Information Overload in a Network of Targeted Communication: Supplementary Notes

Size: px
Start display at page:

Download "Information Overload in a Network of Targeted Communication: Supplementary Notes"

Transcription

1 Inforation Overload in a Network of Targeted Counication: Suppleentary Notes Tiothy Van Zandt INSEAD 10 June 2003 Abstract These are suppleentary notes for Van Zandt 2003). They include certain extensions. To be in synch, these notes and the ain paper should have the sae date. Author s address: INSEAD Boulevard de Constance Fontainebleau CEDEX France Voice: Fax: Eail: tvz@econ.insead.edu Web: zandtwerk.insead.edu I a indebted to Roy Radner and Peter Linhart for helpful discussions.

2 Contents 1 Model 1 2 Equilibriu 1 3 Strategies that axiize the senders total payoffs 2 4 Type-dependent echaniss for allocating attention 2 5 Allocating attention through unifor surcharges 3 6 Deographic data and types 4 A Proofs 4 References 11

3 Van Zandt : Inforation Overload in a Network of Targeted Counication 1 1 Model Copared to the odel in Van Zandt 2003), our only odification is to allow the counication cost and surcharges to vary aong senders. Let c j be the cost per essage sent by sender j, so that the cost to sender j of targeting types X j T is c j γx j ). The net payoff of sender j given X and c j is π j X; c j ) s j σ j X) c j γx j ). Each n-tuple c c 1,...,c n R n + of counication costs thus defines a gae Γ c in noral for in which the players are the n senders, each sender s strategy set is B, and sender j s payoff function is π j ; c j ). By an equilibriu for Γ c, we ean a pure strategy Nash equilibriu. 2 Equilibriu Let c R n +. ItisstillthecasethatthegaeΓ c can be decoposed into independent single-receiver gaes. For t T,letΓ c t) be the single-receiver gae for type t. This is the gae in noral for in which a) there are n players; b) each player s strategy set is {0, 1}, where 0 eans not send and 1 eans send ; and c) player j s payoff, given the strategy profile x x 1,...,x n {0, 1} n,is { sj t j in{1,/#x}) c j x j =1 u j x; c j,t) 0 x j =0. Proposition 1 Γ c t) has a pure strategy equilibriu for all c R n + and t T. Given a strategy profile X X 1,...,X n, the payoffs in Γ c given X are equal to the averages of the payoffs in the gaes Γ c t) given X 1 t),...,x n t). Thatis: π j X; c j ) = u j X 1 t),...,x n t); c j,t) dγt). Proposition 2 then follows easily. T Proposition 2 Let c R n +. A strategy profile X 1,...,X n is an equilibriu for Γ c if and only if, for γ-a.e.t T, X 1 t),...,x n t) is a pure-strategy equilibriu for Γ c t). Corollary 1 Γ c t) has an equilibriu for all c R n +. The proofs of these two results are the sae as when all senders face the sae cost, and so they are oitted. Assuption 4.1 in Van Zandt 2003) is also aintained in this paper.

4 Van Zandt : Inforation Overload in a Network of Targeted Counication 2 Proposition 3 Let j {1,...,n} and c j R +. Let X j X 1,...,X j 1,X j+1,...,x n B n 1 be a profile of strategies for senders other than j. Then sender j has a unique best response to X j given c j. That is, ax Xj B π j X j,x j ; c j ) has a solution and it is unique up to equivalence. Denote this solution by X j X j ; c j ). 3 Strategies that axiize the senders total payoffs Assuption 4.1 iplies that, for c R n +, {s j t j c j j =1,...,n} contains n distinct nonzero eleents for γ-a.e. t T. Thus, there is a unique strategy profile that axiizes the total net payoffs of the senders in the gae Γ c, and it is given by Y c j { t T s j t j c j > 0&#{i s i t i c i >s j t j c j } < }. Let Y c Y1 c,...,yn c. As when all senders have the sae counication cost, inefficiency fro the point of view of the senders arises fro too uch rather than too little inforation, and tends to be worse when the counication cost is lower. We suarize this in Proposition 4. Part 1 says that the total counication in equilibriu is greater than or equal to the total counication given Y c. Part 2 says that if the senders other than j adopt the strategies Y j, c then sender j wants to target at least the receivers in Yj c and perhaps others. Part 3 says that for counication costs c in a neighborhood of 0, Y c is not an equilibriu for Γ c. Part 4 says that if suppγ) = n 1, then if the senders total payoffs are not axiized in equilibriu, neither are they axiized in equilibriu when the counication cost is lower. Proposition 4 1. Let c R n + and let X 1,...,X n be an equilibriu for Γ c.then n j=1 γx j n j=1 γy c j. 2. Let c R n + and let j 1,...,n.ThenY c j X j Y c j; c j ). 3. Let C be the set of costs c R n + such that Y c is an equilibriu for Γ c. Then C is non-epty and closed and does not contain Suppose suppγ) = n 1. Then C is convex. Furtherore, if c C and c c, then c C. 4 Type-dependent echaniss for allocating attention The use of type-dependent echaniss is essentially the sae as when senders have the sae cost.

5 Van Zandt : Inforation Overload in a Network of Targeted Counication 3 For exaple, suppose the echanis designer uses a price echanis P : T R + so that the surcharge on targeting B T is B P t) dγt). This defines a gae Γc,P ) in which each sender s strategy set is B and sender j s payoff, given X B n,iss j σ j X) X j c j +P t))dγt). If, for each t T, P t) is equal to the +1) st highest value of s 1 t 1 c 1,...,s n t n c n or to 0, whichever is greater, then for each j, Therefore, Y c is an equilibriu for Γ c,p ). zs j t j c j P t) > 0= t Yj c and s j t j c j P t) < 0= t/ Yj c. 5 Allocating attention through unifor surcharges We allow the surcharges to depend on the identify of the sender and denote the by p R n.wesaythatp supports Y c if Y c is an equilibriu of the gae Γ c+p. Proposition 5 confirs, not surprisingly, that we need only consider positive surcharges rather than subsidies. Proposition 5 Let c R n + and let p R n be such that c + p 0 and p supports Y c. Then there is p R n + that supports Y c. Proposition 6 shows that the negative results on using unifor surcharges to support the strategy profile that axiizes the senders payoffs persist even when we allow the surcharges to depend on the identity of the sender. Proposition 6 Let c R n +.Suppose that either a) suppγ) =T,orb) n 1 suppγ) and either >1 or s j c j 0 for soe j. If Y c is not an equilibriu for Γ c then there is no surcharge p R n that supports Y c. Our next result concerns the case where suppγ) = n 1 and = 1. For this result, we assue that the counication cost is the sae for all firs and we restrict attention to identical surcharges for all firs. There ay not be any arginal receivers; so, if sall enough, a surcharge does not induce senders to drop receivers who they should target in the efficient profile. The difficulty is that, in order to support Y c, a surcharge ust be large enough to eliinate inforation overload. The paraeter values for which these two requireents can be reconciled is liited. Proposition 7 Assue suppγ) = n 1 and =1. Let c 0 and suppose that Y c is not an equilibriu for Γ c. Then there is a surcharge that supports Y c if and only if either 1) n =2;

