetics to Analysis
Digital Trees and Memoryless Sources: from Arithmetics to Analysis Philippe Flajolet, Mathieu Roux, Brigitte Vallée AofA 2010, Wien 1 What is a digital tree, aka TRIE? = a data structure for dynamic dictionaries
More informationEXPECTED WORST-CASE PARTIAL MATCH IN RANDOM QUADTRIES
EXPECTED WORST-CASE PARTIAL MATCH IN RANDOM QUADTRIES Luc Devroye School of Computer Science McGill University Montreal, Canada H3A 2K6 luc@csmcgillca Carlos Zamora-Cura Instituto de Matemáticas Universidad
More informationGrowing and Destroying Catalan Stanley Trees
Discrete Mathematics and Theoretical Computer Science DMTCS vol. 20:1, 2018, #11 Growing and Destroying Catalan Stanley Trees Benjamin Hackl 1 Helmut Prodinger 2 arxiv:1704.03734v3 [math.co] 26 Feb 2018
More informationNetworks: Lectures 9 & 10 Random graphs
Networks: Lectures 9 & 10 Random graphs Heather A Harrington Mathematical Institute University of Oxford HT 2017 What you re in for Week 1: Introduction and basic concepts Week 2: Small worlds Week 3:
More informationNotes by Zvi Rosen. Thanks to Alyssa Palfreyman for supplements.
Lecture: Hélène Barcelo Analytic Combinatorics ECCO 202, Bogotá Notes by Zvi Rosen. Thanks to Alyssa Palfreyman for supplements.. Tuesday, June 2, 202 Combinatorics is the study of finite structures that
More informationNUMBER OF SYMBOL COMPARISONS IN QUICKSORT AND QUICKSELECT
NUMBER OF SYMBOL COMPARISONS IN QUICKSORT AND QUICKSELECT Brigitte Vallée (CNRS and Université de Caen, France) Joint work with Julien Clément, Jim Fill and Philippe Flajolet Plan of the talk. Presentation
More informationMultiple Choice Tries and Distributed Hash Tables
Multiple Choice Tries and Distributed Hash Tables Luc Devroye and Gabor Lugosi and Gahyun Park and W. Szpankowski January 3, 2007 McGill University, Montreal, Canada U. Pompeu Fabra, Barcelona, Spain U.
More informationJacobi-Angelesco multiple orthogonal polynomials on an r-star
M. Leurs Jacobi-Angelesco m.o.p. 1/19 Jacobi-Angelesco multiple orthogonal polynomials on an r-star Marjolein Leurs, (joint work with Walter Van Assche) Conference on Orthogonal Polynomials and Holomorphic
More informationEverything You Always Wanted to Know about Quicksort, but Were Afraid to Ask. Marianne Durand
Algorithms Seminar 200 2002, F. Chyzak (ed., INRIA, (2003, pp. 57 62. Available online at the URL http://algo.inria.fr/seminars/. Everything You Always Wanted to Know about Quicksort, but Were Afraid to
More informationAnalytic Information Theory: From Shannon to Knuth and Back. Knuth80: Piteaa, Sweden, 2018 Dedicated to Don E. Knuth
Analytic Information Theory: From Shannon to Knuth and Back Wojciech Szpankowski Center for Science of Information Purdue University January 7, 2018 Knuth80: Piteaa, Sweden, 2018 Dedicated to Don E. Knuth
More informationApplications of Analytic Combinatorics in Mathematical Biology (joint with H. Chang, M. Drmota, E. Y. Jin, and Y.-W. Lee)
Applications of Analytic Combinatorics in Mathematical Biology (joint with H. Chang, M. Drmota, E. Y. Jin, and Y.-W. Lee) Michael Fuchs Department of Applied Mathematics National Chiao Tung University
More information9. Series representation for analytic functions
9. Series representation for analytic functions 9.. Power series. Definition: A power series is the formal expression S(z) := c n (z a) n, a, c i, i =,,, fixed, z C. () The n.th partial sum S n (z) is
More informationLaws of large numbers and tail inequalities for random tries and PATRICIA trees
Journal of Computational and Applied Mathematics 142 2002 27 37 www.elsevier.com/locate/cam Laws of large numbers and tail inequalities for random tries and PATRICIA trees Luc Devroye 1 School of Computer
