An Introduction To Range Searching

Size: px
Start display at page:

Download "An Introduction To Range Searching"

Transcription

1 An Introduction To Range Searching Jan Vahrenhold eartment of Comuter Science Westfälische Wilhelms-Universität Münster, Germany. Overview 1. Introduction: Problem Statement, Lower Bounds 2. Range Searching in 1 and 1.5 imensions 3. Range Searching in 2 imensions 4. Summary and Outlook Jan Vahrenhold Range Searching 1

2 Problem Setting Given: Collection S of n oints in d dimensions (S IR d ). Wanted: Algorithm for efficiently reorting all k oints in S falling into a given axis-arallel query range IR d. Alications: Geograhic Information Systems; atabases having relations in which the keys can be totally ordered. Gehalt Mayer Maier Eintrittsdatum Meier 1985 Ma Me Name Jan Vahrenhold Range Searching 2 A First Aroach Assume that S = { 0,..., n 1 } is stored in an array. Scan though the array and test for each i whether i Need to scan the whole array, regardless of how many oints are reorted. Comlexity: Θ (n) time and sace. Jan Vahrenhold Range Searching 3

3 Lower (and Uer) Bounds Change the model to also include k (the number of oints reorted) as a arameter. Algorithm on revious slide has comlexity O (n + k) = O (n). Time comlexity: rerocessing time query time Can disregard rerocessing time for many alications (one-time oeration). Query time comosed of two comonents: Search time: Time to locate the first element to be reorted. Retrieval time: Time to fetch and reort all k elements to be reorted. Sace requirement (lower bound for rerocessing time). Jan Vahrenhold Range Searching 4 Lower Bounds [Bentley & Maurer, 1980] Parameters: n oints, k oints reorted, d dimensions. Sace requirement: Ω (n). Retrieval time: Ω (k). Search time: Using binary decision tree ( sorting lower bound). Lower bound construction: (n =) 2ad oints, each with exactly one unique non-zero integer coordinate taken from [ a, a] \ {0}. = [b 1,..., b d ] [c 1,..., c d ], with b i [ a, 1], c i [1, a], 1 i d. Query ranges not-emty, each roduces a different answer. Overall: a 2d = (n/(2d)) 2d different answers. ( eth of decision tree: Ω log (n/(2d)) 2d) = Ω (d log n). Lower bound not tight for all d. Jan Vahrenhold Range Searching 5

4 Overview 1. Introduction: Problem Statement, Lower Bounds 2. Range Searching in 1 and 1.5 imensions 3. Range Searching in 2 imensions 4. Summary and Outlook Jan Vahrenhold Range Searching 6 One-imensional Range Searching Point set S = { 0,..., n 1 } IR, stored in an array. Query range = [x 1, x 2 ]. Scanning is sub-otimal; lower bound: Ω(1 log 2 n + k). Prerocessing: Sort the oints, e.g., using heasort in O (n log 2 n) time Query: Binary search for smallest i x 1... O (log 2 n)... scan forward until first i < x 2 (or end of array). O (k + 1) Jan Vahrenhold Range Searching 7

5 oes Sorting Hel in Two imensions? There is no total order on oints in two dimensions sorting according to which guarantees Θ (2 log 2 n + k) query time for range searching. Jan Vahrenhold Range Searching 8 Reca: One-imensional Range Searching Key ingredient: binary search (bisection). Relace (sorted) array by binary search tree Time Comlexity: Prerocessing time: O (n log n) Query time: O (log n + k) Sace Comlexity: O (n). Inserts/eletes ossible Jan Vahrenhold Range Searching 9

6 Three-sided (1.5-dim.) Range Searching Given: Point set S = { 0,..., n 1 } IR 2, stored in an array. Wanted: Method to efficiently retrieve all S that, for given (x 1, x 2, y), fall into [x 1, x 2 ] ], y]. Look at two subroblems: Reort all oints in [x 1, x 2 ] IR using, e.g., a threaded binary search tree. Reort all oints in IR ], y] using, e.g., a hea: Almost comlete binary tree. key(v) min{key(lson(v)), key(rson(v))} Jan Vahrenhold Range Searching 10 Combining the best of both worlds(?) Binary search tree with hea roerty: Binary search tree unique w.r.t. inorder -traversal. No (direct) way of incororating hea roerty. Hea with search tree roerty: Hea not unique. More recisely: Children of a node may be switched. Priority Search Tree: Binary tree H storing a two-dimensional oint at each node s.t. the hea roerty w.r.t. the y-coordinates is fulfilled. Additional requirement: v H : x v IR : l x v < r l LSUBTREE(v), r RSUBTREE(v). Jan Vahrenhold Range Searching 11

7 Building a riority search tree Use recursive definition [McCreight, 1985]: Build riority search tree H(S) for a given set S of oints in the lane. Assume w.l.o.g. that all coordinates are airwise distinct. If S =, construct H(S) as an (emty) leaf. Else let min be the oint in S having the minimum y-coordinate. Let x mid be the median of the x-coordinates in S \ { min }. Partition S \ { min }: S left := { S \ { min }.x x mid } S right := { S \ { min }.x > x mid } Construct search tree node v storing x mid and set (v) := min. Recursively comute v s children H(S left ) and H(S right ). Comlexity: O (n) sace; O (n log n) time (why?). Jan Vahrenhold Range Searching 12 Querying a riority search tree Query range [x 1, x 2 ] [, y]: Queries for x 1 and x 2 result in two search aths in H. Check all oints on these aths. All subtrees embraced by these aths contain oints in [x 1, x 2 ] IR. Query these subtrees a follows: x 1 x 2 SearchInSubtree(v, y) if v not a leaf and (v).y y then Reort (v); SearchInSubtree(LSON(v), y); SearchInSubtree(RSON(v), y); Query time: O (1 + k v ). Examle for y = 5. Jan Vahrenhold Range Searching 13

