Constant-Space String-Matching. in Sublinear Average Time. (Extended Abstract) Wojciech Rytter z. Warsaw University. and. University of Liverpool
|
|
- Evelyn Fletcher
- 5 years ago
- Views:
Transcription
1 Constant-Space String-Matching in Sublinear Average Tie (Extended Abstract) Maxie Crocheore Universite de Marne-la-Vallee Leszek Gasieniec y Max-Planck Institut fur Inforatik Wojciech Rytter z Warsaw University and University of Liverpool Abstract Given two strings: pattern P of length and text T of length n. The stringatching proble is to nd all occurrences of the pattern P in the text T. We present a siple string-atching algoriths which works in average o(n) tie with constant additional space for one-diensional texts and two-diensional arrays. This is the rst attept to the sall-space string-atching proble in which sublinear tie algoriths are delivered. More precisely we show that all occurrences of one- or two-diensional patterns can be found in O( n r ) average tie with constant eory, where r is the repetition size (size of the longest repeated subword) of P. Institut Gaspard Monge, Universite de Marne-la-Vallee, France (ac@univ-lv.fr). ymax-planck Institut fur Inforatik, I Stadtwald, D{66123 Saarbrucken, Gerany (leszek@pi-sb.pg.de). zinstitute of Inforatics, Warsaw University, Poland and Departent of Coputer Science, University of Liverpool, U.K. Supported by the grant KBN 8T11C208 (rytter@iuw.edu.pl).
2 1 Introduction The string-atching proble is dened as follows. Assue we are given two strings: pattern P of length and text T of length n. The pattern occurs at position i in text T i P = T [i::i +? 1]. We consider algoriths that deterine all occurrences of the pattern P in the text T. The coplexity of the string atching algorith is easured by the nuber of sybol coparisons of pattern and text sybols. The algoriths solving string-atching proble in linear tie and constant space are perhaps the ost interesting ones aong all designed for the entire proble. The rst algorith which uses a constant aount of additional eory was proposed by Galil and Seiferas in [8]. Later Crocheore and Perrin in [4] have presented an algorith that achieves a saller (at ost 2n) nuber of coparisons while preserving the sall aount of eory. Then, another iproveent ( 3 ) on the nuber of coparisons 2 was presented by Breslauer in [2]. In the eantie, alternative algoriths were introduced by Gasieniec, Plandowski and Rytter in [9] (2 + ") and [10] (1 + "). Besides there are known algoriths which ake a sublinear nuber of coparisons on the average. The rst such ethod was proposed in [11] for strings. An attept to 2d-diensional pattern atching fast on the average is due to Baeza-Yates and Regnier in [1]. However all known sublinear average tie algoriths use a linear-size additional eory to keep a table of shifts as in the Boyer-Moore algorith, (see e.g. [11], [7]), or for the representation of a directed subword graph or equivalent data structures (see e.g. [3] and [6]). The latter algoriths have the best possible O( n log ) average tie coplexity due to lower bound of Yao [12]. One can try to nd a trade-o between sall space and good average tie applying techniques fro [3] to the subwords of the pattern P. This ight lead to an algorith which uses O(s) space (size of the preprocessed subwords) and has O( n log s ) average s tie. Until now there was no algorith both perforing an average sublinear nuber of coparisons and using only constant eory space. In this paper we present the novel idea of such an algorith for one-diensional strings as well as for two-diensional arrays. The idea of the algoriths is based on the use of subword repetitions. For the siplicity of the presentation we assue that all strings considered in the paper are built over a binary alphabet = fa, bg. We say that the word w 2 has a period q (0 < q jwj) if w[i] = w[i + q] for
3 all positions 1 i jwj? q. The shortest period of w is called the period of w. If it satises q jwj=2, then the word w is called periodic; otherwise, w is called nonperiodic. 2 Nonperiodic one-diensional patterns In this section we assue that the pattern P is nonperiodic. Let us denote by rep size(p ) the size of the length of a largest subword of P. Exaple 1. The repeated subword in an exaple text given below is indicated here in bold. rep size(ababbaababaaababbaababba) = 9. The nuber of logarithic-size subwords of a text is large enough to guarantee that at least one of the repeats. This iplies easily the following fact. Lea 1 For each pattern P of size rep size(p ) = (log ). Denote r = rep size(p ), and let w be a longest repeated subword. Assue P [p? r::p? 1] = P [q? r::q? 1]; p q? r and P [p] 6= P [q]: In Exaple 1 we have (w; r; p; q) = (babbaabab; 9; 11; 23). The positions p; q are isatches w.r.t. the repetition of the word w. In general if there are no isatch positions based on repetition w to the right of two copies of w then we try to nd the to the left reversing the string-atching process. In case no isatch is found neither to the right nor to the left it eans that the repetition occurs at the borders of the pattern. This case is handled siilarly to the periodic case discussed in the next section. We say that a position i in T is a isatch position i T [i + p? 1] 6= T [i + q? 1]. We call a window any interval of positions [i::i+r?1] on the T, for 1 i n?r+1. Assue w.l.o.g. that we already know the 4-tuple (w; r; p; q).