More informationString Complexity. Dedicated to Svante Janson for his 60 Birthday
String Complexity Wojciech Szpankowski Purdue University W. Lafayette, IN 47907 June 1, 2015 Dedicated to Svante Janson for his 60 Birthday Outline 1. Working with Svante 2. String Complexity 3. Joint
More informationDigital search trees JASS
Digital search trees Analysis of different digital trees with Rice s integrals. JASS Nicolai v. Hoyningen-Huene 28.3.2004 28.3.2004 JASS 04 - Digital search trees 1 content Tree Digital search tree: Definition
More information13 Maximum Modulus Principle
3 Maximum Modulus Principle Theorem 3. (maximum modulus principle). If f is non-constant and analytic on an open connected set Ω, then there is no point z 0 Ω such that f(z) f(z 0 ) for all z Ω. Remark
More informationStat 134 Fall 2011: Notes on generating functions
Stat 3 Fall 0: Notes on generating functions Michael Lugo October, 0 Definitions Given a random variable X which always takes on a positive integer value, we define the probability generating function
More informationINTRODUCTION TO REAL ANALYTIC GEOMETRY
INTRODUCTION TO REAL ANALYTIC GEOMETRY KRZYSZTOF KURDYKA 1. Analytic functions in several variables 1.1. Summable families. Let (E, ) be a normed space over the field R or C, dim E
More informationConsidering our result for the sum and product of analytic functions, this means that for (a 0, a 1,..., a N ) C N+1, the polynomial.
Lecture 3 Usual complex functions MATH-GA 245.00 Complex Variables Polynomials. Construction f : z z is analytic on all of C since its real and imaginary parts satisfy the Cauchy-Riemann relations and
More informationPartial Match Queries in Relaxed Multidimensional Search Trees 1
Algorithmica 2001 29: 181 204 DOI: 10.1007/s004530010065 Algorithmica 2001 Springer-Verlag New York Inc. Partial Match Queries in Relaxed Multidimensional Search Trees 1 C. Martínez, 2 A. Panholzer, 3
More informationAsymptotic results for silent elimination
Discrete Mathematics and Theoretical Computer Science DMTCS vol. subm., by the authors, 1 1 Asymptotic results for silent elimination Guy Louchard 1 and Helmut Prodinger 2 1 Université Libre de Bruxelles,
More information7 Asymptotics for Meromorphic Functions
Lecture G jacques@ucsd.edu 7 Asymptotics for Meromorphic Functions Hadamard s Theorem gives a broad description of the exponential growth of coefficients in power series, but the notion of exponential
More informationOn rational approximation of algebraic functions. Julius Borcea. Rikard Bøgvad & Boris Shapiro
On rational approximation of algebraic functions http://arxiv.org/abs/math.ca/0409353 Julius Borcea joint work with Rikard Bøgvad & Boris Shapiro 1. Padé approximation: short overview 2. A scheme of rational
More informationAnalysis of the multiplicity matching parameter in suffix trees
2005 International Conference on Analysis of Algorithms DMTCS proc. AD, 2005, 307 322 Analysis of the multiplicity matching parameter in suffix trees Mark Daniel Ward and Wojciech Szpankoski 2 Department
More informationDirichlet s Theorem. Calvin Lin Zhiwei. August 18, 2007
Dirichlet s Theorem Calvin Lin Zhiwei August 8, 2007 Abstract This paper provides a proof of Dirichlet s theorem, which states that when (m, a) =, there are infinitely many primes uch that p a (mod m).
More informationComplex Variables. Cathal Ormond
Complex Variables Cathal Ormond Contents 1 Introduction 3 1.1 Definition: Polar Form.............................. 3 1.2 Definition: Length................................ 3 1.3 Definitions.....................................