6 Van Zandt : Inforation Overload in a Network of Targeted Counication 4 2) n =3and s 1 i + s 1 j s 1 k for all distinct i, j, k; or 3) n =4and s 1 = s 2 = s 3 = s 4. In this case, the surcharge n ) 1 k=1 s 1 k c supports Y c. 6 Deographic data and types This section describes a ore priitive odel of the receivers and the inforation the senders have about the. Because the purpose is to provide intuition rather than a atheatical fraework to be used elsewhere in the paper, we consider a finite odel. The odel with a large dispersed population of receivers and types of receivers is eant to be an approxiation of this finite odel. There is a finite set A of receivers. The senders have a coon ailing list, which gives the nae and address of each receiver. The ailing list also gives deographic inforation such as age, sex, race, place of residence, job title, and agazine subscriptions. Let D be the finite set of possible deographic characteristics. Let Z: A D be a function that specifies the characteristic of each receiver. The senders also have arketing data, which gives the correlation between these characteristics and the interest in the senders essages. Specifically, let A j A be the set of receivers who are interested in j s essage. For d D, let δ j d) #A j Z 1 d)). #Z 1 d) Here, δ j d) is the proportion of those receivers with deographic characteristic d who are interested in j s essage. Sender j can estiate δ j d) by sapling the population of receivers in Z 1 d), such as with arketing surveys. Let δd) = δ 1 d),...,δ n d) and let T [0, 1] n be the set of types. Then δ: D T.Let M: A T be the coposition δ Z. Receiver a s type is Ma). The nuber of receivers of type t T is γt) #M 1 t). The proportion of receivers of type t 1,...,t n interested is sender j s essage is exactly t j. If the deographic characteristics are good indicators of the interests of the receivers, then γ places greater ass near the corners of T. Otherwise, γ places greater ass near #A 1 /#A,...,#A n /#A. If each receiver is interested in one and only one essage, then γ puts positive weight only on points in n 1. Figure 1 contains an illustration of the link between γ and the senders inforation. A Proofs Proof of Proposition 1. The structure of the gae that we use in this proof is that each player has a fixed payoff of 0 fro not sending a essage and each player s payoff fro sending

7 Van Zandt : Inforation Overload in a Network of Targeted Counication 5 Division between basketball and golf players basketball basketball Height Height Height basketball golf golf golf Incoe Incoe Incoe Support of γ t 2 t 2 t t t t 1 Figure 1. Illustration of the senders inforation. There are two senders, a basketball equipent retailer and a golf equipent retailer. Each receiver plays either basketball or golf, depending only on her incoe and height. The receivers incoe and heights are distributed uniforly on [$0, $100K] [150c, 200c]. The division between basketball and golf players is shown in the upper row for three cases. The senders know the receivers incoes but not their heights. The support of the induced distribution γ on [0, 1] 2 is drawn in the lower row. For the left-hand division, incoe is partly inforative and γ is unifor on the siplex 1. For the iddle division, incoe is uninforative and γ is concentrated on 1/2, 1/2. For the right-hand division, incoe is fully inforative and γ is concentrated on 1, 0 and 0, 1.

8 Van Zandt : Inforation Overload in a Network of Targeted Counication 6 a essage is decreasing in the nuber of other players who also send a essage but does not depend on the identities of these players. Let c R n + and t T. For j {1,...,n}, letl j {0, 1,...,n} be such that sending a essage is a best response for sender j in Γ c t) if and only if at ost l j 1 other senders send essages. Specifically, l j ax { l =0, 1,...,n l =0orsj t j ax {1,/l}) c j 0 }. Renuber the senders if necessary so that l 1 l n. Iagine that the senders sequentially choose to enter send a essage), basing this decision only on the nuber of senders who have already entered. Let k + 1 be the first player to choose not to enter. That is, k ax {j =0, 1,...,n j =0orl j j}. Since sender k finds it profitable to enter, l k k. Since l 1 l k, senders 1,...,k 1 still find it profitable to send a essage given that a total of k senders do so. Since player k + 1 chooses not to enter, l k+1 <k+1. Sincel k+1 l n players k +2,...,n also find it unprofitable to enter given that k players have already done so. Hence, it is an equilibriu that players 1,...,k send a essage and players k + 1,...,n do not. Proof of Proposition 3. Let j {1,...,n}, letc j R +,andletx j X 1,...,X j 1, X j+1,...,x n B n 1 be a profile of strategies for senders other than j. LetXt resp., X t + ) be the set of types t for who j has a strict resp., weak) incentive to send a essage given c j and X j t). That is, X j { t T sj t j in {1,/#X j t)+1)} ) } >c j X + j { t T s j t j in {1,/#X j t)+1)} ) c j }. Then X j and X + j are both best responses. Furtherore, for any best response X j B, X j X j X + j where B B eans that γ-a.e. eleent of B is in B ). The syetric a.s. a.s. a.s. different between X j and X + j is X + j \ X j = { t T s j t j in {1,/#X j t)+1)} ) >c j } n {t T t j =l/)c j /s j )}. Assuption 4.1 iplies that γ{t T t j =l/)c j /s j )} = 0 for l =,...,n. Hence X j and X + j, and any other best response X j,areequivalent. l= Proof of Proposition We show that for γ-a.e. t T,#Xt) #Y c t). Let t be such that X 1 t),...,x n t) is an equilibriu for Γ c t); this holds γ-a.e. according to

9 Van Zandt : Inforation Overload in a Network of Targeted Counication 7 Proposition 4.2. If at least essages are sent in this equilibriu, i.e. if #Xt), then #Xt) #Y c t) since#y c t) receivers are never overloaded in the efficient strategy profile). Otherwise, #Xt) <and each sender s essage is processed for sure, as would also be the case if one ore sender sent a essage. Assue that s j t j c j 0 for each j, which holds for γ-a.e. t T. Then sender j sends a essage in this equilibriu if and only if s j t j c j > 0. This is true also for the efficient strategy profile when this inequality holds for at ost senders. Hence, #Xt) =#Y t). 2. Let t Y c j.then#y c jt) 1ands j t j c j > 0. Therefore, and t X j Y c j; c j ). s j t j in { 1,/#Y c j t)+1) }) > c j, 3. Suppose c = 0. For any t T, sending a essage is a strictly doinant strategy for sender j in the single-receiver gae for type t unless t j = 0. Assuption 4.1 iplies that γ{t T t j =0} = 0. Hence, in the gae Γ c the strategy T or a set equivalent to T is a strictly doinant strategy for each player. However, this is not the efficient strategy profile since then γ-a.e. receiver would be overloaded. Thus, 0 / C. Let c R n + \ C. Then by part 2), there is j {1,...,n} such that Up to equivalence, γ X j Y c j; c j ) \ Y c j ) > 0. Xj Y j; c c j ) \ Yj c { } = t T +1 s jt j c j > 0&#{i s i t i c i >s j t j c j } { = t T +1 s jt j c j > 1 { η &# i s it i c i >s j t j c j + 1 } η η=1 } T η. Hence, there is η such that γt η > 0. Let c belong to the nbd. of c such that c i c i < 1/2η) for all i {1,...,n}. Then, for all t T η, +1 s jt j c j > +1 s jt j c j 1/2η) > 0 and # { i s i t i c i >s j t j c j} > #{i si t i c i >s j t j c j +1/η)}, and thus t Xj Y j; c c j) \ Yj c.thenγxj Y j; c c j) \ Y j) c > 0andc / C. Thus,C is closed. Finally, note that if s j = c j for all j, thenyj c = and this is also a doinant strategy for j; therefore, s 1,...,s n C and C. 4. Assue that suppγ) = n 1. Let F be the set of subsets of {1,...,n} with +1 eleents. Given F F and c R n +,lett F c) be the unique eleent of R +1 such that, for all i, j F, j F tf j c) =1ands j t F j c) c j = s i t F i c) c i. The following lea is proved below.

