Sequence Analysis, WS 14/15, D. Huson & R. Neher (this part by D. Huson & J. Fischer) January 21,

Size: px
Start display at page:

Download "Sequence Analysis, WS 14/15, D. Huson & R. Neher (this part by D. Huson & J. Fischer) January 21,"

Transcription

1 Sequene Analysis, WS 14/15, D. Huson & R. Neher (this part by D. Huson & J. Fisher) January 21, Suffix Trees and Suffix Arrays This leture is based on the following soures, whih are all reommended reading: D. Gusfield, Algorithms on Strings, Trees and Sequenes, Cambridge UP, M. Crohemore, W. Rytter, Jewels of Stringology, World Sientifi, M. Crohemore, C. Hanart, T. Leroq, Algorithms on Strings, Cambridge UP, J. Kärkkäinen et al, Simple Linear Work Suffix Array Constrution, Journal of the ACM (JACM) Volume 53 Issue 6, November 2006 Pages S. Kurtz, Foundations of Sequene Analysis, Universität Bielefeld, Introdution Problem Assume we are given a long text T and many short queries Q 1,..., Q k. For eah query sequene Q i, find all its ourrenes in T. We would like to have a data-struture that allows us to solve this problem effiiently. Important appliations are in the omparison of genomes (in programs suh as MUMmer that omputes alignments between genomi sequenes, based on maximal unique mathes ) and in the analysis of repeats (in programs suh as REPuter). For example, the text T might be a genome and the queries might be short words suh as transription fator binding sites. Text T = tttttttgagaggagttgttgtgaggtggagtgagt gggggattggtatgaagtgtgggttaga tttgtagtaagtagtgggataagggga ggtaattttttgtatttttagtagagaggggtttagtttta gggatggttgatttgatgtgatggtggt aaagtgtgggattaagggt Query Q = tttta Find (all) ourrenes of the query Q in the text T 9.2 Basi definitions Definition (Prefix, suffix, fator) We use Σ to denote an alphabet and Σ for the set of all strings over Σ. We use ɛ to denote the empty string and Σ + = Σ \ {ɛ}. Let T = t 1 t 2... t n be a text. A prefix of T is a substring of T beginning at the first position in T. A suffix of T is a substring T i...n = t i t i+1... t n of T ending at the last position in T. A fator (or infix) of T is any substring T i...j = t i t i+1... t j of T.

2 12 Sequene Analysis, WS 14/15, D. Huson & R. Neher (this part by D. Huson & J. Fisher) January 21, 2015 In bioinformatis, the alphabet Σ is usually of size 4 or 20. In other appliations, the alphabet an be muh larger, for example, in the analysis of web-surfing patterns, Σ onsists of the set of all links ontained in a olletion of web sites. 9.3 The role of suffixes Consider the text abab It has the following suffixes: abab, bab, ab, b and. Queries are prefixes of suffixes: To determine whether a given query Q is ontained in the text, we ould simply hek whether Q is the prefix of one of the suffixes. 9.4 Sharing prefixes E.g., the query ab is the prefix of both abab and ab. To speed up the searh for all suffixes that have the query as a prefix, we use a tree struture to share ommon prefixes between the suffixes. (a) The suffixes abab and ab both share the prefix ab. (b) The suffixes bab and b both share the prefix b. () The suffix doesn t share a prefix. a b (a) b a b b a (b) Here is an example of how the idea of searhing the prefix of every suffix an be optimized by sharing prefixes whenever possible: () b a b abab ab bab b a b b a A suffix tree for abab is obtained by sharing prefixes whenever possible. The leaves are annotated by the positions of the orresponding suffixes in the text. 9.5 Σ + -tree Definition (Σ + -tree) A ompat Σ + -tree is a rooted tree S = (V, E) with edge labels from Σ + that fulfills the following two onstraints: For eah node v V, the labels of all outgoing edges eah starts with a different letter.

3 Sequene Analysis, WS 14/15, D. Huson & R. Neher (this part by D. Huson & J. Fisher) January 21, Apart from the root, all nodes have out-degree 1. You an think of a ompat Σ + -tree as a tree that looks like a trie data struture, but with degreeone-paths ontrated into a single edge. A leaf is a node with no hildren and an edge leading to a leaf is alled a leaf edge. A node with at least two hildren is alled a branhing node. Definition (Notations in Σ + -trees) Let S = (V, E) be a ompat Σ + -tree. Then v denotes the onatenation of all path labels from the root of S to node v. Then d(v) denotes the string-depth v of v. A string α ours in S, or S displays α, iff there exists a node v and a (not neessarily nonempty) string β with v = αβ. Then words(s) denotes the set of all all strings that our in S. If v = α for some node v and string α, then we also use α to denote v. root p For example u = pqr: The root is alled ɛ. q r u 9.6 Suffix tree Definition (Suffix tree) Let fator(t ) denote the set of all fators of T. The suffix tree of T is a ompat Σ + -tree S with words(s) = fator(t ). It is onvenient to ensure that eah suffix ends at a leaf of S. This an be aomplished by always assuming that the text T ends on a sentinel letter $ / Σ that is lexiographially smaller than all other letters. Then there is a one-to-one between suffixes of T $ and the leaves of S and we an label eah leaf v by the start index l(v) = i of the orresponding suffix T i...n, i.e. we set l(v) = i v = T i...n.

4 14 Sequene Analysis, WS 14/15, D. Huson & R. Neher (this part by D. Huson & J. Fisher) January 21, 2015 This explains the name suffix tree. A suffix tree S built for T without a sentinel $ is alled an impliit suffix tree. (Note that we did not define suffix trees in terms of suffixes, but rather in terms of fators.) We an use S to find ourrenes of a query Q Σ as follows. Starting at the root, attempt to math the letters of Q against the labels of the edges of S, along a path into the tree. If at some point the path annot be extended, then Q does not our in T. Otherwise, Q ours in T. In this ase, the mathing proedure ends at some loation p in S, either at a node or in an edge. To identify all ourrenes of Q in T, we traverse the subtree below p and report all leaf-labels. The deision query ( does Q our in T? ) takes O(m) time, with m the length of Q. The reporting query ( report all ourrenes of Q in T ) takes O(m + k) time, where k denotes the number of ourrenes of Q in T. The orretness of the two query algorithms follows from the fat that eah fator of T is a prefix of some suffix of T. For an alphabet of onstant size, finding the appropriate outgoing edge an be done in onstant time. An important implementation detail is that the edge labels in a suffix tree an be represented by a

5 Sequene Analysis, WS 14/15, D. Huson & R. Neher (this part by D. Huson & J. Fisher) January 21, pair (i, j), 1 i j n suh that T i...j equals the orresponding edge label. Hene, eah edge label uses only a onstant amount of memory. From this implementation detail and the fat that S ontains exatly n leaves and hene less than n branhing nodes, we get the following result: Theorem (Linear spae) A suffix tree requires only O(n) spae. 9.7 Suffix Array We will now introdue two arrays that are losely related to the suffix tree, the suffix array A and the LCP array. Definition (Suffix array) The suffix array A of T is a permutation of {1, 2,..., n} suh that A[i] is the i-th smallest suffix in lexiographi order: T A[i 1]...n < T A[i]...n for all 1 < i n. Let S be the assoiated suffix tree. If we do a traversal through S, visiting hildren in lexiographi order of the labels of the edges leading to them, then all leaves will be visited in the order given in the suffix array A. This links the onepts of suffix array A and suffix tree S. 9.8 LCP Array The LCP array is based on the suffix array: Definition (LCP array) The LCP array of T is defined as follows: set LCP[1] = 0, and for all i > 1, let LCP[i] equal the length of the longest ommon prefix (lp) of T A[i]...n and T A[i 1]...n. To relate the LCP array to the suffix tree S, we need to define the onept of lowest ommon anestors: Definition (Lowest ommon anestor) Given a tree S = (V, E) and two nodes v, w V, the lowest ommon anestor of v and w is the deepest node in S that is an anestor of both v and w, denoted by LCA(v, w).