8 Summary Missing Comonents: A more detailed descrition of the query algorithm. Proof of correctness. [de Berg et al., 2000] Theorem 2.1 Priority search trees allow for answering three-sided range queries on oints in IR 2 with time and sace comlexities as follows: Prerocessing time: Θ (n log n) Query time: O (log n + k) Sace requirement: Θ (n) Jan Vahrenhold Range Searching 14 Overview 1. Introduction: Problem Statement, Lower Bounds 2. Range Searching in 1 and 1.5 imensions 3. Range Searching in 2 imensions 4. Summary and Outlook Jan Vahrenhold Range Searching 15

9 Multidimensional Binary Search Tree Extend the concet of binary search by bisection to higher dimensions. Instead of intervals, artition (hyer-)rectangles; do the artitioning alternating arallel to the coordinate axes. R i is artitioned into R j and R k R j R k 1 2 R i. Structure corresonding to artitioning: balanced binary tree (k-tree [Bentley, 1975]). Node v corresonds to hyerrectangle R(v), R(root) = IR d ; children corresond to sub-hyerrectangles. Each node v is augmented to store: S(v): oints contained in R(v) (imlicitly). l(v): reresentation of slit axis. P (v): median of S(v) w.r.t. l(v). Jan Vahrenhold Range Searching 16 Examle Alternating artitioning along the coordinate axes. Jan Vahrenhold Range Searching 17

10 Querying a 2-tree void search(node v, rectangle, list oint & result) double left, median, right; if v.tye == vertical then left =.x1; right =.x2; median = v.p.x; else left =.y1; right =.y2; median = v.p.y; if left median right and.contains(v.p) then result.aend(v.p); if!isleaf(v) then if left < median then search(leftson(v),, result); if median < right then search(rightson(v),, result); return; Jan Vahrenhold Range Searching 18 Comlexity of a 2-tree Sace requirement: R(v) = P (v) R(q) for any descendant q of v. O (1) sace requirement er node, exactly one oint stored at each node O (n) overall sace requirement. Construction time (rerocessing): Linear-time median finding er artitioning ste, i.e., recurrence: T (n) = 2 T ( n/2 ) + O (n) O (n log n) Alternative: Relace median-finding by re-sorting (coies of) the oint by their x- and y-coordinates, resectively. Can find median w.r.t. x-coordinate in O (1) time. Can construct sorted y-arrays to be assed to the children in linear time. Jan Vahrenhold Range Searching 19

11 Analysis of worst-case query time Query time roortional to number of nodes visited. v roductive P (v). Nodes visited: roductive and unroductive nodes. efinition 3.1 Let R(v) be a rectangle and let 0 i 4. and R(v) form a tyei situation i sides of R(v) intersect the interior of. R(v) R(v) R(v) R(v) Tye 0 Tye 1 Tye 2 R(v) Tye 3 Tye 4 Tye-4 situation always roductive, all other situations may be unroductive. Jan Vahrenhold Range Searching 20 Constructing a worst-case situation I Use self-relicating tye-2/tye-3 situations [Lee & Wong, 1977]. A E B C B Y A G H F I C E F G Y H I T (h-2) T(h-2) T (h-3) h Recurrence for worst-case query time: T (h) = }{{} 1 + }{{} 1 + }{{} 1 + T (h 2) + T (h 2) + }{{}}{{}}{{} 1 A B C G F + T (h 3) }{{} H Jan Vahrenhold Range Searching 21

12 Constructing a worst-case situation II A closer look at situation subtree rooted at node. E B Y A G H F I C T (h-2) T (h-2) Y h Recurrence for this situation: T (h) = }{{} 1 + }{{} 1 + }{{} 1 Y + 2 T (h 2) }{{} Children of and Y Jan Vahrenhold Range Searching 22 Constructing a worst-case situation III The following recurrence holds for T (h): Y T (h) = 2 T (h 2) + 3 h with T (0) = 0 and T (1) = 1. T (h-2) T (h-2) Solve recurrence for T (h), w.l.o.g. h = 2 i, i IN. T ( 2 i ) = T ( 2(i 1) ) = ( T ( 2(i 2) )) = i 1 j=0 Similarly: T (2 i + 1) = 4 2 i j = 3 2 i 3 Jan Vahrenhold Range Searching 23

