Asymptotically Optimal Simulation Allocation under Dependent Sampling

Size: px
Start display at page:

Download "Asymptotically Optimal Simulation Allocation under Dependent Sampling"

Transcription

1 Asymtotically Otimal Simulation Allocation under Deendent Samling Xiaoing Xiong The Robert H. Smith School of Business, University of Maryland, College Park, MD , USA, Sandee Juneja School of Technology and Comuter Science, Tata Institute of Fundamental Research, Mumbai, India , Michael C. Fu The Robert H. Smith School of Business, Institute for Systems Research, University of Maryland, College Park, MD , USA, We consider the roblem of otimal allocation of a simulation comuting budget to maximize the robability of correct selection in the ordinal otimization setting where the outut samles from different designs have a general distribution and may be mutually deendent, e.g., due to the use of common random numbers to generate them. Asymtotically, in terms of an increasing comutational budget, this roblem may be viewed in the large deviations framework, so that the rate function of the robability of false (incorrect) selection rovides a good surrogate measure for this robability. We evaluate this rate function as a function of comutation allocation to different designs and identify the equations satisfied by the otimal allocation in this asymtotic limit. By establishing several theoretical roerties that the allocation must satisfy, we reduce the roblem to a single-variable nonlinear otimization roblem that can be solved by numerical methods. We also characterize the convergence rate of the otimality ga (bias) between the asymtotically otimal solution and the true otimal solution. 1. Introduction In many simulation alications, the objective is to select a best design from among a finite set of cometing designs that are evaluated using stochastic system models, where the decision is based on comaring erformance measures that are exectations of random variables associated with each design model. In our setting, these exectations are unknown, and simulation is used to generate samles of the associated random variables. One then comutes a samle mean for each design, and then selects the design with the best (w.l.o.g., the highest) 1

2 samle mean. Under sufficient indeendence in the generated samles, the law of large numbers guarantees the convergence of the samle mean to the corresonding exectation, and the central limit theorem imlies that the rate of convergence is roortional to the inverse of the square root of the number of samles generated. The traditional aroach towards these tyes of roblems is based on the classical statistical ranking & selection rocedures for which there is an enormous body of literature, nearly all of it assuming indeendent Gaussian samling distributions. In the simulation context considered here, there has been significant research rogress made in the last decade or so on in develoing rocedures for the correlated setting (e.g., Yang and Nelson 1991; Nelson and Matejcik 1995, Goldsman and Nelson 1998; see also Chick and Inoue 2001ab for a Bayesian aroach), but to the best of our knowledge, non-gaussian distributions have not been addressed. The aroach of ordinal otimization (cf. Ho, Srinivas, and Vakili 1992, Dai and Chen 1997) is based on the observation that the robability of false (incorrect) selection decreases at an exonential rate as a function of the total number of generated samles (see Dai 1996, Dai and Chen 1997). Thus, while the number of samles needed to accurately estimate exectations may be large (as imlied by the inverse square root convergence rate), far fewer samles may be needed to correctly select the best design. The otimal comuting budget allocation (OCBA) framework introduced by Chen et al. (1997, 2000, 2005) exloits this observation by formulating and aroximately solving an otimization roblem that maximizes the robability of correct selection for a given total number of simulation relications. Thus, under the otimal allocation, little effort may be exended on obviously inferior designs, while more effort is focused on distinguishing between the to few cometing designs. The formulation assumes that each samle from each design has a Gaussian distribution and is indeendent of all the other generated samles. Glynn and Juneja (2004) use the large deviations framework to rigorously analyze this otimization roblem when the generated samles are allowed to have non-gaussian distributions; however, they still assume indeendence between generated samles from different designs. In ractice, common random numbers may be beneficially used to induce ositive deendence between oututs from different designs to further imrove the value of the robability of correct selection (see Dai and Chen 1997; Deng, Ho, and Hu 1992). In many alications, deendence between the designs may be endogenous, e.g., consider the case where the erformance of different financial ortfolios is based on the value of exected utility of each ortfolio. Here the utility of any given ortfolio is a function of underlying assets and these in turn may deend uon a 2

3 few common factors. Motivated by such alications, in this aer we consider the roblem of otimal allocation of a comuting budget when the oututs from different designs are deendent. Fu et al. (2004, 2006) consider this roblem under the assumtion that oututs from all the designs follow a multivariate Gaussian distribution. Based on Xiong (2005), we generalize their analysis to allow for non-gaussian distributions. As noted by Glynn and Juneja (2004), this setting also has imortant ractical consequences, because assuming Gaussian distributions for non-gaussian samling can lead to faulty allocations and significant erformance degradation, even after batching. A summary of our secific research contributions is as follows: We use the large deviations framework to identify the large deviations rate function associated with the robability of false selection as a function of the comutational allocations to various designs. Thus, asymtotically, the roblem of finding an otimal allocation to minimize the robability of false selection reduces to a deterministic otimization roblem involving the corresonding rate function. We establish structural roerties of the solution to the asymtotic otimization roblem, which leads to a simlified, single-variable nonlinear otimization roblem, for which we roose a numerical solution rocedure. We exlicitly characterize the convergence rate for the otimality ga (bias) between the otimal asymtotic allocations and the true (finite samle) otimal allocations. As far as we are aware, these are the first such results in ordinal otimization. As is tyical in the OCBA literature (cf. Chen et al. 1997, 2000; Fu et al. 2004, 2006), the analysis assumes that the large deviations rate function of the robability of false selection is known (e.g., if the joint distribution from samles from different designs is known). Since this is not the case in ractice as even the exected value of the samles is unknown imlementation involves a ilot hase where this rate function is estimated, from which the corresonding otimal allocations are determined, leading to some erformance degradation due to estimation errors. However, analysis of this erformance degradation is beyond the scoe of this aer. The rest of the aer is organized as follows. In Section 2, we formulate the roblem and identify the large deviations rate function associated with the robability of incorrect 3

4 selection. In Section 3 we develo a numerical solution methodology to solve the nonlinear otimization roblem to determine asymtotically otimal allocations. The convergence rate of these allocations to the true (finite samle) otimal allocations is characterized in Section 4. In Section 5, we rovide a brief conclusion to the aer. Some of the lengthy roofs are relegated to Aendices A and B. 2. Problem Formulation & Rate Function Identification Suose that we have k designs, with µ i denoting the mean of design i, i = 1,..., k, and the goal is to find the design with maximum mean. Without loss of generality, assume that µ 1 > µ 2... µ k, so the best design is design 1. In the setting of this aer, for each design i, µ i is estimated from i.i.d. samles J ij, j = 1, 2,..., where E[J ij ] = µ i. Samles across designs, however, may be deendent for a fixed (relication number) j, but are otherwise indeendent. Denote the samle mean for a design based on m relications by J i (m) = m j=1 J ij/m. The design with the largest samle mean is chosen as the best design; thus, correct selection occurs if design 1 has the largest samle mean. The roblem of otimal allocation of a comuting budget is to decide the number of samles for each design in order to maximize the robability of correct selection, or conversely to minimize the robability of false selection. Let i (n) denote the roortion of simulation relications (samles) allocated to design i out of the comuting budget exressed as the total number of relications n, where i (n) 0, k i=1 i(n) = 1, and each i (n)n is an integer. Thus, (J i,1, J i,2,..., J i,i (n)n) denotes the samles for design i. Then false selection is made if J1 ( 1 (n)n) is not the largest samle mean, so we define the robability of false selection by P (F S) P ( J 1 ( 1 (n)n) max 2 i k J i ( i (n)n)). (1) The roblem of interest is to find a robability vector (n) = ( 1 (n),..., k (n)) that minimizes (1). As mentioned in the introduction, we first use the large deviations framework to identify the rate function of P (F S) as n. We then find a robability vector [0, 1] k to minimize this rate function, which acts as a surrogate to P (F S). After roviding a numerical rocedure for finding, we rove convergence of (n) to and characterize the rate of convergence. 4

5 Note that (1) is lower bounded by and is uer bounded by Therefore, if for 2 i k, for some rate function R i (, ), then max P ( J 1 ( 1 (n)n) J i ( i (n)n)) 2 i k (k 1) max 2 i k P ( J 1 ( 1 (n)n) J i ( i (n)n)). 1 lim n n log P ( J 1 ( 1 (n)n) J i ( i (n)n)) = R i ( 1, i ) (2) 1 lim log P (F S) = min n n R i( 1, i ). (3) 2 i k Thus, asymtotically our otimization roblem reduces to finding a robability vector = ( 1,..., k ) that solves the otimization roblem max ( 1,..., k ) min R i( 1, i ). (4) 2 i k We determine R i ( 1, i ) using the Gartner-Ellis Theorem (see Dembo and Zeitouni 1998). Some notation and assumtions are needed before we do this. 2.1 Notation Throughout, we use J i to denote the generic design i random variable for J ij, j = 1, 2,... Let Λ i : R 2 R denote the log-moment generating function of (J 1, J i ), i.e., Λ i (x, y) = log E[e xj 1+yJ i ], and I i : R 2 R + denote the Fenchel-Legendre transform of Λ i, i.e., I i (x 1, x i ) = su λ 1,λ i (λ 1 x 1 + λ i x i Λ i (λ 1, λ i )). Let D Λi {λ R 2 : Λ i (λ) < ). Let A o denote the interior of set A. It is well known that Λ i is convex and C throughout D o Λ i (see Dembo and Zeitouni 1998). Let F i { Λ i (λ) : λ D Λ o i }. For x F i R 2, let λ x denote the solution to Λ i (λ) = x. 5

6 Then, I i (x) = λ T x x Λ i (λ x ), so that I i (x) <. It is also well known that I i is convex and differentiable along the interior of F i, I i (µ 1, µ i ) = 0, and I i (x) 0 for all x R 2 for 2 i k (see Dembo and Zeitouni 1998). For notational convenience, we introduce the following notational convention to denote artial derivatives for any function f : R 2 R: We make the following key assumtion: Assumtion 1. For each i = 2, 3,..., k, (i) (0, 0) D o Λ i ; f (j,k) (x, y) j+k f(x, y). j x k y (ii) γ i > 0, β i > 0 such that ( γ i, 0), (0, β i ) D o Λ i, Λ (1,0) i ( γ i, 0) = µ i, Λ (0,1) i (0, β i ) = µ 1 ; and (iii) J 1 J i is a non-degenerate random variable. Condition (i) ensures that each J i is light tailed, i.e., both its left and right tail decay at least exonentially fast. Condition (ii) imlies P (J 1 < µ i ) > 0, since if P (J 1 µ i ) = 1, no such γ i exists; similarly, it also imlies P (J i > µ 1 ) > 0. Condition (iii) is true in ractically all cases of interest; even in those cases where it does not hold, it is easy to modify the analysis and the roosed algorithm to handle the situation. 2.2 Determining the Rate Function R i ( 1, i ) Let Z (n) (i, 1 (n), i (n)) = J i (n i (n)) J 1 (n 1 (n)), and let Λ (n) (i, (i, 1 (n), i (n))(x) = log E[exZ(n) 1 (n), i (n)) ] denote its log-moment generating function. Since for any fixed j, (J ij : i = 1,..., k) are i.i.d. vectors, we have Λ (n) (i, 1 (n), i (n)) (λ) = { ni (n)λ i ( λ n 1 (n)λ i (, λ ) + n( n 1 (n) n i (n) 1(n) i (n))λ i ( λ, 0) n 1 (n) λ, λ ) + n( λ n 1 (n) n i (n) i(n) 1 (n))λ i (0, ) n i (n) 1(n) i (n), i(n) 1 (n). Note Z (n) (i, 1 (n), i (n)) is only well defined when {n i(n)} are integers; and Λ (n) (i, 1 (n), i (n))(λ) is well-defined when {n i (n)} are ositive. We further assume that i (n) i > 0 as n 6

