Asymptotic and Exact Poissonized Variance in the Analysis of Random Digital Trees (joint with Hsien-Kuei Hwang and Vytas Zacharovas)

Size: px
Start display at page:

Download "Asymptotic and Exact Poissonized Variance in the Analysis of Random Digital Trees (joint with Hsien-Kuei Hwang and Vytas Zacharovas)"

Transcription

1 Asymptotic and Exact Poissonized Variance in the Analysis of Random Digital Trees (joint with Hsien-Kuei Hwang and Vytas Zacharovas) Michael Fuchs Institute of Applied Mathematics National Chiao Tung University June 22nd, 2017 Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

2 Digital Trees Three standard types: Trie: René de la Briandais, 1959; PATRICIA Trie: Donald R. Morrison, 1968; Digital Search Tree: Coffman and Eve, Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

3 Digital Trees Three standard types: Trie: René de la Briandais, 1959; PATRICIA Trie: Donald R. Morrison, 1968; Digital Search Tree: Coffman and Eve, Example: R 1 =0010, R 2 =0011, R 3 =1100, R 4 =1010 Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

4 Digital Trees Three standard types: Trie: René de la Briandais, 1959; PATRICIA Trie: Donald R. Morrison, 1968; Digital Search Tree: Coffman and Eve, Example: R 1 =0010, R 2 =0011, R 3 =1100, R 4 = R 4 R R 1 R 2 Trie Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

5 Digital Trees Three standard types: Trie: René de la Briandais, 1959; PATRICIA Trie: Donald R. Morrison, 1968; Digital Search Tree: Coffman and Eve, Example: R 1 =0010, R 2 =0011, R 3 =1100, R 4 = R 4 R R 1 R 2 R 4 R R 1 R 2 PATRICIA trie Trie Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

6 Digital Trees Three standard types: Trie: René de la Briandais, 1959; PATRICIA Trie: Donald R. Morrison, 1968; Digital Search Tree: Coffman and Eve, Example: R 1 =0010, R 2 =0011, R 3 =1100, R 4 = R R 4 R R 2 R 3 0 R 1 R 2 R 4 R 3 R R 1 R 2 PATRICIA trie DST Trie Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

7 Random Digital Trees Bernoulli model: Bits are iid with P(bit = 1) = p and P(bit = 0) = q := 1 p. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

8 Random Digital Trees Bernoulli model: Bits are iid with P(bit = 1) = p and P(bit = 0) = q := 1 p. Gives two types: p = 1/2: symmetric digital tree; p 1/2: asymmetric digital tree. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

9 Random Digital Trees Bernoulli model: Bits are iid with Gives two types: P(bit = 1) = p and P(bit = 0) = q := 1 p. p = 1/2: symmetric digital tree; p 1/2: asymmetric digital tree. Bernoulli model is simple and prototypical but not very realistic! J. Clément, P. Flajolet, B. Vallée (2001). Dynamical sources in information theory: A general analysis of trie structures, Algorithmica, 29:1-2, Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

10 Shape Parameters Size S n Number of internal nodes in tries; for the other two standard types the size is deterministic. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

11 Shape Parameters Size S n Number of internal nodes in tries; for the other two standard types the size is deterministic. Path Lengths L n Internal path length, external path length, total path length, weighted path length, peripheral path lengths, etc. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

12 Shape Parameters Size S n Number of internal nodes in tries; for the other two standard types the size is deterministic. Path Lengths L n Internal path length, external path length, total path length, weighted path length, peripheral path lengths, etc. Depth Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

13 Shape Parameters Size S n Number of internal nodes in tries; for the other two standard types the size is deterministic. Path Lengths L n Internal path length, external path length, total path length, weighted path length, peripheral path lengths, etc. Depth Number of leaves and patterns Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

14 Shape Parameters Size S n Number of internal nodes in tries; for the other two standard types the size is deterministic. Path Lengths L n Internal path length, external path length, total path length, weighted path length, peripheral path lengths, etc. Depth Number of leaves and patterns External and Internal Profiles Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

15 Shape Parameters Size S n Number of internal nodes in tries; for the other two standard types the size is deterministic. Path Lengths L n Internal path length, external path length, total path length, weighted path length, peripheral path lengths, etc. Depth Number of leaves and patterns External and Internal Profiles Height Etc. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

16 Additive Shape Parameters X n+b d = XIn + X n I n + T n I n d = Binomial(n, p); Root 0 1 X n d = X n ; X n, X n, (I n, T n ) independent. T n toll-function. Size: I n Size: n I n Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

17 Additive Shape Parameters X n+b d = XIn + X n I n + T n I n d = Binomial(n, p); Root 0 1 X n d = X n ; X n, X n, (I n, T n ) independent. T n toll-function. Size: I n Size: n I n Thus, moments satisfy the recurrence: n ( ) n a n+b = p j q n j (a j + a n j ) + b n. j j=0 Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

18 Two (Main) Approaches Rice-Noerlund Method: Exercise 54 in Section of Knuth s book. Developed into a systematic tool by Flajolet & Sedgewick (1986, 1995). Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

19 Two (Main) Approaches Rice-Noerlund Method: Exercise 54 in Section of Knuth s book. Developed into a systematic tool by Flajolet & Sedgewick (1986, 1995). Two-stage Approach Introduced by Jacquet & Régnier (1988). Important contributions by Jacquet & Szpankowski (1998); Flajolet, Gourdon & Dumas (1995). Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

20 Two (Main) Approaches Rice-Noerlund Method: Exercise 54 in Section of Knuth s book. Developed into a systematic tool by Flajolet & Sedgewick (1986, 1995). Two-stage Approach Introduced by Jacquet & Régnier (1988). Important contributions by Jacquet & Szpankowski (1998); Flajolet, Gourdon & Dumas (1995). Poisson-Mellin- Newton cycle: Poisson GF a n Noerlund integral f(z) Mellin transform F (s) Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

21 Rice-Noerlund Method Lemma (Noerlund) Let C be a positive oriented, closed curve encircling 0,..., n and f(z) be analytic within C. Then, n ( ) n ( 1) k f(k) = 1 n!γ( s) f(s) k 2πi C Γ(n + 1 s) ds. k=0 Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

22 Rice-Noerlund Method Lemma (Noerlund) Let C be a positive oriented, closed curve encircling 0,..., n and f(z) be analytic within C. Then, n ( ) n ( 1) k f(k) = 1 n!γ( s) f(s) k 2πi C Γ(n + 1 s) ds. k=0 For additive trie parameters: where f(s) = F ( s) Γ( s) = G( s) (1 p s q s )Γ( s). F (s) = M e z a n z n /n!; s, n 0 G(s) = M e z b n z n /n!; s. n 0 Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

23 Mean of Size in Symmetric Tries (i) We have, f(s) = (s 1)/(1 2 1 s ). Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

24 Mean of Size in Symmetric Tries (i) We have, f(s) = (s 1)/(1 2 1 s ). Theorem For n 2, E(S n ) = n log 2 1 log 2 k 0 c k n! Γ(n + χ k ) 1, where with χ k = 2kπi/(log 2). c k = χ k Γ( 1 + χ k ). Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

25 Mean of Size in Symmetric Tries (i) We have, f(s) = (s 1)/(1 2 1 s ). Theorem For n 2, E(S n ) = n log 2 1 log 2 k 0 c k n! Γ(n + χ k ) 1, where with χ k = 2kπi/(log 2). c k = χ k Γ( 1 + χ k ). Note that n! Γ(n + χ k ) n1 χ k + (1 χ k)χ k n χ k +. 2 Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

26 Mean of Size in Symmetric Tries (ii) E(S n) n (n = 1,..., 1024) Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

27 Mean of Size in Symmetric Tries (ii) E(S n) n (n = 1,..., 1024) E(S n)+1 n (n = 1,..., 1024) Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

28 Variance via Rice-Noerlund Method Symmetric digital trees: done by Kirschenhofer & Prodinger & Szpankowski in a series of papers in the beginning of 90s. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

29 Variance via Rice-Noerlund Method Symmetric digital trees: done by Kirschenhofer & Prodinger & Szpankowski in a series of papers in the beginning of 90s. Second Moment Method: Use Rice-Noerlund twice for mean and second moment. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

30 Variance via Rice-Noerlund Method Symmetric digital trees: done by Kirschenhofer & Prodinger & Szpankowski in a series of papers in the beginning of 90s. Second Moment Method: Use Rice-Noerlund twice for mean and second moment. Compute the variance via Var(X) = E(X 2 ) (E(X)) 2. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

31 Variance via Rice-Noerlund Method Symmetric digital trees: done by Kirschenhofer & Prodinger & Szpankowski in a series of papers in the beginning of 90s. Second Moment Method: Use Rice-Noerlund twice for mean and second moment. Compute the variance via Var(X) = E(X 2 ) (E(X)) 2. Here, one needs identities of Ramanjuan: e.g. for α and β with αβ = π 2, we have 1 k(e 2αk 1) 1 4 log α + α 12 k 1 = k 1 1 k(e 2βk 1) 1 4 log β + β 12 Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

32 Variance of Size in Symmetric Tries (i) Theorem (Kirschenhofer & Prodinger) We have, Var(S n ) n log 2 G( 1 + χ k )n χ k, k Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

33 Variance of Size in Symmetric Tries (i) Theorem (Kirschenhofer & Prodinger) We have, where Var(S n ) n log 2 G( 1 + χ k )n χ k, k G( 1 + χ k ) = 3χ k Γ( 1 + χ k ) χ kγ(1 + χ k ) log 2 (1 χ k )(2 χ k )Γ(χ k ) 1 2 (χ k + j) ( χ ) k j 1 (j + 1)(2 j 1) j 1 2Γ(1 + χ k ) 5 χ k 4(1 χ k ) (χ k + j + 1) ( χ k 1) j 1 (j + 1)(2 j 1) j log 2 j+m=k j,m 0 χ j Γ( 1 + χ j )χ mγ(1 + χ m). Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