13 Constructing a worst-case situation IV The following recurrence holds for T (h): T (h) = T (h 2) + T (h 2) + T (h 3) + 4 T (h) = 4 2 i 3 for h = 2 i i 3 for h = 2 i with T (0) = T (0) = 0 and T (1) = T (1) = 1. A B C E F G Y H I T (h-2) T(h-2) T (h-3) h Solve recurrence for T (h), w.l.o.g. h = 2 i, i IN. T ( 2 i ) = 4 + T ( 2(i 1) ) i i 2 3 = T ( 2(i 1) ) i 1 2 = 5 (2 h/2 1 ) h Similarly: T (2 i + 1) = 7 (2 h/2 1 ) h + 2. Overall (for n 2 h 1): T (n) O ( 2 n 1/2). Jan Vahrenhold Range Searching 24 Summary Worst-case query time indeendent of the number of oints reorted. k-tree very relevant in ractice! Extension to higher dimensions (oints in IR d ): o artitioning in a round-robin manner of the coordinate axes x 1 x 2... x d x 1... Theorem 3.2 Multidimensional search trees (k-trees) allow for answering foursided range queries on oints in IR d, d 2 with time and sace comlexities as follows: Prerocessing time: Θ (d n log n) Query time: O ( d n 1 1/d + k ) Sace requirement: Θ (n) Jan Vahrenhold Range Searching 25

14 Overview 1. Introduction: Problem Statement, Lower Bounds 2. Range Searching in 1 and 1.5 imensions 3. Range Searching in 2 imensions 4. Summary and Outlook Jan Vahrenhold Range Searching 26 Summary Lower bounds: Ω (d log 2 n + k) time, Ω (n) sace. Results: One dimension: otimal O (log 2 n + k) algorithm, Θ (n) sace. 1.5 dimensions: otimal O (log 2 n + k) algorithm, Θ (n) sace. Two dimensions: sub-otimal O ( n + k ) algorithm, Θ (n) sace. d dimensions: sub-otimal O ( n 1 1/d + k ) algorithm, Θ (n) sace. Outlook: Otimal query time ossible of one is willing to send suerlinear sace [Chazelle, 1990]. Beware: choosing the adequate model of comutation is crucial. Jan Vahrenhold Range Searching 27

15 Bibliograhy [Bentley & Maurer, 1980] J. L. Bentley and H. A. Maurer. Efficient worst-case data structures for range searching. Acta Informatica, 13: , [Bentley, 1975] J. L. Bentley. Multidimensional binary search trees used for associative searching. Communications of the ACM, 18(9): , Setember [Chazelle, 1990] B. M. Chazelle. Lower bounds for orthogonal range searching. I: The reorting case. Journal of the ACM, 37(2): , Aril [de Berg et al., 2000] M. de Berg, M. J. van Kreveld, M. H. Overmars, and O. Schwarzkof. Comutational Geometry: Algorithms and Alications. Sringer, Berlin, second edition, [Lee & Wong, 1977].-T. Lee and C. K. Wong. Worst-case analysis for region and artial region searches in multidimensional binary search trees and balanced quad trees. Acta Informatica, 9:23 29, [McCreight, 1985] E. M. McCreight. Priority search trees. SIAM Journal on Comuting, 14(2): , May 1985.

16. Binary Search Trees

16. Binary Search Trees Dictionary imlementation 16. Binary Search Trees [Ottman/Widmayer, Ka..1, Cormen et al, Ka. 1.1-1.] Hashing: imlementation of dictionaries with exected very fast access times. Disadvantages of hashing:

More information

16. Binary Search Trees

16. Binary Search Trees Dictionary imlementation 16. Binary Search Trees [Ottman/Widmayer, Ka..1, Cormen et al, Ka. 12.1-12.] Hashing: imlementation of dictionaries with exected very fast access times. Disadvantages of hashing:

More information

On the Chvatál-Complexity of Knapsack Problems

On the Chvatál-Complexity of Knapsack Problems R u t c o r Research R e o r t On the Chvatál-Comlexity of Knasack Problems Gergely Kovács a Béla Vizvári b RRR 5-08, October 008 RUTCOR Rutgers Center for Oerations Research Rutgers University 640 Bartholomew

More information

Approximating min-max k-clustering

Approximating min-max k-clustering Aroximating min-max k-clustering Asaf Levin July 24, 2007 Abstract We consider the roblems of set artitioning into k clusters with minimum total cost and minimum of the maximum cost of a cluster. The cost

More information

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Technical Sciences and Alied Mathematics MODELING THE RELIABILITY OF CISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Cezar VASILESCU Regional Deartment of Defense Resources Management

More information

Combinatorics of topmost discs of multi-peg Tower of Hanoi problem

Combinatorics of topmost discs of multi-peg Tower of Hanoi problem Combinatorics of tomost discs of multi-eg Tower of Hanoi roblem Sandi Klavžar Deartment of Mathematics, PEF, Unversity of Maribor Koroška cesta 160, 000 Maribor, Slovenia Uroš Milutinović Deartment of

More information

GIVEN an input sequence x 0,..., x n 1 and the

GIVEN an input sequence x 0,..., x n 1 and the 1 Running Max/Min Filters using 1 + o(1) Comarisons er Samle Hao Yuan, Member, IEEE, and Mikhail J. Atallah, Fellow, IEEE Abstract A running max (or min) filter asks for the maximum or (minimum) elements

More information

where x i is the ith coordinate of x R N. 1. Show that the following upper bound holds for the growth function of H:

where x i is the ith coordinate of x R N. 1. Show that the following upper bound holds for the growth function of H: Mehryar Mohri Foundations of Machine Learning Courant Institute of Mathematical Sciences Homework assignment 2 October 25, 2017 Due: November 08, 2017 A. Growth function Growth function of stum functions.