7 for some robability vector { i }. We take this assumtion as given for now, and we will show in Section 4 it always holds. It follows from this assumtion that Λ (n) (i, lim 1 (n), i (n)) (nλ) n n = Λ (i,1, i )(λ), where Λ (i,1, i )(λ) = { i Λ i ( λ 1, λ i ) + ( 1 i )Λ i ( λ 1, 0) 1 i, 1 Λ i ( λ 1, λ i ) + ( i 1 )Λ i (0, λ i ) i 1. (5) Since D o Λ i is non-emty, D o Λ (i,1, i ) is non-emty. Let F (i, 1, i ) {Λ (i,1, i ) (λ) : λ D o Λ (i,1, i ) }. To characterize the rate function, we need the following additional assumtion: Assumtion 2. For each i = 2, 3,..., k, 0 F o (i, 1, i ) 1, i > 0. In other words, Λ (i, 1, i ) has a zero in F (i, o 1, i ), which we will denote by λ i ( 1, i ), which we now show is unique and satisfies some other roerties useful for our analysis. Definition 1. A function f is said to be homogeneous if f(αx) = αf(x) for α > 0. Lemma 1. Under Assumtions 1 and 2, λ i ( 1, i ) is a unique homogeneous function. Furthermore, it is ositive for 1, i > 0. Proof: Assumtion 2 imlies the existence of λ i ( 1, i ) such that Λ (i, 1, i ) (λ i( 1, i )) = 0, and its uniqueness follows from the strict convexity of Λ (i,1, i ), which we now establish. Λ i ( λ 1, λ i ) is a convex function of λ, as it is a log-moment generating function of J i / i J 1 / 1 evaluated at λ. Also, Λ i (0, x) and Λ i (x, 0) are strictly convex functions of x in the interior of their domain of finiteness (see Dembo and Zeitouni 1993, ). Therefore, for 1 i, Λ (i,1, i ) is strictly convex throughout D o Λ (i,1, i ) ; for 1 = i, strict convexity follows from Assumtion 1, which ensures that J 1 J i is non-degenerate. It is easy to check that Λ (i, 1, i ) (0) = µ i µ 1 < 0. Hence, λ i ( 1, i ) > 0. By differentiating Equation (5) and setting equal to zero, we have i 1 Λ (1,0) i ( λ i( 1, i ) 1, λ i( 1, i ) i ) + 1 i 1 Λ (1,0) i ( λ i( 1, i ) 1, 0) = Λ (0,1) i ( λ i( 1, i ) 1, λ i( 1, i ) i ), i 1, 7

8 Λ (1,0) i ( λ i( 1, i ) 1, λ i( 1, i ) i ) = 1 i Λ (0,1) i ( λ i( 1, i ) 1, λ i( 1, i ) i ) + i 1 i Λ (1,0) i (0, λ i( 1, i ) i ), 1 i. It follows that for any α > 0, λ i (α 1, α i ) = αλ i ( 1, i ). The lemma means that Assumtion 2 is essentially equivalent to requiring the existence of λ i (1, ) satisfying Λ (i,1,) (λ i(1, )) = 0 for each > 0. We can now state the main result characterizing the rate function. Theorem 1. Under Assumtions 1 and 2, R i ( 1, i ) = I (i,1, i )(0) = Λ (i,1, i )(λ i ( 1, i )) satisfies (2), so that (3) holds with this rate function. Proof: Under Assumtions 1 and 2, using the Gartner-Ellis Theorem (see Dembo and Zeitouni 1998, Theorem and Lemma 2.3.9), it can be seen that for each i 2, (Z (n) (i, 1 (n), i (n)) : n 0) satisfies the large deviations rincile, so that 1 lim log P (Z(n) n (i, n 1 (n), i (n)) 0) = inf I (i, 1, i )(x), (6) x 0 where I (i,1, i )(x) = su λ R (λx Λ (i,1, i )(λ)). Now, I (i,1, i ) is strictly convex and C in the set F o (i, 1, i ) (see Dembo and Zeitouni 1998, ), and equal to zero when µ i µ 1 < 0. Therefore, R i ( 1, i ) = inf x 0 I (i, 1, i )(x) = I (i,1, i )(0) = inf λ Λ (i, 1, i )(λ) = Λ (i,1, i )(λ i ( 1, i )). Recall our otimization roblem (4). If each R i (, ) were a concave function, our otimization roblem would be a concave otimization roblem and first-order conditions would be necessary and sufficient for otimality. As noted in Glynn and Juneja (2004) and Xiong (2005), this is true when the samles of different designs are indeendently generated. However, when there is deendence amongst samles, R i (, ) need not be a concave function making the otimization roblem much harder to solve. In Section 3.2, this lack of concavity is illustrated in Examle 3. Note that if for each i 2, J 1 and J i have ositive deendence, i.e., P (J 1 x, J i y) P (J 1 x)p (J i y), x, y, (7) 8

9 then the otimization roblem (4) gives a better solution comared to the case where each J 1 and J i are indeendent or negatively deendent, where the latter corresonds to the reversal of the inequality in (7). To see this, note that under ositive deendence, for any λ, µ > 0, e λj 1 and e µj i are negatively deendent, i.e., P (e λj 1 x, e µj i y) P (e λj 1 x)p (e µj i y), x, y. This imlies that (Lemma 2.1 in Jin et al. 2003) Ee λj 1+µJ i Ee λj 1 Ee µj i. With simle algebra, it can be seen that R i ( 1, i ) dominates R i ( 1, i ) under indeendence for any non-negative 1 and i, and the claim follows. We now illustrate some roerties of R i (, ) that are useful in designing algorithms to numerically solve (4). Lemma 2. For all i 2, R i ( 1, i ) is increasing in i when i 1, and increasing in 1 when i 1. Proof: Recall that R i ( 1, i ) = Λ (i,1, i )(λ i ( 1, i )) and If we fix 1 > 0 and let i < 1, we have Λ (i,1, i )(λ) λ = 0. λ=λi ( 1, i ) R (0,1) i ( 1, i ) = Λ (i, 1, i )(λ) λ=λi. ( 1, i ) i For notational convenience, we denote λ i ( 1, i ) as λ i in this roof. Then R (0,1) i ( 1, i ) = Λ i ( λ i, λ i ) + λ i Λ (0,1) i ( λ i, λ i ) + Λ i ( λ i, 0). (8) 1 i i 1 i 1 Consider function G(x) Λ i ( λ i 1, x). It is easily seen that G (x) > 0 for any x. We may rewrite the right hand side of (8) as G(0) G( λ i ) + λ i G ( λ i ) = λ2 i G (θ λ i ) 0, i i i 2 2 i i where the second equality is by a Taylor exansion of G(0) around λ i i and θ [0, 1]. With this, we establish the first art. Alying similar arguments to i > 1, the second art can be similarly established. 9

10 Recall that R i ( 1, i ) denotes the rate function associated with P (F S) when only design 1 and i are considered and 1 n samles are allocated to design 1 while i n samles are allocated to design i (here we assume that 1 n and i n are integers to facilitate the discussion). Then R i ( 1, i ) is a surrogate measure for P (F S), in that the larger its value, asymtotically the smaller the value of P (F S). Lemma 2 therefore is intuitively lausible as larger the number of samles of the design assigned less samles, asymtotically, lower the P (F S). However, as our analysis indicates, this monotonicity may breakdown when the samles of design assigned more samles are further increased. For instance, R i ( 1, i ) may decrease as i is increased when i > 1. This may haen when J 1 and J i are highly ositively deendent, so that J 1 J i has very little variability. Under such deendence, consider the case where 1 = i. Then the robability ( 1 n 1 P J 1k 1 1 n i n k=1 i n k=1 ) ( ) 1 n 1 J ik = P (J 1k J ik ) 0 1 n may be quite small. However, if i is increased further, then this robability becomes ( 1 n 1 P J 1k 1 n k=1 ( 1 i ) 1 1 n k=1 1 n ( ) i 1 J ik + k=1 i 1 ( i 1 )n i n k= 1 n+1 J ik ). (9) Thus, as i increases, the weight given to the deendent samles reduces while that given to the indeendent samles increases. This suggests that in certain cases, R i ( 1, i ) may decrease as i is increased from 1, due to added noise from the indeendent samles ( i 1 )n samles. Equation (9) suggests that as i, we may exect R i ( 1, i ) to converge to the rate function of P 1 1 (n)n 1 (n)n k=1 J 1k µ i. We show this in Lemma 4, and establish some other roerties of R i ( 1, i ) in Lemmas 3 and 4 useful to our analysis. Lemma 3. Under Assumtions 1 and 2, R i (, ) is a homogeneous function. Proof: Follows from Lemma 1 and Theorem 1, alying the definition of Λ (i,1, i )(λ i ( 1, i )) in (5). Thus, it suffices to focus on R i (1, ) for > 0 to understand the behavior of R i ( 1, i ). For notational simlicity, let λ i () denote λ i (1, ) and R i () denote R i (1, ). 10

11 Let f i (λ, ) = Λ (i,1,) (λ) = Λ i ( λ, λ ) ( 1)Λ i(0, λ ). (10) Then, R i () = f i (λ i (), ). Also, as discussed before, λ i () is the unique solution to f (1,0) i (λ i (), ) = 0. Therefore, from the imlicit function theorem, it follows that λ i() = f (1,1) i (λ i (), ) f (2,0) i (λ i (), ). It is also easy to see that R i () = f (0,1) i (λ i (), ). Furthermore, R i () = f (2,0) i (λ i (), )f (0,2) i (λ i (), ) f (1,1) i (λ i (), ) 2. f (2,0) i (λ i (), ) Lemma 2 and Lemma 3 imly that R i () is increasing when < 1. In order to know the monotonicity of R i () on (1, ), we need to analyze the first and second derivatives of R i () and its behavior as. So we ut down the exressions of both derivatives above. The following Lemma gives the asymtotic behavior of R i () and λ i (). Lemma 4. Under Assumtions 1 and 2, λ i () γ i (11) as, and as 0. Furthermore, λ i () β i (12) R i ( ) = lim R i () = Λ i ( γ i, 0) γ i µ i = inf x I i(µ i, x), (13) and R i (0 + ) = 0. lim R i () = 0, (14) The roof of Lemma 4 is given in the Aendix. These roerties will be used in the three examles resented later in the next section. Since under Assumtions 1 and 2, R i (0+) = 0, we set R i (0) = 0 henceforth. 11

12 3. Solving the Asymtotic Otimization Problem In this section, we first reduce the asymtotic otimization roblem (4) to a single variable otimization roblem. We then develo a numerical rocedure to solve this roblem. 3.1 Transformation to a Single Variable Problem Let Ω = {2, 3,..., k}. Setting x i = i 1 for i Ω, we can rewrite the budget constraint as 1 (1 + i Ω x i) = 1, and roblem (4) as: max (x j 0:j Ω) min i Ω R i (x i ) 1 + i Ω x. (15) i Recall that R i ( ) need not be a monotone function. Set R 1 i (z) inf{x > 0 R i (x) = z}. If (x i : i Ω) solves (15), then the solution to (4) corresonds to 1 1 = 1+ i Ω x i i = 1x i. The following theorem characterizes such a solution. Theorem 2. Under Assumtions 1 and 2, if (x i : i Ω) denotes an otimal solution to the otimization roblem (15), then for each i Ω, the following hold: 1. 0 < x i <. 2. z > 0 such that R i (x i ) = z i Ω. Furthermore, x i = R 1 i (z ). 3. If x i 1, then R i(x i ) If z R i (1), then x i 1. Proof: Under Assumtions 1 and 2, R i (0) = 0, so it s clear that each x i and > 0. Similarly, since for any x i =, the objective function value equals zero, it follows that at an otimal oint, each x i <. To see conclusion 2, first note that R i (x i ) must be equal for each i Ω. Otherwise, suose that R i (x i ) < R j (x j) for some i, j Ω. Then a small reduction in x j does not change the numerator of the objective function, but it reduces the denominator, contradicting the otimality of (x i : i Ω). Let z = R i (x i ). It is easy to see that x i = R 1 i (z ). Otherwise, x i > R 1 i (z ), and a better solution to (15) is obtained by relacing x i with R 1 i (z ). To see conclusion 3, note that if R i(x i ) < 0, then there exists an x < x i such that R i (x) > R i (x i ). Since R i (0) = 0, and R i ( ) is a continuous function, it follows that there exists a x < x < x i such that R i ( x) = R i (x i ). This contradicts the fact that x i = R 1 i (z ). 12