4 Denote by Leftost Misatch(W ) the procedure that nds the rst (fro the left) isatch position in a given window W. If there is no such a isatch position then a special value nil is returned. Lea 2 (1). If Leftost Misatch(W ) = nil, no position of P in T is in W, (2). Otherwise, no position of P in T is in W? fleftost Misatch(W )g. The isatch is used as a constant-size deterinistic saple. 2 Denote by Naive Check(i) the procedure that tests a possible occurrence of P starting at a given position i in T and that tests the equality of corresponding sybols fro left to right. In the worst case, coparisons are done, but for rando binary texts T the average tie is really sall. We assue that sybols of the text are uniforly distributed. Lea 3 On rando texts each of the procedures Naive Check and Leftost Misatch akes on the average less than 2 coparisons. The su i 2 i is bounded by 2. 2 Lea 4 Assue that pattern P is nonperiodic. Then, for a rando text T, we can nd all the occurrences of P in T in O( n rep size(p ) n ), which is O( ), average tie using constant log additional eory. The worst-case running tie of the algorith is O(n). There are O(n=r) iterations in the algorith Nonperiodic Pattern Searching below. Each iteration uses at ost 4 coparisons on the average both for execution of Naive Check and Leftost Misatch, due to Lea 3. The coparisons done during dierent iterations can be dependent on each other, but the independence is not needed according to the fact that the average value of a su of rando variables is the su of their average value. Therefore the algorith akes altogether at ost O(n=r) coparisons on the average.
5 ALGORITHM Nonperiodic Pattern Searching; f nonperiodic pattern g; i:= 1; r:= rep size(p ); while i n? do begin W := [i::i + r? 1]; i 0 := Leftost Misatch(W ) if i 0 6= nil then end if Naive Check(i 0 ) then report atch at i 0 ; i:= i + r; Siilarly to the algorith presented in [10] we can guarantee the linear worst-case tie of the algorith Nonperiodic Pattern Searching since the shifts are based on a longest repeated subword of the pattern. This copletes the proof. 2 3 Periodic one-diensional patterns Assue now that P is periodic, so obviously its repetition size is large. Lea 5 If P is periodic then rep size(p ) 2. In this situation we cannot use the approach based on 4-tuples (w; r; p; q). Thus we derive a slightly dierent algorith, which is even ore ecient than the one used in nonperiodic case. Lea 6 Assue P is periodic. Then for a rando text T we can nd all occurrences of P in T in O( n ) average tie using constant additional eory. The worst-case tie of the algorith is linear. Assue p is the period of P, where p jp j=2. We can partition the positions in
6 T into disjoint consecutive large windows; each window consists of =2 consecutive positions of T (the last one can be saller). The rst large window is [1::=2]. n The algorith akes iterations. We process each large window as follows. Assue that the current window is [i + 1::i + =2]. =2 Phase 1. nd the rightost isatch in T according to the period p in the segent [i+1::i+]. If a isatch is found then switch to the next window [i+=2+1::i+] and execute Phase 1 again, otherwise Phase 2. search naively for an occurrence of P starting in the current window The probability that we do not have a isatch in Phase 1 is exponentially sall, so the expected cost of the second phase is very sall even if we search for the occurence naively. The expected tie to nd a isatch in the rst phase is O(1). There are O(n=) iterations, so the total cost is as required. This copletes the proof. 2 The algorith for the nonperiodic case when repetition is placed on borders is handled in the sae way but with windows of size O(r). Lea 4 and Lea 6 iply the following result. Theore 7 n For a rando text T we can nd all occurrences of P in T in O( ) rep size(p average ) tie (which is O( n )) using constant additional eory. The worst-case tie of log the algorith is linear. 4 Two-diensional pattern-atching In this section we show that also for the 2d-pattern atching proble the eciency of a search depends on the repetition size. Assue the pattern P and the text T are and n n sybol arrays, respectively. Denote N = n 2 ; M = 2. We say that the pattern occurs in T at position (i; j) i P [x; y] = T [i + x?1; j + y? 1] for all integers 1 x; y. A 2-diensional pattern P has a period [a; b] if P [i; j] = P [i + a; j + b], for all 1 i? a and 1 j? b.
7 If pattern P has a period [a; b] such that axfa; bg 2 Denote by 1rep size(p ) the axiu repetition size of a row of P. then it is called periodic. Theore 8 Assue P and T are two-diensional texts. For a rando two-diensional text T there is an algorith that nds all the occurrences of P in T tie O( which is O( N log M periodic row then the algorith perfors only O( N ) coparisons. N 1rep size(p ), )), average tie using constant additional eory. If P contains a Siilarly as in 1-diensional case we consider periodic and nonperiodic case separately. The algorith is alost the sae as for one diension. We can construct a 2-diensional version of the algorith Nonperiodic Pattern Searching. In the case where all rows of the pattern are nonperiodic, the algorith takes the rst row of the pattern and looks for it scanning each row of T partitioned into windows of size 1rep size(p ). For each window at least one position involves a test for an occurrence of the whole pattern. Instead of Naive Check(i 0 ), a version for 2 diensions 2d-Naive Check(i 0 ; j 0 ) is used. According to lea 1 we have altogether N=1rep size(p ) windows, and in each of the the average nuber of coparisons is constant. Hence the total nuber of coparisons is O(N=1rep size(p )), which is O( N ) since 1rep size(p ) = (log M). log M In the case where pattern P has at least one periodic row, the algorith chooses one such row and then proceeds in a siilar way as in 1-diensional case. Each row of T is partitioned into large windows. There are O( N ) such windows, and in each of the the algorith akes a constant nuber of coparisons on the average. Hence the total nuber of coparisons is O( N ). This copletes the proof. 2 In the case of a periodic pattern P the text search can be done faster. Theore 9 If the pattern P is periodic the search for it in T can be done in tie O( N M ). Since the pattern P is periodic it has two repeated subrectangles of size at least (see g. 1, and the shaded areas naed A), which denes a set of pairs of 2 2 equal sybols of size (M). We consider right botto quadrants D and E of these rectangles. The 2-diensional sapling is using this set as follows. Assue that there
8 > /2 pattern P subsquare D text T A > / A 1 P > /4 short period isatch C > /4 the window x subsquare D y subsquare E large repeated squares subsquare E Figure 1: Sapling in 2-diensions, if there is isatch between position x and y then there is no occurrence of P starting in the indicated window. is a pair of dierent sybols (x; y) in the text T whose positions dier exactly by a vector that is a short period in P. Let sybol x belong to square D and let y belong to E. Then there is no any occurrence of pattern P in the window B. Using the latter observation the text T is divided into windows of size at least 4 4 = (M) (corresponding to rst quadrant of A). The search in every window starts fro the test of equality of sybols in pairs between windows E and D. Since the text is rando the algorith akes only a constant nuber of tests on the average in every window, and this nally gives the O( N ) desired bound. 2 M We can dene 2-diensional repetition size of 2d-pattern P (2drep size(p), in short) as the largest repeated subsquare area of P. Siilarly to 1-diensional case we can prove that. Theore 10 For a rando two-diensional text T there is an algorith that nds all the occurrences of P in T in O( N 2drep size(p ) ) average tie using constant additional eory. 5 Suary The ain result of the paper is a constant space algorith that perfors O(n= log()) coparisons on the average for one-diensional as well as for two-diensional texts.