More information

4. Score normalization technical details We now discuss the technical details of the score normalization method.

4. Score normalization technical details We now discuss the technical details of the score normalization method. SMT SCORING SYSTEM This document describes the scoring system for the Stanford Math Tournament We begin by giving an overview of the changes to scoring and a non-technical descrition of the scoring rules

More information

Parallelism and Locality in Priority Queues. A. Ranade S. Cheng E. Deprit J. Jones S. Shih. University of California. Berkeley, CA 94720

Parallelism and Locality in Priority Queues. A. Ranade S. Cheng E. Deprit J. Jones S. Shih. University of California. Berkeley, CA 94720 Parallelism and Locality in Priority Queues A. Ranade S. Cheng E. Derit J. Jones S. Shih Comuter Science Division University of California Berkeley, CA 94720 Abstract We exlore two ways of incororating

More information

1 1 c (a) 1 (b) 1 Figure 1: (a) First ath followed by salesman in the stris method. (b) Alternative ath. 4. D = distance travelled closing the loo. Th

1 1 c (a) 1 (b) 1 Figure 1: (a) First ath followed by salesman in the stris method. (b) Alternative ath. 4. D = distance travelled closing the loo. Th 18.415/6.854 Advanced Algorithms ovember 7, 1996 Euclidean TSP (art I) Lecturer: Michel X. Goemans MIT These notes are based on scribe notes by Marios Paaefthymiou and Mike Klugerman. 1 Euclidean TSP Consider

More information

Model checking, verification of CTL. One must verify or expel... doubts, and convert them into the certainty of YES [Thomas Carlyle]

Model checking, verification of CTL. One must verify or expel... doubts, and convert them into the certainty of YES [Thomas Carlyle] Chater 5 Model checking, verification of CTL One must verify or exel... doubts, and convert them into the certainty of YES or NO. [Thomas Carlyle] 5. The verification setting Page 66 We introduce linear

More information

Best approximation by linear combinations of characteristic functions of half-spaces

Best approximation by linear combinations of characteristic functions of half-spaces Best aroximation by linear combinations of characteristic functions of half-saces Paul C. Kainen Deartment of Mathematics Georgetown University Washington, D.C. 20057-1233, USA Věra Kůrková Institute of

More information

Topic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar

Topic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar 15-859(M): Randomized Algorithms Lecturer: Anuam Guta Toic: Lower Bounds on Randomized Algorithms Date: Setember 22, 2004 Scribe: Srinath Sridhar 4.1 Introduction In this lecture, we will first consider

More information

Finding Shortest Hamiltonian Path is in P. Abstract

Finding Shortest Hamiltonian Path is in P. Abstract Finding Shortest Hamiltonian Path is in P Dhananay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune, India bstract The roblem of finding shortest Hamiltonian ath in a eighted comlete grah belongs

More information

Opposite-quadrant depth in the plane

Opposite-quadrant depth in the plane Oosite-quadrant deth in the lane Hervé Brönnimann Jonathan Lenchner János Pach Comuter and Information Science, Polytechnic University, Brooklyn, NY 1101, hbr@oly.edu IBM T. J. Watson Research Center,

More information

Optimal Approximate Polytope Membership

Optimal Approximate Polytope Membership Otimal Aroximate Polytoe Membershi Sunil Arya Deartment of Comuter Science and Engineering The Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong arya@cse.ust.hk Abstract

More information

A randomized sorting algorithm on the BSP model

A randomized sorting algorithm on the BSP model A randomized sorting algorithm on the BSP model Alexandros V. Gerbessiotis a, Constantinos J. Siniolakis b a CS Deartment, New Jersey Institute of Technology, Newark, NJ 07102, USA b The American College

More information

Theoretically Optimal and Empirically Efficient R-trees with Strong Parallelizability

Theoretically Optimal and Empirically Efficient R-trees with Strong Parallelizability Theoretically Otimal and Emirically Efficient R-trees with Strong Parallelizability Jianzhong Qi, Yufei Tao, Yanchuan Chang, Rui Zhang School of Comuting and Information Systems, The University of Melbourne

More information

Periodic scheduling 05/06/

Periodic scheduling 05/06/ Periodic scheduling T T or eriodic scheduling, the best that we can do is to design an algorithm which will always find a schedule if one exists. A scheduler is defined to be otimal iff it will find a

More information

SAT based Abstraction-Refinement using ILP and Machine Learning Techniques

SAT based Abstraction-Refinement using ILP and Machine Learning Techniques SAT based Abstraction-Refinement using ILP and Machine Learning Techniques 1 SAT based Abstraction-Refinement using ILP and Machine Learning Techniques Edmund Clarke James Kukula Anubhav Guta Ofer Strichman

More information

Composition of Transformations: A Framework for Systems with Dynamic Topology

Composition of Transformations: A Framework for Systems with Dynamic Topology Comosition of Transformations: A Framework for Systems with Dynamic Toology Marnes Augusto Hoff, Karina Girardi Roggia, Paulo lauth Menezes Instituto de Informática, Universidade Federal do Rio Grande

More information

Correspondence Between Fractal-Wavelet. Transforms and Iterated Function Systems. With Grey Level Maps. F. Mendivil and E.R.