13 Conclusion 4 now follows from Lemma 2. It can be seen that R 1 i for non-gaussian distributions, R 1 i is continuous for Gaussian distributions (see Fu et al. 2006), but can be discontinuous when R i is not monotone. This is illustrated in Examle 3 (Figure 1: a = 0.95, b = 1.05 case) in the next section. The next lemma states some features of function R 1 i. Lemma 5. Under Assumtions 1 and 2, 1. R 1 i 2. R 1 i is strictly increasing. is left continuous. 3. If R 1 i is discontinuous at z 0 with x 0 = R 1 i (z 0 ), then R i(x 0 ) = 0. Proof. 1. Suose x 0 = R 1 i (z 0 ) > 0. Then for arbitrary z 1 (0, z 0 ), there exists x 1 (0, x 0 ) such that R i (x 1 ) = z 1 by continuity of R i. Hence, R 1 i (z 1 ) x 1 < x Let R 1 i (z 0 ) = x 0 and z n z 0. Then there exists x 1 = lim n R 1 i (z n ). By continuity of R i, we have z 0 = lim n z n = lim n R i (R 1 i (z n )) = R i (x 1 ). By monotonicity above, we have x 1 x 0. Then the definition of R 1 i imlies x 1 = x Discontinuity at z 0 imlies there exists x 1 > x 0 such that R 1 i (z) x 1 whenever z > z 0. The above two features imly R i(x 0 ) 0. Suose R i(x 0 ) > 0. Then there exists x 2 (x 0, x 1 ) such that z 2 = R i (x 2 ) > z 0. Now we have R 1 i (z 2 ) x 2 < x 1, a contradiction. Let R b i su x 0 R i (x). Obviously, z R b min i Ω R b i. Now we can rewrite roblem (15) as a single-variable nonlinear rogramming (NLP) roblem where F (z) = min 0 z R b F (z) (16) 1 + k z R 1 i (z). (17) Once we find an otimizer to this roblem, z, we can easily obtain { i } via 1 = i Ω R 1 i (z ), i = 1R 1 i (z ). (18) 13

14 Let R b i = max(r i (1), R i ( )). Then, clearly R b i R b i. It is intuitively lausible that at least in tyical cases, R b i = R b i. To see this, recall that R i (x) serves as a surrogate for the robability P ( 1 n n k=1 J 1k 1 xn xn k=1 J ik ) for large values of n. As roved in Lemma 2, R i (x) increases with x for x < 1. However, it may decrease with x for x > 1. It is intuitively lausible that either R i (x) increases with x for all x, in which case its highest value R b i = R i ( ) comuted in Lemma 4. Otherwise, it may have R i(1+) < 0, and it may either decrease with x for all x > 1, or that it first decreases and then increases with x. Thus, in all such cases, R b i = R b i. In articular, in these cases, R i ( ) is quasi-convex in the region (1, ). Next, we illustrate this with some examles. 3.2 Examles We resent some illustrative examles where R b i = R b i. This subsection can be skied without loss of continuity. Examle 1. Suose that Λ (0,1) i ( µ, λ) Λ (0,1) i (0, λ), for all µ λ > 0, and ( µ, λ) D Λi. In the case of Gaussian and Bernoulli distributions, this condition corresonds to negative correlation between J 1 and J i. We know R i () = f i (λ i (), )), where f i is given by Equation (10). Then we have R i() = f (1,0) i (λ i (), ) = λ i() [ (0,1) Λ 2 i ( λ i (), λ i() ) + ( 1)Λ(0,1) i (0, λ i() )] Λ i (0, λ i() ) λ i() Λ(0,1) i (0, λ i() ) Λ i(0, λ i() ) > 0, where the last ste uses convexity of Λ i (0, λ). Hence we always have an increasing R i (). In articular, R b i = R b i. Examle 2. Suose that Λ (0,2) i ( µ, λ) Λ (0,2) i (0, λ) and Λ (0,3) i (0, λ) 0, for all µ λ > 0, and ( µ, λ) D Λi. It can be seen that these conditions hold for a Gaussian distribution. In the aendix, we rove that R i is quasi-convex, so R b i = R b i. A non-gaussian distribution where both conditions hold (roof in the aendix) is the following: J 1 U( 1, 1), J i = cj 1 a + bu i, c [0, 0.5], where U i U( 1, 1) are i.i.d. and indeendent of J 1. 14

15 1.4 a=0.8, b=0.9 a=0.8, b=2 a=0.8, b= X i X i X i Figure 1: Function R i (x i ) Examle 3. Consider J 1 and J i as in Examle 2, with c = 1, 0 < a < 1 and a < b. In this case, it is difficult to establish quasi-convexity of R i on (1, ) analytically. However, numerically we observe this to be true for three set of arameters (refer to Figure 1; see also the aendix for more details): 1 > b > a: x i (0, 1]; b 1: Since R i is increasing to the right of 1, x i (0, ); b > 1 + o(1): Since R 1 i (R i (x)) x for any x (1, 4.7], x i (1, 4.7]. 3.3 Numerical Procedure for solving the NLP We now develo an efficient numerical rocedure to solve the one-dimensional NLP min F (z), (19) 0 z R b where R b = min i Ω Rb i and F is given by (17). Note that even if R b > R b, the solution to (19) still rovides a good solution to (16). Straightforward algebra yields M(z) z 2 F (z) = z R i (R 1 i (z)) 1 R 1 i (z). (20) 15

16 If F is smooth, we only need to locate all the roots of M(z) = 0 in interval [0, R b ]. But F is not differentiable at R i (1) unless J i and J 1 are indeendent. Also note that F may not even be continuous when some R i is not monotone, as then R 1 i is discontinuous. So M(z ) = 0 may not be satisfied or even well defined for each otimizer z to roblem (19). Now we define two sets as follows: S 1 = {R i (1) i Ω} [0, R b ), S 2 = {z (0, R b ) F ( ) discontinuous at z}. If we let k = 4 and functions {R i ( ), i = 2, 3, 4} to be set as the three cases from left to right in Figure 1, then we can show R b = R 2 (1), S 1 = {R 3 (1), R 4 (1)}, and S 2 = {R 4 (1)}. Theorem 3 resents some necessary conditions that an otimizer z satisfies. Theorem 3. If z is an otimizer of roblem (19), one of the following three conditions has to be satisfied: (i) F (z ) = 0, z / S 1, 0 < z < R b ; (ii) F (z ) 0, F (z +) 0, z S 1 \ (S 2 { R b }); (iii) F (z ) 0, z S 1 (S 2 { R b }). Proof: Note that F (0+) =, so 0 cannot be an otimizer. Now consider the oint R b, and assume R b / S 1. If R 1 i ( R b ) = for some i Ω, then the objective function F ( R b ) =, and hence R b cannot be otimal. Now assume R 1 i ( R b ) is finite for all i Ω. Recall that R b = min i Ω Rb i. Thus, Rb = R b i for some i, and since R b / S 1, it follows that R b = R i ( ) > R i (1). Therefore, R 1 i ( R b ) = +. From (14), it follows that R i(r 1 i ( R b )) = 0. Then we have F ( R b ) =, because z Therefore, R b cannot be otimal as long as R b / S 1. R i (R 1 i (z)) R 1 i (z) as z R b. Let ω S 2 \ S 1. Lemma 5 imlies that F is left continuous at ω, and R i(r 1 i (ω)) = 0 for some i Ω. So we have F (ω ) =, and thus ω cannot be otimal. Now if we assume z (0, R b )\S 1, we have z / S 2, i.e., F is continuous and differentiable at z. So F (z ) = 0 has to be true. This is the first situation in the theorem. For the case z S 1 \ (S 2 { R b }), we know F has both left and right limits at z, so F (z ) 0 and F (z +) 0 have to hold. This is the second situation in the theorem. For the case z S 1 (S 2 { R b }), we know F ( ) only has a left limit, so F (z ) 0, which is the third condition in the theorem. The following establishes a useful roerty of the otimal solution { i, i k}. 16

17 Lemma 6. Without loss of generality, assume R 2 (1) R 3 (1) R k (1). Then there exists 2 i 1 i 2 k such that i > 1, 2 i < i 1, i = 1, i 1 i < i 2, i < 1, i 2 i, where i = j = 1 for some i 1 i, j < i 2 only if R i (1) = R j (1). Proof: Suose R i (1) < z for some i. Then i = R 1 i (z ) > 1 = i > 1. The reverse 1 equality holds if R i (1) > z. Since i = 1 if and only if R i (1) = z, we can rove the second art of the claim. This feature is consistent with intuition. The order of R i (1) reflects the order of simulation efficiency. A small (large) value imlies low (high) efficiency, which then asks for more (less) allocation. In order to locate the global otimizer of roblem (16), we need to solve the following two roblems: P1. Calculate F (z), or more recisely, R 1 i (z), for any given R i (1) < z R b i. P2. Find all z satisfying conditions in Theorem 3. If we assume R i (x) on (1, ) only takes three ossible shaes as illustrated in Examle 3 of the revious section, P1 is trivial to solve by calculating R 1 i (z) via numerical rocedures such as the bisection method. P2 deends on our knowledge on convexity of function F. If all the samles follow Gaussian distributions, Fu et al. (2006) show that F is iecewise convex. However, this may not be true in general settings. Let V denote the otimal value of roblem (16). For an arbitrary > 0, the following result rovides a means to locate a solution with objective value in the interval [V, V + ]. Let F 0 = F (min i Ω R i (1)). Theorem 4. Consider a sequence {z n } where z 1 = 1 F 0 and z n+1 = F (z n )z n, where a b = min(a, b). min 1 j n F (z j ) F 0 For < V, there exists an m such that z m R b and z m 1 < R b. In addition, min F (z n) F 0 V +. 1 n m 17

18 Proof. Since < V, z n+1 = F (z n )z n min 1 j n F (z j ) F 0 F (z n)z n F (z n ) > z n. (21) Suose the sequence never exceeds R b, then it has to converge to some value, say r R b. Since F (z) is left continuous from Lemma 5, we have F (z n ) F (r). Letting n in (21), we have r F (r)r > r, a contradiction. F (r) Note that G(z) zf (z) = 1 + k R 1 i (z) is an increasing function of z. Let z 0 = 0. Then, for any 0 n < m and any z (z n, z n+1 ], we have F (z) = G(z) z { G(z n) F0, n = 0 = z n+1 min F (z j) F 0, n > 0 1 j n min F (z n) F 0. 1 n m We comlete the roof by noticing that (0, R b ] m 1 n=0 (z n, z n+1 ]. Based on Theorem 4, we roose the following exlicit algorithm: Algorithm for Solving the Aroximation Problem. Ste 1. Let z = min i {2,...,k} R i (1, 1) and F = F (z ), where F is given by (17) and R i is the rate function. Secify a tolerance level (0, F ). Set n = 1 and z 1 = 1 F. Ste 2. If z n > R b min i {2,...,k} Rb i, go to Ste 4; otherwise, go to Ste 3. Ste 3. If F (z n ) < F, let z = z n and F = F (z n ). Set z n+1 = F (zn)zn and n = n + 1, then go to ste 2. F Ste 4. Calculate 1 from z via (18) and i = 1R 1 i (z ) for i = 2,..., k. Return { i }. 4. Asymtotic Analysis Since the rocedure described in the revious section gives a solution = ( 1,..., k ) to the aroximate roblem, instead of the solution (n) = ( 1 (n),..., k (n)) to the original roblem of minimizing the robability of false selection given by (1), we rove that (n) and characterize the rate of convergence under additional assumtions. Lemma 7 roves that dominates any solution (n) = ( 1 (n),..., k (n)), where (n) converges to some limit. Any vector R k is referred to as an allocation vector if i 0 for each i, i k i = 1 and 18

