On Process Complexity

Size: px
Start display at page:

Download "On Process Complexity"

Transcription

1 On Process Coplexity Ada R. Day School of Matheatics, Statistics and Coputer Science, Victoria University of Wellington, PO Box 600, Wellington 6140, New Zealand, Eail: Abstract Process coplexity is one of the basic variants of Kologorov coplexity. Unlike plain Kologorov coplexity, process coplexity provides a siple characterization of randoness for real nubers in ters of initial segent coplexity. Process coplexity was first developed in (Schnorr 1973). Schnorr s definition of a process, while siple, can be difficult to work with. In any situations, a preferable definition of a process is that given by Levin in (Levin & Zvonkin 1970). In this paper we define a variant of process coplexity based on Levin s definition of a process. We call this variant strict process coplexity. Strict process coplexity retains the ain desirable properties of process coplexity. Particularly, it provides siple characterizations of Martin-Löf rando real nubers, and of coputable real nubers. However, we will prove that strict process coplexity does not agree within an additive constant with Schnorr s original process coplexity. One of the basic properties of prefix-free coplexity is that it is subadditive. Subadditive eans that there is soe constant d such that for all strings σ, τ the coplexity of στ (σ and τ concatenated) is less than or equal to the su of the coplexities of σ and τ plus d. A fundaental question about any coplexity easure is whether or not it is subadditive. In this paper we resolve this question for process coplexity by proving that neither of these process coplexities is subadditive. 1 Introduction The basic concept behind Algorithic Inforation Theory is that the inherent coplexity of a string can be quantified by the iniu nuber of bits of inforation needed to describe it. This concept was first foralized by defining the coplexity of a string σ, as the length of the shortest description of σ with respect to soe universal interpreter. This is known as the plain Kologorov coplexity of σ. However, plain Kologorov coplexity, while useful for any purposes, does not truly capture this basic concept (Downey & Hirschfeldt to appear, Li & Vitányi 1997). The proble is that the universal interpreter can use not only the bits within the description, but also the length of the description to deterine its output. There are several variants of Kologorov coplexity that attept to overcoe this proble. Each variant provides different insight into the nature of Copyright c 2009, Australian Coputer Society, Inc. This paper appeared at the Fifteenth Coputing: The Australasian Theory Syposiu (CATS2009), Wellington, New Zealand. Conferences in Research and Practice in Inforation Technology (CRPIT), Vol. 94, Rod Downey and Prabhu Manye, Ed. Reproduction for acadeic, not-for profit purposes peritted provided this text is included. coplexity. These variants include the widely used prefix-free coplexity as well as the process coplexity introduced in (Schnorr 1973). One reason prefixfree coplexity has been extensively studied is that the Kraft-Chaitin theore and the coding theore provide an easy eans of constructing prefix-free achines. No siilar theores exist for process coplexity and this coplexity sees genuinely ore difficult to deal with. In order to give a foral definition of the coplexities we will study, first we will define coplexity with respect to a general function. Take any F : 2 <ω 2 <ω (where 2 <ω is the set of all finite binary strings). The coplexity of the string σ with respect to F is: in{ τ : F (τ) = σ} if τ 2 <ω, C F (σ) = F (τ) = σ otherwise In the above definition, τ refers to the length of the string τ. We define the plain Kologorov coplexity of a string σ to be C(σ) = C U (σ) where U is a fixed universal Turing achine. We call a finite string σ rando if C(σ) σ. Note that U is a universal achine for the whole class of Turing achines. One way to produce variants of Kologorov coplexity is to use a universal achine for a subclass of Turing achines. Two iportant subclasses of Turing achines are the class of all prefix-free achines and the class of all process achines. To understand these achines, first note that 2 <ω has the following natural partial ordering. If τ 1, τ 2 2 <ω then we define τ 1 τ 2 to hold if τ 2 is an extension of τ 1. A subset A of 2 <ω is called prefix-free if it is anti-chain with respect to this partial ordering, or alternatively if for all distinct τ 1, τ 2 in A, τ 1 τ 2. A prefix-free achine is a partial coputable function 2 <ω 2 <ω whose doain is a prefix-free set. It can be shown that there exists a universal prefixfree achine and by fixing U this tie as a universal prefix-free achine we can siilarly define the prefixfree coplexity of σ by K(σ) = C U (σ). Another natural subclass is the class of all process achines. The key idea about a process is that it preserves the ordering on 2 <ω aking its action continuous. Definition 1.1. A process achine is a partial coputable function M : 2 <ω 2 <ω such that if τ, τ do(m), and τ τ, then M(τ ) M(τ). A natural exaple of a process is given by the recordings of oves in a gae of chess e.g. 1. e4 e5, 2. Nf3 Nc6 etc. Given the descriptions of the first n oves, it is possible to replay the gae up until that point. If we extend the description, we can extend the replay of the gae by adding new oves, but we cannot change any oves already defined.

2 Again we can take a universal process achine U and define the process coplexity K MD of a string σ by K MD (σ) = C U (σ). This definition of a process achine and related coplexity was given in (Schnorr 1973). We follow the notation of (Downey & Hirschfeldt to appear) by using K MD to denote process coplexity. Schnorr s definition of a process differs slightly fro that given by Levin in (Levin & Zvonkin 1970). We will use the ter strict process achine for Levin s definition. It is defined as follows. Definition 1.2. A strict process achine is a partial coputable function M : 2 <ω 2 <ω such that if τ do(m) and τ τ, then τ do(m) and M(τ ) M(τ). While Levin defined strict process achines, he did not use the to define a easure of coplexity in the sae way as Schnorr. Instead he used strict process achines to construct a universal seieasure fro which he defined another variant of Kologorov coplexity (Levin & Zvonkin 1970, Levin 1973). Both of these definitions of process achines have erit. Schnorr s definition corresponds to a hooorphis of the doain of M. Levin s definition has the following very natural odel. This odel is alost identical to one described in the first paper on algorithic randoness (Soloonoff 1964). Take a three-tape Turing achine M with a read-only oneway input tape, a one-way write-once output tape, and a work tape. The first square of the input table is blank and the input head starts on that square. Let the achine run. If at any stage M wants to ove the input head of the tape, first we define M(τ) = σ, where τ is the input string read so far and σ is the current output on the output tape. Levin s definition of a process can be easier to deal with. This becoes apparent when attepting any gae based proof where the opponent is developing a process achine. If the opponent ust keep the doain of the process achine closed under substrings, then the gae becoes uch sipler. This is our ain otivation for introducing the following definition. Definition 1.3. Given any σ 2 <ω, the strict process coplexity K MS (σ) is defined by C U (σ) where U is a universal strict process achine. The existence of a universal strict process achine is established by (Levin & Zvonkin 1970). Note that a prefix-free achine can be considered as a strict process achine. This is done as follows. Suppose M : 2 <ω 2 <ω is a prefix-free achine. We take λ to be the epty string and we define a strict process achine M as follows: M(σ) M λ (σ) = undefined if σ do(m) if there exists σ > σ and σ do(m) otherwise It can be shown that if M is partial coputable then so is M. Additionally, with the exception of the epty string, the coplexities generated by the two achines agree. As a strict process achine is a type of process achine it follows that for all σ, K MD (σ) K MS (σ) + O(1) K(σ) + O(1). It is not iediately apparent that K MD and K MS differ in any significant way. The first result that we will prove in this paper is that the coplexities K MD and K MS are different, that is they do not agree within any additive constant. In fact we will go further and show that for any a R with 0 < a < 1, there are infinitely any σ such that K MS (σ) K MD (σ) > a log log σ. In the opening paragraph, we stated that plain Kologorov coplexity did not capture the basic concept behind Algorithic Inforation Theory. This becae apparent during attepts to define algorithic randoness for real nubers. 1 The intuition is that a real α should be rando if all of its initial segents are rando strings (though we allow deviation by soe constant aount). Thus we would like to be able to define α as rando if C(α n) n O(1) (where α n is the first n bits of α). The proble with this attept at a definition is that Martin-Löf showed: given any d, then for any sufficiently long string υ there is an initial segent σ of υ such that C(σ) < σ d (Downey & Hirschfeldt to appear). In particular, this proves that there are no reals α with the property that C(α n) n O(1). Martin-Löf s proof ade direct use of the fact that a Turing achine can use the bits of a description τ and additionally another log τ bits fro the length of τ to deterine its output. Prefix-free coplexity or process coplexity can be used to define randoness for a real nuber based on initial segent coplexity (Schnorr 1973, Chaitin 1987). If we say that a real α is rando if for all n, Q(α n) n O(1) where Q is either K, or K MD, then we get a non-epty class of rando reals. Now it does not atter which of the two we choose Q to be because they both give rise to the sae class of rando reals. The class is in fact the class of Martin- Löf rando reals, the ost coonly used notion of randoness in algorithic inforation theory. This shows that prefix-free achines and process achines are unable to use those extra log τ bits. As the coplexity K MS lies between K and K MD it follows that if we replace Q by K MS, we still get the sae class of rando reals. Hence strict process coplexity retains the desirable property of process coplexity by providing a siple characterization of the Martin-Löf rando reals. Additionally, like process coplexity, strict process coplexity provides a siple characterization of coputable reals. A real α is coputable if and only if K MS (α n) K MS (n) + O(1) where K MS (n) = K MS (1 n ) (1 n is the string fored by repeating 1 n ties). The non-trivial direction follows because K MS (n) log(n) + O(1) and C(α n) K MS (α n) + O(1). Hence if for soe α, K MS (α n) K MS (n) + O(1), then C(α n) log(n) + O(1) and so α is coputable by a theore of Chaitin s (Downey & Hirschfeldt to appear). Martin-Löf s proof also showed that plain Kologorov coplexity is not subadditive. That is to say, for any d there exists strings σ, τ such that C(στ) > C(σ) + C(τ) + d where στ is the string fored by appending τ to the end of σ. It does this because we can take a rando finite string υ that has an initial segent σ with C(σ) < σ d. Now if τ is chosen so that στ = υ then C(στ) σ + τ > C(σ) + d + C(τ) i where i is the length of the index of the identity function in U. As i is fixed we can ake d i arbitrarily large. Thus we have that plain Kologorov coplexity is not subadditive. On the other hand, prefix-free coplexity is an exaple of a coplexity that is subadditive. The second result that we will prove is that both process coplexity and strict process coplexity are not subadditive. The proof Martin-Löf used for plain coplexity cannot be adapted to process coplexity. This is because given a rando real α, it is true that 1 A real is identified as an infinite binary string.

