Growth functions of braid monoids and generation of random braids
|
|
- Mercy Norton
- 6 years ago
- Views:
Transcription
1 Growth functions of braid monoids and generation of random braids Universidad de Sevilla Joint with Volker Gebhardt
2 Introduction Random braids Most authors working in braid-cryptography or computational braid theory, when they perform computations using random braids, they don t use random braids. They use random words.
3 Introduction Random braids We will focus on the positive braid monoid: Length of a (positive) braid = Word length Lattice structure of B n Unique gcd s (Æ) and lcm s (Ç)
4 Introduction Random braids We want to generate a random positive braid of length k. What if we take the product of k randomly chosen generators? There is only one word representing the braid There are 16 words representing the braid The probability of obtaining is 16 times the probability of obtaining This becomes more dramatic as n and k grow.
5 Generating random braids Lex-representative How do we generate braids with the same probability? Given a braid a, its Lex-representative, w(a ), is the (lexicographically) smallest word representing a. Bij. { Braids of length k } { Lex-representatives of length k }
6 Generating random braids Braid tree The situation can be described using a rooted tree. Example, in B 4 : Root. The only braid of length 0 in B 4.
7 Generating random braids Braid tree The situation can be described using a rooted tree. Example, in B 4 : 3 braids of length 1 in B 4.
8 Generating random braids Braid tree The situation can be described using a rooted tree. Example, in B 4 : 8 braids of length 2 in B 4. The word is not there, as the Lex-representative of is.
9 Generating random braids Braid tree The situation can be described using a rooted tree. Example, in B 4 : 19 braids of length 3 in B 4. There is no subword, neither, nor.
10 Generating random braids Braid tree The situation can be described using a rooted tree. Example, in B 4 : 19 braids of length 3 in B 4. There is no subword, neither, nor.
11 Generating random braids Generation procedure To generate a random braid: 1) Compute the number of leaves of the tree: 19 2) Choose a random number between 1 and 19: 16 3) Find the braid corresponding to the 16th leaf: In polynomial time! Warning: the tree is exponentially big!
12 Counting braids of given length Deligne s theorem x n,k = Number of braids in B n of length k. How to compute this number? Growth function of B n : It is a rational function, 9 recurrence relation for It is the inverse of a polynomial, Deligne (1972): The growth function of B n is the inverse of a polynomial.
13 Counting braids of given length Deligne s theorem x n,k = Number of braids in B n of length k. How to compute this number? Growth function of B n : It is a rational function, 9 recurrence relation for It is the inverse of a polynomial, Deligne (1972): The growth function of B n is the inverse of a polynomial.
14 Counting braids of given length Deligne s theorem Deligne (1972): The growth function of B n is the inverse of a polynomial. Proof: Denote
15 Counting braids of given length Deligne s theorem Deligne (1972): The growth function of B n is the inverse of a polynomial. Proof: Denote
16 Counting braids of given length Deligne s theorem Deligne (1972): The growth function of B n is the inverse of a polynomial. Proof: Inclusion - exclusion principle Each term equals for Recurrence relation! Q.E.D.
17 Counting braids of given length Deligne s theorem Deligne (1972): The growth function of B n is the inverse of a polynomial. Proof: Inclusion - exclusion principle Each term equals for Recurrence relation! Q.E.D.
18 Counting braids of given length Bronfman s method Deligne (1972): The growth function of B n is the inverse of a polynomial. Actually: Hard to compute! Bronfman (2001): Recursive formula: As H 0 (t)= 1, one can compute H n (t), and then x n,k. (in polynomial time) We will use another method