19 n i is an integer for each i. Let P (F S) denotes the robability of false selection under the allocation vector. The following result establishes that a finite budget allocation based on dominates all other linear allocations in a certain sense asymtotically. Lemma 7. Consider a sequence of allocation vectors (n) = ( 1 (n),..., k (n)) for n 1, and suose that there exists a vector such that Under Assumtions 1 and 2, if, then (n). log(p (n) (F S)/P lim (n)(f S)) n n where (n) is an allocation vector such that (n). > 0, (22) Proof: We slit the roof into three cases: (i) 1 > 0 and i > 0 for all i Ω; (ii) 1 = 0; (iii) 1 > 0 and i = 0 for some i Ω. From Theorem 1, (i) follows. Now consider (ii). Without loss of generality, we further assume 2 > 0. Assumtion 1 imlies that there exists ε > 0 such that P (J 1 µ 2 ε) > 0. Letting α 2 (n) = 2(n) 1 (n), for n n 0 sufficiently large so that 2 (n) > 1 (n) for all n n 0, log P ( J2 ( 2 (n)n) J 1 ( 1 (n)n) ) 1 (n)n = log P (J 2m /α 2 (n) J 1m ) + log P m=1 2 (n)n m= 1 (n)n+1 2 (n)n m= 1 (n)n+1 J 2m /α 2 (n) 1 (n)n(µ 2 ε) J 2m /α 2 (n) > 0 1 (n)n + log P (J 2m /α 2 (n) J 1m ) 1 (n)n(µ 2 ε) log P m=1 1 2 (n)n 2 (n)n m= 1 (n)n+1 J 2m (µ 2 ε) + 1 (n)n log P ((J 2 /α 2 (n) J 1 ) (µ 2 ε)). By the strong law of large numbers, the first term converges to zero, and P ((J 2 /α 2 (n) J 1 ) (µ 2 ε)) P ( J 1 (µ 2 ε)). 19

20 Hence, we have lim inf n which then imlies that 1 n log P ( J 2 ( 2 (n)n) J 1 ( 1 (n)n) 1 log P (J 1 µ 2 ε) = 0, 1 lim n n P 1 (n)(f S) = 0 > lim n n P (n)(f S). Case (iii) can be treated by switching the roles of 2 (n) and 1 (n) in the arguments for case (ii). The following convergence result follows from Lemma 7: Theorem 5. Under Assumtions 1 and 2, lim (n) = n. Proof. Suose that (n) does not converge to. Then we can find an increasing and divergent sequence {n m, m = 1, } and a vector such that Then from Lemma 7, we have that lim (n m) =. n log(p (nm )(F S)/P lim (n)(f S)) n n > 0, imlying P (nm )(F S) > P (n)(f S) for n sufficiently large, which is a contradiction. Theorem 5 imlies that (n) differs from by an o(1) amount. In order to get a better idea of the rate of convergence of (n) to, we need an additional assumtion. Assumtion 3. J i, J 1, and J i J 1 are non-lattice random variables. Recall that a function f(n) is said to be Θ(g(n)) if there exist ositive constants K 1 < K 2 such that K 1 g(n) f(n) K 2 g(n) for all n sufficiently large. We have the following two lemmas, whose roofs are given in the Aendix. Lemma 8. Under Assumtions 1, 2, and 3, P α(n) (F S) = Θ ( 1 n ex[ n min 2 i k R i(α 1 (n), α i (n))] ), for any allocation vector α(n) that converges to a vector α as n. 20

21 Lemma 9. Under Assumtions 1, 2, and 3, su nr i ( 1 (n), i (n)) nr i ( 1, i ) <, i Ω. n>0 Recall that the otimizer z to roblem (16) has to satisfy one of three conditions in Theorem 3. Based on these conditions, we introduce the following definition. Definition 2. A solution z conditions hold: to roblem (16) is called Zero Fit if any of the following (1) F (z ) = 0 and z (0, R b ) \ S 1 ; (2) F (z )F (z +) = 0 and z S 1 \ (S 2 {R b }); (3) F (z ) = 0 and z S 1 (S 2 {R b }). The following theorem gives a more recise order of i (n) i in terms of the budget n. Its roof is given in the Aendix. Theorem 6. Under Assumtions 1, 2, and 3, suose there do not exist 1 < i < j k such that z = R i (1) = R j (1), then (i) If z is not Zero Fit, i (n) i O( 1 ) for any 1 i k; n (ii) If z is Zero Fit and F (z ±) 0, i (n) i O( 1 n ) for any 1 i k. 5. Conclusions In this aer, we considered the ordinal otimization roblem when the outut from different oulations is deendent and has a general (not necessarily Gaussian) distribution. By using the large deviations framework to identify the large deviations rate function of the robability of false selection, we obtain an otimization roblem that is far more comlex than the one obtained in the indeendent and/or Gaussian setting. However, by analyzing the structure of this roblem, we are able to reduce it to a single variable nonlinear otimization roblem and develo a numerical algorithm to aroximately solve it. In addition to roving that the solution to this aroximate otimization roblem is in fact the asymtotic limit of the solution to the original otimal budget allocation roblem, we are also able to characterize the convergence rate of the aroximate solution under additional conditions. Both the analysis used and the results obtained are novel to this general ordinal otimization setting. 21

22 Acknowledgments Michael Fu and Xiaoing Xiong were suorted in art by the National Science Foundation under Grants DMI and DMI , and by the Air Force Office of Scientific Research under Grant FA Aendix In this aendix, we rovide the roofs of Lemmas 4, 8, 9, Theorem 6, and further details of the analysis for Examles 2 and 3 from Section 3.2. Proof of Lemma 4: First consider > 1. For ɛ > 0 and sufficiently small, Λ (0,1) i (0, γ i + ɛ Note that Λ (0,1) i Λ (i,1,)(γ i + ɛ) = ) Λ (1,0) i ( (γ i + ɛ), γ i + ɛ ) + 1 ( (0, γ i+ɛ ) µ i as, and Λ (1,0) i ( (γ i + ɛ), γ i + ɛ Λ (0,1) i ( (γ i + ɛ), γ i + ɛ ) Λ (1,0) i ( (γ i + ɛ), 0) < µ i. ) Λ (0,1) i (0, γ ) i + ɛ ). Therefore, Λ (i,1,) (γ i + ɛ) > 0 for all sufficiently large. Similarly it follows that Λ (i, 1, i ) (γ i ɛ) < 0 for all sufficiently large. Since ɛ is arbitrary, (11) follows. To see (12), consider < 1. For ɛ > 0 and sufficiently small, Λ (i,1,)((β i + ɛ)) = Λ (0,1) i ( (β i + ɛ), β i + ɛ) Λ (1,0) i ( (β i + ɛ), β i + ɛ) (1 )Λ (1,0) i ( (β i + ɛ), 0). Note that as 0, Λ (0,1) i ( (β i + ɛ), β i + ɛ) Λ (0,1) i (0, β i + ɛ) > µ 1, and Λ (1,0) i ( (β i +ɛ), 0) µ 1. Hence, Λ (i,1,) ((β i +ɛ)) > 0 for sufficiently large. Similarly, it can be seen that Λ (i,1,) ((β i ɛ)) < 0 for sufficiently large, and (12) follows. To see (13), note that for > 1, R i () = Λ i ( λ i (), λ i() ) ( 1)Λ i(0, λ i() ). 22

23 Now as, Using Taylor s Theorem, Therefore, Λ i ( λ i (), λ i() ) Λ i( γ i, 0). Λ i (0, λ i() ) = λ i() Λ(0,1) i (0, 0) + o(1/). R i ( ) = Λ i ( γ i, 0) γ i µ i. To see that RHS equals inf x I i (µ i, x), note that the latter equals inf x su (λ 1 µ i + λ 2 x Λ i (λ 1, λ 2 )). λ 1,λ 2 Using the min-max theorem, this in turn equals su λ 1,λ 2 inf x (λ 1µ i + λ 2 x Λ i (λ 1, λ 2 )) The result now follows since Λ i( γ i, 0) = µ i. = su λ 1 (λ 1 µ i Λ i (λ 1, 0)). To see (14), note that R i() = f (0,1) i (λ i (), ) equals λ i () Λ (0,1) 2 i ( λ i (), λ i() ) Λ i(0, λ i() ) + ( 1)λ i() Λ (0,1) 2 i (0, λ i() ). (23) From the fact that f (1,0) i (λ i (), ) = 0, it follows that 1 Λ(0,1) i Plugging this in (23), ( λ i (), λ i() R i() = λ i() ) = Λ(1,0) i ( λ i (), λ i() Λ(1,0) i Equation (14) follows from this and (11). ( λ i (), λ i() To see that R i (0 + ) = 0, note that for < 1, ) 1 ) Λ i(0, λ i() ). R i () = Λ i ( λ i (), λ i() ) (1 )Λ i( λ i (), 0). Λ(0,1) i (0, λ i() ). The result now follows from (12). Theorem 3.3 in Chaganty and Sethuraman 1993 is useful in roving Lemma 8. reroduce its statement here to hel the reader follow the roof of Lemma 8. We 23

24 Theorem 7 (Chaganty and Sethuraman 1993). Let T n be a sequence of non-lattice valued random variables with m.g.f. φ n (z) = E ex(zt n ), which is nonvanishing and analytic in the region Ψ = {z C, z < a}, where a > 0 and C is the set of all comlex numbers. Let {a n } be a sequence of real numbers. Let ψ n (z) = log φn(z) a n and γ n (u) = su s <a,s R [us ψ n (s)], for u R. Let {m n } be a bounded sequence of real numbers and {τ n } be a sequence satisfying ψ n(τ n ) = m n and 0 < τ n < a 0 < a, for all n. Suose that a n such that τ n an. Further, assume that T n satisfies the following three conditions: (a) There exists β < such that ψ n (z) < β for all n and z Ψ; (b) There exists γ > 0 such that ψ n(τ n ) γ for all n; (c) There exists δ 0 > 0 such that, for any given δ and δ such that 0 < δ < δ 0 < δ, su φ n(τ n + t 1) = o( 1 ). (24) δ< t <δ τ n φ n (τ n ) n Then P ( T n a n m n ) 1 τ n 2πan ψ n(τ n ) ex( a nγ n (m m )). Proof of Lemma 8: In Theorem 7, set T n = n J i (α i (n)) n J 1 (α 1 (n)), m n = 0, a n = n, ψ n (λ) = Λ (i,α1 (n),α i (n))(λ), φ n (λ) = ex{nψ n (λ)}, and τ n be the solution to ψ n(λ) = 0. We also let ψ(λ) = Λ (i,α1,α i )(λ) and τ be the solution to ψ (λ) = 0. Then there exists a > τ such that ψ n (λ) is well defined on [0, a] for any sufficiently large n. We denote as Ψ the set {z C : z a, Re(z) 0}. Now we only need to verify the conditions (a), (b), (c) in Theorem 7 above. Obviously we have τ n τ and ψ n (z) ψ(z), z Ψ. Since ψ n and ψ are uniformly continuous on comact set Ψ, ψ n (z) uniformly converges to ψ(z) and thus (a) holds. The convexity of ψ(λ) and ψ n(τ n ) ψ(τ) imlies condition (b). To roceed, we denote as χ(λ; ξ) the moment-generating function, i.e., χ(λ; ξ) = Ee λξ. Obviously, χ(λ+t 1;ξ) is the χ(λ;ξ) characteristic function of a random variable, say η, hence, we have χ(λ + t 1; ξ) = χ(t 1; η) 1. χ(λ; ξ) In articular, if ξ is non-lattice, so is η. Now we suose α 1 > α i, 24