Correspondence Between Fractal-Wavelet. Transforms and Iterated Function Systems. With Grey Level Maps. F. Mendivil and E.R. 1 Corresondence Between Fractal-Wavelet Transforms and Iterated Function Systems With Grey Level Mas F. Mendivil and E.R. Vrscay Deartment of Alied Mathematics Faculty of Mathematics University of Waterloo

More information

1/25/2018 LINEAR INDEPENDENCE LINEAR INDEPENDENCE LINEAR INDEPENDENCE LINEAR INDEPENDENCE

1/25/2018 LINEAR INDEPENDENCE LINEAR INDEPENDENCE LINEAR INDEPENDENCE LINEAR INDEPENDENCE /25/28 Definition: An indexed set of vectors {v,, v } in R n is said to be linearly indeendent if the vector equation x v x v... x v 2 2 has only the trivial solution. The set {v,, v } is said to be linearly

More information

Paper C Exact Volume Balance Versus Exact Mass Balance in Compositional Reservoir Simulation

Paper C Exact Volume Balance Versus Exact Mass Balance in Compositional Reservoir Simulation Paer C Exact Volume Balance Versus Exact Mass Balance in Comositional Reservoir Simulation Submitted to Comutational Geosciences, December 2005. Exact Volume Balance Versus Exact Mass Balance in Comositional

More information

Multi-Operation Multi-Machine Scheduling

Multi-Operation Multi-Machine Scheduling Multi-Oeration Multi-Machine Scheduling Weizhen Mao he College of William and Mary, Williamsburg VA 3185, USA Abstract. In the multi-oeration scheduling that arises in industrial engineering, each job

More information

Statics and dynamics: some elementary concepts

Statics and dynamics: some elementary concepts 1 Statics and dynamics: some elementary concets Dynamics is the study of the movement through time of variables such as heartbeat, temerature, secies oulation, voltage, roduction, emloyment, rices and

More information

Matching Partition a Linked List and Its Optimization

Matching Partition a Linked List and Its Optimization Matching Partition a Linked List and Its Otimization Yijie Han Deartment of Comuter Science University of Kentucky Lexington, KY 40506 ABSTRACT We show the curve O( n log i + log (i) n + log i) for the

More information

Discrete-time Geo/Geo/1 Queue with Negative Customers and Working Breakdowns

Discrete-time Geo/Geo/1 Queue with Negative Customers and Working Breakdowns Discrete-time GeoGeo1 Queue with Negative Customers and Working Breakdowns Tao Li and Liyuan Zhang Abstract This aer considers a discrete-time GeoGeo1 queue with server breakdowns and reairs. If the server

More information

Recursive Estimation of the Preisach Density function for a Smart Actuator

Recursive Estimation of the Preisach Density function for a Smart Actuator Recursive Estimation of the Preisach Density function for a Smart Actuator Ram V. Iyer Deartment of Mathematics and Statistics, Texas Tech University, Lubbock, TX 7949-142. ABSTRACT The Preisach oerator

More information

On split sample and randomized confidence intervals for binomial proportions

On split sample and randomized confidence intervals for binomial proportions On slit samle and randomized confidence intervals for binomial roortions Måns Thulin Deartment of Mathematics, Usala University arxiv:1402.6536v1 [stat.me] 26 Feb 2014 Abstract Slit samle methods have

More information

Principles of Computed Tomography (CT)

Principles of Computed Tomography (CT) Page 298 Princiles of Comuted Tomograhy (CT) The theoretical foundation of CT dates back to Johann Radon, a mathematician from Vienna who derived a method in 1907 for rojecting a 2-D object along arallel

More information

Linear diophantine equations for discrete tomography

Linear diophantine equations for discrete tomography Journal of X-Ray Science and Technology 10 001 59 66 59 IOS Press Linear diohantine euations for discrete tomograhy Yangbo Ye a,gewang b and Jiehua Zhu a a Deartment of Mathematics, The University of Iowa,

More information

For q 0; 1; : : : ; `? 1, we have m 0; 1; : : : ; q? 1. The set fh j(x) : j 0; 1; ; : : : ; `? 1g forms a basis for the tness functions dened on the i

For q 0; 1; : : : ; `? 1, we have m 0; 1; : : : ; q? 1. The set fh j(x) : j 0; 1; ; : : : ; `? 1g forms a basis for the tness functions dened on the i Comuting with Haar Functions Sami Khuri Deartment of Mathematics and Comuter Science San Jose State University One Washington Square San Jose, CA 9519-0103, USA khuri@juiter.sjsu.edu Fax: (40)94-500 Keywords:

More information

Introduction Consider a set of jobs that are created in an on-line fashion and should be assigned to disks. Each job has a weight which is the frequen

Introduction Consider a set of jobs that are created in an on-line fashion and should be assigned to disks. Each job has a weight which is the frequen Ancient and new algorithms for load balancing in the L norm Adi Avidor Yossi Azar y Jir Sgall z July 7, 997 Abstract We consider the on-line load balancing roblem where there are m identical machines (servers)

More information

Round-off Errors and Computer Arithmetic - (1.2)

Round-off Errors and Computer Arithmetic - (1.2) Round-off Errors and Comuter Arithmetic - (.). Round-off Errors: Round-off errors is roduced when a calculator or comuter is used to erform real number calculations. That is because the arithmetic erformed