19 Counting braids of given length Our method Example: # (Lex-representatives of length k starting with s 5 ) =
20 Counting braids of given length Our method This yields an easy recursive formula: - - =
21 Counting braids of given length Example, in B 4 : Our method =
22 Counting braids of given length Our method Example, in B 4 : =
23 Counting braids of given length Our method Example, in B 4 : =
24 Counting braids of given length Our method Example, in B 4 : =
25 Counting braids of given length Our method Example, in B 4 : =
26 Counting braids of given length Our method Example, in B 4 : = What are we computing?
27 Counting braids of given length Our method The first column of our table contains x n,1, x n,2, x n,3, Computing k rows, we obtain x n,k. In time
28 Consequence A formula for the growth function A new line is obtained from the 6 previous ones by a linear transformation = Multiplying from the left by ( ), one gets x n,k
29 Consequence A formula for the growth function
30 Consequence A formula for the growth function
31 Consequence A formula for the growth function After some easy computations (Bronfman s recursive formula = expansion along the first column)
32 Other Artin-Tits monoids A formula for the growth function Artin-Tits monoid of type B n 4
33 Other Artin-Tits monoids A formula for the growth function Artin-Tits monoid of type D n
34 Generating random braids Generation procedure To generate a random braid: 1) Compute the number of leaves of the tree: 19 2) Choose a random number between 1 and 19: 16 3) Find the braid corresponding to the 16th leaf: Next
35 Finding the rth braid of length k Hanging leaves Consider the graph of height k as before. Given a vertex w, suppose we can compute, in polynomial time, the number of leaves hanging from w:
36 Finding the rth braid of length k The procedure We want to compute the 16th braid: The first letter is. The second letter is. The third letter is.
37 Computing hanging leaves Forbidden prefixes Computing at most (n-2)k times the hanging leaves of a vertex, one computes the r-th braid of length k. How to compute the hanging leaves? w k - w w Lemma: Can put any braid of length k - w, except those starting by some forbidden prefixes.
38 Computing hanging leaves Forbidden prefixes Example: Forbidden prefixes for the word Know how to compute
39 Computing hanging leaves Forbidden prefixes By the inclusion-exclusion principle, we can compute
40 Computing hanging leaves Forbidden prefixes By the inclusion-exclusion principle, we can compute
41 Computing hanging leaves Forbidden prefixes Good news: Every summand is equal to x n,t, for some t k. These are the elements in the first column of our table. Bad news: There are exponentially many summands. But we can collect all summands corresponding to elts. with the same length.
42 Generating random positive braids The result As a consequence: One can compute in ploynomial space and time with respect to n and k. ) Theorem: (GM-Gebhardt, 2011) There is a procedure to generate a random positive braid in B n of length k, whose time and space complexity is a polynomial in n and k. Time?
43 Generating random positive braids Effective computations Time (in ms.) for computing a random positive braid of length k, on n strands k n Linux system with an Intel E bit CPU (core: 3\,GHz, FSB: 1333\,MHz) and a main memory bandwidth of 6.5\,GB/s (X38 chipset, dual channel DDR2 RAM, memory bus: 1066\,MHz) using a development version of Magma V.2.16.
44 Open problems ² Generate group elements instead of monoid elements. ² Use another generating set: permutation braids. ² Generalize to other Artin groups of finite type.
45 Thank you!
MATH 243E Test #3 Solutions
MATH 4E Test # Solutions () Find a recurrence relation for the number of bit strings of length n that contain a pair of consecutive 0s. You do not need to solve this recurrence relation. (Hint: Consider
More information) = nlog b ( m) ( m) log b ( ) ( ) = log a b ( ) Algebra 2 (1) Semester 2. Exponents and Logarithmic Functions
Exponents and Logarithmic Functions Algebra 2 (1) Semester 2! a. Graph exponential growth functions!!!!!! [7.1]!! - y = ab x for b > 0!! - y = ab x h + k for b > 0!! - exponential growth models:! y = a(
More information1. How many labeled trees are there on n vertices such that all odd numbered vertices are leaves?
1. How many labeled trees are there on n vertices such that all odd numbered vertices are leaves? This is most easily done by Prüfer codes. The number of times a vertex appears is the degree of the vertex.
More informationDiscrete Structures, Final Exam
Discrete Structures, Final Exam Monday, May 11, 2009 SOLUTIONS 1. (40 pts) Short answer. Put your answer in the box. No partial credit. [ ] 0 1 (a) If A = and B = 1 0 [ ] 0 0 1. 0 1 1 [ 0 1 1 0 0 1 ],
More informationBraid combinatorics, permutations, and noncrossing partitions Patrick Dehornoy. Laboratoire de Mathématiques Nicolas Oresme, Université de Caen
Braid combinatorics, permutations, and noncrossing partitions Patrick Dehornoy Laboratoire de Mathématiques Nicolas Oresme, Université de Caen A few combinatorial questions involving braids and their Garside
More informationJuan González-Meneses Universidad de Sevilla. Institute for Mathematical Sciences. Singapore, June 27, 2007.