25 φ n(τ n + t 1) = χ(τ n + t 1; φ n (τ n ) χ(τ n ; J i α i (n) J 1 J i α i (n) J 1 α 1 (n) ) α 1 (n) ) χ(τ n + t 1; J 1 α 1 (n) ) χ(τ n ; J 1 α 1 (n) ) n(α1(n) αi(n)). nαi(n) χ(τ n + t 1; J 1 χ(τ n ; J 1 ) α 1 (n) α 1 (n) ) n(α1(n) αi(n)) Assumtion 3 imlies that the RHS can be taken as c.f. of a non-lattice random variable. To simlify, we denote as χ n (t) the quantity in the brackets on RHS of above formula. Since τ n τ, we have τ = su n τ n <. We choose δ 0 = 1 and fix δ and δ, we have su χ n (t) < 1. δ t δ τ Noticing that χ n (t) uniformly converges to χ(τ+t 1; J 1 α 1 ) have x = su n χ(τ; J 1 α 1 ) su χ n (t) < 1, δ t δ τ on a comact set [δ, δ τ ], we also which further imlies that su φ n (τ n + t 1) x n(α 1(n) α i (n)) = O(ex[n log(x)(α 1 α i )]) = o( 1 ). δ t δ τ n φ n (τ n ) n Similarly we can show (24) also holds when α i α 1, which comletes the roof. Proof of Lemma 9: To simlify notation, we let R(n) = min i( 1 (n), i (n)); Ri (n) = R i ( 1 (n), i (n)); 2 i k R (n) = min i( 1(n), i (n)); Ri (n) = R i ( 1(n), i (n)); 2 i k where ( i (n) : i k) is obtained by suitably rounding of each i to a multile of 1/n so that i (n) i O(1/n), each i (n) > 0 and k i=1 i (n) = 1. If R = min 2 i k R i ( 1, i ); R i = R i ( 1, i ), we have R (n) R = O(1/n), (25) R i (n) R i = O(1/n). (26) 25

26 To show (26), we reresent artial derivative with suerscrits and write R i (n) Ri = Ri ( 1(n), i (n)) R i ( 1, i ) R i ( 1(n), i (n)) R i ( 1, i (n)) + R i ( 1, i (n)) R i ( 1, i ) = (1,0) R i ( θ 1, i (n))( 1(n) 1) + R (0,1) i ( 1, θ i )( i (n) i ) K ( 1 (n) 1) + K ( i (n) i ) = O( 1 n ), where the third ste uses the mean value theorem with θ 1 between 1(n) and 1 and θ i between i (n) and i, the fourth ste uses boundedness of artial derivatives, and the last uses i (n) i O( 1 n ). To show (25), we notice that R i = R and thus, R (n) R = min i Ω [R i (n) R ] = min i Ω [R i (n) R i ] max i Ω R i (n) R i O( 1 n ). From Lemma 8 it follows that Hence, we have P (n) (F S) = Θ ( 1 n ex( n R(n) ), P (n)(f S) = Θ ( 1 n ex( nr (n) ). C log n nr (n) log P (n)(f S) log P (n) (F S) C log n n R(n), (27) where C 1 and C 2 are constants indeendent of n. We can relace R (n) with R on the left hand side by using (25). The fact that R is the value of roblem (4) imlies R R(n). Combining this with the above inequality and (25), we see that su n R(n) nr < C 1 C 2 + O(1) = K <, (28) n>0 where K is another constant. Obviously R i (n) R(n) for all i Ω. In addition, Part 2 of Theorem 2 imlies R i = R for all i Ω. Then n R i (n) nr i n R(n) nr K by (28). We define a new vector (n) with: { i (n) + 2K i(n), i 2, nr i (n) = i (n) 2K 1 i(n), i = 2. nr (29) 26

27 Obviously, (n) satisfies the budget constraint. Given sufficiently large n, each i (n) is ositive and R i (n) R(n) > R K n > R /2 for all i Ω. We recall that the otimality of { i } to roblem (4) is indeendent of the value of n. So we always have, for arbitrary n, min i Ω R i( 1 (n), i (n)) min i Ω R i( 1, i ) = R. (30) Note that i 1 = i(n) for i > 2. Combining this with homogeneity of R 1 (n) i, and noting (29) we have, for i > 2, nr i ( 1 (n), i (n)) = 1(n) 1 (n) nr i( 1 (n), i (n)) = n R i (n) + 2K R i (n) R where the last ste uses (28). > n R i (n) + K n R(n) + K nr, (31) Now nr i ( 1 (n), i (n)) > nr for all i > 2. If this inequality also holds for i = 2, we will lead to a contradiction to (30). Hence, nr 2 ( 1 (n), 2 (n)) nr = nr 2. Using suerscrits to denote artial derivatives of R 2 (, ), we have n R 2 (n) nr 2 = nr 2 ( 1 (n), 2 (n)) nr 2 nr 2 ( 1 (n), 2 (n)) nr 2 ( 1 (n), 2 (n)) = [nr 2 ( 1 (n), 2 (n)) nr 2 ( 1 (n), 2 (n))] + [nr 2 ( 1 (n), 2 (n)) nr 2 ( 1 (n), 2 (n))] = nr (1,0) 2 ( θ 1, 2 (n))[ 1 (n) 1 (n)] + nr (0,1) 2 ( 1 (n), θ 2)[ 2 (n) 2 (n)] = 2K 1(n) R R(1,0) 2 ( θ 1, 2 (n)) + 2K 1 2(n) R (0,1) R 2 ( 1 (n), θ 2), where the second ste uses nr 2 ( 1 (n), 2 (n)) nr 2, the fourth ste uses mean value theorem with θ 1 falling in between 1 (n) and 1 (n) and θ 2 falling in between 2 (n) and 2 (n). Since i (n) and i (n) all converge to i, it is easy to verify boundedness of each term on the RHS. So n R 2 (n) nr 2 is also bounded from above, and thus art (ii) is true when i = 2. Obviously, we can extend the arguments to all i Ω and comlete the roof. Additional notation is needed to hel in roving Theorem 6. We write n i (n) n i as i (n), i(n) as q 1 (n) i(n), and i as q i. We will also denote as X(n) UBD if some series X(n), 1 deending on n, is uniformly bounded from above and below for any large n. We first show the following lemma: Lemma 10. Under Assumtions 1, 2, and 3, 1 (n) UBD = i (n) UBD, i Ω. 27

28 Proof: Recall that for ( 1, i ), and α, R i (α 1, α i ) = αr i ( 1, i ), i.e., R i is a homogeneous function. Furthermore R i (α) = R i (1, α). Therefore, nr i ( 1 (n), i (n)) nr i ( 1, i ) = n 1 (n)r i ( q i (n)) n 1R i (qi ). (32) Through a Taylor series exansion, we have R i ( q i (n)) = R i (qi ) + ( q i (n) qi )R i(v i (n)), where V i (n) lies between q i (n) and qi and R i reresents the right (left) derivative if q i (n) is greater (less) than qi. Then, the RHS in (32) may be re-exressed as R i (qi ) 1 (n) + nr i(v i (n))( i (n) qi 1 (n)) = [R i (qi ) qi R i(v i (n))] 1 (n) + R i(v i (n)) i (n). (33) We observe that the coefficients of 1 (n) and i (n) converge to R i (qi ) qi R i(q i ) and R i(q i ), resectively, as n. Note that nr i ( 1 (n), i (n)) nr i ( 1, i ), and hence the right hand side of (33) is bounded by Lemma 8(ii). Obviously Lemma 10 is true if R i(q i ) 0. Now suose R i(q i ) = 0 for some i Ω; then qi 1, because R i( ) is ositive on (0, 1] by Lemma 2. If we further suose qi > 1, then R i(q i ) = 0 imlies F (z ) =, where F can be inferred from (20). But since z is otimal to (19), Theorem 3 requires F (z ) 0, a contradiction. So we may only have qi = 1, i.e., i = 1. We recall the following: V i (n) falls between q i (n) and qi = 1. R i(v i (n)) R i(1+) = 0 when q i (n) > qi = 1, whereas R i(v i (n)) R i(1 ) > 0 when q i (n) < qi = 1. Therefore, assuming R i(q i ) = 0 imlies V i (n) has to converge to q i and thus q i (n) V i (n) q i = 1. Now we have = 1 from the right, i (n) = n i (n) n i n 1 (n) n i = n 1 (n) n 1 = 1 (n). We can comlete the roof by using k i=1 i(n) = 0. Thus, 1 (n) UBD = i (n) UBD. Proof of Theorem 6: We show art (i) by considering two cases: 28

29 I. R i(q i ) = 0 for some i Ω; II. R i(q i ) 0 for all i Ω. As argued in the roof of Lemma 10, R i(q i ) = 0 for some i only if q i = 1. The condition of this theorem then imlies there is at most one i, say i = 2, such that R 2(q 2) = 0 in case I. Recall that both sides of (33) are uniformly bounded for all i, i.e., [R i (q i ) q i R i(v i (n))] 1 (n) + R i(v i (n)) i (n) UBD. (34) Since R i(v i (n)) converges to a non-zero value for i > 2, we have, for i > 2, Hence, R i (qi ) [ R i (V i(n)) q i ] 1 (n) + i (n) UBD. R i (qi ) [ R i (V i(n)) q i ] 1 (n) + i=3 Since R 2(V 2 (n)) 0, R 2(V 2 (n)) UBD and R i (qi ) [ R i (V i(n)) q i ]R 2(V 2 (n)) 1 (n) + i=3 i=3 i (n) UBD. i=3 R 2(V 2 (n)) i (n) UBD. Combining this with (34) for i = 2, we have [ ( )] [R R 2 (q2) + R 2(V i (qi ) 2 (n)) R i (V i) ] q i q 2 1 (n) + R 2(V 2 (n)) i (n) UBD. Since k i(n) = 0 and the coefficient of 1 (n) in the above item converges to R 2 (q 2) > 0, 1 (n) is bounded. Part (i) for case I of the theorem follows from Lemma 10. For case II, dividing RHS of (33) by R i(v i (n)) (this is ositive for n sufficiently large) imlies, for i Ω, [ R i (qi ) R i (V i(n)) ] q i 1 (n) + i=3 [ R i (qi ) R i (V i(n)) ] q i 1 (n) + i (n) UBD. (35) Therefore, their sum over all i Ω, ( i (n) = ) [ R i (qi ) R i (V i(n)) ] q i 1 1 (n) UBD. If we denote as B(n) the coefficient of 1 (n) in the RHS above, we have B(n) 1 (n) UBD. (36) 29

LECTURE 7 NOTES. x n. d x if. E [g(x n )] E [g(x)]