9 In the case of periodic patterns the average behavior of the algorith is even better, reaching the asyptotic bound of O( n ). Our paper initiates a discussion about pattern atching algoriths using sall space and that are fast on the average. In this paper we have done soe steps towards the goal but we think that the ost interesting proble is still open: what is the exact average coplexity of constant-space string atching? Or respectively: what is the space bound needed by any algorith aking O( n log()) coparisons on the average. References [1] R. Baeza-Yates and M. Regnier, Fast Algoriths for two-diensional and Multiple Pattern Matching, In Proc. of 2nd Scandinavian Workshop on Algorith Theory, SWAT'90, LNCS 447, pp [2] D. Breslauer, Saving Coparisons in the Crocheore{Perrin String Matching Algorith. In Proc. of 1st European Syp. on Algoriths, p. 61{72, [3] M. Crocheore, A. Czuaj, L. Gasieniec, S. Jaroinek, T. Lecroq, W. Plandowski, and W. Rytter. Speeding up two string atching algoriths, Algorithica (1994) 12, pp.247{267. [4] M. Crocheore and D. Perrin, Two-way string-atching. J. Assoc. Coput. Mach., 38(3), p. 651{675, [5] M. Crocheore and W. Rytter, Periodic Prexes in Texts. In Proc. of Sequences'91 Workshop Sequences II: Methods in Counication, Security and Coputer Science, p. 153{165, Springer{Verlag, [6] M. Crocheore and W. Rytter, Text algoriths. Oxford University Press [7] Z. Galil, On iproving the worst case running tie of the Boyer-Moore string searching algorith. CACM 22, (1979) [8] Z. Galil and J. Seiferas, Tie-space-optial string atching. J. Coput. Syste Sci., 26, p. 280{294, [9] L. Gasieniec, W. Plandowski and W. Rytter, The zooing ethod: a recursive approach to tie-space ecient string-atching. Theoret. Coput. Sci. 1996
10 [10] L. Gasieniec, W. Plandowski and W. Rytter, Sequential sapling: a new approach to constant space pattern-atching. CPM 1995 [11] D.E. Knuth, J.H. Morris and V.R. Pratt, Fast pattern atching in strings. SIAM J. Coput., 6, p. 322{350, [12] A.C. Yao, The Coplexity of Pattern Matching for a Rando String, SIAM Journal on Coputing, 8(3), pp. 368{387, August 1979.
List Scheduling and LPT Oliver Braun (09/05/2017)
List Scheduling and LPT Oliver Braun (09/05/207) We investigate the classical scheduling proble P ax where a set of n independent jobs has to be processed on 2 parallel and identical processors (achines)
More informationOptimal Parallel Sux Tree Construction. Ramesh Hariharan y. April 1, Abstract
Optial Parallel Sux Tree Construction Raesh Hariharan y April 1, 1997 Abstract An O()-work, O()-space, O(log 4 )-tie CREW-PRAM algorith for constructing the sux tree of a string s of length drawn fro any
More informationA Better Algorithm For an Ancient Scheduling Problem. David R. Karger Steven J. Phillips Eric Torng. Department of Computer Science
A Better Algorith For an Ancient Scheduling Proble David R. Karger Steven J. Phillips Eric Torng Departent of Coputer Science Stanford University Stanford, CA 9435-4 Abstract One of the oldest and siplest
More informationBlock designs and statistics
Bloc designs and statistics Notes for Math 447 May 3, 2011 The ain paraeters of a bloc design are nuber of varieties v, bloc size, nuber of blocs b. A design is built on a set of v eleents. Each eleent
More informationHomework 3 Solutions CSE 101 Summer 2017
Hoework 3 Solutions CSE 0 Suer 207. Scheduling algoriths The following n = 2 jobs with given processing ties have to be scheduled on = 3 parallel and identical processors with the objective of iniizing
More informationFixed-to-Variable Length Distribution Matching
Fixed-to-Variable Length Distribution Matching Rana Ali Ajad and Georg Böcherer Institute for Counications Engineering Technische Universität München, Gerany Eail: raa2463@gail.co,georg.boecherer@tu.de
More informationA note on the multiplication of sparse matrices
Cent. Eur. J. Cop. Sci. 41) 2014 1-11 DOI: 10.2478/s13537-014-0201-x Central European Journal of Coputer Science A note on the ultiplication of sparse atrices Research Article Keivan Borna 12, Sohrab Aboozarkhani
More informationarxiv: v2 [cs.ds] 14 Jan 2016
On the Average-case Coplexity of Pattern Matching with Wildcards Carl Barton Blizard Institute, Bart s and the London School of Medicine and Dentistry, Queen Mary University of London, UK c.barton@qul.ac.uk
More informationA Simple Regression Problem
A Siple Regression Proble R. M. Castro March 23, 2 In this brief note a siple regression proble will be introduced, illustrating clearly the bias-variance tradeoff. Let Y i f(x i ) + W i, i,..., n, where
More informationOn Poset Merging. 1 Introduction. Peter Chen Guoli Ding Steve Seiden. Keywords: Merging, Partial Order, Lower Bounds. AMS Classification: 68W40
On Poset Merging Peter Chen Guoli Ding Steve Seiden Abstract We consider the follow poset erging proble: Let X and Y be two subsets of a partially ordered set S. Given coplete inforation about the ordering