10 Van Zandt : Inforation Overload in a Network of Targeted Counication 8 Lea 1 Y c is an equilibriu for Γ c if and only if for every F F and j F, 1) +1 s jt F j c) c j 0. Let F F and c R n +.Thereisλ R such that, for every j F, s j t F j c) c j = λ, and thus t F j c) = λ+c j s j.then1= i F tf j c) = i F λ = 1 i F s 1 i Therefore, equation 1) is equivalent to 1 i F s 1 i +1 i F s 1 i i F s 1 i c i λ+c i s i,andso c i. + c j ) c j 0. Rearranging, ) 2) 1 s 1 i c j + s 1 i c i 1. i F i F Therefore, because of the clai and because Equations 1 and 2 are equivalent, { C = c R n + F F, j F : ) 1 s 1 i c j + } s 1 i c i 1, i F i F which is convex since it is defined by linear inequalities. The coefficients of the linear inequalities defining C are positive, so that if c C and c c, thenc C. This ends the proof, except for the proof of the lea. Proof of Lea 1. First, we prove the forward iplication by proving its contrapositive. Suppose there are F Fand j F such that +1 jt F j c) c j > 0. Then also s j t F j c) c j > 0. Perturbing t F c) by subtracting a sall aount fro t F j c) and adding the sae to t F i c) for soe i j, we obtain t 1,...,t n n 1 such that +1 jt j c j > 0and {i s i t i c i >s j t j c j } F\,{j}. Thus, U { t n 1 #{i s i t i c i >s j t j c j } & } +1 s jt j c j > 0 is a non-epty and open subset of n 1. Since suppγ) = n 1, γu > 0. Also, U Xj Y j; c c j ) \ Yj c. Therefore, Y c is not an equilibriu for Γ c. Conversely, suppose equation 1) holds for all F F and j F. Let j {1,...,n} and let t Yj c. If s j t j c j 0, then t j / Xj Y j; c c j ). Assue instead that s j t j c j > 0. Since t Yj c,#{i t Yi c } = and F {i t Yi c } {j} F γ-a.s. Assue so. Then, for every i F \{j}, s i t i c i >s j t j c j, which iplies that s j t F j c j >s j t j c j and thus +1 s jt j c j < +1 s jt F j c j < 0. The second inequality follows fro equation 1). Then t Xj Yj c ; c j ). Therefore, for all j, Xj Y j; c c j ) \ Yj c = ; by part 2 of this proposition, Y c is an equilibriu for Γ c.

11 Van Zandt : Inforation Overload in a Network of Targeted Counication 9 Proof of Proposition 5. Let p j ax{0,p j } for every j {1,...,n} and let p p 1,...,p n. SinceY c is an equilibriu for Γ p+c, Yj c = Xj Y j; c c j +p j ) for every j {1,...,n}. Thus, if p j = p j,thenyj c = Xj Y j; c c j + p j). Otherwise, p j =0>p j,and Y c j X j Y c j; c j ) X j Y c j; c j + p j ) = Y c j. The first inclusion holds by Proposition and the second inclusion holds because p j < 0 and Xj is onotone decreasing in the cost of counication. Therefore, Yj c = Xj Y j; c c j +p j) for every j {1,...,n}, andy c is an equilibriu for Γ c+p. Proof of Proposition 6. Let p R n +.ThenY c is an equilibriu for Γ c+p if and only if, for all j {1,...,n}, 3) 4) s j t j c j p j for γ-a.e. t Yj c,and +1 s jt j c j p j for γ-a.e. t T \ Yj c. Suppose that the assuptions hold but that there is p R n + that supports Y c.weshow that Y c is an equilibriu for Γ c. Let j {1,...,n}. If s j c j s j c j > 0. Let ɛ>0andlet 0, then Y c j = X j Y c j; c j )=. Suppose instead that U { t T ɛ>s j t j c j > 0&#{i s i t i c i >s j t j c j } < }, which is open and which is a subset of Y c j.chooset j 0, 1) such that ɛ>s j t j c j > Suppose suppγ) =T.Since 0,...,t j,...,0 U, U is non-epty and thus γu > Suppose n 1 suppγ). If >1, choose any i j. Ifthereisî such that sî cî 0, let i =î. Then let t n 1 be such that t j = t j and t i =1 t j. In either case, t U n 1,andsoU n 1 and γu > 0. Since U Yj c and γu > 0, equation 3) iplies that p j ɛ. Since this holds for every ɛ>0, p j =0. SinceYj c is an equilibriu for Γ c+p, we again obtain Yj c = Xj Y j; c c j ). Therefore, Y c is an equilibriu for Γ c. Proof of Proposition 7. Various steps are stated as leas. The assuptions i) suppγ) = n 1 and ii) = 1 are aintained throughout. Let v 2 ax =ax t n 1 v 2 t) andv 1 in = in t n 1 v 1 t). Lea 2 Suppose Y c is not an equilibriu of Γ c. Then v 1 in 1/2)v 2 ax is necessary and sufficient for there to be soe p>0 such that Y c is an equilibriu of Γ c+p.

12 Van Zandt : Inforation Overload in a Network of Targeted Counication 10 Proof of Lea 2. Suppose Y c is not an equilibriu of Γ c. It follows fro Corollary A.1 that 1/2)v 2 t) >cfor soe t n 1 and hence that 1/2)v 2 ax >c. Suppose that v 1 in 1/2)v 2 ax. Letp =1/2)v 2 ax c, sop>0. Then v 1 in c + p) 0 and hence v 1 t) c + p) 0 for all t n 1. Furtherore, 1/2)v 2 ax c + p) = 0 and hence 1/2)v 2 t) c + p) 0 for all t n 1. It follows fro Lea A.1 that Y c is an equilibriu of Γ c+p. Suppose instead that v 1 in < 1/2)v 2 ax. We consider two cases: 0 <p<1/2)v 2 ax c and p 1/2)v 2 ax c. Consider the first case. Let U {t T 1/2)v 2 t) c + p) > 0}, which is a set of types for which Y c t) is not an equilibriu fro Lea A.1). Since v 2 is continuous, U is open; since 1/2)v 2 ax c + p) > 0, we have U n 1. Hence, γu > 0 and Y c is not an equilibriu of Γ c+p. Let instead p 1/2)vax c,sothatv 2 in c+p) 1 < 0. Let U = {t T p>v 1 t) c>0}, which again is a set of types such that Y c t) is not an equilibriu of Γ c+p t). The condition v 1 t) c>0 eans that a highest valuation sender should send to t according to Y c t), but the condition v 1 t) c + p) < 0 eans that every sender s doinant strategy in Γ c+p t) is to not send a essage.) Then U n 1 because a) v 1 is continuous, b) vin 1 <c+ p, c) vax 2 >chence there is a t n 1 such that v 1 t) >c), and d) n 1 is connected. Continuity of v 1 also iplies that U is open. Hence, γu > 0andY c is not an equilibriu of Γ c+p. Lea 3 Renuber the senders if necessary so that s 1 s n.then n ) 1 5) vin 1 =, 6) v 2 ax k=1 s 1 k = ) s s Proof. The t that iniizes v 1 t) on n 1 is such that t 1 s 1 = = t n s n, which eans that t j =1/s j )/ n ) k=1 s 1 k and hence v 1 t) =s j t j = n ) 1. k=1 s 1 k The t that axiizes v 2 t) on n 1 has positive values only for senders 1 and 2, who have the two highest values of s j ; t is then such that t 1 s 1 = t 2 s 2. Hence, t 1 =1/s 1 )/1/s 1 +1/s 2 ) and v 2 t) = ) 1. s s 1 2 Lea 4 v 1 in 1/2)v 2 ax if and only if condition 1), 2), or 3) of Proposition 7 holds. Proof. Renuber the senders if necessary so that s 1 s n. Then the inequality vin 1 1/2)vax 2 can be written as 7) n ), s k s 1 s 2 k=1 8) n 1 s k s 1 s 2 k=3