More information

A Parallel Algorithm for Minimization of Finite Automata

A Parallel Algorithm for Minimization of Finite Automata A Parallel Algorithm for Minimization of Finite Automata B. Ravikumar X. Xiong Deartment of Comuter Science University of Rhode Island Kingston, RI 02881 E-mail: fravi,xiongg@cs.uri.edu Abstract In this

More information

RANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES

RANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES RANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES AARON ZWIEBACH Abstract. In this aer we will analyze research that has been recently done in the field of discrete

More information

Lilian Markenzon 1, Nair Maria Maia de Abreu 2* and Luciana Lee 3

Lilian Markenzon 1, Nair Maria Maia de Abreu 2* and Luciana Lee 3 Pesquisa Oeracional (2013) 33(1): 123-132 2013 Brazilian Oerations Research Society Printed version ISSN 0101-7438 / Online version ISSN 1678-5142 www.scielo.br/oe SOME RESULTS ABOUT THE CONNECTIVITY OF

More information

Brownian Motion and Random Prime Factorization

Brownian Motion and Random Prime Factorization Brownian Motion and Random Prime Factorization Kendrick Tang June 4, 202 Contents Introduction 2 2 Brownian Motion 2 2. Develoing Brownian Motion.................... 2 2.. Measure Saces and Borel Sigma-Algebras.........

More information

Combining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO)

Combining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO) Combining Logistic Regression with Kriging for Maing the Risk of Occurrence of Unexloded Ordnance (UXO) H. Saito (), P. Goovaerts (), S. A. McKenna (2) Environmental and Water Resources Engineering, Deartment

More information

Numerical Linear Algebra

Numerical Linear Algebra Numerical Linear Algebra Numerous alications in statistics, articularly in the fitting of linear models. Notation and conventions: Elements of a matrix A are denoted by a ij, where i indexes the rows and

More information

Radial Basis Function Networks: Algorithms

Radial Basis Function Networks: Algorithms Radial Basis Function Networks: Algorithms Introduction to Neural Networks : Lecture 13 John A. Bullinaria, 2004 1. The RBF Maing 2. The RBF Network Architecture 3. Comutational Power of RBF Networks 4.

More information

A Note on Guaranteed Sparse Recovery via l 1 -Minimization

A Note on Guaranteed Sparse Recovery via l 1 -Minimization A Note on Guaranteed Sarse Recovery via l -Minimization Simon Foucart, Université Pierre et Marie Curie Abstract It is roved that every s-sarse vector x C N can be recovered from the measurement vector

More information

GOOD MODELS FOR CUBIC SURFACES. 1. Introduction

GOOD MODELS FOR CUBIC SURFACES. 1. Introduction GOOD MODELS FOR CUBIC SURFACES ANDREAS-STEPHAN ELSENHANS Abstract. This article describes an algorithm for finding a model of a hyersurface with small coefficients. It is shown that the aroach works in

More information

Uncorrelated Multilinear Principal Component Analysis for Unsupervised Multilinear Subspace Learning

Uncorrelated Multilinear Principal Component Analysis for Unsupervised Multilinear Subspace Learning TNN-2009-P-1186.R2 1 Uncorrelated Multilinear Princial Comonent Analysis for Unsuervised Multilinear Subsace Learning Haiing Lu, K. N. Plataniotis and A. N. Venetsanooulos The Edward S. Rogers Sr. Deartment

More information

Estimation of the large covariance matrix with two-step monotone missing data

Estimation of the large covariance matrix with two-step monotone missing data Estimation of the large covariance matrix with two-ste monotone missing data Masashi Hyodo, Nobumichi Shutoh 2, Takashi Seo, and Tatjana Pavlenko 3 Deartment of Mathematical Information Science, Tokyo

More information

Sums of independent random variables

Sums of independent random variables 3 Sums of indeendent random variables This lecture collects a number of estimates for sums of indeendent random variables with values in a Banach sace E. We concentrate on sums of the form N γ nx n, where

More information

Uniform Law on the Unit Sphere of a Banach Space

Uniform Law on the Unit Sphere of a Banach Space Uniform Law on the Unit Shere of a Banach Sace by Bernard Beauzamy Société de Calcul Mathématique SA Faubourg Saint Honoré 75008 Paris France Setember 008 Abstract We investigate the construction of a

More information

Memoryfull Branching-Time Logic

Memoryfull Branching-Time Logic Memoryfull Branching-Time Logic Orna Kuferman 1 and Moshe Y. Vardi 2 1 Hebrew University, School of Engineering and Comuter Science, Jerusalem 91904, Israel Email: orna@cs.huji.ac.il, URL: htt://www.cs.huji.ac.il/

More information

Some results of convex programming complexity

Some results of convex programming complexity 2012c12 $ Ê Æ Æ 116ò 14Ï Dec., 2012 Oerations Research Transactions Vol.16 No.4 Some results of convex rogramming comlexity LOU Ye 1,2 GAO Yuetian 1 Abstract Recently a number of aers were written that

More information

New Schedulability Test Conditions for Non-preemptive Scheduling on Multiprocessor Platforms