More informationFinite fields. and we ve used it in various examples and homework problems. In these notes I will introduce more finite fields
Finite fields I talked in class about the field with two eleents F 2 = {, } and we ve used it in various eaples and hoework probles. In these notes I will introduce ore finite fields F p = {,,...,p } for
More information13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices
CS71 Randoness & Coputation Spring 018 Instructor: Alistair Sinclair Lecture 13: February 7 Disclaier: These notes have not been subjected to the usual scrutiny accorded to foral publications. They ay
More informationAlgorithms for parallel processor scheduling with distinct due windows and unit-time jobs
BULLETIN OF THE POLISH ACADEMY OF SCIENCES TECHNICAL SCIENCES Vol. 57, No. 3, 2009 Algoriths for parallel processor scheduling with distinct due windows and unit-tie obs A. JANIAK 1, W.A. JANIAK 2, and
More informationExpected Behavior of Bisection Based Methods for Counting and. Computing the Roots of a Function D.J. KAVVADIAS, F.S. MAKRI, M.N.
Expected Behavior of Bisection Based Methods for Counting and Coputing the Roots of a Function D.J. KAVVADIAS, F.S. MAKRI, M.N. VRAHATIS Departent of Matheatics, University of Patras, GR-261.10 Patras,
More informationConvex Programming for Scheduling Unrelated Parallel Machines
Convex Prograing for Scheduling Unrelated Parallel Machines Yossi Azar Air Epstein Abstract We consider the classical proble of scheduling parallel unrelated achines. Each job is to be processed by exactly
More informationarxiv: v1 [cs.ds] 3 Feb 2014
arxiv:40.043v [cs.ds] 3 Feb 04 A Bound on the Expected Optiality of Rando Feasible Solutions to Cobinatorial Optiization Probles Evan A. Sultani The Johns Hopins University APL evan@sultani.co http://www.sultani.co/
More informationNon-Parametric Non-Line-of-Sight Identification 1
Non-Paraetric Non-Line-of-Sight Identification Sinan Gezici, Hisashi Kobayashi and H. Vincent Poor Departent of Electrical Engineering School of Engineering and Applied Science Princeton University, Princeton,
More informationThis model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t.
CS 493: Algoriths for Massive Data Sets Feb 2, 2002 Local Models, Bloo Filter Scribe: Qin Lv Local Models In global odels, every inverted file entry is copressed with the sae odel. This work wells when
More informationE0 370 Statistical Learning Theory Lecture 6 (Aug 30, 2011) Margin Analysis
E0 370 tatistical Learning Theory Lecture 6 (Aug 30, 20) Margin Analysis Lecturer: hivani Agarwal cribe: Narasihan R Introduction In the last few lectures we have seen how to obtain high confidence bounds
More informationWhen Short Runs Beat Long Runs
When Short Runs Beat Long Runs Sean Luke George Mason University http://www.cs.gu.edu/ sean/ Abstract What will yield the best results: doing one run n generations long or doing runs n/ generations long
More informationA Note on Scheduling Tall/Small Multiprocessor Tasks with Unit Processing Time to Minimize Maximum Tardiness
A Note on Scheduling Tall/Sall Multiprocessor Tasks with Unit Processing Tie to Miniize Maxiu Tardiness Philippe Baptiste and Baruch Schieber IBM T.J. Watson Research Center P.O. Box 218, Yorktown Heights,
More informationFeature Extraction Techniques
Feature Extraction Techniques Unsupervised Learning II Feature Extraction Unsupervised ethods can also be used to find features which can be useful for categorization. There are unsupervised ethods that
More informationA Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine. (1900 words)
1 A Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine (1900 words) Contact: Jerry Farlow Dept of Matheatics Univeristy of Maine Orono, ME 04469 Tel (07) 866-3540 Eail: farlow@ath.uaine.edu
More informationUsing EM To Estimate A Probablity Density With A Mixture Of Gaussians
Using EM To Estiate A Probablity Density With A Mixture Of Gaussians Aaron A. D Souza adsouza@usc.edu Introduction The proble we are trying to address in this note is siple. Given a set of data points
More informationSPECTRUM sensing is a core concept of cognitive radio
World Acadey of Science, Engineering and Technology International Journal of Electronics and Counication Engineering Vol:6, o:2, 202 Efficient Detection Using Sequential Probability Ratio Test in Mobile
More informatione-companion ONLY AVAILABLE IN ELECTRONIC FORM
OPERATIONS RESEARCH doi 10.1287/opre.1070.0427ec pp. ec1 ec5 e-copanion ONLY AVAILABLE IN ELECTRONIC FORM infors 07 INFORMS Electronic Copanion A Learning Approach for Interactive Marketing to a Custoer
More informationComputational and Statistical Learning Theory