13 Van Zandt : Inforation Overload in a Network of Targeted Counication 11 If n = 2, then equation 8) iposes no restriction of all. If n = 3, then equation 8) becoes s 1 3 s s 1 2 which in turn iplies s 1 i s 1 j + s 1 k for other perutations {i, j, k} of {1, 2, 3}). If n = 4, then equation 8) becoes s s 1 4 s s 1 2. Since s 1 s 2 s 3 s 4, this holds if and only if s 1 = s 2 = s 3 = s 4. Suppose n>4. Then the left-hand side of equation 8) is the su of three or ore ters, each of which is larger than the two ters sued on the right-hand side. Hence, the left-hand side is necessarily larger than the right-hand side. This concludes the proof of Proposition 7. References Van Zandt, T. 2003). Inforation overload in a network of targeted counication. INSEAD.

Block designs and statistics

Block designs and statistics Bloc designs and statistics Notes for Math 447 May 3, 2011 The ain paraeters of a bloc design are nuber of varieties v, bloc size, nuber of blocs b. A design is built on a set of v eleents. Each eleent

More information

Distributed Subgradient Methods for Multi-agent Optimization

Distributed Subgradient Methods for Multi-agent Optimization 1 Distributed Subgradient Methods for Multi-agent Optiization Angelia Nedić and Asuan Ozdaglar October 29, 2007 Abstract We study a distributed coputation odel for optiizing a su of convex objective functions

More information

Equilibria on the Day-Ahead Electricity Market

Equilibria on the Day-Ahead Electricity Market Equilibria on the Day-Ahead Electricity Market Margarida Carvalho INESC Porto, Portugal Faculdade de Ciências, Universidade do Porto, Portugal argarida.carvalho@dcc.fc.up.pt João Pedro Pedroso INESC Porto,

More information

e-companion ONLY AVAILABLE IN ELECTRONIC FORM

e-companion ONLY AVAILABLE IN ELECTRONIC FORM OPERATIONS RESEARCH doi 10.1287/opre.1070.0427ec pp. ec1 ec5 e-copanion ONLY AVAILABLE IN ELECTRONIC FORM infors 07 INFORMS Electronic Copanion A Learning Approach for Interactive Marketing to a Custoer

More information

Revealed Preference with Stochastic Demand Correspondence

Revealed Preference with Stochastic Demand Correspondence Revealed Preference with Stochastic Deand Correspondence Indraneel Dasgupta School of Econoics, University of Nottingha, Nottingha NG7 2RD, UK. E-ail: indraneel.dasgupta@nottingha.ac.uk Prasanta K. Pattanaik

More information

This model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t.

This model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t. CS 493: Algoriths for Massive Data Sets Feb 2, 2002 Local Models, Bloo Filter Scribe: Qin Lv Local Models In global odels, every inverted file entry is copressed with the sae odel. This work wells when

More information

Revealed Preference and Stochastic Demand Correspondence: A Unified Theory

Revealed Preference and Stochastic Demand Correspondence: A Unified Theory Revealed Preference and Stochastic Deand Correspondence: A Unified Theory Indraneel Dasgupta School of Econoics, University of Nottingha, Nottingha NG7 2RD, UK. E-ail: indraneel.dasgupta@nottingha.ac.uk

More information

Approximation in Stochastic Scheduling: The Power of LP-Based Priority Policies

Approximation in Stochastic Scheduling: The Power of LP-Based Priority Policies Approxiation in Stochastic Scheduling: The Power of -Based Priority Policies Rolf Möhring, Andreas Schulz, Marc Uetz Setting (A P p stoch, r E( w and (B P p stoch E( w We will assue that the processing

More information

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and This article appeared in a ournal published by Elsevier. The attached copy is furnished to the author for internal non-coercial research and education use, including for instruction at the authors institution

More information

E0 370 Statistical Learning Theory Lecture 6 (Aug 30, 2011) Margin Analysis

E0 370 Statistical Learning Theory Lecture 6 (Aug 30, 2011) Margin Analysis E0 370 tatistical Learning Theory Lecture 6 (Aug 30, 20) Margin Analysis Lecturer: hivani Agarwal cribe: Narasihan R Introduction In the last few lectures we have seen how to obtain high confidence bounds

More information

Tight Information-Theoretic Lower Bounds for Welfare Maximization in Combinatorial Auctions

Tight Information-Theoretic Lower Bounds for Welfare Maximization in Combinatorial Auctions Tight Inforation-Theoretic Lower Bounds for Welfare Maxiization in Cobinatorial Auctions Vahab Mirrokni Jan Vondrák Theory Group, Microsoft Dept of Matheatics Research Princeton University Redond, WA 9805

More information

Answers to Econ 210A Midterm, October A. The function f is homogeneous of degree 1/2. To see this, note that for all t > 0 and all (x 1, x 2 )

Answers to Econ 210A Midterm, October A. The function f is homogeneous of degree 1/2. To see this, note that for all t > 0 and all (x 1, x 2 ) Question. Answers to Econ 20A Midter, October 200 f(x, x 2 ) = ax {x, x 2 } A. The function f is hoogeneous of degree /2. To see this, note that for all t > 0 and all (x, x 2 ) f(tx, x 2 ) = ax {tx, tx

More information

Course Notes for EE227C (Spring 2018): Convex Optimization and Approximation

Course Notes for EE227C (Spring 2018): Convex Optimization and Approximation Course Notes for EE227C (Spring 2018): Convex Optiization and Approxiation Instructor: Moritz Hardt Eail: hardt+ee227c@berkeley.edu Graduate Instructor: Max Sichowitz Eail: sichow+ee227c@berkeley.edu October

More information

A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks with Order-Optimal Per-Flow Delay

A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks with Order-Optimal Per-Flow Delay A Low-Coplexity Congestion Control and Scheduling Algorith for Multihop Wireless Networks with Order-Optial Per-Flow Delay Po-Kai Huang, Xiaojun Lin, and Chih-Chun Wang School of Electrical and Coputer

More information

OBJECTIVES INTRODUCTION

OBJECTIVES INTRODUCTION M7 Chapter 3 Section 1 OBJECTIVES Suarize data using easures of central tendency, such as the ean, edian, ode, and idrange. Describe data using the easures of variation, such as the range, variance, and

More information

A Simple Regression Problem

A Simple Regression Problem A Siple Regression Proble R. M. Castro March 23, 2 In this brief note a siple regression proble will be introduced, illustrating clearly the bias-variance tradeoff. Let Y i f(x i ) + W i, i,..., n, where

More information

Course Notes for EE227C (Spring 2018): Convex Optimization and Approximation

Course Notes for EE227C (Spring 2018): Convex Optimization and Approximation Course Notes for EE7C (Spring 018: Convex Optiization and Approxiation Instructor: Moritz Hardt Eail: hardt+ee7c@berkeley.edu Graduate Instructor: Max Sichowitz Eail: sichow+ee7c@berkeley.edu October 15,

More information

Multi-Dimensional Hegselmann-Krause Dynamics

Multi-Dimensional Hegselmann-Krause Dynamics Multi-Diensional Hegselann-Krause Dynaics A. Nedić Industrial and Enterprise Systes Engineering Dept. University of Illinois Urbana, IL 680 angelia@illinois.edu B. Touri Coordinated Science Laboratory