7RZDUGVDSRO\QRPLDOVROXWLRQWR WKHFRQMXJDF\SUREOHP LQEUDLGJURXSV Juan González-Meneses Universidad de Sevilla Joint with -RDQ6%LUPDQ and 9*HEKDUGW. %UDLGV Institute for Mathematical Sciences. Singapore,
More informationReview problems solutions
Review problems solutions Math 3152 December 15, 2017 1. Use the binomial theorem to prove that, for all n 1 and k satisfying 0 k n, ( )( ) { n i ( 1) i k 1 if k n; i k 0 otherwise. ik Solution: Using
More informationCS1800 Discrete Structures Final Version A
CS1800 Discrete Structures Fall 2017 Profs. Aslam, Gold, & Pavlu December 11, 2017 CS1800 Discrete Structures Final Version A Instructions: 1. The exam is closed book and closed notes. You may not use
More informationNotation Index. gcd(a, b) (greatest common divisor) NT-16
Notation Index (for all) B A (all functions) B A = B A (all functions) SF-18 (n) k (falling factorial) SF-9 a R b (binary relation) C(n,k) = n! k! (n k)! (binomial coefficient) SF-9 n! (n factorial) SF-9
More informationIntermediate Level Learning Targets
Learning Target #1: Develop proficiency in analyzing, graphing and solving linear equations and inequalities. F1.1,,, B1. C1. 1.1 Students will be able to identify different types of relations and functions.
More informationHOMEWORK #2 - MATH 3260
HOMEWORK # - MATH 36 ASSIGNED: JANUARAY 3, 3 DUE: FEBRUARY 1, AT :3PM 1) a) Give by listing the sequence of vertices 4 Hamiltonian cycles in K 9 no two of which have an edge in common. Solution: Here is
More informationMcGill University Faculty of Science. Solutions to Practice Final Examination Math 240 Discrete Structures 1. Time: 3 hours Marked out of 60
McGill University Faculty of Science Solutions to Practice Final Examination Math 40 Discrete Structures Time: hours Marked out of 60 Question. [6] Prove that the statement (p q) (q r) (p r) is a contradiction
More informationAlgebra 2A Unit 1 Week 1 Day Activity Unit 1 Week 2 Day Activity Unit 1 Week 3 Day Activity Unit 2 Week 1 Day Activity
Algebra 2A Unit 1 Week 1 1 Pretest Unit 1 2 Evaluating Rational Expressions 3 Restrictions on Rational Expressions 4 Equivalent Forms of Rational Expressions 5 Simplifying Rational Expressions Unit 1 Week
More informationCombining the cycle index and the Tutte polynomial?
Combining the cycle index and the Tutte polynomial? Peter J. Cameron University of St Andrews Combinatorics Seminar University of Vienna 23 March 2017 Selections Students often meet the following table
More informationDiscrete Math. Instructor: Mike Picollelli. Day 10
Day 10 Fibonacci Redux. Last time, we saw that F n = 1 5 (( 1 + ) n ( 5 2 1 ) n ) 5. 2 What Makes The Fibonacci Numbers So Special? The Fibonacci numbers are a particular type of recurrence relation, a
More informationarxiv:math/ v1 [math.gt] 9 May 2006
Conjugacy in Garside Groups I: Cyclings, Powers, and Rigidity arxiv:math/0605230v1 [math.gt] 9 May 2006 Joan S. Birman Volker Gebhardt Juan González-Meneses May 8, 2006 Abstract In this paper a relation
More informationChapter 11. Min Cut Min Cut Problem Definition Some Definitions. By Sariel Har-Peled, December 10, Version: 1.
Chapter 11 Min Cut By Sariel Har-Peled, December 10, 013 1 Version: 1.0 I built on the sand And it tumbled down, I built on a rock And it tumbled down. Now when I build, I shall begin With the smoke from
More informationMinimum Linear Arrangements
Minimum Linear Arrangements Rafael Andrade, Tibérius Bonates, Manoel Câmpelo, Mardson Ferreira ParGO - Research team in Parallel computing, Graph theory and Optimization Department of Statistics and Applied
More informationNumber Theory. Number Theory. 6.1 Number Theory
6.1 Number Theory Number Theory The numbers 1, 2, 3, are called the counting numbers or natural numbers. The study of the properties of counting numbers is called number theory. 2 2010 Pearson Education,
More informationData Structures and Algorithms
Data Structures and Algorithms Autumn 2018-2019 Outline 1 Algorithm Analysis (contd.) Outline Algorithm Analysis (contd.) 1 Algorithm Analysis (contd.) Growth Rates of Some Commonly Occurring Functions
More informationCS 310 Advanced Data Structures and Algorithms
CS 310 Advanced Data Structures and Algorithms Runtime Analysis May 31, 2017 Tong Wang UMass Boston CS 310 May 31, 2017 1 / 37 Topics Weiss chapter 5 What is algorithm analysis Big O, big, big notations
More informationIntroduction to Techniques for Counting
Introduction to Techniques for Counting A generating function is a device somewhat similar to a bag. Instead of carrying many little objects detachedly, which could be embarrassing, we put them all in
More information6 Permutations Very little of this section comes from PJE.