More informationAdditive irreducibles in α-expansions
Publ. Math. Debrecen Manuscript Additive irreducibles in α-expansions By Peter J. Grabner and Helmut Prodinger * Abstract. The Bergman number system uses the base α = + 5 2, the digits 0 and, and the condition
More informationOn the number of heaps and the cost of heap construction
On the number of heaps and the cost of heap construction Hsien-Kuei Hwang Institute of Statistical Science Academia Sinica Taipei 5 Taiwan Jean-Marc Steyaert LIX École Polytechnique 928 Palaiseau France
More informationLECTURE-13 : GENERALIZED CAUCHY S THEOREM
LECTURE-3 : GENERALIZED CAUCHY S THEOREM VED V. DATAR The aim of this lecture to prove a general form of Cauchy s theorem applicable to multiply connected domains. We end with computations of some real
More informationThe Number of Inversions in Permutations: A Saddle Point Approach
1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 6 (23), Article 3.2.8 The Number of Inversions in Permutations: A Saddle Point Approach Guy Louchard Département d Informatique CP 212, Boulevard du
More informationAn Analysis of the Height of Tries with Random Weights on the Edges
An Analysis of the Height of Tries with Random Weights on the Edges N. Broutin L. Devroye September 0, 2007 Abstract We analyze the weighted height of random tries built from independent strings of i.i.d.
More informationComplex Analysis Slide 9: Power Series
Complex Analysis Slide 9: Power Series MA201 Mathematics III Department of Mathematics IIT Guwahati August 2015 Complex Analysis Slide 9: Power Series 1 / 37 Learning Outcome of this Lecture We learn Sequence
More informationCompositions and samples of geometric random variables with constrained multiplicities
FPSAC 2010, San Francisco, USA DMTCS proc. AN, 2010, 317 328 Compositions and samples of geometric random variables with constrained multiplicities Margaret Archibald 1 and Arnold Knopfmacher 2 and Toufik
More informationDISCRETE AND ALGEBRAIC STRUCTURES
DISCRETE AND ALGEBRAIC STRUCTURES Master Study Mathematics MAT40 Winter Semester 015/16 (Due to organisational reasons register for the course at TU and KFU) Edited by Mihyun Kang TU Graz Contents I Lectures
More information< k 2n. 2 1 (n 2). + (1 p) s) N (n < 1
List of Problems jacques@ucsd.edu Those question with a star next to them are considered slightly more challenging. Problems 9, 11, and 19 from the book The probabilistic method, by Alon and Spencer. Question
More informationNatural boundary and Zero distribution of random polynomials in smooth domains arxiv: v1 [math.pr] 2 Oct 2017
Natural boundary and Zero distribution of random polynomials in smooth domains arxiv:1710.00937v1 [math.pr] 2 Oct 2017 Igor Pritsker and Koushik Ramachandran Abstract We consider the zero distribution
More informationIntroduction Consider a group of n people (users, computers, objects, etc.) sharing a scarce resource (e.g., channel, CPU, etc.). The following elimin
ANALYSIS OF AN ASYMMETRIC LEADER ELECTION ALGORITHM September 3, 996 Svante Janson Wojciech Szpankowski Department of Mathematics Department of Computer Science Uppsala University Purdue University 756
More informationDESTRUCTION OF VERY SIMPLE TREES
DESTRUCTION OF VERY SIMPLE TREES JAMES ALLEN FILL, NEVIN KAPUR, AND ALOIS PANHOLZER Abstract. We consider the total cost of cutting down a random rooted tree chosen from a family of so-called very simple
More informationarxiv: v2 [math.pr] 4 Sep 2017
arxiv:1708.08576v2 [math.pr] 4 Sep 2017 On the Speed of an Excited Asymmetric Random Walk Mike Cinkoske, Joe Jackson, Claire Plunkett September 5, 2017 Abstract An excited random walk is a non-markovian
More informationn! (k 1)!(n k)! = F (X) U(0, 1). (x, y) = n(n 1) ( F (y) F (x) ) n 2
Order statistics Ex. 4.1 (*. Let independent variables X 1,..., X n have U(0, 1 distribution. Show that for every x (0, 1, we have P ( X (1 < x 1 and P ( X (n > x 1 as n. Ex. 4.2 (**. By using induction
More informationGaussian vectors and central limit theorem
Gaussian vectors and central limit theorem Samy Tindel Purdue University Probability Theory 2 - MA 539 Samy T. Gaussian vectors & CLT Probability Theory 1 / 86 Outline 1 Real Gaussian random variables