3 K MD (α n) n O(1) i.e. there are no arbitrary drops in initial segent coplexity. Thus the question as to whether these coplexities are subadditive requires new techniques. In particular we need to use non-rando strings. The new techniques used for building and analyzing process achines introduced here ay well have wider application. 1.1 Conventions The set of all binary strings of length n, the set of all finite binary strings, and the set of all infinite binary strings will be denoted by {0, 1} n, 2 <ω, and 2 ω respectively. The epty string will be represented by λ. The relation on 2 <ω (2 <ω 2 ω ) is defined by σ τ if σ is an initial segent of τ. We say σ < τ if σ τ and τ σ. If σ τ and τ σ, then τ and σ are said to be incoparable written σ τ. The operation of appending a string τ to the end of a finite string σ, will be represented by στ. If σ 2 <ω let σ be the length of σ and if i N with 1 i σ let σ(i) be the ith bit of σ. The ain proofs in this paper will be cobinatorial in nature. They will ake use of soe basic properties of Cantor space. Cantor space is the topology on 2 ω defined by taking {[σ] : σ 2 <ω }, where [σ] = {σα : α 2 ω } for each σ 2 <ω, as a basis of open sets. If X 2 <ω, then [X] = σ X [σ]. The Lebesgue easure on Cantor space µ is the outer easure obtained by defining µ([σ]) = 2 σ for all open sets [σ] in the basis. The ain properties of Cantor space that we need are as follows. Firstly µ(2 ω ) = µ([λ]) = 1. Secondly if τ 1 and τ 2 are incoparable eleents of 2 <ω then [τ 1 ] [τ 2 ] =. This iplies that if A 2 <ω is a prefix-free set, then µ([a]) = σ A 2 σ. Given a partial coputable function M : X Y and x X, we write M(x) if x is an eleent of the doain of M and M(x) otherwise. Further, if we are regarding M as a Turing achine, we will write M(x)[s] if M halts on input x within s coputational steps, and M(x)[s] otherwise. Logs used are all base 2 and are rounded up to the nearest integer value. By convention log 0 = 0. 2 Strict process coplexity and process coplexity In this section we will show that strict process coplexity and process coplexity are in fact different. As the universal strict process achine is a process achine, there is soe constant d such that for all σ 2 <ω : K MD (σ) K MS (σ) + d We want to show that this inequality cannot be reversed and so strict process coplexity and process coplexity do not agree within an additive constant. To show this, we will ake use of the fact that the universal strict process achine has a coputable approxiation. Let U be a universal strict process achine. For all s N, define: { U(τ) if U(τ)[s] U s = otherwise Because U is a strict process achine, we can take our approxiation to have the property that if U s (τ) = σ and τ < τ then there is soe σ σ such that U s (τ ) = σ. In lea 2.3, we will show that for any i N, we can construct a process achine f i such that there exists a string σ i with C fi (σ i ) + i < K MS (σ i ). Once we have done this, it will not be too difficult to cobine these achines to prove that strict process coplexity and process coplexity do not agree within an additive constant. To understand the ideas behind the proof of lea 2.3, let us take the case i = 1 as an exaple. We will construct a process achine f 1. When we construct this achine, we are able to first define f 1 for all strings of length 3. Then at a later stage, we have the option of defining f 1 for strings of length 2 and even later for strings of length 1. This option is not available to the universal strict process achine U. Once a string τ is added to the doain of U, all initial segents of τ ust be added as well. Our definition of f 1 starts as follows. First let τ = abc be any binary string of length 3, i.e. a, b, and c are the first, second and third bits of τ respectively. We define f 1 by f 1 (abc) = a 8 b 16 c e.g. f 1 (010) = We can consider this as stretching all but the last bit of the the string abc. Now we wait until soe stage s 1, when for all τ {0, 1} 3, C Us 1 (f 1 (τ)) 4. If this never happens then we have finished because for soe τ {0, 1} 3, K MS (f 1 (τ)) = li s CUs (f 1 (τ)) > 4 = τ + 1 = C f1 (f 1 (τ)) + 1 So assue such a stage s 1 occurs. For all τ {0, 1} 3, let ρ τ be soe string in the doain of U s1 such that ρ τ 4 and U s1 (ρ τ ) = f 1 (τ). Let A 1 be the set of all such ρ τ. Note that A 1 ust be a prefixfree set and A 1 = 2 3. If it is not, then there is soe τ, υ {0, 1} 3 with: τ υ; ρ τ, ρ υ A 1 ; and ρ τ ρ υ. But this would ean that f 1 (τ) = U s1 (ρ τ ) U s1 (ρ υ ) = f 1 (υ) which contradicts our definition of f 1. It follows that µ([a 1 ]) A = 1 2. We will now define f 1 for all binary strings of length 2. Given any two bit binary string ab, there ust be soe string a 8 b k with 1 k 16 such that C Us 1 (a 8 b k ) > 3. This is true because there are at ost 15 strings whose coplexity is less than or equal to 3 (as there are only 15 such descriptions). Now we define f 1 (ab) = a 8 b k. Now consider for a oent how the universal strict process achine can respond to this. Because U is a strict process achine, if τ is any initial segent of a string in A 1, then U(τ)[s 1 ]. So if τ 3, then U(τ) f 1 (ab) for any a, b {0, 1}. This eans that in order to reduce the coplexity of f 1 (ab) to 3 or less, U needs to find a short description that is not an initial segent of an eleent of A 1. Again we wait until soe stage s 2, when for all τ {0, 1} 2, C Us 2 (f 1 (τ)) 3. If this never happens then again our objective is achieved. If this stage does occur then for all τ {0, 1} 2, let ρ τ be soe string in the doain of U s2 such that ρ τ 3 and U s2 (ρ τ ) = f 1 (τ). Let A 2 be the set of all such ρ τ. Again µ([a 2 ]) A = 1 2. We want to show that [A 1 ] [A 2 ] =. Take any ρ 1 A 1 and ρ 2 A 2. U(ρ 1 ) > U(ρ 2 ) so we know that ρ 1 ρ 2. Now let us show that U(ρ 2 )[s 1 ]. If U(ρ 2 )[s 1 ], then C Us 1 (U(ρ 2 )) ρ 2 3. So by our construction of f 1, f 1 (ab) U(ρ 2 ) for any a, b {0, 1}. This is a contraction and so U(ρ 2 )[s 1 ]. As U(ρ 1 )[s 1 ] so it ust be that ρ 2 ρ 1 because U is a strict process achine. Hence ρ 1 and ρ 2 are incoparable and so µ([do(u s2 )]) µ(a 1 ) + µ(a 2 ) = 1. Finally we define f 1 (0) = 0 k for soe 1 k 8