6 16 Sequene Analysis, WS 14/15, D. Huson & R. Neher (this part by D. Huson & J. Fisher) January 21, 2015 Lemma (LCA and LCP) The string-depth of the lowest ommon anestor of the two leaves with labels A[i] and A[i 1], respetively, is given by the orresponding entry LCP[i] of the LCP array. In other words, for all i > 1 we have: LCP[i] = d(lca(t A[i]...n, T A[i 1]...n )). i A[i] suffix LCP[i] 0 9 $ ACCTTCCT$ CCT$ CCTTTCCT$ CT$ CTTCCT$ T$ TCCT$ TTCT$ Suffix Tree from Suffix- and LCP Array Assume we are given T, A, and LCP, and we wish to onstrut S, the suffix tree of T. We will show how to do this in O(n) time. (Later, we will also see how to onstrut A and LCP only from T in linear time. In total, this will give us an O(n)-time onstrution algorithm for suffix trees.) The idea of the algorithm is to insert the suffixes into S in the order of the suffix array: T A[1]...n, T A[2]...n,..., T A[n]...n. To this end, let S i denote the partial suffix tree for 0 i n, i.e. S i is the ompat Σ + -tree with In the end, we will have S = S n. words(s i ) = {T A[k]...j : 1 k i, A[k] j n}. We start with S 0, the tree onsisting only of the root (and displaying only ɛ). In step i + 1, we limb up the rightmost path of S i (i.e., the path from the leaf labeled A[i] to the root) until we meet the deepest node v with d(v) LCP[i + 1]. If d(v) = LCP[i + 1], we simply insert a new leaf x to S i as a hild of v, and label (v, x) by T A[i+1]+LCP[i+1]...n. Leaf x is labeled by A[i + 1]. This gives us S i+1. Otherwise (i.e., d(v) < LCP[i + 1]), let w be the hild of v on S i s rightmost path. In order to obtain S i+1, we split the edge (v, w) as follows: Delete (v, w). Add a new node y and a new edge (v, y), whih gets labeled by T A[i]+d(v)...A[i]+LCP[i+1] 1. Add (y, w) and label it by T A[i]+LCP[i+1]...A[i]+d(w) 1. Add a new leaf x (labeled A[i + 1]) and an edge (y, x). Label (y, x) by T A[i+1]+LCP[i+1]...n.

7 Sequene Analysis, WS 14/15, D. Huson & R. Neher (this part by D. Huson & J. Fisher) January 21, Corretness of Algorithm The orretness of this algorithm follows from results stated above. What is the exeution time of this algorithm? Although limbing up the rightmost path ould take O(n) time in a single step, the running time an be bounded by O(n) in total: Eah node traversed in step i (apart from the last) is removed from the rightmost path and will not be traversed again for all subsequent steps j > i. Hene, at most 2n nodes are traversed in total. Theorem (Suffix tree from arrays) We an onstrut T s suffix tree in linear time from T s suffix- and LCP array. This suffix tree onstrution algorithm is good in terms of memory loality; there is a high orrelation between how lose two piees of data are in the tree, and how lose they are in physial memory. Hene, an average query will produe only few ahe misses and leads to a good performane in pratie Linear-Time Constrution of Suffix Arrays For an easier presentation, we assume in this setion that T is indexed from 0 to n 1, T = t 0 t 1... t n 1. Also, we will assume that the end of T is padded by a suffiient number of $ s. We use T i to denote the suffix that starts at index i T = y a b b a d a b b a d o We want to obtain the following in linear time: A = (1, 6, 4, 9, 3, 8, 2, 7, 5, 10, 11, 0) We will desribe the DC3 algorithm 1, whih operates in three steps: (0) Extrat a sample that ontain 2/3 of all suffixes. (1) Reursively sort the extrated suffixes. (2) Use these to sort the other 1/3 of suffixes. (3) Merge the two sorted lists of suffixes to obtain the final suffix array. Step 0: Extrat sample. For k = 0, 1, 2 define B k = {i [0, n] i mod 3 = k}. Let C = B 1 B 2 be the set of sample positions and T C the set of sample suffixes. B 1 = {1, 4, 7, 10}, B 2 = {2, 5, 8, 11} and C = {1, 2, 4, 5, 7, 8, 10, 11}. Let max B k denote the maximum element in B k, in this example max B 1 = 10 and max B 2 = 11. Step 1: Sort sample suffixes. For k = 1, 2 onstrut the strings 1 J. Kärkkäinen et al 2006 R k = [t k t k+1 t k+2 ][t k+3 t k+4 t k+5 ]... [t max Bk t max bk +1t max Bk +2],

8 18 Sequene Analysis, WS 14/15, D. Huson & R. Neher (this part by D. Huson & J. Fisher) January 21, 2015 whose letters are triples [t i t i+1 t i+2 ]. Note that the last letter of R k is always unique beause it ends on $. Let R = R 1 R 2 be the onatenation of R 1 and R 2. Then the (nonempty) suffixes of R orrespond to the set T C of sample suffixes: [t i t i+1 t i+2 ][t i+3 t i+4 t i+5 ]... orresponds to T i. This orrespondene is order-preserving, so by sorting the suffixes of R we get the order of the sample suffixes T C. R = [abb][ada][bba][do$][bba][dab][bad][o$$]. To sort the suffixes of R, first radix sort the letters (whih are triples) of R and then rename them with their ranks to obtain a new string R. i = R = [abb] [ada] [bba] [do$] [bba] [dab] [bad] [o$$] R = If all the haraters are different, then the lexiographi ordering of the haraters determines the order of the suffixes. Otherwise, we reursively all Algorithm DC3 to sort the suffixes of R. A R = (0, 1, 6, 4, 2, 5, 3, 7). Now assign a rank to eah sample suffix based on A R. i = Index in T = R = rank= This sorts the set of suffixes in T C. T 1 < T 4 < T 8 < T 2 < T 7 < T 5 < T 10 < T 11. For i C let rank(t i ) denote the rank of suffix T i in the sample set T C, obtained from the rank of the orresponding suffix in R. Additionally, define rank(t n+1 ) = rank(t n+2 ) = 0. For i B 0, the value of rank(t i ) is undefined ( ). i rank(t i ) Step 2: Sort nonsample suffixes. Represent eah nonsample suffix T i T B0 as the pair (t i, rank(t i+1 )). Note that rank(t i+1 ) is defined for all i B 0. For all i, j B 0 we have: T i T j (t i, rank(t i+1 )) (t j, rank(t j+1 )). Using this and applying radix sort to the set of all pairs (t i, rank(t i+1 )), we sort all nonsample suffixes. T 12 < T 6 < T 9 < T 3 < T 0 beause ($, 0) < (a, 5) < (a, 7) < (b, 2) < (y, 1). Step 3: Merge. The two sorted sets of suffixes are merged in the straightforward way, omparing any sample suffix T i T C with a non-sample suffix T j T B0 as follows: if i B 1 then: else (i B 2 ): T i T j (t i, rank(t i+1 )) (t j, rank(t j+1 )), T i T j (t i, t i+1, rank(t i+2 )) (t j, t j+1, rank(t j+2 )).