6 Permutations Very little of this section comes from PJE Definition A permutation (p147 of a set A is a bijection ρ : A A Notation If A = {a b c } and ρ is a permutation on A we can express the action
More informationk-protected VERTICES IN BINARY SEARCH TREES
k-protected VERTICES IN BINARY SEARCH TREES MIKLÓS BÓNA Abstract. We show that for every k, the probability that a randomly selected vertex of a random binary search tree on n nodes is at distance k from
More information1. Prove: A full m- ary tree with i internal vertices contains n = mi + 1 vertices.
1. Prove: A full m- ary tree with i internal vertices contains n = mi + 1 vertices. Proof: Every vertex, except the root, is the child of an internal vertex. Since there are i internal vertices, each of
More informationPortable Assisted Study Sequence ALGEBRA IIB
SCOPE This course is divided into two semesters of study (A & B) comprised of five units each. Each unit teaches concepts and strategies recommended for intermediate algebra students. The second half of
More informationPublic Key Encryption
Public Key Encryption 3/13/2012 Cryptography 1 Facts About Numbers Prime number p: p is an integer p 2 The only divisors of p are 1 and p s 2, 7, 19 are primes -3, 0, 1, 6 are not primes Prime decomposition
More informationInteger factorization, part 1: the Q sieve. part 2: detecting smoothness. D. J. Bernstein
Integer factorization, part 1: the Q sieve Integer factorization, part 2: detecting smoothness D. J. Bernstein The Q sieve factors by combining enough -smooth congruences ( + ). Enough log. Plausible conjecture:
More informationSolutions to Exercises Chapter 5: The Principle of Inclusion and Exclusion
Solutions to Exercises Chapter 5: The Principle of Inclusion and Exclusion An opinion poll reports that the percentage of voters who would be satisfied with each of three candidates A, B, C for President
More informationMATH475 SAMPLE EXAMS.
MATH75 SAMPLE EXAMS Exam How many ways are there to distribute 8 different toys and 8 identical candy to children a without restrictions; b if first child should get exactly toys; c if the first child
More informationThe numbers 1, 2, 3, are called the counting numbers or natural numbers. The study of the properties of counting numbers is called number theory.
6.1 Number Theory Number Theory The numbers 1, 2, 3, are called the counting numbers or natural numbers. The study of the properties of counting numbers is called number theory. 2010 Pearson Education,
More informationCOMP 382: Reasoning about algorithms
Fall 2014 Unit 4: Basics of complexity analysis Correctness and efficiency So far, we have talked about correctness and termination of algorithms What about efficiency? Running time of an algorithm For
More informationNotes on the Matrix-Tree theorem and Cayley s tree enumerator
Notes on the Matrix-Tree theorem and Cayley s tree enumerator 1 Cayley s tree enumerator Recall that the degree of a vertex in a tree (or in any graph) is the number of edges emanating from it We will
More informationEssential Learning Outcomes for Algebra 2
ALGEBRA 2 ELOs 1 Essential Learning Outcomes for Algebra 2 The following essential learning outcomes (ELOs) represent the 12 skills that students should be able to demonstrate knowledge of upon completion
More informationCS March 17, 2009
Discrete Mathematics CS 2610 March 17, 2009 Number Theory Elementary number theory, concerned with numbers, usually integers and their properties or rational numbers mainly divisibility among integers
More informationBOUNDS ON ZIMIN WORD AVOIDANCE
BOUNDS ON ZIMIN WORD AVOIDANCE JOSHUA COOPER* AND DANNY RORABAUGH* Abstract. How long can a word be that avoids the unavoidable? Word W encounters word V provided there is a homomorphism φ defined by mapping
More information7.11 A proof involving composition Variation in terminology... 88
Contents Preface xi 1 Math review 1 1.1 Some sets............................. 1 1.2 Pairs of reals........................... 3 1.3 Exponentials and logs...................... 4 1.4 Some handy functions......................