4 such that C Us 2 (0 k ) > 2 (there ust be soe k as there are only 7 possible descriptions of length less than or equal to 2). Consider any υ 2 <ω. As µ(a 1 A 2 ) = 1, either υ is an initial segent, or an extension, of soe eleent ρ A 1 A 2. If υ > ρ and U(υ) then U(υ) U(ρ) and so U(υ) f 1 (0). If υ ρ, then U(υ)[s 2 ] so if U(υ) = f 1 (0) then it ust be that υ > 2 (as we chose f 1 (0) so that C Us 2 (f 1 (0)) > 2). Hence: C f1 (f 1 (0)) + 1 = < C U (f 1 (0)) = K MS (f 1 (0)) The ain idea is that if the universal strict process achine attepts to respond each tie strings are added to the doain of f 1, then it will run out of easure. The key point is that during the construction of f 1, we can reuse easure by using initial segents of strings already in the doain of f 1. On the other hand, U needs to add new easure into its doain at each response. To adapt this arguent to hold for any i, let us start with a lea giving a lower bound on the easure of the doain of a strict process achine. Lea 2.1. If {(τ 1, σ 1 ),..., (τ n, σ n )} is a set of ordered pairs such that for all i, j N, 1 i, j n, U(τ i ) = σ i ; and if i j then: 1. σ i σ j ; and 2. σ i > σ j iplies that there exists an s such that U s (τ i ) and U s (τ j ) ; then µ([do(u)]) n i=1 2 τi. Proof. We will show that the τ i for an prefix-free set. Choose any i j. If σ i σ j then as U is a process achine, τ i τ j. If σ i > σ j then there exists an s such that U s (τ i ) and U s (τ j ), so as U is a strict process achine τ j is not an initial segent of τ i. Further τ j cannot extend τ i as this would iply that σ j σ i. Hence τ i τ j. Siilarly if σ j > σ i then τ i τ j as well. We will foralize the notion of stretching a string as follows. Definition 2.2. If g : N N, then ĝ : 2 <ω 2 <ω is defined by: ĝ(τ) = τ(1) g(1) τ(2) g(2)... τ( τ ) g( τ ) For exaple if g is the identity function, then ĝ(0101) = = Lea 2.3. For all i N, there exists a process achine f i and a string σ i such that: C fi (σ i ) + i < K MS (σ i ). Proof. Again we take U to be the universal strict process achine. We looked at the case f 1 as an exaple. In this case we started by defining f 1 for strings of length 3, and then for strings of progressively shorter lengths. For the general case, we will start by defining f i for strings of length 2 i + 1. If necessary we will define f i for strings of length 2 i, 2 i 1, 2 i 2 and so on. Our propt to extend the doain of f i is if at soe stage s, the universal strict process achine has ade C Us (σ) C fi (σ) + i for all eleents σ in the doain of f i at stage s. We define g i : N N by g i (n) = 2 n+i+1. We will use g i in order to stretch strings. g i is defined like this because for any n, there are only 2 n+i+1 1 descriptions of length less than or equal to n + i. By aking g i (n) larger than this, we know that at any stage s, we can always find initial segents of the stretched string without descriptions of length n+i in U s. The construction of f i proceeds as follows. At stage 0, first set l 0 = 2 i + 1. Then for all τ {0, 1} l0 set f i (τ) = ĝ i (τ ( τ 1))τ( τ ) i.e. we use g i to stretch all but the last bit of τ. At stage s + 1, if there exists soe τ {0, 1} ls such that C Us (f i (τ)) > τ + i, then set l s+1 = l s and go to the next stage. Otherwise, we know that for all τ {0, 1} ls, C Us (f i (τ)) τ + i. Now we will extend the doain of f i. We set l s+1 = l s 1. For all τ {0, 1} ls+1 and for all k N, 1 k g i ( τ ). Let σ τ,k = ĝ i (τ (τ 1))τ( τ ) k. As there are 2 τ +i+1 possible values of k, it follows that for any τ, there ust be soe k such that: C Us (σ τ,k ) > τ + i because there are only 2 τ +i+1 1 descriptions of length less than or equal to τ + i. For all τ {0, 1} ls+1, let σ τ = σ τ,k for such a k and set f i (τ) = σ τ. To verify the construction we will first show that for all s, l s > 0. We will prove this by showing that the alternative iplies that U runs out of easure. If l s = 0 for soe s, then for all τ 2 <ω such that 1 τ 2 i + 1, K MS (f i (τ)) τ + i because this is the condition to extend the doain of f i. So for all such τ we can choose a string ρ τ such that (i) ρ τ τ + i, (ii) U(ρ τ ) = f i (τ) and such that no other string with properties (i) and (ii) halts before U(ρ τ ) halts. Now take the set A = {(ρ τ, f i (τ)) : τ 2 <ω, 1 τ 2 i + 1}. Consider any τ 1, τ 2 2 <ω, 1 τ 1, τ 2 2 i +1, and τ 1 τ 2. First f i (τ 1 ) f i (τ 2 ) as f i is injective. If f i (τ 1 ) < f i (τ 2 ) then by construction this iplies that τ 1 < τ 2. Now f i is defined for τ 1 after f i is defined for τ 2. Further if f i (τ 1 ) is defined at stage t + 1, it ust be that: 1. C Ut (f i (τ 2 )) τ 2 + i; and 2. C Ut (f i (τ 1 )) > τ 1 + i. (1) follows as this is required to extend the doain of f i to strings of length < τ 2. (2) follows by our choice of f i (τ 1 ). Now by (i) and (ii), (1) iplies that U t (ρ τ2 ) and (2) iplies that U t (ρ τ1 ). The set A therefore eets the conditions of lea 2.1 and this iplies that: µ([do(u)]) 2 ρτ τ 2 <ω,1 τ 2 i +1 τ 2 <ω,1 τ 2 i +1 = 2 i (2 i + 1) > 1 2 τ i A contradiction and so for all s, l s > 0. Let n = in{l s : s N}. It follows that for soe τ {0, 1} n, for all s, C Us (f i (τ)) > τ + i and hence K MS (f i (τ)) > τ + i. Thus we can take σ i = f i (τ), and we have that C fi (σ i ) + i = τ + i < K MS (σ i ). Finally, f i is a process achine because consider any τ 1, τ 2 do(f i ) and τ 1 < τ 2. We have that: f i (τ 1 ) ĝ i (τ 1 ) ĝ i (τ 2 (τ 2 1)) f i (τ 2 ). Note that lea 2.3 is unifor.

5 Theore 2.4. K MD and K MS do not agree within an additive constant. Proof. Define a process achine f by f(0 i 1τ) = f 2i (τ). Let c be the length of the index of f in the universal process achine. Now given any d, take i = 2(c + d + 1). By lea 2.3, there exists soe σ i such that C fi (σ i ) + i < K MS (σ i ), so: K MD (σ i ) + d C f (σ i ) + d + c C fi (σ i ) + d + c + i = C fi (σ i ) + i < K MS (σ i ) In fact we can go further and prove that this constant can be replaced with a function of order log log(n) where n is string length. First note that we can deterine an upper bound on the length of the σ i fro lea 2.3. Because σ i = f i (τ) for soe τ with τ 2 i + 1, and as we stretch all but the last bit of τ we know that: σ i 1 + g i (n) 2 i n=1 = i n=1 2 n+i+1 2 i 1 = i+2 n=0 2 n = i+2 (2 2i 1) < 2 2i +i+2 It will be easier to express this as log σ i < 2 i + i + 2. Theore 2.5. Given any a R, 0 < a < 1, then there exist infinitely any σ such that: K MS (σ) K MD (σ) > a log log σ. Proof. Given any such a choose k N >0 such that a < 1 1 k. Now define a process f : 2<ω 2 <ω by f(0 i 1τ) = f i (τ). Let c be the length of the index of f in the universal process achine. Choose any d N such that 1 divides c + d + 1. Now let i = (c+d+1) 1. Hence i is a positive integer, and i = c + d i i. This iplies that is a positive integer too. Let σ d = σ i fro lea 2.3. We know that: K MD (σ d ) + d C f (σ d ) + c + d Also we know that: = C fi (σ d ) + c + d i = C fi (σ d ) + i < K MS (σ d ) log σ d < 2 (c+d+1) (c + d + 1) = c d + c d k ( 1)( 2). where c 1 and c 2 are constant. Let j = As there are infinitely any d that we can choose, we can consider those d such that 2 jd ax(c d, c 2, 2). So we have that: log σ d < 2 jd + 2 jd 2 1 d = 2 jd ( d ) 2 jd (2 1 d+jd ) = 2 1 d+2jd = 2 k k 1 d The last step follows because: 1 + 2j = So log log σ d < 1 + 4k 2 = ( 1)( 2) = k k 1 a log log σ d < k 1 k So for these such d: ( 1)( 2) k k 1d and hence we have that: log log σ d < d K MD (σ d ) + d < K MS (σ d ) K MD (σ d ) + a log log σ d < K MS (σ d ) K MS (σ d ) K MD (σ d ) > a log log σ d There are infinitely any d that eet the conditions we require so the result follows. Theore 2.5 gives a lower bound on the difference between K MD and K MS. A basic upper bound on the difference between these coplexities is that for all σ, K MS (σ) K MD (σ) 2 log σ + O(1). This holds because the difference between onotone coplexity K M (a related coplexity) and prefix-free coplexity is bounded above by the sae aount and both K M (σ) K MD (σ) + O(1) and K MS (σ) K(σ)+O(1)(Li & Vitányi 1997). This leaves an open question with respect to the difference between these two coplexities which of these two bounds can be iproved? 3 Process coplexity is not subadditive Our objective for this section is to prove that process coplexity and strict process coplexity are not subadditive. We will present the proof for process coplexity but it holds without odification for strict process coplexity as well. Theore 3.1. Let U be a universal process achine. For any d N, there exists a σ, τ such that: K MD (στ) > K MD (σ) + K MD (τ) + d. We will prove this theore by giving short descriptions to a lot of strings. We will argue cobinatorially that one of these strings σ, ust have an extension στ such that the desired property holds. The following lea expresses a basic cobinatorial fact about process achines.