LECTURE 7 NOTES. x n. d x if. E [g(x n )] E [g(x)] LECTURE 7 NOTES 1. Convergence of random variables. Before delving into the large samle roerties of the MLE, we review some concets from large samle theory. 1. Convergence in robability: x n x if, for

More information

4. Score normalization technical details We now discuss the technical details of the score normalization method.

4. Score normalization technical details We now discuss the technical details of the score normalization method. SMT SCORING SYSTEM This document describes the scoring system for the Stanford Math Tournament We begin by giving an overview of the changes to scoring and a non-technical descrition of the scoring rules

More information

1 Extremum Estimators

1 Extremum Estimators FINC 9311-21 Financial Econometrics Handout Jialin Yu 1 Extremum Estimators Let θ 0 be a vector of k 1 unknown arameters. Extremum estimators: estimators obtained by maximizing or minimizing some objective

More information

MATH 2710: NOTES FOR ANALYSIS

MATH 2710: NOTES FOR ANALYSIS MATH 270: NOTES FOR ANALYSIS The main ideas we will learn from analysis center around the idea of a limit. Limits occurs in several settings. We will start with finite limits of sequences, then cover infinite

More information

Analysis of some entrance probabilities for killed birth-death processes

Analysis of some entrance probabilities for killed birth-death processes Analysis of some entrance robabilities for killed birth-death rocesses Master s Thesis O.J.G. van der Velde Suervisor: Dr. F.M. Sieksma July 5, 207 Mathematical Institute, Leiden University Contents Introduction

More information

Elementary Analysis in Q p

Elementary Analysis in Q p Elementary Analysis in Q Hannah Hutter, May Szedlák, Phili Wirth November 17, 2011 This reort follows very closely the book of Svetlana Katok 1. 1 Sequences and Series In this section we will see some

More information

Elements of Asymptotic Theory. James L. Powell Department of Economics University of California, Berkeley

Elements of Asymptotic Theory. James L. Powell Department of Economics University of California, Berkeley Elements of Asymtotic Theory James L. Powell Deartment of Economics University of California, Berkeley Objectives of Asymtotic Theory While exact results are available for, say, the distribution of the

More information

Estimation of the large covariance matrix with two-step monotone missing data

Estimation of the large covariance matrix with two-step monotone missing data Estimation of the large covariance matrix with two-ste monotone missing data Masashi Hyodo, Nobumichi Shutoh 2, Takashi Seo, and Tatjana Pavlenko 3 Deartment of Mathematical Information Science, Tokyo

More information

Convex Optimization methods for Computing Channel Capacity

Convex Optimization methods for Computing Channel Capacity Convex Otimization methods for Comuting Channel Caacity Abhishek Sinha Laboratory for Information and Decision Systems (LIDS), MIT sinhaa@mit.edu May 15, 2014 We consider a classical comutational roblem

More information

Sums of independent random variables

Sums of independent random variables 3 Sums of indeendent random variables This lecture collects a number of estimates for sums of indeendent random variables with values in a Banach sace E. We concentrate on sums of the form N γ nx n, where

More information

Towards understanding the Lorenz curve using the Uniform distribution. Chris J. Stephens. Newcastle City Council, Newcastle upon Tyne, UK

Towards understanding the Lorenz curve using the Uniform distribution. Chris J. Stephens. Newcastle City Council, Newcastle upon Tyne, UK Towards understanding the Lorenz curve using the Uniform distribution Chris J. Stehens Newcastle City Council, Newcastle uon Tyne, UK (For the Gini-Lorenz Conference, University of Siena, Italy, May 2005)

More information

Improved Bounds on Bell Numbers and on Moments of Sums of Random Variables

Improved Bounds on Bell Numbers and on Moments of Sums of Random Variables Imroved Bounds on Bell Numbers and on Moments of Sums of Random Variables Daniel Berend Tamir Tassa Abstract We rovide bounds for moments of sums of sequences of indeendent random variables. Concentrating

More information

COMMUNICATION BETWEEN SHAREHOLDERS 1

COMMUNICATION BETWEEN SHAREHOLDERS 1 COMMUNICATION BTWN SHARHOLDRS 1 A B. O A : A D Lemma B.1. U to µ Z r 2 σ2 Z + σ2 X 2r ω 2 an additive constant that does not deend on a or θ, the agents ayoffs can be written as: 2r rθa ω2 + θ µ Y rcov

More information

Approximating min-max k-clustering

Approximating min-max k-clustering Aroximating min-max k-clustering Asaf Levin July 24, 2007 Abstract We consider the roblems of set artitioning into k clusters with minimum total cost and minimum of the maximum cost of a cluster. The cost

More information

On split sample and randomized confidence intervals for binomial proportions

On split sample and randomized confidence intervals for binomial proportions On slit samle and randomized confidence intervals for binomial roortions Måns Thulin Deartment of Mathematics, Usala University arxiv:1402.6536v1 [stat.me] 26 Feb 2014 Abstract Slit samle methods have

More information

Research Article An iterative Algorithm for Hemicontractive Mappings in Banach Spaces

Research Article An iterative Algorithm for Hemicontractive Mappings in Banach Spaces Abstract and Alied Analysis Volume 2012, Article ID 264103, 11 ages doi:10.1155/2012/264103 Research Article An iterative Algorithm for Hemicontractive Maings in Banach Saces Youli Yu, 1 Zhitao Wu, 2 and

More information

Elements of Asymptotic Theory. James L. Powell Department of Economics University of California, Berkeley

Elements of Asymptotic Theory. James L. Powell Department of Economics University of California, Berkeley Elements of Asymtotic Theory James L. Powell Deartment of Economics University of California, Berkeley Objectives of Asymtotic Theory While exact results are available for, say, the distribution of the

More information

General Linear Model Introduction, Classes of Linear models and Estimation

General Linear Model Introduction, Classes of Linear models and Estimation Stat 740 General Linear Model Introduction, Classes of Linear models and Estimation An aim of scientific enquiry: To describe or to discover relationshis among events (variables) in the controlled (laboratory)

More information

Robustness of classifiers to uniform l p and Gaussian noise Supplementary material

Robustness of classifiers to uniform l p and Gaussian noise Supplementary material Robustness of classifiers to uniform l and Gaussian noise Sulementary material Jean-Yves Franceschi Ecole Normale Suérieure de Lyon LIP UMR 5668 Omar Fawzi Ecole Normale Suérieure de Lyon LIP UMR 5668

More information

John Weatherwax. Analysis of Parallel Depth First Search Algorithms

John Weatherwax. Analysis of Parallel Depth First Search Algorithms Sulementary Discussions and Solutions to Selected Problems in: Introduction to Parallel Comuting by Viin Kumar, Ananth Grama, Anshul Guta, & George Karyis John Weatherwax Chater 8 Analysis of Parallel

More information

HENSEL S LEMMA KEITH CONRAD

HENSEL S LEMMA KEITH CONRAD HENSEL S LEMMA KEITH CONRAD 1. Introduction In the -adic integers, congruences are aroximations: for a and b in Z, a b mod n is the same as a b 1/ n. Turning information modulo one ower of into similar

More information

Quantitative estimates of propagation of chaos for stochastic systems with W 1, kernels

Quantitative estimates of propagation of chaos for stochastic systems with W 1, kernels oname manuscrit o. will be inserted by the editor) Quantitative estimates of roagation of chaos for stochastic systems with W, kernels Pierre-Emmanuel Jabin Zhenfu Wang Received: date / Acceted: date Abstract

More information

Finite Mixture EFA in Mplus

Finite Mixture EFA in Mplus Finite Mixture EFA in Mlus November 16, 2007 In this document we describe the Mixture EFA model estimated in Mlus. Four tyes of deendent variables are ossible in this model: normally distributed, ordered

More information

Information collection on a graph

Information collection on a graph Information collection on a grah Ilya O. Ryzhov Warren Powell February 10, 2010 Abstract We derive a knowledge gradient olicy for an otimal learning roblem on a grah, in which we use sequential measurements

More information

On Isoperimetric Functions of Probability Measures Having Log-Concave Densities with Respect to the Standard Normal Law

On Isoperimetric Functions of Probability Measures Having Log-Concave Densities with Respect to the Standard Normal Law On Isoerimetric Functions of Probability Measures Having Log-Concave Densities with Resect to the Standard Normal Law Sergey G. Bobkov Abstract Isoerimetric inequalities are discussed for one-dimensional

More information

IMPROVED BOUNDS IN THE SCALED ENFLO TYPE INEQUALITY FOR BANACH SPACES

IMPROVED BOUNDS IN THE SCALED ENFLO TYPE INEQUALITY FOR BANACH SPACES IMPROVED BOUNDS IN THE SCALED ENFLO TYPE INEQUALITY FOR BANACH SPACES OHAD GILADI AND ASSAF NAOR Abstract. It is shown that if (, ) is a Banach sace with Rademacher tye 1 then for every n N there exists

More information

Improved Capacity Bounds for the Binary Energy Harvesting Channel

Improved Capacity Bounds for the Binary Energy Harvesting Channel Imroved Caacity Bounds for the Binary Energy Harvesting Channel Kaya Tutuncuoglu 1, Omur Ozel 2, Aylin Yener 1, and Sennur Ulukus 2 1 Deartment of Electrical Engineering, The Pennsylvania State University,

More information

B8.1 Martingales Through Measure Theory. Concept of independence

B8.1 Martingales Through Measure Theory. Concept of independence B8.1 Martingales Through Measure Theory Concet of indeendence Motivated by the notion of indeendent events in relims robability, we have generalized the concet of indeendence to families of σ-algebras.

More information

Notes on Instrumental Variables Methods

Notes on Instrumental Variables Methods Notes on Instrumental Variables Methods Michele Pellizzari IGIER-Bocconi, IZA and frdb 1 The Instrumental Variable Estimator Instrumental variable estimation is the classical solution to the roblem of

More information

Information collection on a graph

Information collection on a graph Information collection on a grah Ilya O. Ryzhov Warren Powell October 25, 2009 Abstract We derive a knowledge gradient olicy for an otimal learning roblem on a grah, in which we use sequential measurements

More information

Combining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO)

Combining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO) Combining Logistic Regression with Kriging for Maing the Risk of Occurrence of Unexloded Ordnance (UXO) H. Saito (), P. Goovaerts (), S. A. McKenna (2) Environmental and Water Resources Engineering, Deartment

More information

16.2. Infinite Series. Introduction. Prerequisites. Learning Outcomes

16.2. Infinite Series. Introduction. Prerequisites. Learning Outcomes Infinite Series 6.2 Introduction We extend the concet of a finite series, met in Section 6., to the situation in which the number of terms increase without bound. We define what is meant by an infinite

More information

Brownian Motion and Random Prime Factorization

Brownian Motion and Random Prime Factorization Brownian Motion and Random Prime Factorization Kendrick Tang June 4, 202 Contents Introduction 2 2 Brownian Motion 2 2. Develoing Brownian Motion.................... 2 2.. Measure Saces and Borel Sigma-Algebras.........