34 Variance of TPL in Symmetric DSTs (i) Theorem (Kirschenhofer, Prodinger, Szpankowski) We have, Var(L n ) n(c var + P (log 2 n)), where P (z) is a 1-periodic function with zero average value. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

35 Variance of TPL in Symmetric DSTs (i) Theorem (Kirschenhofer, Prodinger, Szpankowski) We have, Var(L n ) n(c var + P (log 2 n)), where P (z) is a 1-periodic function with zero average value. To describe C var we need the following: Let L = log 2, Q j = j i=1 (1 2 i ), Q(1) = lim j Q j. Put ω(z) = 1 Γ( 1 χ l )e 2lπiz ; L ψ(z) = 1 L l 0 ( l 0 1 χ l 2 ) Γ( χ l )e 2lπiz. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

36 C var = 28 3L l 1 l2 l (2 l 1) L l 1 2 ( 1) l+1 (l 5) L (l + 1)l(l 1)(2 l 1) l 3 2Q(1) L + l l Q l 1 2 l 1 + π2 2L L ( ) ( 1) l 2 l+1 2 L(1 2 l+1 )/2 1 L 1 2 l ( 1) r+1 r(r 1)(2 r+l 1) l 1 r 2 ( ) ( 1) r 2 r+1 2 ( j j+r+l+2 1 Q r+l 2 Q r 0 r ( l 1 ( l + 1 ) 2 l+1 2l i i=2 2 (1 2 l r ) 2 + 2l + 2 (1 2 1 l r ) 2 2 L l+1 ( l + 1 ) 2 j j=2 1 2 r+j L j=0 i r+i l r + 2 l+1 ( l + 1 ) L j j=1 l+1 ( l + 1 ) ( 1) i ) j (i + 1)(2 r+j+i 1) + l 1 ( l + 1 ) Qr 2 Q l r 1 1 r 2 l 3 r=2 l Q l 2 j 1 2[ωψ] 0 [ω 2 ] 0. j l+1 ) 1 2 r+j 1 Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

37 Bernoulli and Poisson Model Bernoulli Model: Digital tree is built from n records. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

38 Bernoulli and Poisson Model Bernoulli Model: Digital tree is built from n records. Poisson Model: Digital tree is built from Poi(n) records. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

39 Bernoulli and Poisson Model Bernoulli Model: Digital tree is built from n records. Poisson Model: Digital tree is built from Poi(n) records. We have, E(X Poi(n) ) = e n j 0 E(X j ) nj j! = f 1 (n). Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

40 Bernoulli and Poisson Model Bernoulli Model: Digital tree is built from n records. Poisson Model: Digital tree is built from Poi(n) records. We have, E(X Poi(n) ) = e n j 0 E(X j ) nj j! = f 1 (n). Poisson Heuristic: f 1 (n) sufficiently smooth = E(X Poi(n) ) E(X n ). Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

41 Poisson-Charlier Expansion Let f(z) = e z n 0 a n z n n!. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

42 Poisson-Charlier Expansion Let f(z) = e z n 0 a n z n n!. Lemma (F., Hwang, Zacharovas) Let f(z) be entire, then a n = j 0 τ j (n) j! f (j) (n), where τ j (n) = n![z n ](z n) j e z. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

43 Poisson-Charlier Expansion Let f(z) = e z n 0 a n z n n!. Lemma (F., Hwang, Zacharovas) Let f(z) be entire, then a n = j 0 τ j (n) j! f (j) (n), where τ j (n) = n![z n ](z n) j e z. τ 0 (z) τ 1 (z) τ 2 (z) τ 3 (z) τ 4 (z) τ 5 (z) 1 0 n 2n 3n(n 2) 4n(5n 6) Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

44 J S -admissibility We say f(z) J S α,β if (I) Uniformly for arg(z) ɛ, f(z) = O ( z α log β z ). (O) Uniformly for ɛ < arg(z) π, f(z) := e z ( f(z) = O e (1 ɛ) z ). Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

45 J S -admissibility We say f(z) J S α,β if (I) Uniformly for arg(z) ɛ, (O) Uniformly for ɛ < arg(z) π, Theorem (Jacquet & Szpankowski) If f(z) J S α,β, then f(z) = O ( z α log β z ). f(z) := e z f(z) = O ( e (1 ɛ) z ). a n j 0 τ j (n) j! f (j) (n). Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

46 Closure Properties of J S -admissibility Proposition Let α (0, 1). (i) z m, e αz J S. (ii) If f J S, then f(αz), z m f J S. (iii) If f, g J S, then f + g J S. (iv) If f, g, then f(αz) g((1 α)z) J S. (v) If f J S, then f J S. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

47 Closure Properties of J S -admissibility Proposition Let α (0, 1). (i) z m, e αz J S. (ii) If f J S, then f(αz), z m f J S. (iii) If f, g J S, then f + g J S. (iv) If f, g, then f(αz) g((1 α)z) J S. (v) If f J S, then f J S. Proposition Let b j=0 ( b j) f(z) (j) = 2 f(z/2) + g(z). Then, g(z) J S f(z) J S. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

48 Two Stage Approach for Tries (and PATRICIA Tries) Uses first poissonization: f(z) = e z n 0 a n z n n!. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

49 Two Stage Approach for Tries (and PATRICIA Tries) Uses first poissonization: f(z) = e z n 0 a n z n n!. f(z) satisfies: f(z) = 2 f(z/2) + g(z) which is solved with the Mellin transform: F (s) = 0 f(z)z s 1 dz = G(s) s. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

50 Two Stage Approach for Tries (and PATRICIA Tries) Uses first poissonization: f(z) = e z n 0 a n z n n!. f(z) satisfies: f(z) = 2 f(z/2) + g(z) which is solved with the Mellin transform: F (s) = 0 f(z)z s 1 dz = G(s) s. Asymptotics of f(z) is obtained via inverse Mellin transform (Flajolet & Gourdon & Dumas, 1995). Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

51 Two Stage Approach for Tries (and PATRICIA Tries) Uses first poissonization: f(z) = e z n 0 a n z n n!. f(z) satisfies: f(z) = 2 f(z/2) + g(z) which is solved with the Mellin transform: F (s) = 0 f(z)z s 1 dz = G(s) s. Asymptotics of f(z) is obtained via inverse Mellin transform (Flajolet & Gourdon & Dumas, 1995). Asymptotics of a n is obtained via (analytic) depoissonization (Jacquet & Szpankowski, 1998). Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

52 Asymptotic Poissonized Variances Let f 1 (z) = e z n 0 E(X n ) zn n!, f2 (z) = e z E(Xn) 2 zn n!. n 0 Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

53 Asymptotic Poissonized Variances Let f 1 (z) = e z n 0 E(X n ) zn n!, f2 (z) = e z E(Xn) 2 zn n!. n 0 Variance of Poisson model: Ṽ 1 (n) := Var(X Poi(n) ) = f 2 (n) f 1 (n) 2. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

54 Asymptotic Poissonized Variances Let f 1 (z) = e z n 0 E(X n ) zn n!, f2 (z) = e z E(Xn) 2 zn n!. n 0 Variance of Poisson model: Ṽ 1 (n) := Var(X Poi(n) ) = f 2 (n) f 1 (n) 2. However, for many shape parameters: Var(X n ) Ṽ1(n), i.e., Poisson model unsuitable for obtaining asymptotics of the variance! Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

55 Asymptotic Poissonized Variances Let f 1 (z) = e z n 0 E(X n ) zn n!, f2 (z) = e z E(Xn) 2 zn n!. n 0 Variance of Poisson model: Ṽ 1 (n) := Var(X Poi(n) ) = f 2 (n) f 1 (n) 2. However, for many shape parameters: Var(X n ) Ṽ1(n), i.e., Poisson model unsuitable for obtaining asymptotics of the variance! F., Hwang, Zacharovas (2010): Ṽ 2 (z) := f 2 (z) f 1 (z) 2 z f 1(z) 2. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

56 Ṽ 1 (z) vs. Ṽ 2 (z) Ṽ 1 (z) Ṽ 2 (z) depth; leader/loser selection; Paper-Stone-Scissors and variants; approximate counting; corner parking; partial match queries in k-d digital trees; node profile of asymmetric digital trees. size; path length; occurrence of pattern; node profile of symmetric digital trees; Wiener and Steiner index. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

57 Variance of TPL in Symmetric DSTs (ii) Theorem (F., Hwang, Zacharovas) We, have Var(L n ) n(c var + P (log 2 n)), where P (z) is a 1-periodic function with zero average value and C var = Q(1) L j,h,l 0 ( 1) j 2 (j+1 2 ) Q j Q h Q l 2 h+l ϕ(2 j h + 2 j l ), where ϕ(x) := { (x log x 1)/(x 1) 2, if x 1; 1/2, if x = 1. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