6 Lea 3.2. If A 2 <ω is a prefix-free set, then: 2 K M (σ) D 1 σ A Proof. Consider B = {τ σ : σ A} where τ σ is a shortest description of σ with respect to the universal process achine U. If τ 1, τ 2 are distinct eleents of B, then U(τ 1 ) and U(τ 2 ) are incoparable (as they are both in A). Therefore because U is a process achine we have that τ 1 τ 2. Hence B is an prefixfree set as well and the result follows because: 2 τ = µ([b]) 1 σ A 2 KMD (σ) = τ B Proof of theore 3.1. The identity function is a process so there is soe constant c i such that for all σ 2 <ω, K MD (σ) σ + c i. Now given any d, choose e = d + c i + c g. Fro the previous lea, there exists soe, i, υ with υ Bi such that K MD (υ) > υ i + e. Now set σ = υ 2i so σ A i and thus K MD (σ) σ i + c g. Choose τ so that στ = υ. Now K MD (τ) τ + c i. Cobining these results gives us that: K MD (σ) + K MD (τ) + d σ i + c g + τ + c i + d = στ i + e < K MD (στ) Let g : N N be the constant function g(x) = 2. Now the function ĝ : 2 <ω 2 <ω is a process (recall the definition of ĝ in section 2). For all i, we can define A i = {ĝ(τ) : τ {0, 1} i }. So A 0 = {λ}, A 1 = {00, 11}, A 2 = {0000, 0011, 1100, 1111} etc. As ĝ is a process, there is soe constant c g such that for all ρ A i, K MD (ρ) i+c g = ρ i+c g. The A i s are our sets of strings with short descriptions. For all, i such that 2i + 2, we define Bi = {σ {0, 1} : ρ A i (ρ01 σ or ρ10 σ)}. The Bi s are the sets of extensions that we will exaine. It is iportant to note that we have constructed the Bi s so that if i j then B i Bj =. We will explain the reason for this using an exaple. Consider σ = Because σ extends an eleent of A 2, 0011, we want to place σ in B2 8 and not in B1 8 even though σ extends 00 as well. This is because if we break σ into the strings 0011 and 0100 then the difference between the length of the first string 0011, and the length of its ĝ description is 2 (ĝ(01) = 0011). This is larger than the difference between the length of 00 and the length of its ĝ description. We need to use the larger difference for the following arguent to hold. Note that Bi = A i 2 2 2i 2 = 2 i 1. Now we will use the following lea to find the extension we want. Lea 3.3. Given any e N,, i, σ with σ B i such that K MD (σ) > σ i + e. Proof. Take = 2 e+3 and assue that no such i, σ exist. If so, then: σ {0,1} 2 KMD (σ) = = σ B i σ B i 2 K M D (σ) 2 σ +i e Bi 2 +i e i 1 2 +i e = ( 2 )2 e 1 > 1 This is a contradiction by lea 3.2 as {0, 1} is a prefix-free set. Acknowledgents The author would like to thank his PhD supervisor, Rod Downey, for helpful discussions in the developent of this paper. The author would also like to thank the anonyous referees for their helpful coents. The author also acknowledges the support of the New Zealand Tertiary Education Coission. References Chaitin, G. (1975), A theory of progra size forally identical to inforation theory, J. ACM 22(3), Chaitin, G. (1987), Incopleteness theores for rando reals, Adv. Appl. Math. 8(2), Downey, R. & Hirschfeldt, D. (to appear), Algorithic Randoness and Coplexity, Springer-Verlag. Gács, P. (1974), On the syetry of algorithic inforation, Soviet Math. Dokl. 15. Kologorov, A. (1965), Three approaches to the quantitiative definition of inforation, Probles of Inforation Transission 1. Levin, L. (1973), On the notion of a rando sequence, Soviet Math. Dokl. 14(5), Levin, L. (1974), Laws of inforation conservation (non-growth) and aspects of the foundation of probability theory, Probles of Inforation Transission 10. Levin, L. & Zvonkin, A. (1970), The coplexity of finite objects and the developent of the concepts of inforation and randoness of eans of the theory of algoriths, Russian Math. Surveys 25(6). Li, M. & Vitányi, P. (1997), An introduction to Kologorov coplexity and its applications (2nd ed.), Springer-Verlag New York, Inc., Secaucus, NJ, USA. Schnorr, C. (1973), Process coplexity adn effective rando test, Journal of Coputer and Syste Sciences 7. Schnorr, C. (1977), A survey of the theory of rando sequences, in: Basic Probles in Methodology and Linguistics, D. Reidel, Dordrecht, Holland, pp Soloonoff, R. (1964), A foral theory of inductive inference, Inforation and Control 7.

The Frequent Paucity of Trivial Strings

The Frequent Paucity of Trivial Strings The Frequent Paucity of Trivial Strings Jack H. Lutz Departent of Coputer Science Iowa State University Aes, IA 50011, USA lutz@cs.iastate.edu Abstract A 1976 theore of Chaitin can be used to show that

More information

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 11 10/15/2008 ABSTRACT INTEGRATION I

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 11 10/15/2008 ABSTRACT INTEGRATION I MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 11 10/15/2008 ABSTRACT INTEGRATION I Contents 1. Preliinaries 2. The ain result 3. The Rieann integral 4. The integral of a nonnegative

More information

List Scheduling and LPT Oliver Braun (09/05/2017)

List Scheduling and LPT Oliver Braun (09/05/2017) List Scheduling and LPT Oliver Braun (09/05/207) We investigate the classical scheduling proble P ax where a set of n independent jobs has to be processed on 2 parallel and identical processors (achines)

More information

A := A i : {A i } S. is an algebra. The same object is obtained when the union in required to be disjoint.

A := A i : {A i } S. is an algebra. The same object is obtained when the union in required to be disjoint. 59 6. ABSTRACT MEASURE THEORY Having developed the Lebesgue integral with respect to the general easures, we now have a general concept with few specific exaples to actually test it on. Indeed, so far

More information

The Weierstrass Approximation Theorem

The Weierstrass Approximation Theorem 36 The Weierstrass Approxiation Theore Recall that the fundaental idea underlying the construction of the real nubers is approxiation by the sipler rational nubers. Firstly, nubers are often deterined

More information

Handout 7. and Pr [M(x) = χ L (x) M(x) =? ] = 1.