More informationn! (k 1)!(n k)! = F (X) U(0, 1). (x, y) = n(n 1) ( F (y) F (x) ) n 2
Order statistics Ex. 4. (*. Let independent variables X,..., X n have U(0, distribution. Show that for every x (0,, we have P ( X ( < x and P ( X (n > x as n. Ex. 4.2 (**. By using induction or otherwise,
More information4. Complex Analysis, Rational and Meromorphic Asymptotics
ANALYTIC COMBINATORICS P A R T T W O 4. Complex Analysis, Rational and Meromorphic Asymptotics http://ac.cs.princeton.edu ANALYTIC COMBINATORICS P A R T T W O Analytic Combinatorics Philippe Flajolet and
More informationLattice paths with catastrophes
Lattice paths with catastrophes Lattice paths with catastrophes SLC 77, Strobl 12.09.2016 Cyril Banderier and Michael Wallner Laboratoire d Informatique de Paris Nord, Université Paris Nord, France Institute
More informationProblems for MATH-6300 Complex Analysis
Problems for MATH-63 Complex Analysis Gregor Kovačič December, 7 This list will change as the semester goes on. Please make sure you always have the newest version of it.. Prove the following Theorem For
More informationAnalysis Comprehensive Exam, January 2011 Instructions: Do as many problems as you can. You should attempt to answer completely some questions in both
Analysis Comprehensive Exam, January 2011 Instructions: Do as many problems as you can. You should attempt to answer completely some questions in both real and complex analysis. You have 3 hours. Real
More informationRENEWAL THEORY IN ANALYSIS OF TRIES AND STRINGS: EXTENDED ABSTRACT
RENEWAL THEORY IN ANALYSIS OF TRIES AND STRINGS: EXTENDED ABSTRACT SVANTE JANSON Abstract. We give a survey of a number of simple applications of renewal theory to problems on random strings, in particular
More informationMORE NOTES FOR MATH 823, FALL 2007
MORE NOTES FOR MATH 83, FALL 007 Prop 1.1 Prop 1. Lemma 1.3 1. The Siegel upper half space 1.1. The Siegel upper half space and its Bergman kernel. The Siegel upper half space is the domain { U n+1 z C
More informationOn Tricomi and Hermite-Tricomi Matrix Functions of Complex Variable
Communications in Mathematics and Applications Volume (0), Numbers -3, pp. 97 09 RGN Publications http://www.rgnpublications.com On Tricomi and Hermite-Tricomi Matrix Functions of Complex Variable A. Shehata
More informationSusceptible-Infective-Removed Epidemics and Erdős-Rényi random
Susceptible-Infective-Removed Epidemics and Erdős-Rényi random graphs MSR-Inria Joint Centre October 13, 2015 SIR epidemics: the Reed-Frost model Individuals i [n] when infected, attempt to infect all
More informationLIMITING DISTRIBUTIONS FOR THE NUMBER OF INVERSIONS IN LABELLED TREE FAMILIES
LIMITING DISTRIBUTIONS FOR THE NUMBER OF INVERSIONS IN LABELLED TREE FAMILIES ALOIS PANHOLZER AND GEORG SEITZ Abstract. We consider so-called simple families of labelled trees, which contain, e.g., ordered,
More informationProperties of Entire Functions
Properties of Entire Functions Generalizing Results to Entire Functions Our main goal is still to show that every entire function can be represented as an everywhere convergent power series in z. So far
More informationP (A G) dp G P (A G)
First homework assignment. Due at 12:15 on 22 September 2016. Homework 1. We roll two dices. X is the result of one of them and Z the sum of the results. Find E [X Z. Homework 2. Let X be a r.v.. Assume
More informationAverage Case Analysis of the Boyer-Moore Algorithm
Average Case Analysis of the Boyer-Moore Algorithm TSUNG-HSI TSAI Institute of Statistical Science Academia Sinica Taipei 115 Taiwan e-mail: chonghi@stat.sinica.edu.tw URL: http://www.stat.sinica.edu.tw/chonghi/stat.htm
More informationThe number of inversions in permutations: A saddle point approach
The number of inversions in permutations: A saddle point approach Guy Louchard and Helmut Prodinger November 4, 22 Abstract Using the saddle point method, we obtain from the generating function of the
More informationPart IA Probability. Definitions. Based on lectures by R. Weber Notes taken by Dexter Chua. Lent 2015
Part IA Probability Definitions Based on lectures by R. Weber Notes taken by Dexter Chua Lent 2015 These notes are not endorsed by the lecturers, and I have modified them (often significantly) after lectures.