More informationRevised: 2/19/09 Unit 1 Pre-Algebra Concepts and Operations Review
2/19/09 Unit 1 Pre-Algebra Concepts and Operations Review 1. How do algebraic concepts represent real-life situations? 2. Why are algebraic expressions and equations useful? 2. Operations on rational numbers
More informationarxiv: v1 [math.gr] 2 Aug 2017
RANDOM GROUP COBORDISMS OF RANK 7 arxiv:1708.0091v1 [math.gr] 2 Aug 2017 SYLVAIN BARRÉ AND MIKAËL PICHOT Abstract. We construct a model of random groups of rank 7, and show that in this model the random
More informationMATH c UNIVERSITY OF LEEDS Examination for the Module MATH2210 (May/June 2004) INTRODUCTION TO DISCRETE MATHEMATICS. Time allowed : 2 hours
This question paper consists of 5 printed pages, each of which is identified by the reference MATH221001 MATH221001 No calculators allowed c UNIVERSITY OF LEEDS Examination for the Module MATH2210 (May/June
More informationAlgebra II. A2.1.1 Recognize and graph various types of functions, including polynomial, rational, and algebraic functions.
Standard 1: Relations and Functions Students graph relations and functions and find zeros. They use function notation and combine functions by composition. They interpret functions in given situations.
More informationLecture 17: Trees and Merge Sort 10:00 AM, Oct 15, 2018
CS17 Integrated Introduction to Computer Science Klein Contents Lecture 17: Trees and Merge Sort 10:00 AM, Oct 15, 2018 1 Tree definitions 1 2 Analysis of mergesort using a binary tree 1 3 Analysis of
More informationThe cogrowth series for BS(N,N) is D-finite
The cogrowth series for BS(N,N) is D-finite Murray Elder, (U Newcastle, Australia) Andrew Rechnitzer, (UBC, Canada) Buks van Rensburg, (York U, Canada) Tom Wong, (UBC, Canada) AustMS 2013, Group Actions
More informationHow do we analyze, evaluate, solve, and graph quadratic functions?
Topic: 4. Quadratic Functions and Factoring Days: 18 Key Learning: Students will be able to analyze, evaluate, solve and graph quadratic functions. Unit Essential Question(s): How do we analyze, evaluate,
More informationCMPSCI611: Three Divide-and-Conquer Examples Lecture 2
CMPSCI611: Three Divide-and-Conquer Examples Lecture 2 Last lecture we presented and analyzed Mergesort, a simple divide-and-conquer algorithm. We then stated and proved the Master Theorem, which gives
More informationCSE 321 Solutions to Practice Problems
CSE 321 Solutions to Practice Problems Instructions: Feel free NOT to multiply out binomial coefficients, factorials, etc, and feel free to leave answers in the form of a sum. No calculators, books or
More informationA Combinatorial Interpretation of the Numbers 6 (2n)! /n! (n + 2)!
1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 8 (2005), Article 05.2.3 A Combinatorial Interpretation of the Numbers 6 (2n)! /n! (n + 2)! Ira M. Gessel 1 and Guoce Xin Department of Mathematics Brandeis
More informationIntroduction to Combinatorial Mathematics
Introduction to Combinatorial Mathematics George Voutsadakis 1 1 Mathematics and Computer Science Lake Superior State University LSSU Math 300 George Voutsadakis (LSSU) Combinatorics April 2016 1 / 57
More informationImplementations of 3 Types of the Schreier-Sims Algorithm
Implementations of 3 Types of the Schreier-Sims Algorithm Martin Jaggi m.jaggi@gmx.net MAS334 - Mathematics Computing Project Under supervison of Dr L.H.Soicher Queen Mary University of London March 2005
More informationComputing Minimal Polynomial of Matrices over Algebraic Extension Fields
Bull. Math. Soc. Sci. Math. Roumanie Tome 56(104) No. 2, 2013, 217 228 Computing Minimal Polynomial of Matrices over Algebraic Extension Fields by Amir Hashemi and Benyamin M.-Alizadeh Abstract In this
More informationNumber Theory and Divisibility
Number Theory and Divisibility Recall the Natural Numbers: N = {1, 2, 3, 4, 5, 6, } Any Natural Number can be expressed as the product of two or more Natural Numbers: 2 x 12 = 24 3 x 8 = 24 6 x 4 = 24
More informationApproaches to tiling semigroups
Nick Gilbert Heriot-Watt University, Edinburgh (joint work with Erzsi Dombi) Periodic tilings Non-periodic tilings Ulrich Kortenkamp: Paving the Alexanderplatz Tilings of R n A tile in R n is a connected
More informationDe Bruijn Sequences for the Binary Strings with Maximum Density
De Bruijn Sequences for the Binary Strings with Maximum Density Joe Sawada 1, Brett Stevens 2, and Aaron Williams 2 1 jsawada@uoguelph.ca School of Computer Science, University of Guelph, CANADA 2 brett@math.carleton.ca
More informationAvoiding Approximate Squares
Avoiding Approximate Squares Narad Rampersad School of Computer Science University of Waterloo 13 June 2007 (Joint work with Dalia Krieger, Pascal Ochem, and Jeffrey Shallit) Narad Rampersad (University
More informationYale university technical report #1402.