More information

On Certain C-Test Words for Free Groups

On Certain C-Test Words for Free Groups Journal of Algebra 247, 509 540 2002 doi:10.1006 jabr.2001.9001, available online at http: www.idealibrary.co on On Certain C-Test Words for Free Groups Donghi Lee Departent of Matheatics, Uni ersity of

More information

Polygonal Designs: Existence and Construction

Polygonal Designs: Existence and Construction Polygonal Designs: Existence and Construction John Hegean Departent of Matheatics, Stanford University, Stanford, CA 9405 Jeff Langford Departent of Matheatics, Drake University, Des Moines, IA 5011 G

More information

Interactive Markov Models of Evolutionary Algorithms

Interactive Markov Models of Evolutionary Algorithms Cleveland State University EngagedScholarship@CSU Electrical Engineering & Coputer Science Faculty Publications Electrical Engineering & Coputer Science Departent 2015 Interactive Markov Models of Evolutionary

More information

Constrained Consensus and Optimization in Multi-Agent Networks arxiv: v2 [math.oc] 17 Dec 2008

Constrained Consensus and Optimization in Multi-Agent Networks arxiv: v2 [math.oc] 17 Dec 2008 LIDS Report 2779 1 Constrained Consensus and Optiization in Multi-Agent Networks arxiv:0802.3922v2 [ath.oc] 17 Dec 2008 Angelia Nedić, Asuan Ozdaglar, and Pablo A. Parrilo February 15, 2013 Abstract We

More information

Optimum Value of Poverty Measure Using Inverse Optimization Programming Problem

Optimum Value of Poverty Measure Using Inverse Optimization Programming Problem International Journal of Conteporary Matheatical Sciences Vol. 14, 2019, no. 1, 31-42 HIKARI Ltd, www.-hikari.co https://doi.org/10.12988/ijcs.2019.914 Optiu Value of Poverty Measure Using Inverse Optiization

More information

Many-to-Many Matching Problem with Quotas

Many-to-Many Matching Problem with Quotas Many-to-Many Matching Proble with Quotas Mikhail Freer and Mariia Titova February 2015 Discussion Paper Interdisciplinary Center for Econoic Science 4400 University Drive, MSN 1B2, Fairfax, VA 22030 Tel:

More information

A note on the multiplication of sparse matrices

A note on the multiplication of sparse matrices Cent. Eur. J. Cop. Sci. 41) 2014 1-11 DOI: 10.2478/s13537-014-0201-x Central European Journal of Coputer Science A note on the ultiplication of sparse atrices Research Article Keivan Borna 12, Sohrab Aboozarkhani

More information

arxiv: v1 [cs.ds] 3 Feb 2014

arxiv: v1 [cs.ds] 3 Feb 2014 arxiv:40.043v [cs.ds] 3 Feb 04 A Bound on the Expected Optiality of Rando Feasible Solutions to Cobinatorial Optiization Probles Evan A. Sultani The Johns Hopins University APL evan@sultani.co http://www.sultani.co/

More information

Fixed-to-Variable Length Distribution Matching

Fixed-to-Variable Length Distribution Matching Fixed-to-Variable Length Distribution Matching Rana Ali Ajad and Georg Böcherer Institute for Counications Engineering Technische Universität München, Gerany Eail: raa2463@gail.co,georg.boecherer@tu.de

More information

The Weierstrass Approximation Theorem

The Weierstrass Approximation Theorem 36 The Weierstrass Approxiation Theore Recall that the fundaental idea underlying the construction of the real nubers is approxiation by the sipler rational nubers. Firstly, nubers are often deterined

More information

Supplementary Information for Design of Bending Multi-Layer Electroactive Polymer Actuators

Supplementary Information for Design of Bending Multi-Layer Electroactive Polymer Actuators Suppleentary Inforation for Design of Bending Multi-Layer Electroactive Polyer Actuators Bavani Balakrisnan, Alek Nacev, and Elisabeth Sela University of Maryland, College Park, Maryland 074 1 Analytical

More information

Generalized Alignment Chain: Improved Converse Results for Index Coding

Generalized Alignment Chain: Improved Converse Results for Index Coding Generalized Alignent Chain: Iproved Converse Results for Index Coding Yucheng Liu and Parastoo Sadeghi Research School of Electrical, Energy and Materials Engineering Australian National University, Canberra,

More information

Learnability and Stability in the General Learning Setting

Learnability and Stability in the General Learning Setting Learnability and Stability in the General Learning Setting Shai Shalev-Shwartz TTI-Chicago shai@tti-c.org Ohad Shair The Hebrew University ohadsh@cs.huji.ac.il Nathan Srebro TTI-Chicago nati@uchicago.edu

More information

Worst-case efficiency ratio in false-name-proof combinatorial auction mechanisms

Worst-case efficiency ratio in false-name-proof combinatorial auction mechanisms Worst-case efficiency ratio in false-nae-proof cobinatorial auction echaniss Atsushi Iwasaki 1, Vincent Conitzer, Yoshifusa Oori 1, Yuko Sakurai 1, Taiki Todo 1, Mingyu Guo, and Makoto Yokoo 1 1 Kyushu

More information

Some Proofs: This section provides proofs of some theoretical results in section 3.

Some Proofs: This section provides proofs of some theoretical results in section 3. Testing Jups via False Discovery Rate Control Yu-Min Yen. Institute of Econoics, Acadeia Sinica, Taipei, Taiwan. E-ail: YMYEN@econ.sinica.edu.tw. SUPPLEMENTARY MATERIALS Suppleentary Materials contain

More information

Consistent Multiclass Algorithms for Complex Performance Measures. Supplementary Material

Consistent Multiclass Algorithms for Complex Performance Measures. Supplementary Material Consistent Multiclass Algoriths for Coplex Perforance Measures Suppleentary Material Notations. Let λ be the base easure over n given by the unifor rando variable (say U over n. Hence, for all easurable

More information

Birthday Paradox Calculations and Approximation

Birthday Paradox Calculations and Approximation Birthday Paradox Calculations and Approxiation Joshua E. Hill InfoGard Laboratories -March- v. Birthday Proble In the birthday proble, we have a group of n randoly selected people. If we assue that birthdays

More information

On Constant Power Water-filling

On Constant Power Water-filling On Constant Power Water-filling Wei Yu and John M. Cioffi Electrical Engineering Departent Stanford University, Stanford, CA94305, U.S.A. eails: {weiyu,cioffi}@stanford.edu Abstract This paper derives

More information

1 Bounding the Margin

1 Bounding the Margin COS 511: Theoretical Machine Learning Lecturer: Rob Schapire Lecture #12 Scribe: Jian Min Si March 14, 2013 1 Bounding the Margin We are continuing the proof of a bound on the generalization error of AdaBoost

More information

Compression and Predictive Distributions for Large Alphabet i.i.d and Markov models

Compression and Predictive Distributions for Large Alphabet i.i.d and Markov models 2014 IEEE International Syposiu on Inforation Theory Copression and Predictive Distributions for Large Alphabet i.i.d and Markov odels Xiao Yang Departent of Statistics Yale University New Haven, CT, 06511

More information

Implementing the Wisdom of Waze

Implementing the Wisdom of Waze Ipleenting the Wisdo of Waze Shoshana Vasseran Harvard University svasseran@fas.harvard.edu Michal Feldan Tel Aviv University ichal.feldan@cs.tau.ac.il Avinatan Hassidi Bar Ilan University avinatanh@gail.co