More information1 Exercises for lecture 1
1 Exercises for lecture 1 Exercise 1 a) Show that if F is symmetric with respect to µ, and E( X )
More information11 COMPLEX ANALYSIS IN C. 1.1 Holomorphic Functions
11 COMPLEX ANALYSIS IN C 1.1 Holomorphic Functions A domain Ω in the complex plane C is a connected, open subset of C. Let z o Ω and f a map f : Ω C. We say that f is real differentiable at z o if there
More informationMath 220A Homework 4 Solutions
Math 220A Homework 4 Solutions Jim Agler 26. (# pg. 73 Conway). Prove the assertion made in Proposition 2. (pg. 68) that g is continuous. Solution. We wish to show that if g : [a, b] [c, d] C is a continuous
More informationMod-φ convergence I: examples and probabilistic estimates
Mod-φ convergence I: examples and probabilistic estimates Valentin Féray (joint work with Pierre-Loïc Méliot and Ashkan Nikeghbali) Institut für Mathematik, Universität Zürich Summer school in Villa Volpi,
More informationthe electronic journal of combinatorics 4 (997), #R7 2 (unbiased) coin tossing process by Prodinger [9] (cf. also []), who provided the rst non-trivia
ANALYSIS OF AN ASYMMETRIC LEADER ELECTION ALGORITHM Svante Janson Wojciech Szpankowski Department of Mathematics Department of Computer Science Uppsala University Purdue University 756 Uppsala W. Lafayette,
More informationAnalytic Pattern Matching: From DNA to Twitter. AxA Workshop, Venice, 2016 Dedicated to Alberto Apostolico
Analytic Pattern Matching: From DNA to Twitter Wojciech Szpankowski Purdue University W. Lafayette, IN 47907 June 19, 2016 AxA Workshop, Venice, 2016 Dedicated to Alberto Apostolico Joint work with Philippe
More informationAn example of generalization of the Bernoulli numbers and polynomials to any dimension
An example of generalization of the Bernoulli numbers and polynomials to any dimension Olivier Bouillot, Villebon-Georges Charpak institute, France C.A.L.I.N. team seminary. Tuesday, 29 th March 26. Introduction
More informationDiscrete Distributions
A simplest example of random experiment is a coin-tossing, formally called Bernoulli trial. It happens to be the case that many useful distributions are built upon this simplest form of experiment, whose
More informationComplex Analysis Qualifying Exam Solutions
Complex Analysis Qualifying Exam Solutions May, 04 Part.. Let log z be the principal branch of the logarithm defined on G = {z C z (, 0]}. Show that if t > 0, then the equation log z = t has exactly one
More informationThe result above is known as the Riemann mapping theorem. We will prove it using basic theory of normal families. We start this lecture with that.