The Mailman algorithm: a note on matrix vector multiplication Yale university technical report #1402. Edo Liberty Computer Science Yale University New Haven, CT Steven W. Zucker Computer Science and Appled
More informationSpiral Review Probability, Enter Your Grade Online Quiz - Probability Pascal's Triangle, Enter Your Grade
Course Description This course includes an in-depth analysis of algebraic problem solving preparing for College Level Algebra. Topics include: Equations and Inequalities, Linear Relations and Functions,
More informationThe chromatic number of random regular graphs
The chromatic number of random regular graphs Xavier Pérez Giménez Stochastics Numerics Seminar Models of random graphs Erdős & Rényi classic models (G n,p, G n,m ) Fixed degree sequence Regular graphs
More informationCSCE 222 Discrete Structures for Computing. Review for Exam 2. Dr. Hyunyoung Lee !!!
CSCE 222 Discrete Structures for Computing Review for Exam 2 Dr. Hyunyoung Lee 1 Strategy for Exam Preparation - Start studying now (unless have already started) - Study class notes (lecture slides and
More informationCS1800 Discrete Structures Spring 2018 February CS1800 Discrete Structures Midterm Version A
CS1800 Discrete Structures Spring 2018 February 2018 CS1800 Discrete Structures Midterm Version A Instructions: 1. The exam is closed book and closed notes. You may not use a calculator or any other electronic
More informationPolynomial multiplication and division using heap.
Polynomial multiplication and division using heap. Michael Monagan and Roman Pearce Department of Mathematics, Simon Fraser University. Abstract We report on new code for sparse multivariate polynomial
More informationQuestionnaire for CSET Mathematics subset 1
Questionnaire for CSET Mathematics subset 1 Below is a preliminary questionnaire aimed at finding out your current readiness for the CSET Math subset 1 exam. This will serve as a baseline indicator for
More informationCoxeter-Knuth Graphs and a signed Little Bijection
Coxeter-Knuth Graphs and a signed Little Bijection Sara Billey University of Washington http://www.math.washington.edu/ billey AMS-MAA Joint Meetings January 17, 2014 0-0 Outline Based on joint work with
More informationAnalysis of Algorithms [Reading: CLRS 2.2, 3] Laura Toma, csci2200, Bowdoin College
Analysis of Algorithms [Reading: CLRS 2.2, 3] Laura Toma, csci2200, Bowdoin College Why analysis? We want to predict how the algorithm will behave (e.g. running time) on arbitrary inputs, and how it will
More informationHow to use this Algebra II - Semester 2 Study Packet
Excellence is not an act, but a habit. Aristotle Dear Algebra II Student, First of all, Congrats! for making it this far in your math career. Passing Algebra II is a huge mile-stone Give yourself a pat
More informationFinding small factors of integers. Speed of the number-field sieve. D. J. Bernstein University of Illinois at Chicago
The number-field sieve Finding small factors of integers Speed of the number-field sieve D. J. Bernstein University of Illinois at Chicago Prelude: finding denominators 87366 22322444 in R. Easily compute
More informationDiophantine equations via weighted LLL algorithm
Cryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL algorithm Momonari Kudo Graduate School of Mathematics, Kyushu University, JAPAN Kyushu University Number Theory
More informationFoundations of Discrete Mathematics
Foundations of Discrete Mathematics Chapter 0 By Dr. Dalia M. Gil, Ph.D. Statement Statement is an ordinary English statement of fact. It has a subject, a verb, and a predicate. It can be assigned a true
More informationA Note on Scalar Multiplication Using Division Polynomials
1 A Note on Scalar Multiplication Using Division Polynomials Binglong Chen, Chuangqiang Hu and Chang-An Zhao Abstract Scalar multiplication is the most important and expensive operation in elliptic curve
More informationAlgebraic Connections. Mathematics Curriculum Framework. Revised 2004
Algebraic Connections Mathematics Curriculum Framework Revised 2004 Course Title: Algebraic Connections (Third-year Course) Course/Unit Credit: 1 Course Number: Teacher Licensure: Secondary Mathematics
More informationFall River Joint Unified School District
1 Fall River Joint Unified School District McDougal Littell Math Algebra 2 Pacing Guide Begin First Semester Use the state released STAR test questions as warm-ups 1.1, 1.2, 1.3 1.4, 1.5, 1.6 3 Chapter
More informationNew successor rules for constructing de Bruijn sequences