New Schedulability Test Conditions for Non-preemptive Scheduling on Multiprocessor Platforms New Schedulability Test Conditions for Non-reemtive Scheduling on Multirocessor Platforms Technical Reort May 2008 Nan Guan 1, Wang Yi 2, Zonghua Gu 3 and Ge Yu 1 1 Northeastern University, Shenyang, China

More information

Feedback-error control

Feedback-error control Chater 4 Feedback-error control 4.1 Introduction This chater exlains the feedback-error (FBE) control scheme originally described by Kawato [, 87, 8]. FBE is a widely used neural network based controller

More information

The Graph Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule

The Graph Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule The Grah Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule STEFAN D. BRUDA Deartment of Comuter Science Bisho s University Lennoxville, Quebec J1M 1Z7 CANADA bruda@cs.ubishos.ca

More information

MATH 2710: NOTES FOR ANALYSIS

MATH 2710: NOTES FOR ANALYSIS MATH 270: NOTES FOR ANALYSIS The main ideas we will learn from analysis center around the idea of a limit. Limits occurs in several settings. We will start with finite limits of sequences, then cover infinite

More information

A Game Theoretic Investigation of Selection Methods in Two Population Coevolution

A Game Theoretic Investigation of Selection Methods in Two Population Coevolution A Game Theoretic Investigation of Selection Methods in Two Poulation Coevolution Sevan G. Ficici Division of Engineering and Alied Sciences Harvard University Cambridge, Massachusetts 238 USA sevan@eecs.harvard.edu

More information

OXFORD UNIVERSITY. MATHEMATICS, JOINT SCHOOLS AND COMPUTER SCIENCE WEDNESDAY 4 NOVEMBER 2009 Time allowed: hours

OXFORD UNIVERSITY. MATHEMATICS, JOINT SCHOOLS AND COMPUTER SCIENCE WEDNESDAY 4 NOVEMBER 2009 Time allowed: hours OXFORD UNIVERSITY MATHEMATICS, JOINT SCHOOLS AND COMPUTER SCIENCE WEDNESDAY 4 NOVEMBER 2009 Time allowed: 2 1 2 hours For candidates alying for Mathematics, Mathematics & Statistics, Comuter Science, Mathematics

More information

John Weatherwax. Analysis of Parallel Depth First Search Algorithms

John Weatherwax. Analysis of Parallel Depth First Search Algorithms Sulementary Discussions and Solutions to Selected Problems in: Introduction to Parallel Comuting by Viin Kumar, Ananth Grama, Anshul Guta, & George Karyis John Weatherwax Chater 8 Analysis of Parallel

More information

Static Dictionaries on AC 0 RAMs: Query time ( log n= log log n) is necessary and sufficient

Static Dictionaries on AC 0 RAMs: Query time ( log n= log log n) is necessary and sufficient q Static Dictionaries on AC 0 RAMs: Query time ( = log ) is necessary and sufficient Arne Andersson Lund University arne@dna.lth.se Peter Bro Miltersen y University of Toronto bmilter@cs.toronto.edu Søren

More information

A Spectral-Factorization Combinatorial-Search Algorithm Unifying the Systematized Collection of Daubechies Wavelets. Abstract.

A Spectral-Factorization Combinatorial-Search Algorithm Unifying the Systematized Collection of Daubechies Wavelets. Abstract. A Sectral-Factorization Combinatorial-Search Algorithm Unifying the Systematized Collection of Daubechies Wavelets Carl Taswell UCSD School of Medicine, La Jolla, CA 92093-0603 Comutational Toolsmiths,

More information

Rough Sets in Approximate Spatial Reasoning

Rough Sets in Approximate Spatial Reasoning ough Sets in Aroximate Satial easoning Thomas Bittner and John G. Stell Centre de recherche en geomatique, Laval University, Quebec, Canada. Thomas.Bittner@scg.ulaval.ca Deartment of Comuter Science, Keele

More information

CMSC 425: Lecture 4 Geometry and Geometric Programming

CMSC 425: Lecture 4 Geometry and Geometric Programming CMSC 425: Lecture 4 Geometry and Geometric Programming Geometry for Game Programming and Grahics: For the next few lectures, we will discuss some of the basic elements of geometry. There are many areas

More information

System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests

System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests 009 American Control Conference Hyatt Regency Riverfront, St. Louis, MO, USA June 0-, 009 FrB4. System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests James C. Sall Abstract

More information

A generalization of Amdahl's law and relative conditions of parallelism

A generalization of Amdahl's law and relative conditions of parallelism A generalization of Amdahl's law and relative conditions of arallelism Author: Gianluca Argentini, New Technologies and Models, Riello Grou, Legnago (VR), Italy. E-mail: gianluca.argentini@riellogrou.com

More information

Research of PMU Optimal Placement in Power Systems

Research of PMU Optimal Placement in Power Systems Proceedings of the 5th WSEAS/IASME Int. Conf. on SYSTEMS THEORY and SCIENTIFIC COMPUTATION, Malta, Setember 15-17, 2005 (38-43) Research of PMU Otimal Placement in Power Systems TIAN-TIAN CAI, QIAN AI

More information

Efficient Approximations for Call Admission Control Performance Evaluations in Multi-Service Networks

Efficient Approximations for Call Admission Control Performance Evaluations in Multi-Service Networks Efficient Aroximations for Call Admission Control Performance Evaluations in Multi-Service Networks Emre A. Yavuz, and Victor C. M. Leung Deartment of Electrical and Comuter Engineering The University