58 C var = 28 3L l 1 l2 l (2 l 1) L l 1 2 ( 1) l+1 (l 5) L (l + 1)l(l 1)(2 l 1) l 3 2Q(1) L + l l Q l 1 2 l 1 + π2 2L L ( ) ( 1) l 2 l+1 2 L(1 2 l+1 )/2 1 L 1 2 l ( 1) r+1 r(r 1)(2 r+l 1) l 1 r 2 ( ) ( 1) r 2 r+1 2 ( j j+r+l+2 1 Q r+l 2 Q r 0 r ( l 1 ( l + 1 ) 2 l+1 2l i i=2 2 (1 2 l r ) 2 + 2l + 2 (1 2 1 l r ) 2 2 L l+1 ( l + 1 ) 2 j j=2 1 2 r+j L j=0 i r+i l r + 2 l+1 ( l + 1 ) L j j=1 l+1 ( l + 1 ) ( 1) i ) j (i + 1)(2 r+j+i 1) + l 1 ( l + 1 ) Qr 2 Q l r 1 1 r 2 l 3 r=2 l Q l 2 j 1 2[ωψ] 0 [ω 2 ] 0. j l+1 ) 1 2 r+j 1 Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

59 General Framework for Symmmetric Tries Consider X n d = XIn + X n I n + T n and let g 1 (z) = e z n 0 and W 2 (z) := g 2 (z) g 1 (z) 2 z g 1 (z). E(T n ) zn n!, g 2(z) = e z E(Tn) 2 zn n! n 0 Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

60 General Framework for Symmmetric Tries Consider X n d = XIn + X n I n + T n and let g 1 (z) = e z n 0 and W 2 (z) := g 2 (z) g 1 (z) 2 z g 1 (z). E(T n ) zn n!, g 2(z) = e z E(Tn) 2 zn n! n 0 Theorem (F., Hwang, Zacharovas) Let g 1, W 2 J S α,β with α < 1 and g 2 J S. Then, E(X n ) np 1 (log 2 n), Var(X n ) np 2 (log 2 n), where P 1, P 2 are 1-periodic, computable functions. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

61 Variance of Size in Symmetric Tries (ii) Theorem (F., Hwang, Zacharovas) We have, where Var(S n ) n log 2 G( 1 + χ k )n χ k, k G( 1 + χ k ) = χ kγ( 1 + χ k )(1 + χ k ) ( 1) j j(j(j + χ k ) 1)Γ(j + χ k ) (j + 1)!(2 j 1) j 1 with χ k = 2kπi/(log 2). Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

62 Exact Poissonized Variance Question: why not using the PGF of the variance, i.e., Ṽ (z) := e z n 0 Var(X n ) zn n!? Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

63 Exact Poissonized Variance Question: why not using the PGF of the variance, i.e., Ṽ (z) := e z n 0 Var(X n ) zn n!? Recall that Then, σ 2 n = 2 1 n where σ 2 n = Var(X n ). X n d = XIn + X n I n + T n. n ( ) n σj 2 + Var(T n ) j j=0 n ( ) n + 2 n (E(X j ) + E(X n j ) E(X n ) + E(T n )) 2, j j=0 Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

64 Poissonization of the Variance Recurrence Set W (z) := e z n 0 Var(T n ) zn n!. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

65 Poissonization of the Variance Recurrence Set Proposition We have, W (z) := e z n 0 Var(T n ) zn n!. Ṽ (z) = 2Ṽ (z/2) + W (z) + h(z), where h(z) =2( f 1 f 1 )(z/2) + 2 f 1 (z/2) 2 ( f 1 f 1 )(z) + 2( f 1 g 1 )(z) ( g 1 g 1 )(z). Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

66 Poissonization of the Variance Recurrence Set Proposition We have, W (z) := e z n 0 Var(T n ) zn n!. Ṽ (z) = 2Ṽ (z/2) + W (z) + h(z), where h(z) =2( f 1 f 1 )(z/2) + 2 f 1 (z/2) 2 ( f 1 f 1 )(z) + 2( f 1 g 1 )(z) ( g 1 g 1 )(z). Here, f g denotes the Hadamard product of f and g. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

67 Closure Property of Hadamard Product Proposition (F., Hwang, Zacharovas) If f(z) = e z n 0 are both J S -admissible, then is also J S -admissible. z n a n n!, g(z) = z n e z b n n! n 0 ( f g)(z) = e z n 0 a n b n z n n! Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

68 Closure Property of Hadamard Product Proposition (F., Hwang, Zacharovas) If f(z) = e z n 0 are both J S -admissible, then is also J S -admissible. z n a n n!, g(z) = z n e z b n n! n 0 ( f g)(z) = e z n 0 Proof uses the integral representation ( f g)(z 2 ) = e z2 ue u2 4πi 0 ξ =1 a n b n z n n! e zuξ+zu ξ f(zuξ) g(zu ξ) dξ ξ du. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

69 An IFF Condition for J S -admissibility Theorem (Jacquet) f J S iff there exists an analytic extension α(z) of a n with α(z) = O(z p ), for some p > 0, as z, in a cone {z : arg(z) ɛ}. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

70 An IFF Condition for J S -admissibility Theorem (Jacquet) f J S iff there exists an analytic extension α(z) of a n with α(z) = O(z p ), for some p > 0, as z, in a cone {z : arg(z) ɛ}. Was proved in two stages: Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

71 An IFF Condition for J S -admissibility Theorem (Jacquet) f J S iff there exists an analytic extension α(z) of a n with α(z) = O(z p ), for some p > 0, as z, in a cone {z : arg(z) ɛ}. Was proved in two stages: If : Jacquet & Szpankowski (1999); Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

72 An IFF Condition for J S -admissibility Theorem (Jacquet) f J S iff there exists an analytic extension α(z) of a n with α(z) = O(z p ), for some p > 0, as z, in a cone {z : arg(z) ɛ}. Was proved in two stages: If : Jacquet & Szpankowski (1999); Only If : Jacquet (2014). Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

73 An IFF Condition for J S -admissibility Theorem (Jacquet) f J S iff there exists an analytic extension α(z) of a n with α(z) = O(z p ), for some p > 0, as z, in a cone {z : arg(z) ɛ}. Was proved in two stages: If : Jacquet & Szpankowski (1999); Only If : Jacquet (2014). Corollary If f, g are J S -admissible, then f g is J S -admissible. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

74 Asymptotic Expansion for Hadamard Product Theorem If f, g J S, then ( f g)(z) n 0 z k k! f (k) (z) g (k) (z). Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

75 Asymptotic Expansion for Hadamard Product Theorem If f, g J S, then ( f g)(z) n 0 z k k! f (k) (z) g (k) (z). We have, where with Ṽ (z) = 2Ṽ (z/2) + W (z) + h(z), h(z) k 2 c ( k z ) k (k) f 1 (z/2) 2 k! 2 c k = 2(1 2 1 k ). Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

76 General Framework for Symmetric Tries - Revisited d Recall: X n = XIn + Xn I n + T n. Theorem (F., Hwang, Zacharovas) Let g 1, W 2 J S α,β with α < 1 and g 2 J S. Then, E(X n ) np 1 (log 2 n), Var(X n ) np 2 (log 2 n), where P 1, P 2 are 1-periodic, computable functions. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

77 General Framework for Symmetric Tries - Revisited d Recall: X n = XIn + Xn I n + T n. Theorem (F., Hwang, Zacharovas) Let g 1, W 2 J S α,β with α < 1 and g 2 J S. Then, E(X n ) np 1 (log 2 n), Var(X n ) np 2 (log 2 n), where P 1, P 2 are 1-periodic, computable functions. Theorem Let g 1, W J S α,β with α < 1. Then, E(X n ) np 1 (log 2 n), Var(X n ) np 2 (log 2 n), where P 1, P 2 are 1-periodic, computable functions. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

78 Variance of Size in Symmetric Tries (iii) Theorem We have, where Var(S n ) 1 log 2 P 1(n) 1 1 log 2 2 k! P k(n), k 2 P k (n) = l d k,l n! Γ(n + k 1 + χ l ) with d 1,l as before and for k 2 d k,l = j χ j Γ(k 1 + χ j )χ l j Γ(k 1 + χ l j ). Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

79 Variance of Size in Symmetric Tries (iii) Theorem We have, where Var(S n ) 1 log 2 P 1(n) 1 1 log 2 2 k! P k(n), k 2 P k (n) = l d k,l n! Γ(n + k 1 + χ l ) with d 1,l as before and for k 2 d k,l = j χ j Γ(k 1 + χ j )χ l j Γ(k 1 + χ l j ). Remark: Similar results for other (additive) shape parameters of symmetric tries and PATRICIA tries. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

80 Identity for Hadamard Product Theorem Under assumptions which include J S -admissibility, we have ( f g)(z) = k 0 z k k! f (k) (z) g (k) (z). Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

81 Identity for Hadamard Product Theorem Under assumptions which include J S -admissibility, we have ( f g)(z) = k 0 z k k! f (k) (z) g (k) (z). Equivalently, we have: ( )( τ j (n) f (j) (n) j! j 0 = j 0 j 0 ) τ j (n) g (j) (n) j! ( ) (j) τ j (n) n k j! k! f (k) (n) g(k)(n). k 0 Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

82 A Quick Proof (i) Let f(z) = A m m! zm, g(z) = B m m! zm. m 0 m 0 Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

83 A Quick Proof (i) Let Then, f(z) = A m m! zm, g(z) = B m m! zm. m 0 m 0 ( j 0 τ j (n) j! = j 0 f (j) (n) )( j 0 ) τ j (n) g (j) (n) j! ( τ j (n) n k j! k! f (k) (n) g(k)(n) k 0 ) (j) can be rewritten to ( ( ) )( n A m m 0 m n 0 m n ( ) n )B m = n![z n ]e z z k m k! f (k) (z) g (k) (z). k 0 Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

84 A Quick Proof (ii) Note that n![z n ]e z k! f (k) (z) g (k) (z) = n! 1 k! [zn ]z k e z f (k) (z) g (k) (z) k 0 k 0 z k Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