9 Sequene Analysis, WS 14/15, D. Huson & R. Neher (this part by D. Huson & J. Fisher) January 21, T 1 < T 6 beause (a, 4) < (a, 5), and T 3 < T 8 beause (b, a, 6) < (b, a, 7). The time omplexity is given by the following result: Theorem (Linear time) The time omplexity of Algorithm DC3 is O(n). Proof Exluding the reursive all, everything an learly be done in linear time. The reursion is on a string of length 2n/3. Thus the time is given by the reurrene T (n) = T (2n/3) + O(n), whose solution is T (n) = O(n) Linear-Time Constrution of LCP Arrays It remains to be shown how the LCP array an be onstruted in O(n) time. Here, we assume that we are given T, A, and A 1, the latter being the inverse suffix array that maps the i-th suffix to its rank in the lexiographial ordering of all suffixes. We will onstrut the LCP in the original order of the suffixes, using A 1 to index the appropriate element of LCP. This is a good order in whih to proeed beause the following result states that in eah step the value an only derease by at most one: Lemma For all 1 i < n: LCP[A 1 [i + 1]] LCP[A 1 [i]] 1. Proof Let T j be the lexiographi predeessor of T i, i.e., T j < T i and there are no other suffixes between them in the lexiographial order. Then T j is diret predeessor of T i in A and so If h = 0, then the laim is trivially true. LCP [A 1 [i]] = lp(t i, T j ) =: h. If h > 0, then for some letter we have T i = T i+1 and T j = T j+1. Then T j+1 < T i+1 and lp(t i+1, T j+1 ) = h 1. Let T k be the lexiographial predeessor of T i+1. Then either T j+1 = T k or T j+1 < T k < T i+1. In either ase, LCP [A 1 [i + 1]] = lp(t i+1, T k ) lp(t i+1, T j+1 ) = h 1, based on the following argument: If T j+1 = T K, then equality holds in the equation above. Otherwise, T j+1 must ome before T k. Beause T k is the diret predeessor of T i+1, it follows that in the orresponding suffix tree we have that the leaf representing T k is immediately followed by the leaf representing T k+1, and both leaf edges have the same parent. Beause T j+1 is a predeessor of T k, it follows that T j+1 attahes diretly, or indiretly, to a node on the path from the root to T k. Thus the longest ommon prefix of T j+1 and T i+1 annot exeed lp(t k, T i+1 ), as seen here: lp(t k$,t i+1 )## # T j+1# T T i+1# k$ This gives rise to the following elegant algorithm to onstrut the LCP:

10 20 Sequene Analysis, WS 14/15, D. Huson & R. Neher (this part by D. Huson & J. Fisher) January 21, 2015 Algorithm (LCP from suffix array) begin 0 LCP[0] = 0 1 h 0 / length of lp for previous suffix / 2 for i = 1,..., n do 3 k A 1 [i] 4 j A[k 1] / T j is lexiographial predeessor of T i / 5 while t i+h = t j+h do 6 h h LCP[k] h 8 h max{0, h 1} end Theorem (Linear time onstrution of LCP) The LCP array for a text of length n an be onstruted in O(n) time. Proof This follows from the presented algorithm: The for loop (line 2) is exeuted n times. Note that h annot grow larger than n, is deremented at most n times, and is inremented in eah round of the while loop (line 5). It follows that line (6) is exeuted at most 2n times Summary and outlook The LCP array and suffix array A an be onstruted in linear time for any given sequene T. We an onstrut the suffix tree S from LCP and A in linear time. In total, this provides a linear time onstrution of S from T. Suffix array and LCP an be used together to replae a suffix tree, using less spae (not shown here).

15.12 Applications of Suffix Trees

15.12 Applications of Suffix Trees 248 Algorithms in Bioinformatis II, SoSe 07, ZBIT, D. Huson, May 14, 2007 15.12 Appliations of Suffix Trees 1. Searhing for exat patterns 2. Minimal unique substrings 3. Maximum unique mathes 4. Maximum

More information

McCreight s Suffix Tree Construction Algorithm. Milko Izamski B.Sc. Informatics Instructor: Barbara König

McCreight s Suffix Tree Construction Algorithm. Milko Izamski B.Sc. Informatics Instructor: Barbara König 1. Introution MCreight s Suffix Tree Constrution Algorithm Milko Izamski B.S. Informatis Instrutor: Barbara König The main goal of MCreight s algorithm is to buil a suffix tree in linear time. This is

More information

Searching All Approximate Covers and Their Distance using Finite Automata

Searching All Approximate Covers and Their Distance using Finite Automata Searhing All Approximate Covers and Their Distane using Finite Automata Ondřej Guth, Bořivoj Melihar, and Miroslav Balík České vysoké učení tehniké v Praze, Praha, CZ, {gutho1,melihar,alikm}@fel.vut.z

More information

Computer Science 786S - Statistical Methods in Natural Language Processing and Data Analysis Page 1

Computer Science 786S - Statistical Methods in Natural Language Processing and Data Analysis Page 1 Computer Siene 786S - Statistial Methods in Natural Language Proessing and Data Analysis Page 1 Hypothesis Testing A statistial hypothesis is a statement about the nature of the distribution of a random

More information

State Diagrams. Margaret M. Fleck. 14 November 2011

State Diagrams. Margaret M. Fleck. 14 November 2011 State Diagrams Margaret M. Flek 14 November 2011 These notes over state diagrams. 1 Introdution State diagrams are a type of direted graph, in whih the graph nodes represent states and labels on the graph

More information

Skriptum VL Text Indexing Sommersemester 2012 Johannes Fischer (KIT)

Skriptum VL Text Indexing Sommersemester 2012 Johannes Fischer (KIT) Skriptum VL Text Indexing Sommersemester 2012 Johannes Fischer (KIT) Disclaimer Students attending my lectures are often astonished that I present the material in a much livelier form than in this script.