Coputational and Statistical Learning Theory Proble sets 5 and 6 Due: Noveber th Please send your solutions to learning-subissions@ttic.edu Notations/Definitions Recall the definition of saple based Radeacher
More informationCS Lecture 13. More Maximum Likelihood
CS 6347 Lecture 13 More Maxiu Likelihood Recap Last tie: Introduction to axiu likelihood estiation MLE for Bayesian networks Optial CPTs correspond to epirical counts Today: MLE for CRFs 2 Maxiu Likelihood
More informationOn the Communication Complexity of Lipschitzian Optimization for the Coordinated Model of Computation
journal of coplexity 6, 459473 (2000) doi:0.006jco.2000.0544, available online at http:www.idealibrary.co on On the Counication Coplexity of Lipschitzian Optiization for the Coordinated Model of Coputation
More informationFast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials
Fast Montgoery-like Square Root Coputation over GF( ) for All Trinoials Yin Li a, Yu Zhang a, a Departent of Coputer Science and Technology, Xinyang Noral University, Henan, P.R.China Abstract This letter
More informationMulticollision Attacks on Some Generalized Sequential Hash Functions
Multicollision Attacks on Soe Generalized Sequential Hash Functions M. Nandi David R. Cheriton School of Coputer Science University of Waterloo Waterloo, Ontario N2L 3G1, Canada 2nandi@uwaterloo.ca D.
More informationSharp Time Data Tradeoffs for Linear Inverse Problems
Sharp Tie Data Tradeoffs for Linear Inverse Probles Saet Oyak Benjain Recht Mahdi Soltanolkotabi January 016 Abstract In this paper we characterize sharp tie-data tradeoffs for optiization probles used
More informationDistance Optimal Target Assignment in Robotic Networks under Communication and Sensing Constraints
Distance Optial Target Assignent in Robotic Networks under Counication and Sensing Constraints Jingjin Yu CSAIL @ MIT/MechE @ BU Soon-Jo Chung Petros G. Voulgaris AE @ University of Illinois Supported
More informationBootstrapping Dependent Data
Bootstrapping Dependent Data One of the key issues confronting bootstrap resapling approxiations is how to deal with dependent data. Consider a sequence fx t g n t= of dependent rando variables. Clearly
More informationLeft-to-right maxima in words and multiset permutations
Left-to-right axia in words and ultiset perutations Ay N. Myers Saint Joseph s University Philadelphia, PA 19131 Herbert S. Wilf University of Pennsylvania Philadelphia, PA 19104
More informationBipartite subgraphs and the smallest eigenvalue
Bipartite subgraphs and the sallest eigenvalue Noga Alon Benny Sudaov Abstract Two results dealing with the relation between the sallest eigenvalue of a graph and its bipartite subgraphs are obtained.
More informationEstimating Entropy and Entropy Norm on Data Streams
Estiating Entropy and Entropy Nor on Data Streas Ait Chakrabarti 1, Khanh Do Ba 1, and S. Muthukrishnan 2 1 Departent of Coputer Science, Dartouth College, Hanover, NH 03755, USA 2 Departent of Coputer
More informationSupport Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization
Recent Researches in Coputer Science Support Vector Machine Classification of Uncertain and Ibalanced data using Robust Optiization RAGHAV PAT, THEODORE B. TRAFALIS, KASH BARKER School of Industrial Engineering
More informationNew Slack-Monotonic Schedulability Analysis of Real-Time Tasks on Multiprocessors
New Slack-Monotonic Schedulability Analysis of Real-Tie Tasks on Multiprocessors Risat Mahud Pathan and Jan Jonsson Chalers University of Technology SE-41 96, Göteborg, Sweden {risat, janjo}@chalers.se
More informationUnderstanding Machine Learning Solution Manual
Understanding Machine Learning Solution Manual Written by Alon Gonen Edited by Dana Rubinstein Noveber 17, 2014 2 Gentle Start 1. Given S = ((x i, y i )), define the ultivariate polynoial p S (x) = i []:y
More informationFairness via priority scheduling
Fairness via priority scheduling Veeraruna Kavitha, N Heachandra and Debayan Das IEOR, IIT Bobay, Mubai, 400076, India vavitha,nh,debayan}@iitbacin Abstract In the context of ulti-agent resource allocation
More informationMidterm 1 Sample Solution
Midter 1 Saple Solution NOTE: Throughout the exa a siple graph is an undirected, unweighted graph with no ultiple edges (i.e., no exact repeats of the sae edge) and no self-loops (i.e., no edges fro a
More informationCharacterization of the Line Complexity of Cellular Automata Generated by Polynomial Transition Rules. Bertrand Stone
Characterization of the Line Coplexity of Cellular Autoata Generated by Polynoial Transition Rules Bertrand Stone Abstract Cellular autoata are discrete dynaical systes which consist of changing patterns
More informationtime time δ jobs jobs
Approxiating Total Flow Tie on Parallel Machines Stefano Leonardi Danny Raz y Abstract We consider the proble of optiizing the total ow tie of a strea of jobs that are released over tie in a ultiprocessor