Handout 7. and Pr [M(x) = χ L (x) M(x) =? ] = 1. Notes on Coplexity Theory Last updated: October, 2005 Jonathan Katz Handout 7 1 More on Randoized Coplexity Classes Reinder: so far we have seen RP,coRP, and BPP. We introduce two ore tie-bounded randoized

More information

3.8 Three Types of Convergence

3.8 Three Types of Convergence 3.8 Three Types of Convergence 3.8 Three Types of Convergence 93 Suppose that we are given a sequence functions {f k } k N on a set X and another function f on X. What does it ean for f k to converge to

More information

Computational and Statistical Learning Theory

Computational and Statistical Learning Theory Coputational and Statistical Learning Theory Proble sets 5 and 6 Due: Noveber th Please send your solutions to learning-subissions@ttic.edu Notations/Definitions Recall the definition of saple based Radeacher

More information

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices CS71 Randoness & Coputation Spring 018 Instructor: Alistair Sinclair Lecture 13: February 7 Disclaier: These notes have not been subjected to the usual scrutiny accorded to foral publications. They ay

More information

THE AVERAGE NORM OF POLYNOMIALS OF FIXED HEIGHT

THE AVERAGE NORM OF POLYNOMIALS OF FIXED HEIGHT THE AVERAGE NORM OF POLYNOMIALS OF FIXED HEIGHT PETER BORWEIN AND KWOK-KWONG STEPHEN CHOI Abstract. Let n be any integer and ( n ) X F n : a i z i : a i, ± i be the set of all polynoials of height and

More information

Polygonal Designs: Existence and Construction

Polygonal Designs: Existence and Construction Polygonal Designs: Existence and Construction John Hegean Departent of Matheatics, Stanford University, Stanford, CA 9405 Jeff Langford Departent of Matheatics, Drake University, Des Moines, IA 5011 G

More information

Course Notes for EE227C (Spring 2018): Convex Optimization and Approximation

Course Notes for EE227C (Spring 2018): Convex Optimization and Approximation Course Notes for EE227C (Spring 2018): Convex Optiization and Approxiation Instructor: Moritz Hardt Eail: hardt+ee227c@berkeley.edu Graduate Instructor: Max Sichowitz Eail: sichow+ee227c@berkeley.edu October

More information

On Poset Merging. 1 Introduction. Peter Chen Guoli Ding Steve Seiden. Keywords: Merging, Partial Order, Lower Bounds. AMS Classification: 68W40

On Poset Merging. 1 Introduction. Peter Chen Guoli Ding Steve Seiden. Keywords: Merging, Partial Order, Lower Bounds. AMS Classification: 68W40 On Poset Merging Peter Chen Guoli Ding Steve Seiden Abstract We consider the follow poset erging proble: Let X and Y be two subsets of a partially ordered set S. Given coplete inforation about the ordering

More information

Block designs and statistics

Block designs and statistics Bloc designs and statistics Notes for Math 447 May 3, 2011 The ain paraeters of a bloc design are nuber of varieties v, bloc size, nuber of blocs b. A design is built on a set of v eleents. Each eleent

More information

The Transactional Nature of Quantum Information

The Transactional Nature of Quantum Information The Transactional Nature of Quantu Inforation Subhash Kak Departent of Coputer Science Oklahoa State University Stillwater, OK 7478 ABSTRACT Inforation, in its counications sense, is a transactional property.

More information

arxiv: v1 [math.nt] 14 Sep 2014

arxiv: v1 [math.nt] 14 Sep 2014 ROTATION REMAINDERS P. JAMESON GRABER, WASHINGTON AND LEE UNIVERSITY 08 arxiv:1409.411v1 [ath.nt] 14 Sep 014 Abstract. We study properties of an array of nubers, called the triangle, in which each row

More information

Lecture 21. Interior Point Methods Setup and Algorithm

Lecture 21. Interior Point Methods Setup and Algorithm Lecture 21 Interior Point Methods In 1984, Kararkar introduced a new weakly polynoial tie algorith for solving LPs [Kar84a], [Kar84b]. His algorith was theoretically faster than the ellipsoid ethod and

More information

Curious Bounds for Floor Function Sums

Curious Bounds for Floor Function Sums 1 47 6 11 Journal of Integer Sequences, Vol. 1 (018), Article 18.1.8 Curious Bounds for Floor Function Sus Thotsaporn Thanatipanonda and Elaine Wong 1 Science Division Mahidol University International

More information

A Note on Scheduling Tall/Small Multiprocessor Tasks with Unit Processing Time to Minimize Maximum Tardiness

A Note on Scheduling Tall/Small Multiprocessor Tasks with Unit Processing Time to Minimize Maximum Tardiness A Note on Scheduling Tall/Sall Multiprocessor Tasks with Unit Processing Tie to Miniize Maxiu Tardiness Philippe Baptiste and Baruch Schieber IBM T.J. Watson Research Center P.O. Box 218, Yorktown Heights,

More information

Energy-Efficient Threshold Circuits Computing Mod Functions

Energy-Efficient Threshold Circuits Computing Mod Functions Energy-Efficient Threshold Circuits Coputing Mod Functions Akira Suzuki Kei Uchizawa Xiao Zhou Graduate School of Inforation Sciences, Tohoku University Araaki-aza Aoba 6-6-05, Aoba-ku, Sendai, 980-8579,

More information

1 Proof of learning bounds

1 Proof of learning bounds COS 511: Theoretical Machine Learning Lecturer: Rob Schapire Lecture #4 Scribe: Akshay Mittal February 13, 2013 1 Proof of learning bounds For intuition of the following theore, suppose there exists a

More information

Chapter 6 1-D Continuous Groups

Chapter 6 1-D Continuous Groups Chapter 6 1-D Continuous Groups Continuous groups consist of group eleents labelled by one or ore continuous variables, say a 1, a 2,, a r, where each variable has a well- defined range. This chapter explores:

More information

A note on the multiplication of sparse matrices

A note on the multiplication of sparse matrices Cent. Eur. J. Cop. Sci. 41) 2014 1-11 DOI: 10.2478/s13537-014-0201-x Central European Journal of Coputer Science A note on the ultiplication of sparse atrices Research Article Keivan Borna 12, Sohrab Aboozarkhani

More information

Now multiply the left-hand-side by ω and the right-hand side by dδ/dt (recall ω= dδ/dt) to get:

Now multiply the left-hand-side by ω and the right-hand side by dδ/dt (recall ω= dδ/dt) to get: Equal Area Criterion.0 Developent of equal area criterion As in previous notes, all powers are in per-unit. I want to show you the equal area criterion a little differently than the book does it. Let s

More information

1 Generalization bounds based on Rademacher complexity

1 Generalization bounds based on Rademacher complexity COS 5: Theoretical Machine Learning Lecturer: Rob Schapire Lecture #0 Scribe: Suqi Liu March 07, 08 Last tie we started proving this very general result about how quickly the epirical average converges

More information

Tight Information-Theoretic Lower Bounds for Welfare Maximization in Combinatorial Auctions

Tight Information-Theoretic Lower Bounds for Welfare Maximization in Combinatorial Auctions Tight Inforation-Theoretic Lower Bounds for Welfare Maxiization in Cobinatorial Auctions Vahab Mirrokni Jan Vondrák Theory Group, Microsoft Dept of Matheatics Research Princeton University Redond, WA 9805

More information

An Extension to the Tactical Planning Model for a Job Shop: Continuous-Time Control

An Extension to the Tactical Planning Model for a Job Shop: Continuous-Time Control An Extension to the Tactical Planning Model for a Job Shop: Continuous-Tie Control Chee Chong. Teo, Rohit Bhatnagar, and Stephen C. Graves Singapore-MIT Alliance, Nanyang Technological Univ., and Massachusetts

More information

e-companion ONLY AVAILABLE IN ELECTRONIC FORM

e-companion ONLY AVAILABLE IN ELECTRONIC FORM OPERATIONS RESEARCH doi 10.1287/opre.1070.0427ec pp. ec1 ec5 e-copanion ONLY AVAILABLE IN ELECTRONIC FORM infors 07 INFORMS Electronic Copanion A Learning Approach for Interactive Marketing to a Custoer

More information

On the Inapproximability of Vertex Cover on k-partite k-uniform Hypergraphs

On the Inapproximability of Vertex Cover on k-partite k-uniform Hypergraphs On the Inapproxiability of Vertex Cover on k-partite k-unifor Hypergraphs Venkatesan Guruswai and Rishi Saket Coputer Science Departent Carnegie Mellon University Pittsburgh, PA 1513. Abstract. Coputing

More information

Research Article On the Isolated Vertices and Connectivity in Random Intersection Graphs

Research Article On the Isolated Vertices and Connectivity in Random Intersection Graphs International Cobinatorics Volue 2011, Article ID 872703, 9 pages doi:10.1155/2011/872703 Research Article On the Isolated Vertices and Connectivity in Rando Intersection Graphs Yilun Shang Institute for