More information

Introduction to Probability and Statistics

Introduction to Probability and Statistics Introduction to Probability and Statistics Chater 8 Ammar M. Sarhan, asarhan@mathstat.dal.ca Deartment of Mathematics and Statistics, Dalhousie University Fall Semester 28 Chater 8 Tests of Hyotheses Based

More information

On a class of Rellich inequalities

On a class of Rellich inequalities On a class of Rellich inequalities G. Barbatis A. Tertikas Dedicated to Professor E.B. Davies on the occasion of his 60th birthday Abstract We rove Rellich and imroved Rellich inequalities that involve

More information

16.2. Infinite Series. Introduction. Prerequisites. Learning Outcomes

16.2. Infinite Series. Introduction. Prerequisites. Learning Outcomes Infinite Series 6. Introduction We extend the concet of a finite series, met in section, to the situation in which the number of terms increase without bound. We define what is meant by an infinite series

More information

Positivity, local smoothing and Harnack inequalities for very fast diffusion equations

Positivity, local smoothing and Harnack inequalities for very fast diffusion equations Positivity, local smoothing and Harnack inequalities for very fast diffusion equations Dedicated to Luis Caffarelli for his ucoming 60 th birthday Matteo Bonforte a, b and Juan Luis Vázquez a, c Abstract

More information

Chapter 7: Special Distributions

Chapter 7: Special Distributions This chater first resents some imortant distributions, and then develos the largesamle distribution theory which is crucial in estimation and statistical inference Discrete distributions The Bernoulli

More information

Statics and dynamics: some elementary concepts

Statics and dynamics: some elementary concepts 1 Statics and dynamics: some elementary concets Dynamics is the study of the movement through time of variables such as heartbeat, temerature, secies oulation, voltage, roduction, emloyment, rices and

More information

The non-stochastic multi-armed bandit problem

The non-stochastic multi-armed bandit problem Submitted for journal ublication. The non-stochastic multi-armed bandit roblem Peter Auer Institute for Theoretical Comuter Science Graz University of Technology A-8010 Graz (Austria) auer@igi.tu-graz.ac.at

More information

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK Comuter Modelling and ew Technologies, 5, Vol.9, o., 3-39 Transort and Telecommunication Institute, Lomonosov, LV-9, Riga, Latvia MATHEMATICAL MODELLIG OF THE WIRELESS COMMUICATIO ETWORK M. KOPEETSK Deartment

More information

Paper C Exact Volume Balance Versus Exact Mass Balance in Compositional Reservoir Simulation

Paper C Exact Volume Balance Versus Exact Mass Balance in Compositional Reservoir Simulation Paer C Exact Volume Balance Versus Exact Mass Balance in Comositional Reservoir Simulation Submitted to Comutational Geosciences, December 2005. Exact Volume Balance Versus Exact Mass Balance in Comositional

More information

Feedback-error control

Feedback-error control Chater 4 Feedback-error control 4.1 Introduction This chater exlains the feedback-error (FBE) control scheme originally described by Kawato [, 87, 8]. FBE is a widely used neural network based controller

More information

arxiv: v2 [math.na] 6 Apr 2016

arxiv: v2 [math.na] 6 Apr 2016 Existence and otimality of strong stability reserving linear multiste methods: a duality-based aroach arxiv:504.03930v [math.na] 6 Ar 06 Adrián Németh January 9, 08 Abstract David I. Ketcheson We rove

More information

March 4, :21 WSPC/INSTRUCTION FILE FLSpaper2011

March 4, :21 WSPC/INSTRUCTION FILE FLSpaper2011 International Journal of Number Theory c World Scientific Publishing Comany SOLVING n(n + d) (n + (k 1)d ) = by 2 WITH P (b) Ck M. Filaseta Deartment of Mathematics, University of South Carolina, Columbia,

More information

System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests

System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests 009 American Control Conference Hyatt Regency Riverfront, St. Louis, MO, USA June 0-, 009 FrB4. System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests James C. Sall Abstract

More information

On the Chvatál-Complexity of Knapsack Problems

On the Chvatál-Complexity of Knapsack Problems R u t c o r Research R e o r t On the Chvatál-Comlexity of Knasack Problems Gergely Kovács a Béla Vizvári b RRR 5-08, October 008 RUTCOR Rutgers Center for Oerations Research Rutgers University 640 Bartholomew

More information

arxiv: v1 [physics.data-an] 26 Oct 2012

arxiv: v1 [physics.data-an] 26 Oct 2012 Constraints on Yield Parameters in Extended Maximum Likelihood Fits Till Moritz Karbach a, Maximilian Schlu b a TU Dortmund, Germany, moritz.karbach@cern.ch b TU Dortmund, Germany, maximilian.schlu@cern.ch

More information

Topic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar

Topic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar 15-859(M): Randomized Algorithms Lecturer: Anuam Guta Toic: Lower Bounds on Randomized Algorithms Date: Setember 22, 2004 Scribe: Srinath Sridhar 4.1 Introduction In this lecture, we will first consider

More information

On Wald-Type Optimal Stopping for Brownian Motion

On Wald-Type Optimal Stopping for Brownian Motion J Al Probab Vol 34, No 1, 1997, (66-73) Prerint Ser No 1, 1994, Math Inst Aarhus On Wald-Tye Otimal Stoing for Brownian Motion S RAVRSN and PSKIR The solution is resented to all otimal stoing roblems of

More information

Elementary theory of L p spaces

Elementary theory of L p spaces CHAPTER 3 Elementary theory of L saces 3.1 Convexity. Jensen, Hölder, Minkowski inequality. We begin with two definitions. A set A R d is said to be convex if, for any x 0, x 1 2 A x = x 0 + (x 1 x 0 )

More information

LORENZO BRANDOLESE AND MARIA E. SCHONBEK

LORENZO BRANDOLESE AND MARIA E. SCHONBEK LARGE TIME DECAY AND GROWTH FOR SOLUTIONS OF A VISCOUS BOUSSINESQ SYSTEM LORENZO BRANDOLESE AND MARIA E. SCHONBEK Abstract. In this aer we analyze the decay and the growth for large time of weak and strong

More information

An Analysis of Reliable Classifiers through ROC Isometrics

An Analysis of Reliable Classifiers through ROC Isometrics An Analysis of Reliable Classifiers through ROC Isometrics Stijn Vanderlooy s.vanderlooy@cs.unimaas.nl Ida G. Srinkhuizen-Kuyer kuyer@cs.unimaas.nl Evgueni N. Smirnov smirnov@cs.unimaas.nl MICC-IKAT, Universiteit

More information

Yixi Shi. Jose Blanchet. IEOR Department Columbia University New York, NY 10027, USA. IEOR Department Columbia University New York, NY 10027, USA

Yixi Shi. Jose Blanchet. IEOR Department Columbia University New York, NY 10027, USA. IEOR Department Columbia University New York, NY 10027, USA Proceedings of the 2011 Winter Simulation Conference S. Jain, R. R. Creasey, J. Himmelsach, K. P. White, and M. Fu, eds. EFFICIENT RARE EVENT SIMULATION FOR HEAVY-TAILED SYSTEMS VIA CROSS ENTROPY Jose

More information

Lecture 4: Law of Large Number and Central Limit Theorem

Lecture 4: Law of Large Number and Central Limit Theorem ECE 645: Estimation Theory Sring 2015 Instructor: Prof. Stanley H. Chan Lecture 4: Law of Large Number and Central Limit Theorem (LaTeX reared by Jing Li) March 31, 2015 This lecture note is based on ECE

More information

Lecture 10: Hypercontractivity

Lecture 10: Hypercontractivity CS 880: Advanced Comlexity Theory /15/008 Lecture 10: Hyercontractivity Instructor: Dieter van Melkebeek Scribe: Baris Aydinlioglu This is a technical lecture throughout which we rove the hyercontractivity

More information

ON THE LEAST SIGNIFICANT p ADIC DIGITS OF CERTAIN LUCAS NUMBERS

ON THE LEAST SIGNIFICANT p ADIC DIGITS OF CERTAIN LUCAS NUMBERS #A13 INTEGERS 14 (014) ON THE LEAST SIGNIFICANT ADIC DIGITS OF CERTAIN LUCAS NUMBERS Tamás Lengyel Deartment of Mathematics, Occidental College, Los Angeles, California lengyel@oxy.edu Received: 6/13/13,

More information

2 Asymptotic density and Dirichlet density

2 Asymptotic density and Dirichlet density 8.785: Analytic Number Theory, MIT, sring 2007 (K.S. Kedlaya) Primes in arithmetic rogressions In this unit, we first rove Dirichlet s theorem on rimes in arithmetic rogressions. We then rove the rime

More information

An Estimate For Heilbronn s Exponential Sum

An Estimate For Heilbronn s Exponential Sum An Estimate For Heilbronn s Exonential Sum D.R. Heath-Brown Magdalen College, Oxford For Heini Halberstam, on his retirement Let be a rime, and set e(x) = ex(2πix). Heilbronn s exonential sum is defined

More information

Location of solutions for quasi-linear elliptic equations with general gradient dependence

Location of solutions for quasi-linear elliptic equations with general gradient dependence Electronic Journal of Qualitative Theory of Differential Equations 217, No. 87, 1 1; htts://doi.org/1.14232/ejqtde.217.1.87 www.math.u-szeged.hu/ejqtde/ Location of solutions for quasi-linear ellitic equations

More information

ON THE NORM OF AN IDEMPOTENT SCHUR MULTIPLIER ON THE SCHATTEN CLASS

ON THE NORM OF AN IDEMPOTENT SCHUR MULTIPLIER ON THE SCHATTEN CLASS PROCEEDINGS OF THE AMERICAN MATHEMATICAL SOCIETY Volume 00, Number 0, Pages 000 000 S 000-9939XX)0000-0 ON THE NORM OF AN IDEMPOTENT SCHUR MULTIPLIER ON THE SCHATTEN CLASS WILLIAM D. BANKS AND ASMA HARCHARRAS

More information

Partial Identification in Triangular Systems of Equations with Binary Dependent Variables

Partial Identification in Triangular Systems of Equations with Binary Dependent Variables Partial Identification in Triangular Systems of Equations with Binary Deendent Variables Azeem M. Shaikh Deartment of Economics University of Chicago amshaikh@uchicago.edu Edward J. Vytlacil Deartment

More information

Lecture 2: Consistency of M-estimators

Lecture 2: Consistency of M-estimators Lecture 2: Instructor: Deartment of Economics Stanford University Preared by Wenbo Zhou, Renmin University References Takeshi Amemiya, 1985, Advanced Econometrics, Harvard University Press Newey and McFadden,

More information

Lecture 3 Consistency of Extremum Estimators 1

Lecture 3 Consistency of Extremum Estimators 1 Lecture 3 Consistency of Extremum Estimators 1 This lecture shows how one can obtain consistency of extremum estimators. It also shows how one can find the robability limit of extremum estimators in cases

More information

Lecture 6. 2 Recurrence/transience, harmonic functions and martingales

Lecture 6. 2 Recurrence/transience, harmonic functions and martingales Lecture 6 Classification of states We have shown that all states of an irreducible countable state Markov chain must of the same tye. This gives rise to the following classification. Definition. [Classification

More information

Extension of Minimax to Infinite Matrices

Extension of Minimax to Infinite Matrices Extension of Minimax to Infinite Matrices Chris Calabro June 21, 2004 Abstract Von Neumann s minimax theorem is tyically alied to a finite ayoff matrix A R m n. Here we show that (i) if m, n are both inite,

More information

Lower Confidence Bound for Process-Yield Index S pk with Autocorrelated Process Data

Lower Confidence Bound for Process-Yield Index S pk with Autocorrelated Process Data Quality Technology & Quantitative Management Vol. 1, No.,. 51-65, 15 QTQM IAQM 15 Lower onfidence Bound for Process-Yield Index with Autocorrelated Process Data Fu-Kwun Wang * and Yeneneh Tamirat Deartment

More information

t 0 Xt sup X t p c p inf t 0

t 0 Xt sup X t p c p inf t 0 SHARP MAXIMAL L -ESTIMATES FOR MARTINGALES RODRIGO BAÑUELOS AND ADAM OSȨKOWSKI ABSTRACT. Let X be a suermartingale starting from 0 which has only nonnegative jums. For each 0 < < we determine the best