85 A Quick Proof (ii) Note that z k n![z n ]e z k! f (k) (z) g (k) (z) = n! k 0 k 0 1 = n! k! 0 k n i 1 +i 2 +i 3 =n k 1 k! [zn ]z k e z f (k) (z) g (k) (z) A i2 +kb i3 +k i 1!i 2!i 3! Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

86 A Quick Proof (ii) Note that z k n![z n ]e z k! f (k) (z) g (k) (z) = n! k 0 k 0 1 = n! k! = 0 k n ( 0 m n i 1 +i 2 +i 3 =n k ( ) n m A m )( 1 k! [zn ]z k e z f (k) (z) g (k) (z) A i2 +kb i3 +k i 1!i 2!i 3! ( ) n )B m m 0 m n Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

87 A Quick Proof (ii) Note that z k n![z n ]e z k! f (k) (z) g (k) (z) = n! k 0 k 0 1 = n! k! = 0 k n ( 0 m n and this is true since ( )( ) n n = s t 0 k n i 1 +i 2 +i 3 =n k ( ) n m A m )( 1 k! [zn ]z k e z f (k) (z) g (k) (z) A i2 +kb i3 +k i 1!i 2!i 3! ( ) n )B m m 0 m n ( )( n n k ) k s k, t k, n + k s t which counts twice the number of ways of choosing a set of size s and t from a set of size n. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

88 Exact vs. Asymptotic Poissonized Variance Recall Ṽ (z) = e z n 0 Var(X n ) zn n!. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

89 Exact vs. Asymptotic Poissonized Variance Recall Ṽ (z) = e z n 0 Var(X n ) zn n!. Corollary We have, Ṽ (z) = f 2 (z) k 0 z k (k) f 1 (z) 2. k! Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

90 Exact vs. Asymptotic Poissonized Variance Recall Corollary We have, Ṽ (z) = e z n 0 Ṽ (z) = f 2 (z) k 0 Var(X n ) zn n!. z k (k) f 1 (z) 2. k! This gives: Ṽ (z) = f 2 (z) f 1 (z) 2 z }{{} f 1(z) 2 =Ṽ1(z) } {{ } =Ṽ2(z) z2 2 f 1 (z) 2 Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

91 Summary Poisson-Mellin- Newton cycle: Poisson GF a n Noerlund integral f(z) Mellin transform F (s) Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

92 Summary Poisson-Mellin- Newton cycle: Poisson GF a n Noerlund integral f(z) Mellin transform F (s) We used exact poissonized variance in contrast to asymptotic poissonized variances. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

93 Summary Poisson-Mellin- Newton cycle: Poisson GF a n Noerlund integral f(z) Mellin transform F (s) We used exact poissonized variance in contrast to asymptotic poissonized variances. This yields general frameworks for asymptotics of mean and variance of additive shape parameter in tries and PATRICIA tries under natural conditions. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

94 Summary Poisson-Mellin- Newton cycle: Poisson GF a n Noerlund integral f(z) Mellin transform F (s) We used exact poissonized variance in contrast to asymptotic poissonized variances. This yields general frameworks for asymptotics of mean and variance of additive shape parameter in tries and PATRICIA tries under natural conditions. This also yields full asymptotic expansions of the variance for symmetric tries and PATRICIA tries. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

95 Inverse Mellin and De-poissonization Combined Formally, we have a n = n! e z f(z) 2πi z =r z n+1 Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

96 Inverse Mellin and De-poissonization Combined Formally, we have a n = n! 2πi = n! 2πi z =r z =r e z f(z) z n+1 e z z n+1 ( 1 2πi (c) F (s)z s ds ) dz Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

97 Inverse Mellin and De-poissonization Combined Formally, we have a n = n! 2πi = n! 2πi = n! 2πi z =r e z f(z) z n+1 e z z =r z n+1 (c) ( 1 2πi ( 1 F (s) 2πi (c) z =r F (s)z s ds ) e z z n s 1 dz dz ) ds Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

98 Inverse Mellin and De-poissonization Combined Formally, we have a n = n! 2πi = n! 2πi = n! 2πi = 1 2πi z =r e z f(z) z n+1 e z z =r z n+1 (c) (c) ( 1 2πi ( 1 F (s) 2πi F (s) Γ(s) (c) z =r n!γ(s) Γ(n s) ds F (s)z s ds ) e z z n s 1 dz dz ) ds Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

99 Inverse Mellin and De-poissonization Combined Formally, we have a n = n! 2πi = n! 2πi = n! 2πi = 1 2πi z =r e z f(z) z n+1 e z z =r z n+1 (c) (c) ( 1 2πi ( 1 F (s) 2πi F (s) Γ(s) (c) z =r n!γ(s) Γ(n s) ds which after s s is the Noerlund integral. F (s)z s ds ) e z z n s 1 dz dz ) ds Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

100 Inverse Mellin and De-poissonization Combined Formally, we have a n = n! 2πi = n! 2πi = n! 2πi = 1 2πi z =r e z f(z) z n+1 e z z =r z n+1 (c) (c) ( 1 2πi ( 1 F (s) 2πi F (s) Γ(s) (c) z =r n!γ(s) Γ(n s) ds which after s s is the Noerlund integral. F (s)z s ds ) e z z n s 1 dz Remark: justification needs e.g. polynomial growth of F ( s)/γ( s)! dz ) ds Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

101 Variance of Size in Symmetric Tries (iv) Recall Ṽ (z) = 2Ṽ (z/2) + h(z) where h(z) = k 2 c ( k z ) k (k) f 1 (z/2) 2. k! 2 Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

102 Variance of Size in Symmetric Tries (iv) Recall Ṽ (z) = 2Ṽ (z/2) + h(z) where For the size: h(z) = j,l 1 h(z) = k 2 2 j+l 2 e z 2 j z 2 l k 2 c ( k z ) k (k) f 1 (z/2) 2. k! 2 2 (j+l 1)k c ( k z k z ) ( z ) k! 2 j k l k + 1 Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

103 Variance of Size in Symmetric Tries (iv) Recall Ṽ (z) = 2Ṽ (z/2) + h(z) where For the size: h(z) = j,l 1 h(z) = k 2 2 j+l 2 e z 2 j z 2 l k 2 c ( k z ) k (k) f 1 (z/2) 2. k! 2 2 (j+l 1)k c ( k z k z ) ( z ) k! 2 j k l k + 1 From this one obtains an explicit expression for the Mellin transform! Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

104 Variance of Size in Symmetric Tries (iv) Recall Ṽ (z) = 2Ṽ (z/2) + h(z) where For the size: h(z) = j,l 1 h(z) = k 2 2 j+l 2 e z 2 j z 2 l k 2 c ( k z ) k (k) f 1 (z/2) 2. k! 2 2 (j+l 1)k c ( k z k z ) ( z ) k! 2 j k l k + 1 From this one obtains an explicit expression for the Mellin transform! Lemma M [ h(z); s]/γ( s) is of polynomial growth on R(s) > 0. Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

105 Variance of Size in Symmetric Tries (v) Start with: 1 2πi (3/2) M [ h(z); s] n!γ( s) (1 2 1 s )Γ( s) Γ(n + 1 s) Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

106 Variance of Size in Symmetric Tries (v) Start with: 1 2πi (3/2) M [ h(z); s] n!γ( s) (1 2 1 s )Γ( s) Γ(n + 1 s) Moving the line of integration to: Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

107 Variance of Size in Symmetric Tries (v) Start with: 1 2πi (3/2) M [ h(z); s] n!γ( s) (1 2 1 s )Γ( s) Γ(n + 1 s) Moving the line of integration to: + : gives Var(S n ); Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

108 Variance of Size in Symmetric Tries (v) Start with: 1 2πi (3/2) M [ h(z); s] n!γ( s) (1 2 1 s )Γ( s) Γ(n + 1 s) Moving the line of integration to: + : gives Var(S n ); inside (0, 1): gives main term in the asymptotics of Var(S n ). Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

109 Variance of Size in Symmetric Tries (v) Start with: 1 2πi (3/2) M [ h(z); s] n!γ( s) (1 2 1 s )Γ( s) Γ(n + 1 s) Moving the line of integration to: + : gives Var(S n ); inside (0, 1): gives main term in the asymptotics of Var(S n ). Rice-Noerlund method for variance without cancellations! Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

110 Variance of Size in Symmetric Tries (v) Start with: 1 2πi (3/2) M [ h(z); s] n!γ( s) (1 2 1 s )Γ( s) Γ(n + 1 s) Moving the line of integration to: + : gives Var(S n ); inside (0, 1): gives main term in the asymptotics of Var(S n ). Rice-Noerlund method for variance without cancellations! Longer expansions by moving the line beyond the imaginary axis but for this we need polynomial growth beyond R(s) > 0 Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

111 Variance of Size in Symmetric Tries (v) Start with: 1 2πi (3/2) M [ h(z); s] n!γ( s) (1 2 1 s )Γ( s) Γ(n + 1 s) Moving the line of integration to: + : gives Var(S n ); inside (0, 1): gives main term in the asymptotics of Var(S n ). Rice-Noerlund method for variance without cancellations! Longer expansions by moving the line beyond the imaginary axis but for this we need polynomial growth beyond R(s) > 0 tameness of M [ h(z); s]/γ( s)? (Vallée; 2017) Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

112 Open Problems How to show e.g. Var(S n ) 1 log 2 P 1(n) 1 1 log 2 2 k! P k(n) k 2 via the Rice-Noerlund method? Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

113 Open Problems How to show e.g. Var(S n ) 1 log 2 P 1(n) 1 1 log 2 2 k! P k(n) k 2 via the Rice-Noerlund method? Does the above hold as identity? Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