More informationPolygonal Designs: Existence and Construction
Polygonal Designs: Existence and Construction John Hegean Departent of Matheatics, Stanford University, Stanford, CA 9405 Jeff Langford Departent of Matheatics, Drake University, Des Moines, IA 5011 G
More information1 Proof of learning bounds
COS 511: Theoretical Machine Learning Lecturer: Rob Schapire Lecture #4 Scribe: Akshay Mittal February 13, 2013 1 Proof of learning bounds For intuition of the following theore, suppose there exists a
More informationComputational and Statistical Learning Theory
Coputational and Statistical Learning Theory TTIC 31120 Prof. Nati Srebro Lecture 2: PAC Learning and VC Theory I Fro Adversarial Online to Statistical Three reasons to ove fro worst-case deterinistic
More information. The univariate situation. It is well-known for a long tie that denoinators of Pade approxiants can be considered as orthogonal polynoials with respe
PROPERTIES OF MULTIVARIATE HOMOGENEOUS ORTHOGONAL POLYNOMIALS Brahi Benouahane y Annie Cuyt? Keywords Abstract It is well-known that the denoinators of Pade approxiants can be considered as orthogonal
More informationOn the Inapproximability of Vertex Cover on k-partite k-uniform Hypergraphs
On the Inapproxiability of Vertex Cover on k-partite k-unifor Hypergraphs Venkatesan Guruswai and Rishi Saket Coputer Science Departent Carnegie Mellon University Pittsburgh, PA 1513. Abstract. Coputing
More informationASSUME a source over an alphabet size m, from which a sequence of n independent samples are drawn. The classical
IEEE TRANSACTIONS ON INFORMATION THEORY Large Alphabet Source Coding using Independent Coponent Analysis Aichai Painsky, Meber, IEEE, Saharon Rosset and Meir Feder, Fellow, IEEE arxiv:67.7v [cs.it] Jul
More informationCompression and Predictive Distributions for Large Alphabet i.i.d and Markov models
2014 IEEE International Syposiu on Inforation Theory Copression and Predictive Distributions for Large Alphabet i.i.d and Markov odels Xiao Yang Departent of Statistics Yale University New Haven, CT, 06511
More informationRandomized Recovery for Boolean Compressed Sensing
Randoized Recovery for Boolean Copressed Sensing Mitra Fatei and Martin Vetterli Laboratory of Audiovisual Counication École Polytechnique Fédéral de Lausanne (EPFL) Eail: {itra.fatei, artin.vetterli}@epfl.ch
More informationKinematics and dynamics, a computational approach
Kineatics and dynaics, a coputational approach We begin the discussion of nuerical approaches to echanics with the definition for the velocity r r ( t t) r ( t) v( t) li li or r( t t) r( t) v( t) t for
More informationN-Point. DFTs of Two Length-N Real Sequences
Coputation of the DFT of In ost practical applications, sequences of interest are real In such cases, the syetry properties of the DFT given in Table 5. can be exploited to ake the DFT coputations ore
More informationNecessity of low effective dimension
Necessity of low effective diension Art B. Owen Stanford University October 2002, Orig: July 2002 Abstract Practitioners have long noticed that quasi-monte Carlo ethods work very well on functions that
More informationComputable Shell Decomposition Bounds
Coputable Shell Decoposition Bounds John Langford TTI-Chicago jcl@cs.cu.edu David McAllester TTI-Chicago dac@autoreason.co Editor: Leslie Pack Kaelbling and David Cohn Abstract Haussler, Kearns, Seung
More informationGenetic Quantum Algorithm and its Application to Combinatorial Optimization Problem
Genetic Quantu Algorith and its Application to Cobinatorial Optiization Proble Kuk-Hyun Han Dept. of Electrical Engineering, KAIST, 373-, Kusong-dong Yusong-gu Taejon, 305-70, Republic of Korea khhan@vivaldi.kaist.ac.kr
More informationOn the Maximum Number of Codewords of X-Codes of Constant Weight Three
On the Maxiu Nuber of Codewords of X-Codes of Constant Weight Three arxiv:190.097v1 [cs.it] 2 Mar 2019 Yu Tsunoda Graduate School of Science and Engineering Chiba University 1- Yayoi-Cho Inage-Ku, Chiba
More information3.8 Three Types of Convergence
3.8 Three Types of Convergence 3.8 Three Types of Convergence 93 Suppose that we are given a sequence functions {f k } k N on a set X and another function f on X. What does it ean for f k to converge to
More informationLower Bounds for Quantized Matrix Completion
Lower Bounds for Quantized Matrix Copletion Mary Wootters and Yaniv Plan Departent of Matheatics University of Michigan Ann Arbor, MI Eail: wootters, yplan}@uich.edu Mark A. Davenport School of Elec. &
More informationOcean 420 Physical Processes in the Ocean Project 1: Hydrostatic Balance, Advection and Diffusion Answers
Ocean 40 Physical Processes in the Ocean Project 1: Hydrostatic Balance, Advection and Diffusion Answers 1. Hydrostatic Balance a) Set all of the levels on one of the coluns to the lowest possible density.