New successor rules for constructing de Bruijn sequences Dennis Wong Northwest Missouri State University Daniel Gabric and Joe Sawada University of Guelph, CAN Aaron Williams Simon s Rock, USA Southeastern
More informationCoxeter-Knuth Classes and a Signed Little Bijection
Coxeter-Knuth Classes and a Signed Little Bijection Sara Billey University of Washington Based on joint work with: Zachary Hamaker, Austin Roberts, and Benjamin Young. UC Berkeley, February, 04 Outline
More informationN= {1,2,3,4,5,6,7,8,9,10,11,...}
1.1: Integers and Order of Operations 1. Define the integers 2. Graph integers on a number line. 3. Using inequality symbols < and > 4. Find the absolute value of an integer 5. Perform operations with
More informationSparse Polynomial Multiplication and Division in Maple 14
Sparse Polynomial Multiplication and Division in Maple 4 Michael Monagan and Roman Pearce Department of Mathematics, Simon Fraser University Burnaby B.C. V5A S6, Canada October 5, 9 Abstract We report
More informationOn the Generation of Circuits and Minimal Forbidden Sets
Mathematical Programming manuscript No. (will be inserted by the editor) Frederik Stork Marc Uetz On the Generation of Circuits and Minimal Forbidden Sets January 31, 2004 Abstract We present several complexity
More informationApplications of the Lopsided Lovász Local Lemma Regarding Hypergraphs
Regarding Hypergraphs Ph.D. Dissertation Defense April 15, 2013 Overview The Local Lemmata 2-Coloring Hypergraphs with the Original Local Lemma Counting Derangements with the Lopsided Local Lemma Lopsided
More informationPartition of Integers into Distinct Summands with Upper Bounds. Partition of Integers into Even Summands. An Example
Partition of Integers into Even Summands We ask for the number of partitions of m Z + into positive even integers The desired number is the coefficient of x m in + x + x 4 + ) + x 4 + x 8 + ) + x 6 + x
More informationSection 1.4 Solving Other Types of Equations
M141 - Chapter 1 Lecture Notes Page 1 of 27 Section 1.4 Solving Other Types of Equations Objectives: Given a radical equation, solve the equation and check the solution(s). Given an equation that can be
More informationPreliminaries and Complexity Theory
Preliminaries and Complexity Theory Oleksandr Romanko CAS 746 - Advanced Topics in Combinatorial Optimization McMaster University, January 16, 2006 Introduction Book structure: 2 Part I Linear Algebra
More informationMiller Objectives Alignment Math
Miller Objectives Alignment Math 1050 1 College Algebra Course Objectives Spring Semester 2016 1. Use algebraic methods to solve a variety of problems involving exponential, logarithmic, polynomial, and
More informationCMPSCI 311: Introduction to Algorithms Second Midterm Exam
CMPSCI 311: Introduction to Algorithms Second Midterm Exam April 11, 2018. Name: ID: Instructions: Answer the questions directly on the exam pages. Show all your work for each question. Providing more
More informationPacket #1: Logic & Proofs. Applied Discrete Mathematics
Packet #1: Logic & Proofs Applied Discrete Mathematics Table of Contents Course Objectives Page 2 Propositional Calculus Information Pages 3-13 Course Objectives At the conclusion of this course, you should
More informationOrder of Operations. Real numbers
Order of Operations When simplifying algebraic expressions we use the following order: 1. Perform operations within a parenthesis. 2. Evaluate exponents. 3. Multiply and divide from left to right. 4. Add
More informationAlgorithmic Approach to Counting of Certain Types m-ary Partitions
Algorithmic Approach to Counting of Certain Types m-ary Partitions Valentin P. Bakoev Abstract Partitions of integers of the type m n as a sum of powers of m (the so called m-ary partitions) and their
More informationBI-ORDERINGS ON PURE BRAIDED THOMPSON S GROUPS. Introduction
BI-ORDERINGS ON PURE BRAIDED THOMPSON S GROUPS JOSÉ BURILLO AND JUAN GONZÁLEZ MENESES Abstract. In this paper it is proved that the pure braided Thompson s group BF admits a bi-order, analog to the bi-order
More informationHybrid Approach : a Tool for Multivariate Cryptography
Hybrid Approach : a Tool for Multivariate Cryptography Luk Bettale, Jean-Charles Faugère and Ludovic Perret INRIA, Centre Paris-Rocquencourt, SALSA Project UPMC, Univ. Paris 06, LIP6 CNRS, UMR 7606, LIP6
More informationBook announcements. Sukumar Das Adhikari ASPECTS OF COMBINATORICS AND COMBINATORIAL NUMBER THEORY CRC Press, Florida, 2002, 156pp.