114 Open Problems How to show e.g. Var(S n ) 1 log 2 P 1(n) 1 1 log 2 2 k! P k(n) k 2 via the Rice-Noerlund method? Does the above hold as identity? For this one would need polynomial growth of M [ h(z); s]/γ( s) on C (when staying uniformly away from the singularities). Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

115 Open Problems How to show e.g. Var(S n ) 1 log 2 P 1(n) 1 1 log 2 2 k! P k(n) k 2 via the Rice-Noerlund method? Does the above hold as identity? For this one would need polynomial growth of M [ h(z); s]/γ( s) on C (when staying uniformly away from the singularities). Conditions on T n X n d = XIn + X n I n + T n such that Var(X n ) can be obtained with Rice-Noerlund method? Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

116 Open Problems How to show e.g. Var(S n ) 1 log 2 P 1(n) 1 1 log 2 2 k! P k(n) k 2 via the Rice-Noerlund method? Does the above hold as identity? For this one would need polynomial growth of M [ h(z); s]/γ( s) on C (when staying uniformly away from the singularities). Conditions on T n X n d = XIn + X n I n + T n such that Var(X n ) can be obtained with Rice-Noerlund method? B. Vallée has a general framework for mean but how about variance? Michael Fuchs (NCTU) Poissonized Variance June 22nd, / 40

Approximate Counting via the Poisson-Laplace-Mellin Method (joint with Chung-Kuei Lee and Helmut Prodinger)

Approximate Counting via the Poisson-Laplace-Mellin Method (joint with Chung-Kuei Lee and Helmut Prodinger) Approximate Counting via the Poisson-Laplace-Mellin Method (joint with Chung-Kuei Lee and Helmut Prodinger) Michael Fuchs Department of Applied Mathematics National Chiao Tung University Hsinchu, Taiwan

More information

Dependence between Path Lengths and Size in Random Trees (joint with H.-H. Chern, H.-K. Hwang and R. Neininger)

Dependence between Path Lengths and Size in Random Trees (joint with H.-H. Chern, H.-K. Hwang and R. Neininger) Dependence between Path Lengths and Size in Random Trees (joint with H.-H. Chern, H.-K. Hwang and R. Neininger) Michael Fuchs Institute of Applied Mathematics National Chiao Tung University Hsinchu, Taiwan

More information

Asymptotic variance of random symmetric digital search trees

Asymptotic variance of random symmetric digital search trees Discrete Mathematics and Theoretical Computer Science DMTCS vol. :,, 3 66 Asymptotic variance of random symmetric digital search trees Hsien-Kuei Hwang, Michael Fuchs and Vytas Zacharovas Institute of

More information

The variance for partial match retrievals in k-dimensional bucket digital trees

The variance for partial match retrievals in k-dimensional bucket digital trees The variance for partial match retrievals in k-dimensional ucket digital trees Michael FUCHS Department of Applied Mathematics National Chiao Tung University January 12, 21 Astract The variance of partial

More information

ROSENA R.X. DU AND HELMUT PRODINGER. Dedicated to Philippe Flajolet ( )

ROSENA R.X. DU AND HELMUT PRODINGER. Dedicated to Philippe Flajolet ( ) ON PROTECTED NODES IN DIGITAL SEARCH TREES ROSENA R.X. DU AND HELMUT PRODINGER Dedicated to Philippe Flajolet (98 2) Abstract. Recently, 2-protected nodes were studied in the context of ordered trees and

More information

The Subtree Size Profile of Plane-oriented Recursive Trees

The Subtree Size Profile of Plane-oriented Recursive Trees The Subtree Size Profile of Plane-oriented Recursive Trees Michael Fuchs Department of Applied Mathematics National Chiao Tung University Hsinchu, Taiwan ANALCO11, January 22nd, 2011 Michael Fuchs (NCTU)

More information

A Note on a Problem Posed by D. E. Knuth on a Satisfiability Recurrence

A Note on a Problem Posed by D. E. Knuth on a Satisfiability Recurrence A Note on a Problem Posed by D. E. Knuth on a Satisfiability Recurrence Dedicated to Philippe Flajolet 1948-2011 July 4, 2013 Philippe Jacquet Charles Knessl 1 Wojciech Szpankowski 2 Bell Labs Dept. Math.

More information

Forty years of tree enumeration

Forty years of tree enumeration October 24, 206 Canada John Moon (Alberta) Counting labelled trees Canadian mathematical monographs What is our subject? Asymptotic enumeration or Probabilistic combinatorics? What is our subject? Asymptotic

More information

Analytic Depoissonization and Its Applications

Analytic Depoissonization and Its Applications Analytic Depoissonization and Its Applications W. Szpankowski Department of Computer Science Purdue University W. Lafayette, IN 47907 April 29, 2008 AofA and IT logos This research is supported by NSF

More information

The Moments of the Profile in Random Binary Digital Trees

The Moments of the Profile in Random Binary Digital Trees Journal of mathematics and computer science 6(2013)176-190 The Moments of the Profile in Random Binary Digital Trees Ramin Kazemi and Saeid Delavar Department of Statistics, Imam Khomeini International

More information

On the number of subtrees on the fringe of random trees (partly joint with Huilan Chang)

On the number of subtrees on the fringe of random trees (partly joint with Huilan Chang) On the number of subtrees on the fringe of random trees (partly joint with Huilan Chang) Michael Fuchs Institute of Applied Mathematics National Chiao Tung University Hsinchu, Taiwan April 16th, 2008 Michael

More information

PROBABILISTIC BEHAVIOR OF ASYMMETRIC LEVEL COMPRESSED TRIES

PROBABILISTIC BEHAVIOR OF ASYMMETRIC LEVEL COMPRESSED TRIES PROBABILISTIC BEAVIOR OF ASYMMETRIC LEVEL COMPRESSED TRIES Luc Devroye Wojcieh Szpankowski School of Computer Science Department of Computer Sciences McGill University Purdue University 3450 University

More information

Combinatorial/probabilistic analysis of a class of search-tree functionals

Combinatorial/probabilistic analysis of a class of search-tree functionals Combinatorial/probabilistic analysis of a class of search-tree functionals Jim Fill jimfill@jhu.edu http://www.mts.jhu.edu/ fill/ Mathematical Sciences The Johns Hopkins University Joint Statistical Meetings;

More information

Analytic Depoissonization and Its Applications Λ

Analytic Depoissonization and Its Applications Λ Analytic Depoissonization and Its Applications Λ W. Szpankowski y Department of Computer Science Purdue University W. Lafayette, IN 47907 May 31, 2003 Λ This research is supported by NSF and NIH. y Joint

More information

NUMBER OF SYMBOL COMPARISONS IN QUICKSORT

NUMBER OF SYMBOL COMPARISONS IN QUICKSORT NUMBER OF SYMBOL COMPARISONS IN QUICKSORT Brigitte Vallée (CNRS and Université de Caen, France) Joint work with Julien Clément, Jim Fill and Philippe Flajolet Plan of the talk. Presentation of the study

More information

Probabilistic analysis of the asymmetric digital search trees

Probabilistic analysis of the asymmetric digital search trees Int. J. Nonlinear Anal. Appl. 6 2015 No. 2, 161-173 ISSN: 2008-6822 electronic http://dx.doi.org/10.22075/ijnaa.2015.266 Probabilistic analysis of the asymmetric digital search trees R. Kazemi a,, M. Q.

More information

From the Discrete to the Continuous, and Back... Philippe Flajolet INRIA, France

From the Discrete to the Continuous, and Back... Philippe Flajolet INRIA, France From the Discrete to the Continuous, and Back... Philippe Flajolet INRIA, France 1 Discrete structures in... Combinatorial mathematics Computer science: data structures & algorithms Information and communication

More information

AVERAGE-CASE ANALYSIS OF COUSINS IN m-ary TRIES

AVERAGE-CASE ANALYSIS OF COUSINS IN m-ary TRIES J. Appl. Prob. 45, 888 9 (28) Printed in England Applied Probability Trust 28 AVERAGE-CASE ANALYSIS OF COUSINS IN m-ary TRIES HOSAM M. MAHMOUD, The George Washington University MARK DANIEL WARD, Purdue

More information

MOMENTS OF HYPERGEOMETRIC HURWITZ ZETA FUNCTIONS

MOMENTS OF HYPERGEOMETRIC HURWITZ ZETA FUNCTIONS MOMENTS OF HYPERGEOMETRIC HURWITZ ZETA FUNCTIONS ABDUL HASSEN AND HIEU D. NGUYEN Abstract. This paper investigates a generalization the classical Hurwitz zeta function. It is shown that many of the properties

More information

LAWS OF LARGE NUMBERS AND TAIL INEQUALITIES FOR RANDOM TRIES AND PATRICIA TREES

LAWS OF LARGE NUMBERS AND TAIL INEQUALITIES FOR RANDOM TRIES AND PATRICIA TREES LAWS OF LARGE NUMBERS AND TAIL INEQUALITIES FOR RANDOM TRIES AND PATRICIA TREES Luc Devroye School of Computer Science McGill University Montreal, Canada H3A 2K6 luc@csmcgillca June 25, 2001 Abstract We

More information

Digital Trees and Memoryless Sources: from Arithmetics to Analysis

Digital Trees and Memoryless Sources: from Arithmetics to Analysis Digital Trees and Memoryless Sources: from Arithmetics to Analysis Philippe Flajolet, Mathieu Roux, Brigitte Vallée AofA 2010, Wien 1 What is a digital tree, aka TRIE? = a data structure for dynamic dictionaries

More information

EXPECTED WORST-CASE PARTIAL MATCH IN RANDOM QUADTRIES

EXPECTED WORST-CASE PARTIAL MATCH IN RANDOM QUADTRIES EXPECTED WORST-CASE PARTIAL MATCH IN RANDOM QUADTRIES Luc Devroye School of Computer Science McGill University Montreal, Canada H3A 2K6 luc@csmcgillca Carlos Zamora-Cura Instituto de Matemáticas Universidad

More information

Growing and Destroying Catalan Stanley Trees

Growing and Destroying Catalan Stanley Trees Discrete Mathematics and Theoretical Computer Science DMTCS vol. 20:1, 2018, #11 Growing and Destroying Catalan Stanley Trees Benjamin Hackl 1 Helmut Prodinger 2 arxiv:1704.03734v3 [math.co] 26 Feb 2018

More information

Networks: Lectures 9 & 10 Random graphs

Networks: Lectures 9 & 10 Random graphs Networks: Lectures 9 & 10 Random graphs Heather A Harrington Mathematical Institute University of Oxford HT 2017 What you re in for Week 1: Introduction and basic concepts Week 2: Small worlds Week 3:

More information

Notes by Zvi Rosen. Thanks to Alyssa Palfreyman for supplements.