More informationNonmonotonic Networks. a. IRST, I Povo (Trento) Italy, b. Univ. of Trento, Physics Dept., I Povo (Trento) Italy
Storage Capacity and Dynaics of Nononotonic Networks Bruno Crespi a and Ignazio Lazzizzera b a. IRST, I-38050 Povo (Trento) Italy, b. Univ. of Trento, Physics Dept., I-38050 Povo (Trento) Italy INFN Gruppo
More information4 = (0.02) 3 13, = 0.25 because = 25. Simi-
Theore. Let b and be integers greater than. If = (. a a 2 a i ) b,then for any t N, in base (b + t), the fraction has the digital representation = (. a a 2 a i ) b+t, where a i = a i + tk i with k i =
More informationPage 1 Lab 1 Elementary Matrix and Linear Algebra Spring 2011
Page Lab Eleentary Matri and Linear Algebra Spring 0 Nae Due /03/0 Score /5 Probles through 4 are each worth 4 points.. Go to the Linear Algebra oolkit site ransforing a atri to reduced row echelon for
More informationA Generalized Permanent Estimator and its Application in Computing Multi- Homogeneous Bézout Number
Research Journal of Applied Sciences, Engineering and Technology 4(23): 5206-52, 202 ISSN: 2040-7467 Maxwell Scientific Organization, 202 Subitted: April 25, 202 Accepted: May 3, 202 Published: Deceber
More informationCh 12: Variations on Backpropagation
Ch 2: Variations on Backpropagation The basic backpropagation algorith is too slow for ost practical applications. It ay take days or weeks of coputer tie. We deonstrate why the backpropagation algorith
More informationEMPIRICAL COMPLEXITY ANALYSIS OF A MILP-APPROACH FOR OPTIMIZATION OF HYBRID SYSTEMS
EMPIRICAL COMPLEXITY ANALYSIS OF A MILP-APPROACH FOR OPTIMIZATION OF HYBRID SYSTEMS Jochen Till, Sebastian Engell, Sebastian Panek, and Olaf Stursberg Process Control Lab (CT-AST), University of Dortund,
More informationTesting Properties of Collections of Distributions
Testing Properties of Collections of Distributions Reut Levi Dana Ron Ronitt Rubinfeld April 9, 0 Abstract We propose a fraework for studying property testing of collections of distributions, where the
More informationCSE525: Randomized Algorithms and Probabilistic Analysis May 16, Lecture 13
CSE55: Randoied Algoriths and obabilistic Analysis May 6, Lecture Lecturer: Anna Karlin Scribe: Noah Siegel, Jonathan Shi Rando walks and Markov chains This lecture discusses Markov chains, which capture
More informationlecture 36: Linear Multistep Mehods: Zero Stability
95 lecture 36: Linear Multistep Mehods: Zero Stability 5.6 Linear ultistep ethods: zero stability Does consistency iply convergence for linear ultistep ethods? This is always the case for one-step ethods,
More informationGraphical Models in Local, Asymmetric Multi-Agent Markov Decision Processes
Graphical Models in Local, Asyetric Multi-Agent Markov Decision Processes Ditri Dolgov and Edund Durfee Departent of Electrical Engineering and Coputer Science University of Michigan Ann Arbor, MI 48109
More informationUpper bound on false alarm rate for landmine detection and classification using syntactic pattern recognition
Upper bound on false alar rate for landine detection and classification using syntactic pattern recognition Ahed O. Nasif, Brian L. Mark, Kenneth J. Hintz, and Nathalia Peixoto Dept. of Electrical and
More informationCurious Bounds for Floor Function Sums
1 47 6 11 Journal of Integer Sequences, Vol. 1 (018), Article 18.1.8 Curious Bounds for Floor Function Sus Thotsaporn Thanatipanonda and Elaine Wong 1 Science Division Mahidol University International
More informationQuantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search
Quantu algoriths (CO 781, Winter 2008) Prof Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search ow we begin to discuss applications of quantu walks to search algoriths
More informationCourse Notes for EE227C (Spring 2018): Convex Optimization and Approximation
Course Notes for EE227C (Spring 2018): Convex Optiization and Approxiation Instructor: Moritz Hardt Eail: hardt+ee227c@berkeley.edu Graduate Instructor: Max Sichowitz Eail: sichow+ee227c@berkeley.edu October
More informationUSEFUL HINTS FOR SOLVING PHYSICS OLYMPIAD PROBLEMS. By: Ian Blokland, Augustana Campus, University of Alberta
1 USEFUL HINTS FOR SOLVING PHYSICS OLYMPIAD PROBLEMS By: Ian Bloland, Augustana Capus, University of Alberta For: Physics Olypiad Weeend, April 6, 008, UofA Introduction: Physicists often attept to solve
More informationModel Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon
Model Fitting CURM Background Material, Fall 014 Dr. Doreen De Leon 1 Introduction Given a set of data points, we often want to fit a selected odel or type to the data (e.g., we suspect an exponential
More information26 Impulse and Momentum
6 Ipulse and Moentu First, a Few More Words on Work and Energy, for Coparison Purposes Iagine a gigantic air hockey table with a whole bunch of pucks of various asses, none of which experiences any friction
More informationIntroduction to Discrete Optimization
Prof. Friedrich Eisenbrand Martin Nieeier Due Date: March 9 9 Discussions: March 9 Introduction to Discrete Optiization Spring 9 s Exercise Consider a school district with I neighborhoods J schools and
More informationTight Information-Theoretic Lower Bounds for Welfare Maximization in Combinatorial Auctions
Tight Inforation-Theoretic Lower Bounds for Welfare Maxiization in Cobinatorial Auctions Vahab Mirrokni Jan Vondrák Theory Group, Microsoft Dept of Matheatics Research Princeton University Redond, WA 9805
More informationStatistical properties of contact maps
PHYSICAL REVIEW E VOLUME 59, NUMBER 1 JANUARY 1999 Statistical properties of contact aps Michele Vendruscolo, 1 Balakrishna Subraanian, 2 Ido Kanter, 3 Eytan Doany, 1 and Joel Lebowitz 2 1 Departent of
More informationA Note on the Applied Use of MDL Approximations
A Note on the Applied Use of MDL Approxiations Daniel J. Navarro Departent of Psychology Ohio State University Abstract An applied proble is discussed in which two nested psychological odels of retention
More informationIntelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines
Intelligent Systes: Reasoning and Recognition Jaes L. Crowley osig 1 Winter Seester 2018 Lesson 6 27 February 2018 Outline Perceptrons and Support Vector achines Notation...2 Linear odels...3 Lines, Planes
More informationAn Algorithm for Quantization of Discrete Probability Distributions
An Algorith for Quantization of Discrete Probability Distributions Yuriy A. Reznik Qualco Inc., San Diego, CA Eail: yreznik@ieee.org Abstract We study the proble of quantization of discrete probability
More informationFaster and Simpler Algorithms for Multicommodity Flow and other. Fractional Packing Problems. Abstract
Faster and Sipler Algoriths for Multicoodity Flow and other Fractional Packing Probles Naveen Garg Jochen Koneann y Abstract This paper considers the proble of designing fast, approxiate, cobinatorial
More informationReed-Muller Codes. m r inductive definition. Later, we shall explain how to construct Reed-Muller codes using the Kronecker product.