More information

FORMAL METHODS LECTURE VI BINARY DECISION DIAGRAMS (BDD S)

FORMAL METHODS LECTURE VI BINARY DECISION DIAGRAMS (BDD S) Alessandro Artale (FM First Semester 2009/2010) p. 1/38 FORMAL METHODS LECTURE VI BINARY DECISION DIAGRAMS (BDD S) Alessandro Artale Faulty of Computer Siene Free University of Bolzano artale@inf.unibz.it

More information

max min z i i=1 x j k s.t. j=1 x j j:i T j

max min z i i=1 x j k s.t. j=1 x j j:i T j AM 221: Advaned Optimization Spring 2016 Prof. Yaron Singer Leture 22 April 18th 1 Overview In this leture, we will study the pipage rounding tehnique whih is a deterministi rounding proedure that an be

More information

CMSC 451: Lecture 9 Greedy Approximation: Set Cover Thursday, Sep 28, 2017

CMSC 451: Lecture 9 Greedy Approximation: Set Cover Thursday, Sep 28, 2017 CMSC 451: Leture 9 Greedy Approximation: Set Cover Thursday, Sep 28, 2017 Reading: Chapt 11 of KT and Set 54 of DPV Set Cover: An important lass of optimization problems involves overing a ertain domain,

More information

Flexible Word Design and Graph Labeling

Flexible Word Design and Graph Labeling Flexible Word Design and Graph Labeling Ming-Yang Kao Manan Sanghi Robert Shweller Abstrat Motivated by emerging appliations for DNA ode word design, we onsider a generalization of the ode word design

More information

Advanced Computational Fluid Dynamics AA215A Lecture 4

Advanced Computational Fluid Dynamics AA215A Lecture 4 Advaned Computational Fluid Dynamis AA5A Leture 4 Antony Jameson Winter Quarter,, Stanford, CA Abstrat Leture 4 overs analysis of the equations of gas dynamis Contents Analysis of the equations of gas

More information

Skriptum VL Text-Indexierung Sommersemester 2010 Johannes Fischer (KIT)

Skriptum VL Text-Indexierung Sommersemester 2010 Johannes Fischer (KIT) 1 Recommended Reading Skriptum VL Text-Indexierung Sommersemester 2010 Johannes Fischer (KIT) D. Gusfield: Algorithms on Strings, Trees, and Sequences. Cambridge University Press, 1997. M. Crochemore,

More information

The Effectiveness of the Linear Hull Effect

The Effectiveness of the Linear Hull Effect The Effetiveness of the Linear Hull Effet S. Murphy Tehnial Report RHUL MA 009 9 6 Otober 009 Department of Mathematis Royal Holloway, University of London Egham, Surrey TW0 0EX, England http://www.rhul.a.uk/mathematis/tehreports

More information

Nonreversibility of Multiple Unicast Networks

Nonreversibility of Multiple Unicast Networks Nonreversibility of Multiple Uniast Networks Randall Dougherty and Kenneth Zeger September 27, 2005 Abstrat We prove that for any finite direted ayli network, there exists a orresponding multiple uniast

More information

Complexity of Regularization RBF Networks

Complexity of Regularization RBF Networks Complexity of Regularization RBF Networks Mark A Kon Department of Mathematis and Statistis Boston University Boston, MA 02215 mkon@buedu Leszek Plaskota Institute of Applied Mathematis University of Warsaw

More information

Hankel Optimal Model Order Reduction 1

Hankel Optimal Model Order Reduction 1 Massahusetts Institute of Tehnology Department of Eletrial Engineering and Computer Siene 6.245: MULTIVARIABLE CONTROL SYSTEMS by A. Megretski Hankel Optimal Model Order Redution 1 This leture overs both

More information

c-perfect Hashing Schemes for Binary Trees, with Applications to Parallel Memories

c-perfect Hashing Schemes for Binary Trees, with Applications to Parallel Memories -Perfet Hashing Shemes for Binary Trees, with Appliations to Parallel Memories (Extended Abstrat Gennaro Cordaso 1, Alberto Negro 1, Vittorio Sarano 1, and Arnold L.Rosenberg 2 1 Dipartimento di Informatia

More information

Packing Plane Spanning Trees into a Point Set

Packing Plane Spanning Trees into a Point Set Paking Plane Spanning Trees into a Point Set Ahmad Biniaz Alfredo Garía Abstrat Let P be a set of n points in the plane in general position. We show that at least n/3 plane spanning trees an be paked into

More information

Control Theory association of mathematics and engineering

Control Theory association of mathematics and engineering Control Theory assoiation of mathematis and engineering Wojieh Mitkowski Krzysztof Oprzedkiewiz Department of Automatis AGH Univ. of Siene & Tehnology, Craow, Poland, Abstrat In this paper a methodology

More information

A Metric Index for Approximate String Matching

A Metric Index for Approximate String Matching A Metri Index for Approximate String Mathing Edgar Chávez 1 and Gonzalo Navarro 2 1 Esuela de Cienias Físio-Matemátias, Universidad Mihoaana. Edifiio B, Ciudad Universitaria, Morelia, Mih. Méxio 58000.

More information

Methods of evaluating tests

Methods of evaluating tests Methods of evaluating tests Let X,, 1 Xn be i.i.d. Bernoulli( p ). Then 5 j= 1 j ( 5, ) T = X Binomial p. We test 1 H : p vs. 1 1 H : p>. We saw that a LRT is 1 if t k* φ ( x ) =. otherwise (t is the observed

More information

Where as discussed previously we interpret solutions to this partial differential equation in the weak sense: b

Where as discussed previously we interpret solutions to this partial differential equation in the weak sense: b Consider the pure initial value problem for a homogeneous system of onservation laws with no soure terms in one spae dimension: Where as disussed previously we interpret solutions to this partial differential

More information

Parallel disrete-event simulation is an attempt to speed-up the simulation proess through the use of multiple proessors. In some sense parallel disret

Parallel disrete-event simulation is an attempt to speed-up the simulation proess through the use of multiple proessors. In some sense parallel disret Exploiting intra-objet dependenies in parallel simulation Franeso Quaglia a;1 Roberto Baldoni a;2 a Dipartimento di Informatia e Sistemistia Universita \La Sapienza" Via Salaria 113, 198 Roma, Italy Abstrat

More information

7.1 Roots of a Polynomial

7.1 Roots of a Polynomial 7.1 Roots of a Polynomial A. Purpose Given the oeffiients a i of a polynomial of degree n = NDEG > 0, a 1 z n + a 2 z n 1 +... + a n z + a n+1 with a 1 0, this subroutine omputes the NDEG roots of the

More information

Lightpath routing for maximum reliability in optical mesh networks

Lightpath routing for maximum reliability in optical mesh networks Vol. 7, No. 5 / May 2008 / JOURNAL OF OPTICAL NETWORKING 449 Lightpath routing for maximum reliability in optial mesh networks Shengli Yuan, 1, * Saket Varma, 2 and Jason P. Jue 2 1 Department of Computer

More information

Tight bounds for selfish and greedy load balancing

Tight bounds for selfish and greedy load balancing Tight bounds for selfish and greedy load balaning Ioannis Caragiannis Mihele Flammini Christos Kaklamanis Panagiotis Kanellopoulos Lua Mosardelli Deember, 009 Abstrat We study the load balaning problem