Notes by Zvi Rosen. Thanks to Alyssa Palfreyman for supplements. Lecture: Hélène Barcelo Analytic Combinatorics ECCO 202, Bogotá Notes by Zvi Rosen. Thanks to Alyssa Palfreyman for supplements.. Tuesday, June 2, 202 Combinatorics is the study of finite structures that

More information

NUMBER OF SYMBOL COMPARISONS IN QUICKSORT AND QUICKSELECT

NUMBER OF SYMBOL COMPARISONS IN QUICKSORT AND QUICKSELECT NUMBER OF SYMBOL COMPARISONS IN QUICKSORT AND QUICKSELECT Brigitte Vallée (CNRS and Université de Caen, France) Joint work with Julien Clément, Jim Fill and Philippe Flajolet Plan of the talk. Presentation

More information

Multiple Choice Tries and Distributed Hash Tables

Multiple Choice Tries and Distributed Hash Tables Multiple Choice Tries and Distributed Hash Tables Luc Devroye and Gabor Lugosi and Gahyun Park and W. Szpankowski January 3, 2007 McGill University, Montreal, Canada U. Pompeu Fabra, Barcelona, Spain U.

More information

Jacobi-Angelesco multiple orthogonal polynomials on an r-star

Jacobi-Angelesco multiple orthogonal polynomials on an r-star M. Leurs Jacobi-Angelesco m.o.p. 1/19 Jacobi-Angelesco multiple orthogonal polynomials on an r-star Marjolein Leurs, (joint work with Walter Van Assche) Conference on Orthogonal Polynomials and Holomorphic

More information

Everything You Always Wanted to Know about Quicksort, but Were Afraid to Ask. Marianne Durand

Everything You Always Wanted to Know about Quicksort, but Were Afraid to Ask. Marianne Durand Algorithms Seminar 200 2002, F. Chyzak (ed., INRIA, (2003, pp. 57 62. Available online at the URL http://algo.inria.fr/seminars/. Everything You Always Wanted to Know about Quicksort, but Were Afraid to

More information

Analytic Information Theory: From Shannon to Knuth and Back. Knuth80: Piteaa, Sweden, 2018 Dedicated to Don E. Knuth

Analytic Information Theory: From Shannon to Knuth and Back. Knuth80: Piteaa, Sweden, 2018 Dedicated to Don E. Knuth Analytic Information Theory: From Shannon to Knuth and Back Wojciech Szpankowski Center for Science of Information Purdue University January 7, 2018 Knuth80: Piteaa, Sweden, 2018 Dedicated to Don E. Knuth

More information

Applications of Analytic Combinatorics in Mathematical Biology (joint with H. Chang, M. Drmota, E. Y. Jin, and Y.-W. Lee)

Applications of Analytic Combinatorics in Mathematical Biology (joint with H. Chang, M. Drmota, E. Y. Jin, and Y.-W. Lee) Applications of Analytic Combinatorics in Mathematical Biology (joint with H. Chang, M. Drmota, E. Y. Jin, and Y.-W. Lee) Michael Fuchs Department of Applied Mathematics National Chiao Tung University

More information

9. Series representation for analytic functions

9. Series representation for analytic functions 9. Series representation for analytic functions 9.. Power series. Definition: A power series is the formal expression S(z) := c n (z a) n, a, c i, i =,,, fixed, z C. () The n.th partial sum S n (z) is

More information

Laws of large numbers and tail inequalities for random tries and PATRICIA trees

Laws of large numbers and tail inequalities for random tries and PATRICIA trees Journal of Computational and Applied Mathematics 142 2002 27 37 www.elsevier.com/locate/cam Laws of large numbers and tail inequalities for random tries and PATRICIA trees Luc Devroye 1 School of Computer

More information

String Complexity. Dedicated to Svante Janson for his 60 Birthday

String Complexity. Dedicated to Svante Janson for his 60 Birthday String Complexity Wojciech Szpankowski Purdue University W. Lafayette, IN 47907 June 1, 2015 Dedicated to Svante Janson for his 60 Birthday Outline 1. Working with Svante 2. String Complexity 3. Joint

More information

Digital search trees JASS

Digital search trees JASS Digital search trees Analysis of different digital trees with Rice s integrals. JASS Nicolai v. Hoyningen-Huene 28.3.2004 28.3.2004 JASS 04 - Digital search trees 1 content Tree Digital search tree: Definition

More information

13 Maximum Modulus Principle

13 Maximum Modulus Principle 3 Maximum Modulus Principle Theorem 3. (maximum modulus principle). If f is non-constant and analytic on an open connected set Ω, then there is no point z 0 Ω such that f(z) f(z 0 ) for all z Ω. Remark

More information

Stat 134 Fall 2011: Notes on generating functions

Stat 134 Fall 2011: Notes on generating functions Stat 3 Fall 0: Notes on generating functions Michael Lugo October, 0 Definitions Given a random variable X which always takes on a positive integer value, we define the probability generating function

More information

INTRODUCTION TO REAL ANALYTIC GEOMETRY

INTRODUCTION TO REAL ANALYTIC GEOMETRY INTRODUCTION TO REAL ANALYTIC GEOMETRY KRZYSZTOF KURDYKA 1. Analytic functions in several variables 1.1. Summable families. Let (E, ) be a normed space over the field R or C, dim E

More information

Considering our result for the sum and product of analytic functions, this means that for (a 0, a 1,..., a N ) C N+1, the polynomial.

Considering our result for the sum and product of analytic functions, this means that for (a 0, a 1,..., a N ) C N+1, the polynomial. Lecture 3 Usual complex functions MATH-GA 245.00 Complex Variables Polynomials. Construction f : z z is analytic on all of C since its real and imaginary parts satisfy the Cauchy-Riemann relations and

More information

Partial Match Queries in Relaxed Multidimensional Search Trees 1

Partial Match Queries in Relaxed Multidimensional Search Trees 1 Algorithmica 2001 29: 181 204 DOI: 10.1007/s004530010065 Algorithmica 2001 Springer-Verlag New York Inc. Partial Match Queries in Relaxed Multidimensional Search Trees 1 C. Martínez, 2 A. Panholzer, 3

More information

Asymptotic results for silent elimination

Asymptotic results for silent elimination Discrete Mathematics and Theoretical Computer Science DMTCS vol. subm., by the authors, 1 1 Asymptotic results for silent elimination Guy Louchard 1 and Helmut Prodinger 2 1 Université Libre de Bruxelles,

More information

7 Asymptotics for Meromorphic Functions

7 Asymptotics for Meromorphic Functions Lecture G jacques@ucsd.edu 7 Asymptotics for Meromorphic Functions Hadamard s Theorem gives a broad description of the exponential growth of coefficients in power series, but the notion of exponential

More information

On rational approximation of algebraic functions. Julius Borcea. Rikard Bøgvad & Boris Shapiro

On rational approximation of algebraic functions. Julius Borcea. Rikard Bøgvad & Boris Shapiro On rational approximation of algebraic functions http://arxiv.org/abs/math.ca/0409353 Julius Borcea joint work with Rikard Bøgvad & Boris Shapiro 1. Padé approximation: short overview 2. A scheme of rational

More information

Analysis of the multiplicity matching parameter in suffix trees

Analysis of the multiplicity matching parameter in suffix trees 2005 International Conference on Analysis of Algorithms DMTCS proc. AD, 2005, 307 322 Analysis of the multiplicity matching parameter in suffix trees Mark Daniel Ward and Wojciech Szpankoski 2 Department

More information

Dirichlet s Theorem. Calvin Lin Zhiwei. August 18, 2007

Dirichlet s Theorem. Calvin Lin Zhiwei. August 18, 2007 Dirichlet s Theorem Calvin Lin Zhiwei August 8, 2007 Abstract This paper provides a proof of Dirichlet s theorem, which states that when (m, a) =, there are infinitely many primes uch that p a (mod m).

More information

Complex Variables. Cathal Ormond

Complex Variables. Cathal Ormond Complex Variables Cathal Ormond Contents 1 Introduction 3 1.1 Definition: Polar Form.............................. 3 1.2 Definition: Length................................ 3 1.3 Definitions.....................................