More information

Solutions of some selected problems of Homework 4

Solutions of some selected problems of Homework 4 Solutions of soe selected probles of Hoework 4 Sangchul Lee May 7, 2018 Proble 1 Let there be light A professor has two light bulbs in his garage. When both are burned out, they are replaced, and the next

More information

Fourier Series Summary (From Salivahanan et al, 2002)

Fourier Series Summary (From Salivahanan et al, 2002) Fourier Series Suary (Fro Salivahanan et al, ) A periodic continuous signal f(t), - < t

More information

arxiv: v1 [cs.ds] 3 Feb 2014

arxiv: v1 [cs.ds] 3 Feb 2014 arxiv:40.043v [cs.ds] 3 Feb 04 A Bound on the Expected Optiality of Rando Feasible Solutions to Cobinatorial Optiization Probles Evan A. Sultani The Johns Hopins University APL evan@sultani.co http://www.sultani.co/

More information

E0 370 Statistical Learning Theory Lecture 6 (Aug 30, 2011) Margin Analysis

E0 370 Statistical Learning Theory Lecture 6 (Aug 30, 2011) Margin Analysis E0 370 tatistical Learning Theory Lecture 6 (Aug 30, 20) Margin Analysis Lecturer: hivani Agarwal cribe: Narasihan R Introduction In the last few lectures we have seen how to obtain high confidence bounds

More information

A Simple Regression Problem

A Simple Regression Problem A Siple Regression Proble R. M. Castro March 23, 2 In this brief note a siple regression proble will be introduced, illustrating clearly the bias-variance tradeoff. Let Y i f(x i ) + W i, i,..., n, where

More information

CSE525: Randomized Algorithms and Probabilistic Analysis May 16, Lecture 13

CSE525: Randomized Algorithms and Probabilistic Analysis May 16, Lecture 13 CSE55: Randoied Algoriths and obabilistic Analysis May 6, Lecture Lecturer: Anna Karlin Scribe: Noah Siegel, Jonathan Shi Rando walks and Markov chains This lecture discusses Markov chains, which capture

More information

DSPACE(n)? = NSPACE(n): A Degree Theoretic Characterization

DSPACE(n)? = NSPACE(n): A Degree Theoretic Characterization DSPACE(n)? = NSPACE(n): A Degree Theoretic Characterization Manindra Agrawal Departent of Coputer Science and Engineering Indian Institute of Technology, Kanpur 208016, INDIA eail: anindra@iitk.ernet.in

More information

Bipartite subgraphs and the smallest eigenvalue

Bipartite subgraphs and the smallest eigenvalue Bipartite subgraphs and the sallest eigenvalue Noga Alon Benny Sudaov Abstract Two results dealing with the relation between the sallest eigenvalue of a graph and its bipartite subgraphs are obtained.

More information

Uniform Approximation and Bernstein Polynomials with Coefficients in the Unit Interval

Uniform Approximation and Bernstein Polynomials with Coefficients in the Unit Interval Unifor Approxiation and Bernstein Polynoials with Coefficients in the Unit Interval Weiang Qian and Marc D. Riedel Electrical and Coputer Engineering, University of Minnesota 200 Union St. S.E. Minneapolis,

More information

The degree of a typical vertex in generalized random intersection graph models

The degree of a typical vertex in generalized random intersection graph models Discrete Matheatics 306 006 15 165 www.elsevier.co/locate/disc The degree of a typical vertex in generalized rando intersection graph odels Jerzy Jaworski a, Michał Karoński a, Dudley Stark b a Departent

More information

Feature Extraction Techniques

Feature Extraction Techniques Feature Extraction Techniques Unsupervised Learning II Feature Extraction Unsupervised ethods can also be used to find features which can be useful for categorization. There are unsupervised ethods that

More information

A1. Find all ordered pairs (a, b) of positive integers for which 1 a + 1 b = 3

A1. Find all ordered pairs (a, b) of positive integers for which 1 a + 1 b = 3 A. Find all ordered pairs a, b) of positive integers for which a + b = 3 08. Answer. The six ordered pairs are 009, 08), 08, 009), 009 337, 674) = 35043, 674), 009 346, 673) = 3584, 673), 674, 009 337)

More information

arxiv: v1 [cs.ds] 29 Jan 2012

arxiv: v1 [cs.ds] 29 Jan 2012 A parallel approxiation algorith for ixed packing covering seidefinite progras arxiv:1201.6090v1 [cs.ds] 29 Jan 2012 Rahul Jain National U. Singapore January 28, 2012 Abstract Penghui Yao National U. Singapore

More information

A Better Algorithm For an Ancient Scheduling Problem. David R. Karger Steven J. Phillips Eric Torng. Department of Computer Science

A Better Algorithm For an Ancient Scheduling Problem. David R. Karger Steven J. Phillips Eric Torng. Department of Computer Science A Better Algorith For an Ancient Scheduling Proble David R. Karger Steven J. Phillips Eric Torng Departent of Coputer Science Stanford University Stanford, CA 9435-4 Abstract One of the oldest and siplest

More information

4 = (0.02) 3 13, = 0.25 because = 25. Simi-

4 = (0.02) 3 13, = 0.25 because = 25. Simi- Theore. Let b and be integers greater than. If = (. a a 2 a i ) b,then for any t N, in base (b + t), the fraction has the digital representation = (. a a 2 a i ) b+t, where a i = a i + tk i with k i =

More information

Some Perspective. Forces and Newton s Laws

Some Perspective. Forces and Newton s Laws Soe Perspective The language of Kineatics provides us with an efficient ethod for describing the otion of aterial objects, and we ll continue to ake refineents to it as we introduce additional types of

More information

1 Identical Parallel Machines

1 Identical Parallel Machines FB3: Matheatik/Inforatik Dr. Syaantak Das Winter 2017/18 Optiizing under Uncertainty Lecture Notes 3: Scheduling to Miniize Makespan In any standard scheduling proble, we are given a set of jobs J = {j

More information

ORIGAMI CONSTRUCTIONS OF RINGS OF INTEGERS OF IMAGINARY QUADRATIC FIELDS

ORIGAMI CONSTRUCTIONS OF RINGS OF INTEGERS OF IMAGINARY QUADRATIC FIELDS #A34 INTEGERS 17 (017) ORIGAMI CONSTRUCTIONS OF RINGS OF INTEGERS OF IMAGINARY QUADRATIC FIELDS Jürgen Kritschgau Departent of Matheatics, Iowa State University, Aes, Iowa jkritsch@iastateedu Adriana Salerno

More information

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search Quantu algoriths (CO 781, Winter 2008) Prof Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search ow we begin to discuss applications of quantu walks to search algoriths

More information

Math Real Analysis The Henstock-Kurzweil Integral

Math Real Analysis The Henstock-Kurzweil Integral Math 402 - Real Analysis The Henstock-Kurzweil Integral Steven Kao & Jocelyn Gonzales April 28, 2015 1 Introduction to the Henstock-Kurzweil Integral Although the Rieann integral is the priary integration

More information

Convex Programming for Scheduling Unrelated Parallel Machines

Convex Programming for Scheduling Unrelated Parallel Machines Convex Prograing for Scheduling Unrelated Parallel Machines Yossi Azar Air Epstein Abstract We consider the classical proble of scheduling parallel unrelated achines. Each job is to be processed by exactly

More information

Estimating Entropy and Entropy Norm on Data Streams

Estimating Entropy and Entropy Norm on Data Streams Estiating Entropy and Entropy Nor on Data Streas Ait Chakrabarti 1, Khanh Do Ba 1, and S. Muthukrishnan 2 1 Departent of Coputer Science, Dartouth College, Hanover, NH 03755, USA 2 Departent of Coputer

More information

On the Existence of Pure Nash Equilibria in Weighted Congestion Games

On the Existence of Pure Nash Equilibria in Weighted Congestion Games MATHEMATICS OF OPERATIONS RESEARCH Vol. 37, No. 3, August 2012, pp. 419 436 ISSN 0364-765X (print) ISSN 1526-5471 (online) http://dx.doi.org/10.1287/oor.1120.0543 2012 INFORMS On the Existence of Pure

More information

2 Q 10. Likewise, in case of multiple particles, the corresponding density in 2 must be averaged over all

2 Q 10. Likewise, in case of multiple particles, the corresponding density in 2 must be averaged over all Lecture 6 Introduction to kinetic theory of plasa waves Introduction to kinetic theory So far we have been odeling plasa dynaics using fluid equations. The assuption has been that the pressure can be either