More information

CONVOLVED SUBSAMPLING ESTIMATION WITH APPLICATIONS TO BLOCK BOOTSTRAP

CONVOLVED SUBSAMPLING ESTIMATION WITH APPLICATIONS TO BLOCK BOOTSTRAP Submitted to the Annals of Statistics arxiv: arxiv:1706.07237 CONVOLVED SUBSAMPLING ESTIMATION WITH APPLICATIONS TO BLOCK BOOTSTRAP By Johannes Tewes, Dimitris N. Politis and Daniel J. Nordman Ruhr-Universität

More information

Cryptanalysis of Pseudorandom Generators

Cryptanalysis of Pseudorandom Generators CSE 206A: Lattice Algorithms and Alications Fall 2017 Crytanalysis of Pseudorandom Generators Instructor: Daniele Micciancio UCSD CSE As a motivating alication for the study of lattice in crytograhy we

More information

1 Probability Spaces and Random Variables

1 Probability Spaces and Random Variables 1 Probability Saces and Random Variables 1.1 Probability saces Ω: samle sace consisting of elementary events (or samle oints). F : the set of events P: robability 1.2 Kolmogorov s axioms Definition 1.2.1

More information

2 Asymptotic density and Dirichlet density

2 Asymptotic density and Dirichlet density 8.785: Analytic Number Theory, MIT, sring 2007 (K.S. Kedlaya) Primes in arithmetic rogressions In this unit, we first rove Dirichlet s theorem on rimes in arithmetic rogressions. We then rove the rime

More information

ANALYTIC NUMBER THEORY AND DIRICHLET S THEOREM

ANALYTIC NUMBER THEORY AND DIRICHLET S THEOREM ANALYTIC NUMBER THEORY AND DIRICHLET S THEOREM JOHN BINDER Abstract. In this aer, we rove Dirichlet s theorem that, given any air h, k with h, k) =, there are infinitely many rime numbers congruent to

More information

Maximum Likelihood Asymptotic Theory. Eduardo Rossi University of Pavia

Maximum Likelihood Asymptotic Theory. Eduardo Rossi University of Pavia Maximum Likelihood Asymtotic Theory Eduardo Rossi University of Pavia Slutsky s Theorem, Cramer s Theorem Slutsky s Theorem Let {X N } be a random sequence converging in robability to a constant a, and

More information

On Character Sums of Binary Quadratic Forms 1 2. Mei-Chu Chang 3. Abstract. We establish character sum bounds of the form.

On Character Sums of Binary Quadratic Forms 1 2. Mei-Chu Chang 3. Abstract. We establish character sum bounds of the form. On Character Sums of Binary Quadratic Forms 2 Mei-Chu Chang 3 Abstract. We establish character sum bounds of the form χ(x 2 + ky 2 ) < τ H 2, a x a+h b y b+h where χ is a nontrivial character (mod ), 4

More information

CHAPTER-II Control Charts for Fraction Nonconforming using m-of-m Runs Rules

CHAPTER-II Control Charts for Fraction Nonconforming using m-of-m Runs Rules CHAPTER-II Control Charts for Fraction Nonconforming using m-of-m Runs Rules. Introduction: The is widely used in industry to monitor the number of fraction nonconforming units. A nonconforming unit is

More information

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Technical Sciences and Alied Mathematics MODELING THE RELIABILITY OF CISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Cezar VASILESCU Regional Deartment of Defense Resources Management

More information

A Social Welfare Optimal Sequential Allocation Procedure

A Social Welfare Optimal Sequential Allocation Procedure A Social Welfare Otimal Sequential Allocation Procedure Thomas Kalinowsi Universität Rostoc, Germany Nina Narodytsa and Toby Walsh NICTA and UNSW, Australia May 2, 201 Abstract We consider a simle sequential

More information

Positive Definite Uncertain Homogeneous Matrix Polynomials: Analysis and Application

Positive Definite Uncertain Homogeneous Matrix Polynomials: Analysis and Application BULGARIA ACADEMY OF SCIECES CYBEREICS AD IFORMAIO ECHOLOGIES Volume 9 o 3 Sofia 009 Positive Definite Uncertain Homogeneous Matrix Polynomials: Analysis and Alication Svetoslav Savov Institute of Information

More information

Solution sheet ξi ξ < ξ i+1 0 otherwise ξ ξ i N i,p 1 (ξ) + where 0 0

Solution sheet ξi ξ < ξ i+1 0 otherwise ξ ξ i N i,p 1 (ξ) + where 0 0 Advanced Finite Elements MA5337 - WS7/8 Solution sheet This exercise sheets deals with B-slines and NURBS, which are the basis of isogeometric analysis as they will later relace the olynomial ansatz-functions

More information

Lecture: Condorcet s Theorem

Lecture: Condorcet s Theorem Social Networs and Social Choice Lecture Date: August 3, 00 Lecture: Condorcet s Theorem Lecturer: Elchanan Mossel Scribes: J. Neeman, N. Truong, and S. Troxler Condorcet s theorem, the most basic jury

More information

Mollifiers and its applications in L p (Ω) space

Mollifiers and its applications in L p (Ω) space Mollifiers and its alications in L () sace MA Shiqi Deartment of Mathematics, Hong Kong Batist University November 19, 2016 Abstract This note gives definition of mollifier and mollification. We illustrate

More information

1 Gambler s Ruin Problem

1 Gambler s Ruin Problem Coyright c 2017 by Karl Sigman 1 Gambler s Ruin Problem Let N 2 be an integer and let 1 i N 1. Consider a gambler who starts with an initial fortune of $i and then on each successive gamble either wins

More information

RAMANUJAN-NAGELL CUBICS

RAMANUJAN-NAGELL CUBICS RAMANUJAN-NAGELL CUBICS MARK BAUER AND MICHAEL A. BENNETT ABSTRACT. A well-nown result of Beuers [3] on the generalized Ramanujan-Nagell equation has, at its heart, a lower bound on the quantity x 2 2

More information

MA3H1 TOPICS IN NUMBER THEORY PART III

MA3H1 TOPICS IN NUMBER THEORY PART III MA3H1 TOPICS IN NUMBER THEORY PART III SAMIR SIKSEK 1. Congruences Modulo m In quadratic recirocity we studied congruences of the form x 2 a (mod ). We now turn our attention to situations where is relaced

More information

Some results of convex programming complexity

Some results of convex programming complexity 2012c12 $ Ê Æ Æ 116ò 14Ï Dec., 2012 Oerations Research Transactions Vol.16 No.4 Some results of convex rogramming comlexity LOU Ye 1,2 GAO Yuetian 1 Abstract Recently a number of aers were written that

More information

CERIAS Tech Report The period of the Bell numbers modulo a prime by Peter Montgomery, Sangil Nahm, Samuel Wagstaff Jr Center for Education

CERIAS Tech Report The period of the Bell numbers modulo a prime by Peter Montgomery, Sangil Nahm, Samuel Wagstaff Jr Center for Education CERIAS Tech Reort 2010-01 The eriod of the Bell numbers modulo a rime by Peter Montgomery, Sangil Nahm, Samuel Wagstaff Jr Center for Education and Research Information Assurance and Security Purdue University,

More information

p-adic Measures and Bernoulli Numbers

p-adic Measures and Bernoulli Numbers -Adic Measures and Bernoulli Numbers Adam Bowers Introduction The constants B k in the Taylor series exansion t e t = t k B k k! k=0 are known as the Bernoulli numbers. The first few are,, 6, 0, 30, 0,

More information

Inequalities for the L 1 Deviation of the Empirical Distribution

Inequalities for the L 1 Deviation of the Empirical Distribution Inequalities for the L 1 Deviation of the Emirical Distribution Tsachy Weissman, Erik Ordentlich, Gadiel Seroussi, Sergio Verdu, Marcelo J. Weinberger June 13, 2003 Abstract We derive bounds on the robability

More information

substantial literature on emirical likelihood indicating that it is widely viewed as a desirable and natural aroach to statistical inference in a vari

substantial literature on emirical likelihood indicating that it is widely viewed as a desirable and natural aroach to statistical inference in a vari Condence tubes for multile quantile lots via emirical likelihood John H.J. Einmahl Eindhoven University of Technology Ian W. McKeague Florida State University May 7, 998 Abstract The nonarametric emirical

More information

On a Markov Game with Incomplete Information

On a Markov Game with Incomplete Information On a Markov Game with Incomlete Information Johannes Hörner, Dinah Rosenberg y, Eilon Solan z and Nicolas Vieille x{ January 24, 26 Abstract We consider an examle of a Markov game with lack of information

More information

Topic 7: Using identity types

Topic 7: Using identity types Toic 7: Using identity tyes June 10, 2014 Now we would like to learn how to use identity tyes and how to do some actual mathematics with them. By now we have essentially introduced all inference rules

More information

Uniformly best wavenumber approximations by spatial central difference operators: An initial investigation

Uniformly best wavenumber approximations by spatial central difference operators: An initial investigation Uniformly best wavenumber aroximations by satial central difference oerators: An initial investigation Vitor Linders and Jan Nordström Abstract A characterisation theorem for best uniform wavenumber aroximations

More information

Various Proofs for the Decrease Monotonicity of the Schatten s Power Norm, Various Families of R n Norms and Some Open Problems

Various Proofs for the Decrease Monotonicity of the Schatten s Power Norm, Various Families of R n Norms and Some Open Problems Int. J. Oen Problems Comt. Math., Vol. 3, No. 2, June 2010 ISSN 1998-6262; Coyright c ICSRS Publication, 2010 www.i-csrs.org Various Proofs for the Decrease Monotonicity of the Schatten s Power Norm, Various

More information

Robust hamiltonicity of random directed graphs

Robust hamiltonicity of random directed graphs Robust hamiltonicity of random directed grahs Asaf Ferber Rajko Nenadov Andreas Noever asaf.ferber@inf.ethz.ch rnenadov@inf.ethz.ch anoever@inf.ethz.ch Ueli Peter ueter@inf.ethz.ch Nemanja Škorić nskoric@inf.ethz.ch

More information

Stochastic integration II: the Itô integral

Stochastic integration II: the Itô integral 13 Stochastic integration II: the Itô integral We have seen in Lecture 6 how to integrate functions Φ : (, ) L (H, E) with resect to an H-cylindrical Brownian motion W H. In this lecture we address the

More information

Sharp gradient estimate and spectral rigidity for p-laplacian

Sharp gradient estimate and spectral rigidity for p-laplacian Shar gradient estimate and sectral rigidity for -Lalacian Chiung-Jue Anna Sung and Jiaing Wang To aear in ath. Research Letters. Abstract We derive a shar gradient estimate for ositive eigenfunctions of

More information

Distributed Rule-Based Inference in the Presence of Redundant Information

Distributed Rule-Based Inference in the Presence of Redundant Information istribution Statement : roved for ublic release; distribution is unlimited. istributed Rule-ased Inference in the Presence of Redundant Information June 8, 004 William J. Farrell III Lockheed Martin dvanced

More information

PETER J. GRABNER AND ARNOLD KNOPFMACHER

PETER J. GRABNER AND ARNOLD KNOPFMACHER ARITHMETIC AND METRIC PROPERTIES OF -ADIC ENGEL SERIES EXPANSIONS PETER J. GRABNER AND ARNOLD KNOPFMACHER Abstract. We derive a characterization of rational numbers in terms of their unique -adic Engel

More information

THE 2D CASE OF THE BOURGAIN-DEMETER-GUTH ARGUMENT

THE 2D CASE OF THE BOURGAIN-DEMETER-GUTH ARGUMENT THE 2D CASE OF THE BOURGAIN-DEMETER-GUTH ARGUMENT ZANE LI Let e(z) := e 2πiz and for g : [0, ] C and J [0, ], define the extension oerator E J g(x) := g(t)e(tx + t 2 x 2 ) dt. J For a ositive weight ν

More information