More information

A NETWORK SIMPLEX ALGORITHM FOR THE MINIMUM COST-BENEFIT NETWORK FLOW PROBLEM

A NETWORK SIMPLEX ALGORITHM FOR THE MINIMUM COST-BENEFIT NETWORK FLOW PROBLEM NETWORK SIMPLEX LGORITHM FOR THE MINIMUM COST-BENEFIT NETWORK FLOW PROBLEM Cen Çalışan, Utah Valley University, 800 W. University Parway, Orem, UT 84058, 801-863-6487, en.alisan@uvu.edu BSTRCT The minimum

More information

The Hanging Chain. John McCuan. January 19, 2006

The Hanging Chain. John McCuan. January 19, 2006 The Hanging Chain John MCuan January 19, 2006 1 Introdution We onsider a hain of length L attahed to two points (a, u a and (b, u b in the plane. It is assumed that the hain hangs in the plane under a

More information

Chapter 8 Hypothesis Testing

Chapter 8 Hypothesis Testing Leture 5 for BST 63: Statistial Theory II Kui Zhang, Spring Chapter 8 Hypothesis Testing Setion 8 Introdution Definition 8 A hypothesis is a statement about a population parameter Definition 8 The two

More information

Supplementary Materials

Supplementary Materials Supplementary Materials Neural population partitioning and a onurrent brain-mahine interfae for sequential motor funtion Maryam M. Shanehi, Rollin C. Hu, Marissa Powers, Gregory W. Wornell, Emery N. Brown

More information

7 Max-Flow Problems. Business Computing and Operations Research 608

7 Max-Flow Problems. Business Computing and Operations Research 608 7 Max-Flow Problems Business Computing and Operations Researh 68 7. Max-Flow Problems In what follows, we onsider a somewhat modified problem onstellation Instead of osts of transmission, vetor now indiates

More information

QUANTUM MECHANICS II PHYS 517. Solutions to Problem Set # 1

QUANTUM MECHANICS II PHYS 517. Solutions to Problem Set # 1 QUANTUM MECHANICS II PHYS 57 Solutions to Problem Set #. The hamiltonian for a lassial harmoni osillator an be written in many different forms, suh as use ω = k/m H = p m + kx H = P + Q hω a. Find a anonial

More information

A Queueing Model for Call Blending in Call Centers

A Queueing Model for Call Blending in Call Centers A Queueing Model for Call Blending in Call Centers Sandjai Bhulai and Ger Koole Vrije Universiteit Amsterdam Faulty of Sienes De Boelelaan 1081a 1081 HV Amsterdam The Netherlands E-mail: {sbhulai, koole}@s.vu.nl

More information

Next: Pushdown automata. Pushdown Automata. Informal Description PDA (1) Informal Description PDA (2) Formal Description PDA

Next: Pushdown automata. Pushdown Automata. Informal Description PDA (1) Informal Description PDA (2) Formal Description PDA CE 2001: Introdution to Theor of Computation ummer 2007 uprakash Datta datta@s.orku.a Net: Pushdown automata dd stak to definition of Finite utomata Can serve as tpe of memor or ounter More powerful than

More information

Viewing the Rings of a Tree: Minimum Distortion Embeddings into Trees

Viewing the Rings of a Tree: Minimum Distortion Embeddings into Trees Viewing the Rings of a Tree: Minimum Distortion Embeddings into Trees Amir Nayyeri Benjamin Raihel Abstrat We desribe a 1+ε) approximation algorithm for finding the minimum distortion embedding of an n-point

More information

arxiv: v2 [math.pr] 9 Dec 2016

arxiv: v2 [math.pr] 9 Dec 2016 Omnithermal Perfet Simulation for Multi-server Queues Stephen B. Connor 3th Deember 206 arxiv:60.0602v2 [math.pr] 9 De 206 Abstrat A number of perfet simulation algorithms for multi-server First Come First

More information

Modes are solutions, of Maxwell s equation applied to a specific device.

Modes are solutions, of Maxwell s equation applied to a specific device. Mirowave Integrated Ciruits Prof. Jayanta Mukherjee Department of Eletrial Engineering Indian Institute of Tehnology, Bombay Mod 01, Le 06 Mirowave omponents Welome to another module of this NPTEL mok

More information

Some facts you should know that would be convenient when evaluating a limit:

Some facts you should know that would be convenient when evaluating a limit: Some fats you should know that would be onvenient when evaluating a it: When evaluating a it of fration of two funtions, f(x) x a g(x) If f and g are both ontinuous inside an open interval that ontains

More information

Aharonov-Bohm effect. Dan Solomon.

Aharonov-Bohm effect. Dan Solomon. Aharonov-Bohm effet. Dan Solomon. In the figure the magneti field is onfined to a solenoid of radius r 0 and is direted in the z- diretion, out of the paper. The solenoid is surrounded by a barrier that

More information

Sensitivity Analysis in Markov Networks

Sensitivity Analysis in Markov Networks Sensitivity Analysis in Markov Networks Hei Chan and Adnan Darwihe Computer Siene Department University of California, Los Angeles Los Angeles, CA 90095 {hei,darwihe}@s.ula.edu Abstrat This paper explores

More information

A simple expression for radial distribution functions of pure fluids and mixtures

A simple expression for radial distribution functions of pure fluids and mixtures A simple expression for radial distribution funtions of pure fluids and mixtures Enrio Matteoli a) Istituto di Chimia Quantistia ed Energetia Moleolare, CNR, Via Risorgimento, 35, 56126 Pisa, Italy G.

More information

Chapter 3 Church-Turing Thesis. CS 341: Foundations of CS II

Chapter 3 Church-Turing Thesis. CS 341: Foundations of CS II CS 341: Foundations of CS II Marvin K. Nakayama Computer Siene Department New Jersey Institute of Tehnology Newark, NJ 07102 CS 341: Chapter 3 3-2 Contents Turing Mahines Turing-reognizable Turing-deidable

More information

LECTURE NOTES FOR , FALL 2004

LECTURE NOTES FOR , FALL 2004 LECTURE NOTES FOR 18.155, FALL 2004 83 12. Cone support and wavefront set In disussing the singular support of a tempered distibution above, notie that singsupp(u) = only implies that u C (R n ), not as

More information

Wavetech, LLC. Ultrafast Pulses and GVD. John O Hara Created: Dec. 6, 2013

Wavetech, LLC. Ultrafast Pulses and GVD. John O Hara Created: Dec. 6, 2013 Ultrafast Pulses and GVD John O Hara Created: De. 6, 3 Introdution This doument overs the basi onepts of group veloity dispersion (GVD) and ultrafast pulse propagation in an optial fiber. Neessarily, it

More information

arxiv: v1 [cs.cc] 27 Jul 2014

arxiv: v1 [cs.cc] 27 Jul 2014 DMVP: Foremost Waypoint Coverage of Time-Varying Graphs Eri Aaron 1, Danny Krizan 2, and Elliot Meyerson 2 arxiv:1407.7279v1 [s.cc] 27 Jul 2014 1 Computer Siene Department, Vassar College, Poughkeepsie,