Discrete Mathematics 263 (2003) 347 352 www.elsevier.com/locate/disc Book announcements Sukumar Das Adhikari ASPECTS OF COMBINATORICS AND COMBINATORIAL NUMBER THEORY CRC Press, Florida, 2002, 156pp. Notations
More informationarxiv: v2 [cs.ds] 3 Oct 2017
Orthogonal Vectors Indexing Isaac Goldstein 1, Moshe Lewenstein 1, and Ely Porat 1 1 Bar-Ilan University, Ramat Gan, Israel {goldshi,moshe,porately}@cs.biu.ac.il arxiv:1710.00586v2 [cs.ds] 3 Oct 2017 Abstract
More informationThe Littlewood-Richardson Rule
REPRESENTATIONS OF THE SYMMETRIC GROUP The Littlewood-Richardson Rule Aman Barot B.Sc.(Hons.) Mathematics and Computer Science, III Year April 20, 2014 Abstract We motivate and prove the Littlewood-Richardson
More informationPrime Factorization and GCF. In my own words
Warm- up Problem What is a prime number? A PRIME number is an INTEGER greater than 1 with EXACTLY 2 positive factors, 1 and the number ITSELF. Examples of prime numbers: 2, 3, 5, 7 What is a composite
More information1 Solving Linear Recurrences
Solving Linear Recurrences Suppose we have a sequence a n defined by the formula The first couple terms of the sequence are a n = 3a n +, a 0 =, 4, 3, 40, 2,... Can you find a general closed for expression
More informationAdvanced topic: Space complexity
Advanced topic: Space complexity CSCI 3130 Formal Languages and Automata Theory Siu On CHAN Chinese University of Hong Kong Fall 2016 1/28 Review: time complexity We have looked at how long it takes to
More information7.2 Applications of Euler s and Fermat s Theorem.
7.2 Applications of Euler s and Fermat s Theorem. i) Finding and using inverses. From Fermat s Little Theorem we see that if p is prime and p a then a p 1 1 mod p, or equivalently a p 2 a 1 mod p. This
More informationChapter 2 (Part 3): The Fundamentals: Algorithms, the Integers & Matrices. Integers & Algorithms (2.5)
CSE 54 Discrete Mathematics & Chapter 2 (Part 3): The Fundamentals: Algorithms, the Integers & Matrices Integers & Algorithms (Section 2.5) by Kenneth H. Rosen, Discrete Mathematics & its Applications,
More informationQuantitative Aptitude
WWW.UPSCMANTRA.COM Quantitative Aptitude Concept 1 1. Number System 2. HCF and LCM 2011 Prelims Paper II NUMBER SYSTEM 2 NUMBER SYSTEM In Hindu Arabic System, we use ten symbols 0, 1, 2, 3, 4, 5, 6, 7,
More informationENUMERATION BY KERNEL POSITIONS
ENUMERATION BY KERNEL POSITIONS Abstract. We introduce a class of two-player games on posets with a rank function, in which each move of the winning strategy is unique. This allows to enumerate the kernel
More informationIndistinguishable objects in indistinguishable boxes
Counting integer partitions 2.4 61 Indistinguishable objects in indistinguishable boxes When placing k indistinguishable objects into n indistinguishable boxes, what matters? We are partitioning the integer
More informationDiscrete Mathematics (CS503)
Discrete Mathematics (CS503) Module I Suggested Questions Day 1, 2 1. Translate the following statement into propositional logic using the propositions provided: You can upgrade your operating system only
More informationAlgebra I Learning Targets Chapter 1: Equations and Inequalities (one variable) Section Section Title Learning Target(s)
Chapter 1: Equations and Inequalities (one variable) Section Learning Target(s) I can 1.2 Evaluate and Simplify Algebraic Expressions 1. Evaluate and simplify numeric and algebraic expressions (order of
More informationCS6304 / Analog and Digital Communication UNIT IV - SOURCE AND ERROR CONTROL CODING PART A 1. What is the use of error control coding? The main use of error control coding is to reduce the overall probability
More information