More information

Lecture October 23. Scribes: Ruixin Qiang and Alana Shine

Lecture October 23. Scribes: Ruixin Qiang and Alana Shine CSCI699: Topics in Learning and Gae Theory Lecture October 23 Lecturer: Ilias Scribes: Ruixin Qiang and Alana Shine Today s topic is auction with saples. 1 Introduction to auctions Definition 1. In a single

More information

Upper bound on false alarm rate for landmine detection and classification using syntactic pattern recognition

Upper bound on false alarm rate for landmine detection and classification using syntactic pattern recognition Upper bound on false alar rate for landine detection and classification using syntactic pattern recognition Ahed O. Nasif, Brian L. Mark, Kenneth J. Hintz, and Nathalia Peixoto Dept. of Electrical and

More information

a a a a a a a m a b a b

a a a a a a a m a b a b Algebra / Trig Final Exa Study Guide (Fall Seester) Moncada/Dunphy Inforation About the Final Exa The final exa is cuulative, covering Appendix A (A.1-A.5) and Chapter 1. All probles will be ultiple choice

More information

Physics 215 Winter The Density Matrix

Physics 215 Winter The Density Matrix Physics 215 Winter 2018 The Density Matrix The quantu space of states is a Hilbert space H. Any state vector ψ H is a pure state. Since any linear cobination of eleents of H are also an eleent of H, it

More information

Learnability and Stability in the General Learning Setting

Learnability and Stability in the General Learning Setting Learnability and Stability in the General Learning Setting Shai Shalev-Shwartz TTI-Chicago shai@tti-c.org Ohad Shair The Hebrew University ohadsh@cs.huji.ac.il Nathan Srebro TTI-Chicago nati@uchicago.edu

More information

The Wilson Model of Cortical Neurons Richard B. Wells

The Wilson Model of Cortical Neurons Richard B. Wells The Wilson Model of Cortical Neurons Richard B. Wells I. Refineents on the odgkin-uxley Model The years since odgkin s and uxley s pioneering work have produced a nuber of derivative odgkin-uxley-like

More information

Algorithms for parallel processor scheduling with distinct due windows and unit-time jobs

Algorithms for parallel processor scheduling with distinct due windows and unit-time jobs BULLETIN OF THE POLISH ACADEMY OF SCIENCES TECHNICAL SCIENCES Vol. 57, No. 3, 2009 Algoriths for parallel processor scheduling with distinct due windows and unit-tie obs A. JANIAK 1, W.A. JANIAK 2, and

More information

Homework 3 Solutions CSE 101 Summer 2017

Homework 3 Solutions CSE 101 Summer 2017 Hoework 3 Solutions CSE 0 Suer 207. Scheduling algoriths The following n = 2 jobs with given processing ties have to be scheduled on = 3 parallel and identical processors with the objective of iniizing

More information

Descent polynomials. Mohamed Omar Department of Mathematics, Harvey Mudd College, 301 Platt Boulevard, Claremont, CA , USA,

Descent polynomials. Mohamed Omar Department of Mathematics, Harvey Mudd College, 301 Platt Boulevard, Claremont, CA , USA, Descent polynoials arxiv:1710.11033v2 [ath.co] 13 Nov 2017 Alexander Diaz-Lopez Departent of Matheatics and Statistics, Villanova University, 800 Lancaster Avenue, Villanova, PA 19085, USA, alexander.diaz-lopez@villanova.edu

More information

On Constant Power Water-filling

On Constant Power Water-filling On Constant Power Water-filling Wei Yu and John M. Cioffi Electrical Engineering Departent Stanford University, Stanford, CA94305, U.S.A. eails: {weiyu,cioffi}@stanford.edu Abstract This paper derives

More information

PREPRINT 2006:17. Inequalities of the Brunn-Minkowski Type for Gaussian Measures CHRISTER BORELL

PREPRINT 2006:17. Inequalities of the Brunn-Minkowski Type for Gaussian Measures CHRISTER BORELL PREPRINT 2006:7 Inequalities of the Brunn-Minkowski Type for Gaussian Measures CHRISTER BORELL Departent of Matheatical Sciences Division of Matheatics CHALMERS UNIVERSITY OF TECHNOLOGY GÖTEBORG UNIVERSITY

More information

Many-to-Many Matching Problem with Quotas

Many-to-Many Matching Problem with Quotas Many-to-Many Matching Proble with Quotas Mikhail Freer and Mariia Titova February 2015 Discussion Paper Interdisciplinary Center for Econoic Science 4400 University Drive, MSN 1B2, Fairfax, VA 22030 Tel:

More information

ma x = -bv x + F rod.

ma x = -bv x + F rod. Notes on Dynaical Systes Dynaics is the study of change. The priary ingredients of a dynaical syste are its state and its rule of change (also soeties called the dynaic). Dynaical systes can be continuous

More information

New upper bound for the B-spline basis condition number II. K. Scherer. Institut fur Angewandte Mathematik, Universitat Bonn, Bonn, Germany.

New upper bound for the B-spline basis condition number II. K. Scherer. Institut fur Angewandte Mathematik, Universitat Bonn, Bonn, Germany. New upper bound for the B-spline basis condition nuber II. A proof of de Boor's 2 -conjecture K. Scherer Institut fur Angewandte Matheati, Universitat Bonn, 535 Bonn, Gerany and A. Yu. Shadrin Coputing

More information

. The univariate situation. It is well-known for a long tie that denoinators of Pade approxiants can be considered as orthogonal polynoials with respe

. The univariate situation. It is well-known for a long tie that denoinators of Pade approxiants can be considered as orthogonal polynoials with respe PROPERTIES OF MULTIVARIATE HOMOGENEOUS ORTHOGONAL POLYNOMIALS Brahi Benouahane y Annie Cuyt? Keywords Abstract It is well-known that the denoinators of Pade approxiants can be considered as orthogonal

More information

N-Point. DFTs of Two Length-N Real Sequences

N-Point. DFTs of Two Length-N Real Sequences Coputation of the DFT of In ost practical applications, sequences of interest are real In such cases, the syetry properties of the DFT given in Table 5. can be exploited to ake the DFT coputations ore

More information

Machine Learning Basics: Estimators, Bias and Variance

Machine Learning Basics: Estimators, Bias and Variance Machine Learning Basics: Estiators, Bias and Variance Sargur N. srihari@cedar.buffalo.edu This is part of lecture slides on Deep Learning: http://www.cedar.buffalo.edu/~srihari/cse676 1 Topics in Basics

More information

APPROXIMATION BY GENERALIZED FABER SERIES IN BERGMAN SPACES ON INFINITE DOMAINS WITH A QUASICONFORMAL BOUNDARY

APPROXIMATION BY GENERALIZED FABER SERIES IN BERGMAN SPACES ON INFINITE DOMAINS WITH A QUASICONFORMAL BOUNDARY NEW ZEALAND JOURNAL OF MATHEMATICS Volue 36 007, 11 APPROXIMATION BY GENERALIZED FABER SERIES IN BERGMAN SPACES ON INFINITE DOMAINS WITH A QUASICONFORMAL BOUNDARY Daniyal M. Israfilov and Yunus E. Yildirir

More information

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and This article appeared in a ournal published by Elsevier. The attached copy is furnished to the author for internal non-coercial research and education use, including for instruction at the authors institution

More information

Exact tensor completion with sum-of-squares

Exact tensor completion with sum-of-squares Proceedings of Machine Learning Research vol 65:1 54, 2017 30th Annual Conference on Learning Theory Exact tensor copletion with su-of-squares Aaron Potechin Institute for Advanced Study, Princeton David

More information

time time δ jobs jobs

time time δ jobs jobs Approxiating Total Flow Tie on Parallel Machines Stefano Leonardi Danny Raz y Abstract We consider the proble of optiizing the total ow tie of a strea of jobs that are released over tie in a ultiprocessor

More information

CHAPTER 19: Single-Loop IMC Control

CHAPTER 19: Single-Loop IMC Control When I coplete this chapter, I want to be able to do the following. Recognize that other feedback algoriths are possible Understand the IMC structure and how it provides the essential control features

More information

LATTICE POINT SOLUTION OF THE GENERALIZED PROBLEM OF TERQUEi. AND AN EXTENSION OF FIBONACCI NUMBERS.