More information

( ) ( ) Volumetric Properties of Pure Fluids, part 4. The generic cubic equation of state:

( ) ( ) Volumetric Properties of Pure Fluids, part 4. The generic cubic equation of state: CE304, Spring 2004 Leture 6 Volumetri roperties of ure Fluids, part 4 The generi ubi equation of state: There are many possible equations of state (and many have been proposed) that have the same general

More information

Likelihood-confidence intervals for quantiles in Extreme Value Distributions

Likelihood-confidence intervals for quantiles in Extreme Value Distributions Likelihood-onfidene intervals for quantiles in Extreme Value Distributions A. Bolívar, E. Díaz-Franés, J. Ortega, and E. Vilhis. Centro de Investigaión en Matemátias; A.P. 42, Guanajuato, Gto. 36; Méxio

More information

Danielle Maddix AA238 Final Project December 9, 2016

Danielle Maddix AA238 Final Project December 9, 2016 Struture and Parameter Learning in Bayesian Networks with Appliations to Prediting Breast Caner Tumor Malignany in a Lower Dimension Feature Spae Danielle Maddix AA238 Final Projet Deember 9, 2016 Abstrat

More information

The coefficients a and b are expressed in terms of three other parameters. b = exp

The coefficients a and b are expressed in terms of three other parameters. b = exp T73S04 Session 34: elaxation & Elasti Follow-Up Last Update: 5/4/2015 elates to Knowledge & Skills items 1.22, 1.28, 1.29, 1.30, 1.31 Evaluation of relaxation: integration of forward reep and limitations

More information

Product Policy in Markets with Word-of-Mouth Communication. Technical Appendix

Product Policy in Markets with Word-of-Mouth Communication. Technical Appendix rodut oliy in Markets with Word-of-Mouth Communiation Tehnial Appendix August 05 Miro-Model for Inreasing Awareness In the paper, we make the assumption that awareness is inreasing in ustomer type. I.e.,

More information

arxiv:math/ v1 [math.ca] 27 Nov 2003

arxiv:math/ v1 [math.ca] 27 Nov 2003 arxiv:math/011510v1 [math.ca] 27 Nov 200 Counting Integral Lamé Equations by Means of Dessins d Enfants Sander Dahmen November 27, 200 Abstrat We obtain an expliit formula for the number of Lamé equations

More information

SURFACE WAVES OF NON-RAYLEIGH TYPE

SURFACE WAVES OF NON-RAYLEIGH TYPE SURFACE WAVES OF NON-RAYLEIGH TYPE by SERGEY V. KUZNETSOV Institute for Problems in Mehanis Prosp. Vernadskogo, 0, Mosow, 75 Russia e-mail: sv@kuznetsov.msk.ru Abstrat. Existene of surfae waves of non-rayleigh

More information

Concerning the Numbers 22p + 1, p Prime

Concerning the Numbers 22p + 1, p Prime Conerning the Numbers 22p + 1, p Prime By John Brillhart 1. Introdution. In a reent investigation [7] the problem of fatoring numbers of the form 22p + 1, p a, was enountered. Sine 22p + 1 = (2P - 2*

More information

An I-Vector Backend for Speaker Verification

An I-Vector Backend for Speaker Verification An I-Vetor Bakend for Speaker Verifiation Patrik Kenny, 1 Themos Stafylakis, 1 Jahangir Alam, 1 and Marel Kokmann 2 1 CRIM, Canada, {patrik.kenny, themos.stafylakis, jahangir.alam}@rim.a 2 VoieTrust, Canada,

More information

Convergence of reinforcement learning with general function approximators

Convergence of reinforcement learning with general function approximators Convergene of reinforement learning with general funtion approximators assilis A. Papavassiliou and Stuart Russell Computer Siene Division, U. of California, Berkeley, CA 94720-1776 fvassilis,russellg@s.berkeley.edu

More information

COMPARISON OF GEOMETRIC FIGURES

COMPARISON OF GEOMETRIC FIGURES COMPARISON OF GEOMETRIC FIGURES Spyros Glenis M.Ed University of Athens, Department of Mathematis, e-mail spyros_glenis@sh.gr Introdution the figures: In Eulid, the geometri equality is based on the apability

More information

Ordered fields and the ultrafilter theorem

Ordered fields and the ultrafilter theorem F U N D A M E N T A MATHEMATICAE 59 (999) Ordered fields and the ultrafilter theorem by R. B e r r (Dortmund), F. D e l o n (Paris) and J. S h m i d (Dortmund) Abstrat. We prove that on the basis of ZF

More information

Millennium Relativity Acceleration Composition. The Relativistic Relationship between Acceleration and Uniform Motion

Millennium Relativity Acceleration Composition. The Relativistic Relationship between Acceleration and Uniform Motion Millennium Relativity Aeleration Composition he Relativisti Relationship between Aeleration and niform Motion Copyright 003 Joseph A. Rybzyk Abstrat he relativisti priniples developed throughout the six

More information

The Concept of Mass as Interfering Photons, and the Originating Mechanism of Gravitation D.T. Froedge

The Concept of Mass as Interfering Photons, and the Originating Mechanism of Gravitation D.T. Froedge The Conept of Mass as Interfering Photons, and the Originating Mehanism of Gravitation D.T. Froedge V04 Formerly Auburn University Phys-dtfroedge@glasgow-ky.om Abstrat For most purposes in physis the onept

More information

Reliability Guaranteed Energy-Aware Frame-Based Task Set Execution Strategy for Hard Real-Time Systems

Reliability Guaranteed Energy-Aware Frame-Based Task Set Execution Strategy for Hard Real-Time Systems Reliability Guaranteed Energy-Aware Frame-Based ask Set Exeution Strategy for Hard Real-ime Systems Zheng Li a, Li Wang a, Shuhui Li a, Shangping Ren a, Gang Quan b a Illinois Institute of ehnology, Chiago,

More information

Model-based mixture discriminant analysis an experimental study

Model-based mixture discriminant analysis an experimental study Model-based mixture disriminant analysis an experimental study Zohar Halbe and Mayer Aladjem Department of Eletrial and Computer Engineering, Ben-Gurion University of the Negev P.O.Box 653, Beer-Sheva,

More information

Cryptography, winter term 16/17: Sample solution to assignment 2

Cryptography, winter term 16/17: Sample solution to assignment 2 U N S A R I V E R S A V I E I T A S N I S S Cryptography, winter term 6/7: Sample solution to assignment Cornelius Brand, Mar Roth Exerise. (Messing up the one-time pad) Consider the following modifiation

More information

Chapter 2 Linear Elastic Fracture Mechanics

Chapter 2 Linear Elastic Fracture Mechanics Chapter 2 Linear Elasti Frature Mehanis 2.1 Introdution Beginning with the fabriation of stone-age axes, instint and experiene about the strength of various materials (as well as appearane, ost, availability

More information

I F I G R e s e a r c h R e p o r t. Minimal and Hyper-Minimal Biautomata. IFIG Research Report 1401 March Institut für Informatik

I F I G R e s e a r c h R e p o r t. Minimal and Hyper-Minimal Biautomata. IFIG Research Report 1401 March Institut für Informatik I F I G R e s e a r h R e p o r t Institut für Informatik Minimal and Hyper-Minimal Biautomata Markus Holzer Seastian Jakoi IFIG Researh Report 1401 Marh 2014 Institut für Informatik JLU Gießen Arndtstraße

More information

A Characterization of Wavelet Convergence in Sobolev Spaces

A Characterization of Wavelet Convergence in Sobolev Spaces A Charaterization of Wavelet Convergene in Sobolev Spaes Mark A. Kon 1 oston University Louise Arakelian Raphael Howard University Dediated to Prof. Robert Carroll on the oasion of his 70th birthday. Abstrat

More information

Lecture 7: Sampling/Projections for Least-squares Approximation, Cont. 7 Sampling/Projections for Least-squares Approximation, Cont.