More information

COS 424: Interacting with Data. Written Exercises

COS 424: Interacting with Data. Written Exercises COS 424: Interacting with Data Hoework #4 Spring 2007 Regression Due: Wednesday, April 18 Written Exercises See the course website for iportant inforation about collaboration and late policies, as well

More information

In this chapter, we consider several graph-theoretic and probabilistic models

In this chapter, we consider several graph-theoretic and probabilistic models THREE ONE GRAPH-THEORETIC AND STATISTICAL MODELS 3.1 INTRODUCTION In this chapter, we consider several graph-theoretic and probabilistic odels for a social network, which we do under different assuptions

More information

Uniform Approximation and Bernstein Polynomials with Coefficients in the Unit Interval

Uniform Approximation and Bernstein Polynomials with Coefficients in the Unit Interval Unifor Approxiation and Bernstein Polynoials with Coefficients in the Unit Interval Weiang Qian and Marc D. Riedel Electrical and Coputer Engineering, University of Minnesota 200 Union St. S.E. Minneapolis,

More information

arxiv: v2 [math.co] 3 Dec 2008

arxiv: v2 [math.co] 3 Dec 2008 arxiv:0805.2814v2 [ath.co] 3 Dec 2008 Connectivity of the Unifor Rando Intersection Graph Sion R. Blacburn and Stefanie Gere Departent of Matheatics Royal Holloway, University of London Egha, Surrey TW20

More information

Chaotic Coupled Map Lattices

Chaotic Coupled Map Lattices Chaotic Coupled Map Lattices Author: Dustin Keys Advisors: Dr. Robert Indik, Dr. Kevin Lin 1 Introduction When a syste of chaotic aps is coupled in a way that allows the to share inforation about each

More information

are equal to zero, where, q = p 1. For each gene j, the pairwise null and alternative hypotheses are,

are equal to zero, where, q = p 1. For each gene j, the pairwise null and alternative hypotheses are, Page of 8 Suppleentary Materials: A ultiple testing procedure for ulti-diensional pairwise coparisons with application to gene expression studies Anjana Grandhi, Wenge Guo, Shyaal D. Peddada S Notations

More information

Pivots Versus Signals in Elections

Pivots Versus Signals in Elections Pivots Versus Signals in Elections Ada Meirowitz y and Kenneth W. Shotts z Septeber 9, 007 Abstract Incentives in voting odels typically hinge on the event that a voter is pivotal. But voting can also

More information

1 Proof of learning bounds

1 Proof of learning bounds COS 511: Theoretical Machine Learning Lecturer: Rob Schapire Lecture #4 Scribe: Akshay Mittal February 13, 2013 1 Proof of learning bounds For intuition of the following theore, suppose there exists a

More information

On the Use of A Priori Information for Sparse Signal Approximations

On the Use of A Priori Information for Sparse Signal Approximations ITS TECHNICAL REPORT NO. 3/4 On the Use of A Priori Inforation for Sparse Signal Approxiations Oscar Divorra Escoda, Lorenzo Granai and Pierre Vandergheynst Signal Processing Institute ITS) Ecole Polytechnique

More information

On the Communication Complexity of Lipschitzian Optimization for the Coordinated Model of Computation

On the Communication Complexity of Lipschitzian Optimization for the Coordinated Model of Computation journal of coplexity 6, 459473 (2000) doi:0.006jco.2000.0544, available online at http:www.idealibrary.co on On the Counication Coplexity of Lipschitzian Optiization for the Coordinated Model of Coputation

More information

A Markov Framework for the Simple Genetic Algorithm

A Markov Framework for the Simple Genetic Algorithm A arkov Fraework for the Siple Genetic Algorith Thoas E. Davis*, Jose C. Principe Electrical Engineering Departent University of Florida, Gainesville, FL 326 *WL/NGS Eglin AFB, FL32542 Abstract This paper

More information

Tight Bounds for Maximal Identifiability of Failure Nodes in Boolean Network Tomography

Tight Bounds for Maximal Identifiability of Failure Nodes in Boolean Network Tomography Tight Bounds for axial Identifiability of Failure Nodes in Boolean Network Toography Nicola Galesi Sapienza Università di Roa nicola.galesi@uniroa1.it Fariba Ranjbar Sapienza Università di Roa fariba.ranjbar@uniroa1.it

More information

On the Existence of Pure Nash Equilibria in Weighted Congestion Games

On the Existence of Pure Nash Equilibria in Weighted Congestion Games MATHEMATICS OF OPERATIONS RESEARCH Vol. 37, No. 3, August 2012, pp. 419 436 ISSN 0364-765X (print) ISSN 1526-5471 (online) http://dx.doi.org/10.1287/oor.1120.0543 2012 INFORMS On the Existence of Pure

More information

Model Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon

Model Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon Model Fitting CURM Background Material, Fall 014 Dr. Doreen De Leon 1 Introduction Given a set of data points, we often want to fit a selected odel or type to the data (e.g., we suspect an exponential

More information

2 Q 10. Likewise, in case of multiple particles, the corresponding density in 2 must be averaged over all

2 Q 10. Likewise, in case of multiple particles, the corresponding density in 2 must be averaged over all Lecture 6 Introduction to kinetic theory of plasa waves Introduction to kinetic theory So far we have been odeling plasa dynaics using fluid equations. The assuption has been that the pressure can be either

More information

Best Arm Identification: A Unified Approach to Fixed Budget and Fixed Confidence

Best Arm Identification: A Unified Approach to Fixed Budget and Fixed Confidence Best Ar Identification: A Unified Approach to Fixed Budget and Fixed Confidence Victor Gabillon Mohaad Ghavazadeh Alessandro Lazaric INRIA Lille - Nord Europe, Tea SequeL {victor.gabillon,ohaad.ghavazadeh,alessandro.lazaric}@inria.fr

More information

3.8 Three Types of Convergence

3.8 Three Types of Convergence 3.8 Three Types of Convergence 3.8 Three Types of Convergence 93 Suppose that we are given a sequence functions {f k } k N on a set X and another function f on X. What does it ean for f k to converge to

More information

Chapter 6: Economic Inequality

Chapter 6: Economic Inequality Chapter 6: Econoic Inequality We are interested in inequality ainly for two reasons: First, there are philosophical and ethical grounds for aversion to inequality per se. Second, even if we are not interested

More information

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 11 10/15/2008 ABSTRACT INTEGRATION I

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 11 10/15/2008 ABSTRACT INTEGRATION I MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 11 10/15/2008 ABSTRACT INTEGRATION I Contents 1. Preliinaries 2. The ain result 3. The Rieann integral 4. The integral of a nonnegative

More information

AN OPTIMAL SHRINKAGE FACTOR IN PREDICTION OF ORDERED RANDOM EFFECTS

AN OPTIMAL SHRINKAGE FACTOR IN PREDICTION OF ORDERED RANDOM EFFECTS Statistica Sinica 6 016, 1709-178 doi:http://dx.doi.org/10.5705/ss.0014.0034 AN OPTIMAL SHRINKAGE FACTOR IN PREDICTION OF ORDERED RANDOM EFFECTS Nilabja Guha 1, Anindya Roy, Yaakov Malinovsky and Gauri

More information

Page 1 Lab 1 Elementary Matrix and Linear Algebra Spring 2011

Page 1 Lab 1 Elementary Matrix and Linear Algebra Spring 2011 Page Lab Eleentary Matri and Linear Algebra Spring 0 Nae Due /03/0 Score /5 Probles through 4 are each worth 4 points.. Go to the Linear Algebra oolkit site ransforing a atri to reduced row echelon for