More information

Additive irreducibles in α-expansions

Additive irreducibles in α-expansions Publ. Math. Debrecen Manuscript Additive irreducibles in α-expansions By Peter J. Grabner and Helmut Prodinger * Abstract. The Bergman number system uses the base α = + 5 2, the digits 0 and, and the condition

More information

On the number of heaps and the cost of heap construction

On the number of heaps and the cost of heap construction On the number of heaps and the cost of heap construction Hsien-Kuei Hwang Institute of Statistical Science Academia Sinica Taipei 5 Taiwan Jean-Marc Steyaert LIX École Polytechnique 928 Palaiseau France

More information

LECTURE-13 : GENERALIZED CAUCHY S THEOREM

LECTURE-13 : GENERALIZED CAUCHY S THEOREM LECTURE-3 : GENERALIZED CAUCHY S THEOREM VED V. DATAR The aim of this lecture to prove a general form of Cauchy s theorem applicable to multiply connected domains. We end with computations of some real

More information

The Number of Inversions in Permutations: A Saddle Point Approach

The Number of Inversions in Permutations: A Saddle Point Approach 1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 6 (23), Article 3.2.8 The Number of Inversions in Permutations: A Saddle Point Approach Guy Louchard Département d Informatique CP 212, Boulevard du

More information

An Analysis of the Height of Tries with Random Weights on the Edges

An Analysis of the Height of Tries with Random Weights on the Edges An Analysis of the Height of Tries with Random Weights on the Edges N. Broutin L. Devroye September 0, 2007 Abstract We analyze the weighted height of random tries built from independent strings of i.i.d.

More information

Complex Analysis Slide 9: Power Series

Complex Analysis Slide 9: Power Series Complex Analysis Slide 9: Power Series MA201 Mathematics III Department of Mathematics IIT Guwahati August 2015 Complex Analysis Slide 9: Power Series 1 / 37 Learning Outcome of this Lecture We learn Sequence

More information

Compositions and samples of geometric random variables with constrained multiplicities

Compositions and samples of geometric random variables with constrained multiplicities FPSAC 2010, San Francisco, USA DMTCS proc. AN, 2010, 317 328 Compositions and samples of geometric random variables with constrained multiplicities Margaret Archibald 1 and Arnold Knopfmacher 2 and Toufik

More information

DISCRETE AND ALGEBRAIC STRUCTURES

DISCRETE AND ALGEBRAIC STRUCTURES DISCRETE AND ALGEBRAIC STRUCTURES Master Study Mathematics MAT40 Winter Semester 015/16 (Due to organisational reasons register for the course at TU and KFU) Edited by Mihyun Kang TU Graz Contents I Lectures

More information

< k 2n. 2 1 (n 2). + (1 p) s) N (n < 1

< k 2n. 2 1 (n 2). + (1 p) s) N (n < 1 List of Problems jacques@ucsd.edu Those question with a star next to them are considered slightly more challenging. Problems 9, 11, and 19 from the book The probabilistic method, by Alon and Spencer. Question

More information

Natural boundary and Zero distribution of random polynomials in smooth domains arxiv: v1 [math.pr] 2 Oct 2017

Natural boundary and Zero distribution of random polynomials in smooth domains arxiv: v1 [math.pr] 2 Oct 2017 Natural boundary and Zero distribution of random polynomials in smooth domains arxiv:1710.00937v1 [math.pr] 2 Oct 2017 Igor Pritsker and Koushik Ramachandran Abstract We consider the zero distribution

More information

Introduction Consider a group of n people (users, computers, objects, etc.) sharing a scarce resource (e.g., channel, CPU, etc.). The following elimin

Introduction Consider a group of n people (users, computers, objects, etc.) sharing a scarce resource (e.g., channel, CPU, etc.). The following elimin ANALYSIS OF AN ASYMMETRIC LEADER ELECTION ALGORITHM September 3, 996 Svante Janson Wojciech Szpankowski Department of Mathematics Department of Computer Science Uppsala University Purdue University 756

More information

DESTRUCTION OF VERY SIMPLE TREES

DESTRUCTION OF VERY SIMPLE TREES DESTRUCTION OF VERY SIMPLE TREES JAMES ALLEN FILL, NEVIN KAPUR, AND ALOIS PANHOLZER Abstract. We consider the total cost of cutting down a random rooted tree chosen from a family of so-called very simple

More information

arxiv: v2 [math.pr] 4 Sep 2017

arxiv: v2 [math.pr] 4 Sep 2017 arxiv:1708.08576v2 [math.pr] 4 Sep 2017 On the Speed of an Excited Asymmetric Random Walk Mike Cinkoske, Joe Jackson, Claire Plunkett September 5, 2017 Abstract An excited random walk is a non-markovian

More information

n! (k 1)!(n k)! = F (X) U(0, 1). (x, y) = n(n 1) ( F (y) F (x) ) n 2

n! (k 1)!(n k)! = F (X) U(0, 1). (x, y) = n(n 1) ( F (y) F (x) ) n 2 Order statistics Ex. 4.1 (*. Let independent variables X 1,..., X n have U(0, 1 distribution. Show that for every x (0, 1, we have P ( X (1 < x 1 and P ( X (n > x 1 as n. Ex. 4.2 (**. By using induction

More information

Gaussian vectors and central limit theorem

Gaussian vectors and central limit theorem Gaussian vectors and central limit theorem Samy Tindel Purdue University Probability Theory 2 - MA 539 Samy T. Gaussian vectors & CLT Probability Theory 1 / 86 Outline 1 Real Gaussian random variables

More information

n! (k 1)!(n k)! = F (X) U(0, 1). (x, y) = n(n 1) ( F (y) F (x) ) n 2

n! (k 1)!(n k)! = F (X) U(0, 1). (x, y) = n(n 1) ( F (y) F (x) ) n 2 Order statistics Ex. 4. (*. Let independent variables X,..., X n have U(0, distribution. Show that for every x (0,, we have P ( X ( < x and P ( X (n > x as n. Ex. 4.2 (**. By using induction or otherwise,

More information

4. Complex Analysis, Rational and Meromorphic Asymptotics

4. Complex Analysis, Rational and Meromorphic Asymptotics ANALYTIC COMBINATORICS P A R T T W O 4. Complex Analysis, Rational and Meromorphic Asymptotics http://ac.cs.princeton.edu ANALYTIC COMBINATORICS P A R T T W O Analytic Combinatorics Philippe Flajolet and

More information

Lattice paths with catastrophes

Lattice paths with catastrophes Lattice paths with catastrophes Lattice paths with catastrophes SLC 77, Strobl 12.09.2016 Cyril Banderier and Michael Wallner Laboratoire d Informatique de Paris Nord, Université Paris Nord, France Institute

More information

Problems for MATH-6300 Complex Analysis

Problems for MATH-6300 Complex Analysis Problems for MATH-63 Complex Analysis Gregor Kovačič December, 7 This list will change as the semester goes on. Please make sure you always have the newest version of it.. Prove the following Theorem For

More information

Analysis Comprehensive Exam, January 2011 Instructions: Do as many problems as you can. You should attempt to answer completely some questions in both

Analysis Comprehensive Exam, January 2011 Instructions: Do as many problems as you can. You should attempt to answer completely some questions in both Analysis Comprehensive Exam, January 2011 Instructions: Do as many problems as you can. You should attempt to answer completely some questions in both real and complex analysis. You have 3 hours. Real

More information

RENEWAL THEORY IN ANALYSIS OF TRIES AND STRINGS: EXTENDED ABSTRACT

RENEWAL THEORY IN ANALYSIS OF TRIES AND STRINGS: EXTENDED ABSTRACT RENEWAL THEORY IN ANALYSIS OF TRIES AND STRINGS: EXTENDED ABSTRACT SVANTE JANSON Abstract. We give a survey of a number of simple applications of renewal theory to problems on random strings, in particular

More information

MORE NOTES FOR MATH 823, FALL 2007

MORE NOTES FOR MATH 823, FALL 2007 MORE NOTES FOR MATH 83, FALL 007 Prop 1.1 Prop 1. Lemma 1.3 1. The Siegel upper half space 1.1. The Siegel upper half space and its Bergman kernel. The Siegel upper half space is the domain { U n+1 z C

More information

On Tricomi and Hermite-Tricomi Matrix Functions of Complex Variable

On Tricomi and Hermite-Tricomi Matrix Functions of Complex Variable Communications in Mathematics and Applications Volume (0), Numbers -3, pp. 97 09 RGN Publications http://www.rgnpublications.com On Tricomi and Hermite-Tricomi Matrix Functions of Complex Variable A. Shehata

More information

Susceptible-Infective-Removed Epidemics and Erdős-Rényi random

Susceptible-Infective-Removed Epidemics and Erdős-Rényi random Susceptible-Infective-Removed Epidemics and Erdős-Rényi random graphs MSR-Inria Joint Centre October 13, 2015 SIR epidemics: the Reed-Frost model Individuals i [n] when infected, attempt to infect all

More information

LIMITING DISTRIBUTIONS FOR THE NUMBER OF INVERSIONS IN LABELLED TREE FAMILIES

LIMITING DISTRIBUTIONS FOR THE NUMBER OF INVERSIONS IN LABELLED TREE FAMILIES LIMITING DISTRIBUTIONS FOR THE NUMBER OF INVERSIONS IN LABELLED TREE FAMILIES ALOIS PANHOLZER AND GEORG SEITZ Abstract. We consider so-called simple families of labelled trees, which contain, e.g., ordered,

More information

Properties of Entire Functions

Properties of Entire Functions Properties of Entire Functions Generalizing Results to Entire Functions Our main goal is still to show that every entire function can be represented as an everywhere convergent power series in z. So far

More information

P (A G) dp G P (A G)

P (A G) dp G P (A G) First homework assignment. Due at 12:15 on 22 September 2016. Homework 1. We roll two dices. X is the result of one of them and Z the sum of the results. Find E [X Z. Homework 2. Let X be a r.v.. Assume

More information

Average Case Analysis of the Boyer-Moore Algorithm

Average Case Analysis of the Boyer-Moore Algorithm Average Case Analysis of the Boyer-Moore Algorithm TSUNG-HSI TSAI Institute of Statistical Science Academia Sinica Taipei 115 Taiwan e-mail: chonghi@stat.sinica.edu.tw URL: http://www.stat.sinica.edu.tw/chonghi/stat.htm

More information

The number of inversions in permutations: A saddle point approach

The number of inversions in permutations: A saddle point approach The number of inversions in permutations: A saddle point approach Guy Louchard and Helmut Prodinger November 4, 22 Abstract Using the saddle point method, we obtain from the generating function of the

More information

Part IA Probability. Definitions. Based on lectures by R. Weber Notes taken by Dexter Chua. Lent 2015

Part IA Probability. Definitions. Based on lectures by R. Weber Notes taken by Dexter Chua. Lent 2015 Part IA Probability Definitions Based on lectures by R. Weber Notes taken by Dexter Chua Lent 2015 These notes are not endorsed by the lecturers, and I have modified them (often significantly) after lectures.