Lecture 7: Sampling/Projections for Least-squares Approximation, Cont. 7 Sampling/Projections for Least-squares Approximation, Cont. Stat60/CS94: Randomized Algorithms for Matries and Data Leture 7-09/5/013 Leture 7: Sampling/Projetions for Least-squares Approximation, Cont. Leturer: Mihael Mahoney Sribe: Mihael Mahoney Warning: these

More information

Frugality Ratios And Improved Truthful Mechanisms for Vertex Cover

Frugality Ratios And Improved Truthful Mechanisms for Vertex Cover Frugality Ratios And Improved Truthful Mehanisms for Vertex Cover Edith Elkind Hebrew University of Jerusalem, Israel, and University of Southampton, Southampton, SO17 1BJ, U.K. Leslie Ann Goldberg University

More information

On Component Order Edge Reliability and the Existence of Uniformly Most Reliable Unicycles

On Component Order Edge Reliability and the Existence of Uniformly Most Reliable Unicycles Daniel Gross, Lakshmi Iswara, L. William Kazmierzak, Kristi Luttrell, John T. Saoman, Charles Suffel On Component Order Edge Reliability and the Existene of Uniformly Most Reliable Uniyles DANIEL GROSS

More information

MAC Calculus II Summer All you need to know on partial fractions and more

MAC Calculus II Summer All you need to know on partial fractions and more MC -75-Calulus II Summer 00 ll you need to know on partial frations and more What are partial frations? following forms:.... where, α are onstants. Partial frations are frations of one of the + α, ( +

More information

A Functional Representation of Fuzzy Preferences

A Functional Representation of Fuzzy Preferences Theoretial Eonomis Letters, 017, 7, 13- http://wwwsirporg/journal/tel ISSN Online: 16-086 ISSN Print: 16-078 A Funtional Representation of Fuzzy Preferenes Susheng Wang Department of Eonomis, Hong Kong

More information

DIGITAL DISTANCE RELAYING SCHEME FOR PARALLEL TRANSMISSION LINES DURING INTER-CIRCUIT FAULTS

DIGITAL DISTANCE RELAYING SCHEME FOR PARALLEL TRANSMISSION LINES DURING INTER-CIRCUIT FAULTS CHAPTER 4 DIGITAL DISTANCE RELAYING SCHEME FOR PARALLEL TRANSMISSION LINES DURING INTER-CIRCUIT FAULTS 4.1 INTRODUCTION Around the world, environmental and ost onsiousness are foring utilities to install

More information

Lecture 3 - Lorentz Transformations

Lecture 3 - Lorentz Transformations Leture - Lorentz Transformations A Puzzle... Example A ruler is positioned perpendiular to a wall. A stik of length L flies by at speed v. It travels in front of the ruler, so that it obsures part of the

More information

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. This doument is downloaded from DR-NTU, Nanyang Tehnologial University Library, Singapore. Title Extrating Threshold Coneptual Strutures from Web Douments Author(s) Ciobanu, Gabriel; Horne, Ross; Vaideanu,

More information

IMPEDANCE EFFECTS OF LEFT TURNERS FROM THE MAJOR STREET AT A TWSC INTERSECTION

IMPEDANCE EFFECTS OF LEFT TURNERS FROM THE MAJOR STREET AT A TWSC INTERSECTION 09-1289 Citation: Brilon, W. (2009): Impedane Effets of Left Turners from the Major Street at A TWSC Intersetion. Transportation Researh Reord Nr. 2130, pp. 2-8 IMPEDANCE EFFECTS OF LEFT TURNERS FROM THE

More information

Some Properties on Nano Topology Induced by Graphs

Some Properties on Nano Topology Induced by Graphs AASCIT Journal of anosiene 2017; 3(4): 19-23 http://wwwaasitorg/journal/nanosiene ISS: 2381-1234 (Print); ISS: 2381-1242 (Online) Some Properties on ano Topology Indued by Graphs Arafa asef 1 Abd El Fattah

More information

arxiv:math/ v4 [math.ca] 29 Jul 2006

arxiv:math/ v4 [math.ca] 29 Jul 2006 arxiv:math/0109v4 [math.ca] 9 Jul 006 Contiguous relations of hypergeometri series Raimundas Vidūnas University of Amsterdam Abstrat The 15 Gauss ontiguous relations for F 1 hypergeometri series imply

More information

Lecture 18: Identification Schemes, Schnorr Signatures

Lecture 18: Identification Schemes, Schnorr Signatures CS 7880 Graduate Cryptography November 8, 2017 Leture 18: Identifiation Shemes, Shnorr Signatures Leturer: Daniel Wihs Sribe: Vikrant Singhal 1 Topi Covered Identifiation Shemes Shnorr Identifiation Sheme

More information

Moments and Wavelets in Signal Estimation

Moments and Wavelets in Signal Estimation Moments and Wavelets in Signal Estimation Edward J. Wegman 1 Center for Computational Statistis George Mason University Hung T. Le 2 International usiness Mahines Abstrat: The problem of generalized nonparametri

More information

G /G Advanced Cryptography 10/21/2009. Lecture 7

G /G Advanced Cryptography 10/21/2009. Lecture 7 G22.3220-001/G63.2180 Advaned Cryptography 10/21/2009 Leturer: Yevgeniy Dodis Leture 7 Sribe: Aris Tentes In this leture we will over the following topis: Witness Hiding Σ-protools Alternative Constrution

More information

Sensor management for PRF selection in the track-before-detect context

Sensor management for PRF selection in the track-before-detect context Sensor management for PRF seletion in the tra-before-detet ontext Fotios Katsilieris, Yvo Boers, and Hans Driessen Thales Nederland B.V. Haasbergerstraat 49, 7554 PA Hengelo, the Netherlands Email: {Fotios.Katsilieris,

More information

Coding for Random Projections and Approximate Near Neighbor Search

Coding for Random Projections and Approximate Near Neighbor Search Coding for Random Projetions and Approximate Near Neighbor Searh Ping Li Department of Statistis & Biostatistis Department of Computer Siene Rutgers University Pisataay, NJ 8854, USA pingli@stat.rutgers.edu

More information

Metric of Universe The Causes of Red Shift.