More information

A Simple Model of Reliability, Warranties, and Price-Capping

A Simple Model of Reliability, Warranties, and Price-Capping International Journal of Business and Econoics, 2006, Vol. 5, No. 1, 1-16 A Siple Model of Reliability, Warranties, and Price-Capping Donald A. R. George Manageent School & Econoics, University of Edinburgh,

More information

NET Institute*

NET Institute* NET Institute* www.netinst.org Working Paper #07-5 Septeber 2007 undling and Copetition for Slots Doh-Shin Jeon Universitat Popeu Fabra Doenico Menicucci Università degli Studi di Firenze * The Networks,

More information

Uncoupled automata and pure Nash equilibria

Uncoupled automata and pure Nash equilibria Int J Gae Theory (200) 39:483 502 DOI 0.007/s0082-00-0227-9 ORIGINAL PAPER Uncoupled autoata and pure Nash equilibria Yakov Babichenko Accepted: 2 February 200 / Published online: 20 March 200 Springer-Verlag

More information

arxiv: v1 [math.nt] 14 Sep 2014

arxiv: v1 [math.nt] 14 Sep 2014 ROTATION REMAINDERS P. JAMESON GRABER, WASHINGTON AND LEE UNIVERSITY 08 arxiv:1409.411v1 [ath.nt] 14 Sep 014 Abstract. We study properties of an array of nubers, called the triangle, in which each row

More information

New Bounds for Learning Intervals with Implications for Semi-Supervised Learning

New Bounds for Learning Intervals with Implications for Semi-Supervised Learning JMLR: Workshop and Conference Proceedings vol (1) 1 15 New Bounds for Learning Intervals with Iplications for Sei-Supervised Learning David P. Helbold dph@soe.ucsc.edu Departent of Coputer Science, University

More information

Tail Estimation of the Spectral Density under Fixed-Domain Asymptotics

Tail Estimation of the Spectral Density under Fixed-Domain Asymptotics Tail Estiation of the Spectral Density under Fixed-Doain Asyptotics Wei-Ying Wu, Chae Young Li and Yiin Xiao Wei-Ying Wu, Departent of Statistics & Probability Michigan State University, East Lansing,

More information

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices CS71 Randoness & Coputation Spring 018 Instructor: Alistair Sinclair Lecture 13: February 7 Disclaier: These notes have not been subjected to the usual scrutiny accorded to foral publications. They ay

More information

Product Launches and Buying Frenzies: A Dynamic Perspective

Product Launches and Buying Frenzies: A Dynamic Perspective Product Launches and Buying Frenzies: A Dynaic Perspective Pascal Courty Departent of Econoics, University of Victoria, PO Box 700, STN CSC, Victoria, BC, V8W Y, Canada, pcourty@uvic.ca Javad Nasiry School

More information

3.3 Variational Characterization of Singular Values

3.3 Variational Characterization of Singular Values 3.3. Variational Characterization of Singular Values 61 3.3 Variational Characterization of Singular Values Since the singular values are square roots of the eigenvalues of the Heritian atrices A A and

More information

Fairness via priority scheduling

Fairness via priority scheduling Fairness via priority scheduling Veeraruna Kavitha, N Heachandra and Debayan Das IEOR, IIT Bobay, Mubai, 400076, India vavitha,nh,debayan}@iitbacin Abstract In the context of ulti-agent resource allocation

More information

A := A i : {A i } S. is an algebra. The same object is obtained when the union in required to be disjoint.

A := A i : {A i } S. is an algebra. The same object is obtained when the union in required to be disjoint. 59 6. ABSTRACT MEASURE THEORY Having developed the Lebesgue integral with respect to the general easures, we now have a general concept with few specific exaples to actually test it on. Indeed, so far

More information

Error Exponents in Asynchronous Communication

Error Exponents in Asynchronous Communication IEEE International Syposiu on Inforation Theory Proceedings Error Exponents in Asynchronous Counication Da Wang EECS Dept., MIT Cabridge, MA, USA Eail: dawang@it.edu Venkat Chandar Lincoln Laboratory,

More information

Pattern Recognition and Machine Learning. Learning and Evaluation for Pattern Recognition

Pattern Recognition and Machine Learning. Learning and Evaluation for Pattern Recognition Pattern Recognition and Machine Learning Jaes L. Crowley ENSIMAG 3 - MMIS Fall Seester 2017 Lesson 1 4 October 2017 Outline Learning and Evaluation for Pattern Recognition Notation...2 1. The Pattern Recognition

More information

Power-Controlled Feedback and Training for Two-way MIMO Channels

Power-Controlled Feedback and Training for Two-way MIMO Channels 1 Power-Controlled Feedback and Training for Two-way MIMO Channels Vaneet Aggarwal, and Ashutosh Sabharwal, Senior Meber, IEEE arxiv:0901188v3 [csit] 9 Jan 010 Abstract Most counication systes use soe

More information

A BLOCK MONOTONE DOMAIN DECOMPOSITION ALGORITHM FOR A NONLINEAR SINGULARLY PERTURBED PARABOLIC PROBLEM

A BLOCK MONOTONE DOMAIN DECOMPOSITION ALGORITHM FOR A NONLINEAR SINGULARLY PERTURBED PARABOLIC PROBLEM INTERNATIONAL JOURNAL OF NUMERICAL ANALYSIS AND MODELING Volue 3, Nuber 2, Pages 211 231 c 2006 Institute for Scientific Coputing and Inforation A BLOCK MONOTONE DOMAIN DECOMPOSITION ALGORITHM FOR A NONLINEAR

More information

Support Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization

Support Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization Recent Researches in Coputer Science Support Vector Machine Classification of Uncertain and Ibalanced data using Robust Optiization RAGHAV PAT, THEODORE B. TRAFALIS, KASH BARKER School of Industrial Engineering

More information

Supplement to: Subsampling Methods for Persistent Homology

Supplement to: Subsampling Methods for Persistent Homology Suppleent to: Subsapling Methods for Persistent Hoology A. Technical results In this section, we present soe technical results that will be used to prove the ain theores. First, we expand the notation

More information

Outperforming the Competition in Multi-Unit Sealed Bid Auctions

Outperforming the Competition in Multi-Unit Sealed Bid Auctions Outperforing the Copetition in Multi-Unit Sealed Bid Auctions ABSTRACT Ioannis A. Vetsikas School of Electronics and Coputer Science University of Southapton Southapton SO17 1BJ, UK iv@ecs.soton.ac.uk

More information

arxiv: v3 [cs.lg] 7 Jan 2016

arxiv: v3 [cs.lg] 7 Jan 2016 Efficient and Parsionious Agnostic Active Learning Tzu-Kuo Huang Alekh Agarwal Daniel J. Hsu tkhuang@icrosoft.co alekha@icrosoft.co djhsu@cs.colubia.edu John Langford Robert E. Schapire jcl@icrosoft.co

More information

Solutions 1. Introduction to Coding Theory - Spring 2010 Solutions 1. Exercise 1.1. See Examples 1.2 and 1.11 in the course notes.

Solutions 1. Introduction to Coding Theory - Spring 2010 Solutions 1. Exercise 1.1. See Examples 1.2 and 1.11 in the course notes. Solutions 1 Exercise 1.1. See Exaples 1.2 and 1.11 in the course notes. Exercise 1.2. Observe that the Haing distance of two vectors is the iniu nuber of bit flips required to transfor one into the other.