Coding Theory Massoud Malek Reed-Muller Codes An iportant class of linear block codes rich in algebraic and geoetric structure is the class of Reed-Muller codes, which includes the Extended Haing code.
More informationLecture 21. Interior Point Methods Setup and Algorithm
Lecture 21 Interior Point Methods In 1984, Kararkar introduced a new weakly polynoial tie algorith for solving LPs [Kar84a], [Kar84b]. His algorith was theoretically faster than the ellipsoid ethod and
More informationFast Structural Similarity Search of Noncoding RNAs Based on Matched Filtering of Stem Patterns
Fast Structural Siilarity Search of Noncoding RNs Based on Matched Filtering of Ste Patterns Byung-Jun Yoon Dept. of Electrical Engineering alifornia Institute of Technology Pasadena, 91125, S Eail: bjyoon@caltech.edu
More informationVulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links
Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Tie-Varying Jaing Links Jun Kurihara KDDI R&D Laboratories, Inc 2 5 Ohara, Fujiino, Saitaa, 356 8502 Japan Eail: kurihara@kddilabsjp
More informationConvolutional Codes. Lecture Notes 8: Trellis Codes. Example: K=3,M=2, rate 1/2 code. Figure 95: Convolutional Encoder
Convolutional Codes Lecture Notes 8: Trellis Codes In this lecture we discuss construction of signals via a trellis. That is, signals are constructed by labeling the branches of an infinite trellis with
More informationMaximum Entropy Interval Aggregations
Maxiu Entropy Interval Aggregations Ferdinando Cicalese Università di Verona, Verona, Italy Eail: cclfdn@univr.it Ugo Vaccaro Università di Salerno, Salerno, Italy Eail: uvaccaro@unisa.it arxiv:1805.05375v1
More informationPh 20.3 Numerical Solution of Ordinary Differential Equations
Ph 20.3 Nuerical Solution of Ordinary Differential Equations Due: Week 5 -v20170314- This Assignent So far, your assignents have tried to failiarize you with the hardware and software in the Physics Coputing
More informationHandout 7. and Pr [M(x) = χ L (x) M(x) =? ] = 1.
Notes on Coplexity Theory Last updated: October, 2005 Jonathan Katz Handout 7 1 More on Randoized Coplexity Classes Reinder: so far we have seen RP,coRP, and BPP. We introduce two ore tie-bounded randoized
More informationarxiv:cond-mat/ v1 [cond-mat.stat-mech] 22 Oct 1998
arxiv:cond-at/9810285v1 [cond-at.stat-ech] 22 Oct 1998 Statistical Properties of Contact Maps Michele Vendruscolo (1), Balakrishna Subraanian (2), Ido Kanter (3), Eytan Doany (1) and Joel Lebowitz (2)
More informationDesign of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding
IEEE TRANSACTIONS ON INFORMATION THEORY (SUBMITTED PAPER) 1 Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding Lai Wei, Student Meber, IEEE, David G. M. Mitchell, Meber, IEEE, Thoas
More informationSequence Analysis, WS 14/15, D. Huson & R. Neher (this part by D. Huson) February 5,
Sequence Analysis, WS 14/15, D. Huson & R. Neher (this part by D. Huson) February 5, 2015 31 11 Motif Finding Sources for this section: Rouchka, 1997, A Brief Overview of Gibbs Sapling. J. Buhler, M. Topa:
More informationProbability Distributions
Probability Distributions In Chapter, we ephasized the central role played by probability theory in the solution of pattern recognition probles. We turn now to an exploration of soe particular exaples
More informationCombining Classifiers
Cobining Classifiers Generic ethods of generating and cobining ultiple classifiers Bagging Boosting References: Duda, Hart & Stork, pg 475-480. Hastie, Tibsharini, Friedan, pg 246-256 and Chapter 10. http://www.boosting.org/
More informationCOS 424: Interacting with Data. Written Exercises
COS 424: Interacting with Data Hoework #4 Spring 2007 Regression Due: Wednesday, April 18 Written Exercises See the course website for iportant inforation about collaboration and late policies, as well
More informationA Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks with Order-Optimal Per-Flow Delay
A Low-Coplexity Congestion Control and Scheduling Algorith for Multihop Wireless Networks with Order-Optial Per-Flow Delay Po-Kai Huang, Xiaojun Lin, and Chih-Chun Wang School of Electrical and Coputer
More information