Metric of Universe The Causes of Red Shift. Metri of Universe The Causes of Red Shift. ELKIN IGOR. ielkin@yande.ru Annotation Poinare and Einstein supposed that it is pratially impossible to determine one-way speed of light, that s why speed of

More information

Q2. [40 points] Bishop-Hill Model: Calculation of Taylor Factors for Multiple Slip

Q2. [40 points] Bishop-Hill Model: Calculation of Taylor Factors for Multiple Slip 27-750, A.D. Rollett Due: 20 th Ot., 2011. Homework 5, Volume Frations, Single and Multiple Slip Crystal Plastiity Note the 2 extra redit questions (at the end). Q1. [40 points] Single Slip: Calulating

More information

Robust Recovery of Signals From a Structured Union of Subspaces

Robust Recovery of Signals From a Structured Union of Subspaces Robust Reovery of Signals From a Strutured Union of Subspaes 1 Yonina C. Eldar, Senior Member, IEEE and Moshe Mishali, Student Member, IEEE arxiv:87.4581v2 [nlin.cg] 3 Mar 29 Abstrat Traditional sampling

More information

A Spatiotemporal Approach to Passive Sound Source Localization

A Spatiotemporal Approach to Passive Sound Source Localization A Spatiotemporal Approah Passive Sound Soure Loalization Pasi Pertilä, Mikko Parviainen, Teemu Korhonen and Ari Visa Institute of Signal Proessing Tampere University of Tehnology, P.O.Box 553, FIN-330,

More information

On the density of languages representing finite set partitions

On the density of languages representing finite set partitions On the density of languages representing finite set partitions Nelma Moreira Rogério Reis Tehnial Report Series: DCC-04-07 Departamento de Ciênia de Computadores Fauldade de Ciênias & Laboratório de Inteligênia

More information

Combined Electric and Magnetic Dipoles for Mesoband Radiation, Part 2

Combined Electric and Magnetic Dipoles for Mesoband Radiation, Part 2 Sensor and Simulation Notes Note 53 3 May 8 Combined Eletri and Magneti Dipoles for Mesoband Radiation, Part Carl E. Baum University of New Mexio Department of Eletrial and Computer Engineering Albuquerque

More information

Structural Reconfiguration of Systems under Behavioral Adaptation

Structural Reconfiguration of Systems under Behavioral Adaptation Strutural Reonfiguration of Systems under Behavioral Adaptation Carlos Canal a, Javier Cámara b, Gwen Salaün a Department of Computer Siene, University of Málaga, Spain b Department of Informatis Engineering,

More information

Counting Idempotent Relations

Counting Idempotent Relations Counting Idempotent Relations Beriht-Nr. 2008-15 Florian Kammüller ISSN 1436-9915 2 Abstrat This artile introdues and motivates idempotent relations. It summarizes haraterizations of idempotents and their

More information

Fair Integrated Scheduling of Soft Real-time Tardiness Classes on Multiprocessors

Fair Integrated Scheduling of Soft Real-time Tardiness Classes on Multiprocessors Fair Integrated Sheduling of Soft Real-time Tardiness Classes on Multiproessors UmaMaheswari C. Devi and James H. Anderson Department of Computer Siene, The University of North Carolina, Chapel Hill, NC

More information

Vector Field Theory (E&M)

Vector Field Theory (E&M) Physis 4 Leture 2 Vetor Field Theory (E&M) Leture 2 Physis 4 Classial Mehanis II Otober 22nd, 2007 We now move from first-order salar field Lagrange densities to the equivalent form for a vetor field.

More information

arxiv:physics/ v1 [physics.class-ph] 8 Aug 2003

arxiv:physics/ v1 [physics.class-ph] 8 Aug 2003 arxiv:physis/0308036v1 [physis.lass-ph] 8 Aug 003 On the meaning of Lorentz ovariane Lszl E. Szab Theoretial Physis Researh Group of the Hungarian Aademy of Sienes Department of History and Philosophy

More information

Pushdown Specifications

Pushdown Specifications Orna Kupferman Hebrew University Pushdown Speifiations Nir Piterman Weizmann Institute of Siene une 9, 2002 Moshe Y Vardi Rie University Abstrat Traditionally, model heking is applied to finite-state systems

More information

Failure Assessment Diagram Analysis of Creep Crack Initiation in 316H Stainless Steel

Failure Assessment Diagram Analysis of Creep Crack Initiation in 316H Stainless Steel Failure Assessment Diagram Analysis of Creep Crak Initiation in 316H Stainless Steel C. M. Davies *, N. P. O Dowd, D. W. Dean, K. M. Nikbin, R. A. Ainsworth Department of Mehanial Engineering, Imperial

More information

Gog and GOGAm pentagons

Gog and GOGAm pentagons Gog and GOGAm pentagons Philippe Biane, Hayat Cheballah To ite this version: Philippe Biane, Hayat Cheballah. Gog and GOGAm pentagons. Journal of Combinatorial Theory, Series A, Elsevier, 06, .

More information

Physics 523, General Relativity Homework 4 Due Wednesday, 25 th October 2006

Physics 523, General Relativity Homework 4 Due Wednesday, 25 th October 2006 Physis 523, General Relativity Homework 4 Due Wednesday, 25 th Otober 2006 Jaob Lewis Bourjaily Problem Reall that the worldline of a ontinuously aelerated observer in flat spae relative to some inertial

More information

Einstein s Three Mistakes in Special Relativity Revealed. Copyright Joseph A. Rybczyk

Einstein s Three Mistakes in Special Relativity Revealed. Copyright Joseph A. Rybczyk Einstein s Three Mistakes in Speial Relativity Revealed Copyright Joseph A. Rybzyk Abstrat When the evidene supported priniples of eletromagneti propagation are properly applied, the derived theory is

More information

Jan Van den Bussche. Departement WNI, Limburgs Universitair Centrum (LUC), Universitaire Campus, B-3590 Diepenbeek, Belgium

Jan Van den Bussche. Departement WNI, Limburgs Universitair Centrum (LUC), Universitaire Campus, B-3590 Diepenbeek, Belgium Theoretial Computer Siene 254 (2001) 363 377 www.elsevier.om/loate/ts Simulation of the nested relational algera y the at relational algera, with an appliation to the omplexity of evaluating powerset algera

More information

ONLINE APPENDICES for Cost-Effective Quality Assurance in Crowd Labeling

ONLINE APPENDICES for Cost-Effective Quality Assurance in Crowd Labeling ONLINE APPENDICES for Cost-Effetive Quality Assurane in Crowd Labeling Jing Wang Shool of Business and Management Hong Kong University of Siene and Tehnology Clear Water Bay Kowloon Hong Kong jwang@usthk

More information

Final Review. A Puzzle... Special Relativity. Direction of the Force. Moving at the Speed of Light

Final Review. A Puzzle... Special Relativity. Direction of the Force. Moving at the Speed of Light Final Review A Puzzle... Diretion of the Fore A point harge q is loated a fixed height h above an infinite horizontal onduting plane. Another point harge q is loated a height z (with z > h) above the plane.

More information