More information

A Better Algorithm For an Ancient Scheduling Problem. David R. Karger Steven J. Phillips Eric Torng. Department of Computer Science

A Better Algorithm For an Ancient Scheduling Problem. David R. Karger Steven J. Phillips Eric Torng. Department of Computer Science A Better Algorith For an Ancient Scheduling Proble David R. Karger Steven J. Phillips Eric Torng Departent of Coputer Science Stanford University Stanford, CA 9435-4 Abstract One of the oldest and siplest

More information

Principal Components Analysis

Principal Components Analysis Principal Coponents Analysis Cheng Li, Bingyu Wang Noveber 3, 204 What s PCA Principal coponent analysis (PCA) is a statistical procedure that uses an orthogonal transforation to convert a set of observations

More information

OPTIMIZATION in multi-agent networks has attracted

OPTIMIZATION in multi-agent networks has attracted Distributed constrained optiization and consensus in uncertain networks via proxial iniization Kostas Margellos, Alessandro Falsone, Sione Garatti and Maria Prandini arxiv:603.039v3 [ath.oc] 3 May 07 Abstract

More information

The Simplex Method is Strongly Polynomial for the Markov Decision Problem with a Fixed Discount Rate

The Simplex Method is Strongly Polynomial for the Markov Decision Problem with a Fixed Discount Rate The Siplex Method is Strongly Polynoial for the Markov Decision Proble with a Fixed Discount Rate Yinyu Ye April 20, 2010 Abstract In this note we prove that the classic siplex ethod with the ost-negativereduced-cost

More information

Math Reviews classifications (2000): Primary 54F05; Secondary 54D20, 54D65

Math Reviews classifications (2000): Primary 54F05; Secondary 54D20, 54D65 The Monotone Lindelöf Property and Separability in Ordered Spaces by H. Bennett, Texas Tech University, Lubbock, TX 79409 D. Lutzer, College of Willia and Mary, Williasburg, VA 23187-8795 M. Matveev, Irvine,

More information

Iterative Decoding of LDPC Codes over the q-ary Partial Erasure Channel

Iterative Decoding of LDPC Codes over the q-ary Partial Erasure Channel 1 Iterative Decoding of LDPC Codes over the q-ary Partial Erasure Channel Rai Cohen, Graduate Student eber, IEEE, and Yuval Cassuto, Senior eber, IEEE arxiv:1510.05311v2 [cs.it] 24 ay 2016 Abstract In

More information

Málaga Economic Theory Research Center Working Papers

Málaga Economic Theory Research Center Working Papers Málaga Econoic Theory Research Center Working Papers Unequivocal Majority and Maskin-Monotonicity Pablo Aorós WP 2008-3 March 2008 Departaento de Teoría e Historia Econóica Facultad de Ciencias Econóicas

More information

CSE525: Randomized Algorithms and Probabilistic Analysis May 16, Lecture 13

CSE525: Randomized Algorithms and Probabilistic Analysis May 16, Lecture 13 CSE55: Randoied Algoriths and obabilistic Analysis May 6, Lecture Lecturer: Anna Karlin Scribe: Noah Siegel, Jonathan Shi Rando walks and Markov chains This lecture discusses Markov chains, which capture

More information

Supplementary Material for Fast and Provable Algorithms for Spectrally Sparse Signal Reconstruction via Low-Rank Hankel Matrix Completion

Supplementary Material for Fast and Provable Algorithms for Spectrally Sparse Signal Reconstruction via Low-Rank Hankel Matrix Completion Suppleentary Material for Fast and Provable Algoriths for Spectrally Sparse Signal Reconstruction via Low-Ran Hanel Matrix Copletion Jian-Feng Cai Tianing Wang Ke Wei March 1, 017 Abstract We establish

More information

ASSUME a source over an alphabet size m, from which a sequence of n independent samples are drawn. The classical

ASSUME a source over an alphabet size m, from which a sequence of n independent samples are drawn. The classical IEEE TRANSACTIONS ON INFORMATION THEORY Large Alphabet Source Coding using Independent Coponent Analysis Aichai Painsky, Meber, IEEE, Saharon Rosset and Meir Feder, Fellow, IEEE arxiv:67.7v [cs.it] Jul

More information

List Scheduling and LPT Oliver Braun (09/05/2017)

List Scheduling and LPT Oliver Braun (09/05/2017) List Scheduling and LPT Oliver Braun (09/05/207) We investigate the classical scheduling proble P ax where a set of n independent jobs has to be processed on 2 parallel and identical processors (achines)

More information

Ensemble Based on Data Envelopment Analysis

Ensemble Based on Data Envelopment Analysis Enseble Based on Data Envelopent Analysis So Young Sohn & Hong Choi Departent of Coputer Science & Industrial Systes Engineering, Yonsei University, Seoul, Korea Tel) 82-2-223-404, Fax) 82-2- 364-7807

More information

arxiv: v1 [cs.ds] 17 Mar 2016

arxiv: v1 [cs.ds] 17 Mar 2016 Tight Bounds for Single-Pass Streaing Coplexity of the Set Cover Proble Sepehr Assadi Sanjeev Khanna Yang Li Abstract arxiv:1603.05715v1 [cs.ds] 17 Mar 2016 We resolve the space coplexity of single-pass

More information

Soft Computing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis

Soft Computing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis Soft Coputing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis Beverly Rivera 1,2, Irbis Gallegos 1, and Vladik Kreinovich 2 1 Regional Cyber and Energy Security Center RCES

More information

Self-enforcing environmental agreements and international trade

Self-enforcing environmental agreements and international trade Fakultät III Wirtschaftswissenschaften, Wirtschaftsinforatik und Wirtschaftsrecht Volkswirtschaftliche Diskussionsbeiträge Discussion Papers in Econoics No. 156-12 Septeber 2012 Thoas Eichner Rüdiger Pethig

More information

Kernel Methods and Support Vector Machines

Kernel Methods and Support Vector Machines Intelligent Systes: Reasoning and Recognition Jaes L. Crowley ENSIAG 2 / osig 1 Second Seester 2012/2013 Lesson 20 2 ay 2013 Kernel ethods and Support Vector achines Contents Kernel Functions...2 Quadratic

More information

Experimental Design For Model Discrimination And Precise Parameter Estimation In WDS Analysis

Experimental Design For Model Discrimination And Precise Parameter Estimation In WDS Analysis City University of New York (CUNY) CUNY Acadeic Works International Conference on Hydroinforatics 8-1-2014 Experiental Design For Model Discriination And Precise Paraeter Estiation In WDS Analysis Giovanna

More information

Lecture 21 Principle of Inclusion and Exclusion

Lecture 21 Principle of Inclusion and Exclusion Lecture 21 Principle of Inclusion and Exclusion Holden Lee and Yoni Miller 5/6/11 1 Introduction and first exaples We start off with an exaple Exaple 11: At Sunnydale High School there are 28 students

More information

Understanding Machine Learning Solution Manual

Understanding Machine Learning Solution Manual Understanding Machine Learning Solution Manual Written by Alon Gonen Edited by Dana Rubinstein Noveber 17, 2014 2 Gentle Start 1. Given S = ((x i, y i )), define the ultivariate polynoial p S (x) = i []:y

More information

Non-Parametric Non-Line-of-Sight Identification 1

Non-Parametric Non-Line-of-Sight Identification 1 Non-Paraetric Non-Line-of-Sight Identification Sinan Gezici, Hisashi Kobayashi and H. Vincent Poor Departent of Electrical Engineering School of Engineering and Applied Science Princeton University, Princeton,

More information