Lecture 15 The Riemann mapping theorem Variables MATH-GA 2451.1 Complex The point of this lecture is to prove that the unit disk can be mapped conformally onto any simply connected open set in the plane,
More informationDepartment of Mathematics, University of California, Berkeley. GRADUATE PRELIMINARY EXAMINATION, Part A Fall Semester 2016
Department of Mathematics, University of California, Berkeley YOUR 1 OR 2 DIGIT EXAM NUMBER GRADUATE PRELIMINARY EXAMINATION, Part A Fall Semester 2016 1. Please write your 1- or 2-digit exam number on
More informationThe Subtree Size Profile of Bucket Recursive Trees
Iranian Journal of Mathematical Sciences and Informatics Vol., No. (206, pp - DOI: 0.7508/ijmsi.206.0.00 The Subtree Size Profile of Bucket Recursive Trees Ramin Kazemi Department of Statistics, Imam Khomeini
More informationAsymptotic Expansions and Computation of Generalized Stirling Numbers and Generalized Stirling Functions
Illinois Wesleyan University From the SelectedWorks of Summer August 14, 2014 Asymptotic Expansions and Computation of Generalized Stirling Numbers and Generalized Stirling Functions, Illinois Wesleyan
More information6 The normal distribution, the central limit theorem and random samples
6 The normal distribution, the central limit theorem and random samples 6.1 The normal distribution We mentioned the normal (or Gaussian) distribution in Chapter 4. It has density f X (x) = 1 σ 1 2π e
More informationMinimax Redundancy for Large Alphabets by Analytic Methods
Minimax Redundancy for Large Alphabets by Analytic Methods Wojciech Szpankowski Purdue University W. Lafayette, IN 47907 March 15, 2012 NSF STC Center for Science of Information CISS, Princeton 2012 Joint
More informationarxiv: v1 [math.co] 12 Sep 2018
ON THE NUMBER OF INCREASING TREES WITH LABEL REPETITIONS arxiv:809.0434v [math.co] Sep 08 OLIVIER BODINI, ANTOINE GENITRINI, AND BERNHARD GITTENBERGER Abstract. In this paper we study a special subclass
More informationGenerating and characteristic functions. Generating and Characteristic Functions. Probability generating function. Probability generating function
Generating and characteristic functions Generating and Characteristic Functions September 3, 03 Probability generating function Moment generating function Power series expansion Characteristic function
More informationThe Subtree Size Profile of Plane-oriented Recursive Trees
The Subtree Size Profile of Plane-oriente Recursive Trees Michael FUCHS Department of Applie Mathematics National Chiao Tung University Hsinchu, 3, Taiwan Email: mfuchs@math.nctu.eu.tw Abstract In this
More informationSolutions to practice problems for the final
Solutions to practice problems for the final Holomorphicity, Cauchy-Riemann equations, and Cauchy-Goursat theorem 1. (a) Show that there is a holomorphic function on Ω = {z z > 2} whose derivative is z
More informationSolutions for Problem Set #5 due October 17, 2003 Dustin Cartwright and Dylan Thurston
Solutions for Problem Set #5 due October 17, 23 Dustin Cartwright and Dylan Thurston 1 (B&N 6.5) Suppose an analytic function f agrees with tan x, x 1. Show that f(z) = i has no solution. Could f be entire?
More informationConformal blocks in nonrational CFTs with c 1
Conformal blocks in nonrational CFTs with c 1 Eveliina Peltola Université de Genève Section de Mathématiques < eveliina.peltola@unige.ch > March 15th 2018 Based on various joint works with Steven M. Flores,
More informationMATH SPRING UC BERKELEY
MATH 85 - SPRING 205 - UC BERKELEY JASON MURPHY Abstract. These are notes for Math 85 taught in the Spring of 205 at UC Berkeley. c 205 Jason Murphy - All Rights Reserved Contents. Course outline 2 2.
More informationPart IB. Further Analysis. Year
Year 2004 2003 2002 2001 10 2004 2/I/4E Let τ be the topology on N consisting of the empty set and all sets X N such that N \ X is finite. Let σ be the usual topology on R, and let ρ be the topology on
More information5 Introduction to the Theory of Order Statistics and Rank Statistics
5 Introduction to the Theory of Order Statistics and Rank Statistics This section will contain a summary of important definitions and theorems that will be useful for understanding the theory of order
More information