LATTICE POINT SOLUTION OF THE GENERALIZED PROBLEM OF TERQUEi. AND AN EXTENSION OF FIBONACCI NUMBERS. i LATTICE POINT SOLUTION OF THE GENERALIZED PROBLEM OF TERQUEi. AND AN EXTENSION OF FIBONACCI NUMBERS. C. A. CHURCH, Jr. and H. W. GOULD, W. Virginia University, Morgantown, W. V a. In this paper we give

More information

On the Communication Complexity of Lipschitzian Optimization for the Coordinated Model of Computation

On the Communication Complexity of Lipschitzian Optimization for the Coordinated Model of Computation journal of coplexity 6, 459473 (2000) doi:0.006jco.2000.0544, available online at http:www.idealibrary.co on On the Counication Coplexity of Lipschitzian Optiization for the Coordinated Model of Coputation

More information

Figure 1: Equivalent electric (RC) circuit of a neurons membrane

Figure 1: Equivalent electric (RC) circuit of a neurons membrane Exercise: Leaky integrate and fire odel of neural spike generation This exercise investigates a siplified odel of how neurons spike in response to current inputs, one of the ost fundaental properties of

More information

When Short Runs Beat Long Runs

When Short Runs Beat Long Runs When Short Runs Beat Long Runs Sean Luke George Mason University http://www.cs.gu.edu/ sean/ Abstract What will yield the best results: doing one run n generations long or doing runs n/ generations long

More information

#A52 INTEGERS 10 (2010), COMBINATORIAL INTERPRETATIONS OF BINOMIAL COEFFICIENT ANALOGUES RELATED TO LUCAS SEQUENCES

#A52 INTEGERS 10 (2010), COMBINATORIAL INTERPRETATIONS OF BINOMIAL COEFFICIENT ANALOGUES RELATED TO LUCAS SEQUENCES #A5 INTEGERS 10 (010), 697-703 COMBINATORIAL INTERPRETATIONS OF BINOMIAL COEFFICIENT ANALOGUES RELATED TO LUCAS SEQUENCES Bruce E Sagan 1 Departent of Matheatics, Michigan State University, East Lansing,

More information

Fairness via priority scheduling

Fairness via priority scheduling Fairness via priority scheduling Veeraruna Kavitha, N Heachandra and Debayan Das IEOR, IIT Bobay, Mubai, 400076, India vavitha,nh,debayan}@iitbacin Abstract In the context of ulti-agent resource allocation

More information

12 Towards hydrodynamic equations J Nonlinear Dynamics II: Continuum Systems Lecture 12 Spring 2015

12 Towards hydrodynamic equations J Nonlinear Dynamics II: Continuum Systems Lecture 12 Spring 2015 18.354J Nonlinear Dynaics II: Continuu Systes Lecture 12 Spring 2015 12 Towards hydrodynaic equations The previous classes focussed on the continuu description of static (tie-independent) elastic systes.

More information

Lower Bounds for Quantized Matrix Completion

Lower Bounds for Quantized Matrix Completion Lower Bounds for Quantized Matrix Copletion Mary Wootters and Yaniv Plan Departent of Matheatics University of Michigan Ann Arbor, MI Eail: wootters, yplan}@uich.edu Mark A. Davenport School of Elec. &

More information

Fixed-to-Variable Length Distribution Matching

Fixed-to-Variable Length Distribution Matching Fixed-to-Variable Length Distribution Matching Rana Ali Ajad and Georg Böcherer Institute for Counications Engineering Technische Universität München, Gerany Eail: raa2463@gail.co,georg.boecherer@tu.de

More information

Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links

Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Tie-Varying Jaing Links Jun Kurihara KDDI R&D Laboratories, Inc 2 5 Ohara, Fujiino, Saitaa, 356 8502 Japan Eail: kurihara@kddilabsjp

More information

Probability Distributions

Probability Distributions Probability Distributions In Chapter, we ephasized the central role played by probability theory in the solution of pattern recognition probles. We turn now to an exploration of soe particular exaples

More information

Solutions 1. Introduction to Coding Theory - Spring 2010 Solutions 1. Exercise 1.1. See Examples 1.2 and 1.11 in the course notes.

Solutions 1. Introduction to Coding Theory - Spring 2010 Solutions 1. Exercise 1.1. See Examples 1.2 and 1.11 in the course notes. Solutions 1 Exercise 1.1. See Exaples 1.2 and 1.11 in the course notes. Exercise 1.2. Observe that the Haing distance of two vectors is the iniu nuber of bit flips required to transfor one into the other.

More information

Computable Shell Decomposition Bounds

Computable Shell Decomposition Bounds Coputable Shell Decoposition Bounds John Langford TTI-Chicago jcl@cs.cu.edu David McAllester TTI-Chicago dac@autoreason.co Editor: Leslie Pack Kaelbling and David Cohn Abstract Haussler, Kearns, Seung

More information

A Note on Online Scheduling for Jobs with Arbitrary Release Times

A Note on Online Scheduling for Jobs with Arbitrary Release Times A Note on Online Scheduling for Jobs with Arbitrary Release Ties Jihuan Ding, and Guochuan Zhang College of Operations Research and Manageent Science, Qufu Noral University, Rizhao 7686, China dingjihuan@hotail.co

More information

arxiv: v2 [math.co] 3 Dec 2008

arxiv: v2 [math.co] 3 Dec 2008 arxiv:0805.2814v2 [ath.co] 3 Dec 2008 Connectivity of the Unifor Rando Intersection Graph Sion R. Blacburn and Stefanie Gere Departent of Matheatics Royal Holloway, University of London Egha, Surrey TW20

More information

Math Reviews classifications (2000): Primary 54F05; Secondary 54D20, 54D65

Math Reviews classifications (2000): Primary 54F05; Secondary 54D20, 54D65 The Monotone Lindelöf Property and Separability in Ordered Spaces by H. Bennett, Texas Tech University, Lubbock, TX 79409 D. Lutzer, College of Willia and Mary, Williasburg, VA 23187-8795 M. Matveev, Irvine,

More information

Improved Guarantees for Agnostic Learning of Disjunctions

Improved Guarantees for Agnostic Learning of Disjunctions Iproved Guarantees for Agnostic Learning of Disjunctions Pranjal Awasthi Carnegie Mellon University pawasthi@cs.cu.edu Avri Blu Carnegie Mellon University avri@cs.cu.edu Or Sheffet Carnegie Mellon University

More information

Combining Classifiers

Combining Classifiers Cobining Classifiers Generic ethods of generating and cobining ultiple classifiers Bagging Boosting References: Duda, Hart & Stork, pg 475-480. Hastie, Tibsharini, Friedan, pg 246-256 and Chapter 10. http://www.boosting.org/

More information

Lost-Sales Problems with Stochastic Lead Times: Convexity Results for Base-Stock Policies

Lost-Sales Problems with Stochastic Lead Times: Convexity Results for Base-Stock Policies OPERATIONS RESEARCH Vol. 52, No. 5, Septeber October 2004, pp. 795 803 issn 0030-364X eissn 1526-5463 04 5205 0795 infors doi 10.1287/opre.1040.0130 2004 INFORMS TECHNICAL NOTE Lost-Sales Probles with

More information

Reduced Length Checking Sequences

Reduced Length Checking Sequences Reduced Length Checing Sequences Robert M. Hierons 1 and Hasan Ural 2 1 Departent of Inforation Systes and Coputing, Brunel University, Middlesex, UB8 3PH, United Kingdo 2 School of Inforation echnology

More information

Random Reals à la Chaitin with or without prefix-freeness

Random Reals à la Chaitin with or without prefix-freeness Random Reals à la Chaitin with or without prefix-freeness Verónica Becher Departamento de Computación, FCEyN Universidad de Buenos Aires - CONICET Argentina vbecher@dc.uba.ar Serge Grigorieff LIAFA, Université

More information

Multi-Dimensional Hegselmann-Krause Dynamics

Multi-Dimensional Hegselmann-Krause Dynamics Multi-Diensional Hegselann-Krause Dynaics A. Nedić Industrial and Enterprise Systes Engineering Dept. University of Illinois Urbana, IL 680 angelia@illinois.edu B. Touri Coordinated Science Laboratory

More information

Intelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines

Intelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines Intelligent Systes: Reasoning and Recognition Jaes L. Crowley osig 1 Winter Seester 2018 Lesson 6 27 February 2018 Outline Perceptrons and Support Vector achines Notation...2 Linear odels...3 Lines, Planes

More information

The isomorphism problem of Hausdorff measures and Hölder restrictions of functions

The isomorphism problem of Hausdorff measures and Hölder restrictions of functions The isoorphis proble of Hausdorff easures and Hölder restrictions of functions Doctoral thesis András Máthé PhD School of Matheatics Pure Matheatics Progra School Leader: Prof. Miklós Laczkovich Progra

More information