More information

1 Exercises for lecture 1

1 Exercises for lecture 1 1 Exercises for lecture 1 Exercise 1 a) Show that if F is symmetric with respect to µ, and E( X )

More information

11 COMPLEX ANALYSIS IN C. 1.1 Holomorphic Functions

11 COMPLEX ANALYSIS IN C. 1.1 Holomorphic Functions 11 COMPLEX ANALYSIS IN C 1.1 Holomorphic Functions A domain Ω in the complex plane C is a connected, open subset of C. Let z o Ω and f a map f : Ω C. We say that f is real differentiable at z o if there

More information

Math 220A Homework 4 Solutions

Math 220A Homework 4 Solutions Math 220A Homework 4 Solutions Jim Agler 26. (# pg. 73 Conway). Prove the assertion made in Proposition 2. (pg. 68) that g is continuous. Solution. We wish to show that if g : [a, b] [c, d] C is a continuous

More information

Mod-φ convergence I: examples and probabilistic estimates

Mod-φ convergence I: examples and probabilistic estimates Mod-φ convergence I: examples and probabilistic estimates Valentin Féray (joint work with Pierre-Loïc Méliot and Ashkan Nikeghbali) Institut für Mathematik, Universität Zürich Summer school in Villa Volpi,

More information

the electronic journal of combinatorics 4 (997), #R7 2 (unbiased) coin tossing process by Prodinger [9] (cf. also []), who provided the rst non-trivia

the electronic journal of combinatorics 4 (997), #R7 2 (unbiased) coin tossing process by Prodinger [9] (cf. also []), who provided the rst non-trivia ANALYSIS OF AN ASYMMETRIC LEADER ELECTION ALGORITHM Svante Janson Wojciech Szpankowski Department of Mathematics Department of Computer Science Uppsala University Purdue University 756 Uppsala W. Lafayette,

More information

Analytic Pattern Matching: From DNA to Twitter. AxA Workshop, Venice, 2016 Dedicated to Alberto Apostolico

Analytic Pattern Matching: From DNA to Twitter. AxA Workshop, Venice, 2016 Dedicated to Alberto Apostolico Analytic Pattern Matching: From DNA to Twitter Wojciech Szpankowski Purdue University W. Lafayette, IN 47907 June 19, 2016 AxA Workshop, Venice, 2016 Dedicated to Alberto Apostolico Joint work with Philippe

More information

An example of generalization of the Bernoulli numbers and polynomials to any dimension

An example of generalization of the Bernoulli numbers and polynomials to any dimension An example of generalization of the Bernoulli numbers and polynomials to any dimension Olivier Bouillot, Villebon-Georges Charpak institute, France C.A.L.I.N. team seminary. Tuesday, 29 th March 26. Introduction

More information

Discrete Distributions

Discrete Distributions A simplest example of random experiment is a coin-tossing, formally called Bernoulli trial. It happens to be the case that many useful distributions are built upon this simplest form of experiment, whose

More information

Complex Analysis Qualifying Exam Solutions

Complex Analysis Qualifying Exam Solutions Complex Analysis Qualifying Exam Solutions May, 04 Part.. Let log z be the principal branch of the logarithm defined on G = {z C z (, 0]}. Show that if t > 0, then the equation log z = t has exactly one

More information

The result above is known as the Riemann mapping theorem. We will prove it using basic theory of normal families. We start this lecture with that.

The result above is known as the Riemann mapping theorem. We will prove it using basic theory of normal families. We start this lecture with that. Lecture 15 The Riemann mapping theorem Variables MATH-GA 2451.1 Complex The point of this lecture is to prove that the unit disk can be mapped conformally onto any simply connected open set in the plane,

More information

Department of Mathematics, University of California, Berkeley. GRADUATE PRELIMINARY EXAMINATION, Part A Fall Semester 2016

Department of Mathematics, University of California, Berkeley. GRADUATE PRELIMINARY EXAMINATION, Part A Fall Semester 2016 Department of Mathematics, University of California, Berkeley YOUR 1 OR 2 DIGIT EXAM NUMBER GRADUATE PRELIMINARY EXAMINATION, Part A Fall Semester 2016 1. Please write your 1- or 2-digit exam number on

More information

The Subtree Size Profile of Bucket Recursive Trees

The Subtree Size Profile of Bucket Recursive Trees Iranian Journal of Mathematical Sciences and Informatics Vol., No. (206, pp - DOI: 0.7508/ijmsi.206.0.00 The Subtree Size Profile of Bucket Recursive Trees Ramin Kazemi Department of Statistics, Imam Khomeini

More information

Asymptotic Expansions and Computation of Generalized Stirling Numbers and Generalized Stirling Functions

Asymptotic Expansions and Computation of Generalized Stirling Numbers and Generalized Stirling Functions Illinois Wesleyan University From the SelectedWorks of Summer August 14, 2014 Asymptotic Expansions and Computation of Generalized Stirling Numbers and Generalized Stirling Functions, Illinois Wesleyan

More information

6 The normal distribution, the central limit theorem and random samples

6 The normal distribution, the central limit theorem and random samples 6 The normal distribution, the central limit theorem and random samples 6.1 The normal distribution We mentioned the normal (or Gaussian) distribution in Chapter 4. It has density f X (x) = 1 σ 1 2π e

More information

Minimax Redundancy for Large Alphabets by Analytic Methods

Minimax Redundancy for Large Alphabets by Analytic Methods Minimax Redundancy for Large Alphabets by Analytic Methods Wojciech Szpankowski Purdue University W. Lafayette, IN 47907 March 15, 2012 NSF STC Center for Science of Information CISS, Princeton 2012 Joint

More information

arxiv: v1 [math.co] 12 Sep 2018

arxiv: v1 [math.co] 12 Sep 2018 ON THE NUMBER OF INCREASING TREES WITH LABEL REPETITIONS arxiv:809.0434v [math.co] Sep 08 OLIVIER BODINI, ANTOINE GENITRINI, AND BERNHARD GITTENBERGER Abstract. In this paper we study a special subclass

More information

Generating and characteristic functions. Generating and Characteristic Functions. Probability generating function. Probability generating function

Generating and characteristic functions. Generating and Characteristic Functions. Probability generating function. Probability generating function Generating and characteristic functions Generating and Characteristic Functions September 3, 03 Probability generating function Moment generating function Power series expansion Characteristic function

More information

The Subtree Size Profile of Plane-oriented Recursive Trees

The Subtree Size Profile of Plane-oriented Recursive Trees The Subtree Size Profile of Plane-oriente Recursive Trees Michael FUCHS Department of Applie Mathematics National Chiao Tung University Hsinchu, 3, Taiwan Email: mfuchs@math.nctu.eu.tw Abstract In this

More information

Solutions to practice problems for the final

Solutions to practice problems for the final Solutions to practice problems for the final Holomorphicity, Cauchy-Riemann equations, and Cauchy-Goursat theorem 1. (a) Show that there is a holomorphic function on Ω = {z z > 2} whose derivative is z

More information

Solutions for Problem Set #5 due October 17, 2003 Dustin Cartwright and Dylan Thurston

Solutions for Problem Set #5 due October 17, 2003 Dustin Cartwright and Dylan Thurston Solutions for Problem Set #5 due October 17, 23 Dustin Cartwright and Dylan Thurston 1 (B&N 6.5) Suppose an analytic function f agrees with tan x, x 1. Show that f(z) = i has no solution. Could f be entire?

More information

Conformal blocks in nonrational CFTs with c 1

Conformal blocks in nonrational CFTs with c 1 Conformal blocks in nonrational CFTs with c 1 Eveliina Peltola Université de Genève Section de Mathématiques < eveliina.peltola@unige.ch > March 15th 2018 Based on various joint works with Steven M. Flores,

More information

MATH SPRING UC BERKELEY

MATH SPRING UC BERKELEY MATH 85 - SPRING 205 - UC BERKELEY JASON MURPHY Abstract. These are notes for Math 85 taught in the Spring of 205 at UC Berkeley. c 205 Jason Murphy - All Rights Reserved Contents. Course outline 2 2.

More information

Part IB. Further Analysis. Year

Part IB. Further Analysis. Year Year 2004 2003 2002 2001 10 2004 2/I/4E Let τ be the topology on N consisting of the empty set and all sets X N such that N \ X is finite. Let σ be the usual topology on R, and let ρ be the topology on

More information

5 Introduction to the Theory of Order Statistics and Rank Statistics

5 Introduction to the Theory of Order Statistics and Rank Statistics 5 Introduction to the Theory of Order Statistics and Rank Statistics This section will contain a summary of important definitions and theorems that will be useful for understanding the theory of order

More information