More information

Preconditioning techniques for Newton s method for the incompressible Navier Stokes equations

Preconditioning techniques for Newton s method for the incompressible Navier Stokes equations Preconditioning techniques for Newton s method for the incomressible Navier Stokes equations H. C. ELMAN 1, D. LOGHIN 2 and A. J. WATHEN 3 1 Deartment of Comuter Science, University of Maryland, College

More information

CHAPTER 2: SMOOTH MAPS. 1. Introduction In this chapter we introduce smooth maps between manifolds, and some important

CHAPTER 2: SMOOTH MAPS. 1. Introduction In this chapter we introduce smooth maps between manifolds, and some important CHAPTER 2: SMOOTH MAPS DAVID GLICKENSTEIN 1. Introduction In this chater we introduce smooth mas between manifolds, and some imortant concets. De nition 1. A function f : M! R k is a smooth function if

More information

Understanding and Using Availability

Understanding and Using Availability Understanding and Using Availability Jorge Luis Romeu, Ph.D. ASQ CQE/CRE, & Senior Member Email: romeu@cortland.edu htt://myrofile.cos.com/romeu ASQ/RD Webinar Series Noviembre 5, J. L. Romeu - Consultant

More information

Improvement on the Decay of Crossing Numbers

Improvement on the Decay of Crossing Numbers Grahs and Combinatorics 2013) 29:365 371 DOI 10.1007/s00373-012-1137-3 ORIGINAL PAPER Imrovement on the Decay of Crossing Numbers Jakub Černý Jan Kynčl Géza Tóth Received: 24 Aril 2007 / Revised: 1 November

More information

Robust hamiltonicity of random directed graphs

Robust hamiltonicity of random directed graphs Robust hamiltonicity of random directed grahs Asaf Ferber Rajko Nenadov Andreas Noever asaf.ferber@inf.ethz.ch rnenadov@inf.ethz.ch anoever@inf.ethz.ch Ueli Peter ueter@inf.ethz.ch Nemanja Škorić nskoric@inf.ethz.ch

More information

Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models

Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models Ketan N. Patel, Igor L. Markov and John P. Hayes University of Michigan, Ann Arbor 48109-2122 {knatel,imarkov,jhayes}@eecs.umich.edu

More information

Theory of Parallel Hardware May 11, 2004 Massachusetts Institute of Technology Charles Leiserson, Michael Bender, Bradley Kuszmaul

Theory of Parallel Hardware May 11, 2004 Massachusetts Institute of Technology Charles Leiserson, Michael Bender, Bradley Kuszmaul Theory of Parallel Hardware May 11, 2004 Massachusetts Institute of Technology 6.896 Charles Leiserson, Michael Bender, Bradley Kuszmaul Final Examination Final Examination ffl Do not oen this exam booklet

More information

Multiplicative group law on the folium of Descartes

Multiplicative group law on the folium of Descartes Multilicative grou law on the folium of Descartes Steluţa Pricoie and Constantin Udrişte Abstract. The folium of Descartes is still studied and understood today. Not only did it rovide for the roof of

More information

Analysis of M/M/n/K Queue with Multiple Priorities

Analysis of M/M/n/K Queue with Multiple Priorities Analysis of M/M/n/K Queue with Multile Priorities Coyright, Sanjay K. Bose For a P-riority system, class P of highest riority Indeendent, Poisson arrival rocesses for each class with i as average arrival

More information

Strong Matching of Points with Geometric Shapes

Strong Matching of Points with Geometric Shapes Strong Matching of Points with Geometric Shaes Ahmad Biniaz Anil Maheshwari Michiel Smid School of Comuter Science, Carleton University, Ottawa, Canada December 9, 05 In memory of Ferran Hurtado. Abstract

More information

Matching Transversal Edge Domination in Graphs

Matching Transversal Edge Domination in Graphs Available at htt://vamuedu/aam Al Al Math ISSN: 19-9466 Vol 11, Issue (December 016), 919-99 Alications and Alied Mathematics: An International Journal (AAM) Matching Transversal Edge Domination in Grahs

More information

Fig. 21: Architecture of PeerSim [44]

Fig. 21: Architecture of PeerSim [44] Sulementary Aendix A: Modeling HPP with PeerSim Fig. : Architecture of PeerSim [] In PeerSim, every comonent can be relaced by another comonent imlementing the same interface, and the general simulation

More information

An Analysis of Reliable Classifiers through ROC Isometrics

An Analysis of Reliable Classifiers through ROC Isometrics An Analysis of Reliable Classifiers through ROC Isometrics Stijn Vanderlooy s.vanderlooy@cs.unimaas.nl Ida G. Srinkhuizen-Kuyer kuyer@cs.unimaas.nl Evgueni N. Smirnov smirnov@cs.unimaas.nl MICC-IKAT, Universiteit

More information

Finite-State Verification or Model Checking. Finite State Verification (FSV) or Model Checking

Finite-State Verification or Model Checking. Finite State Verification (FSV) or Model Checking Finite-State Verification or Model Checking Finite State Verification (FSV) or Model Checking Holds the romise of roviding a cost effective way of verifying imortant roerties about a system Not all faults

More information

STABILITY ANALYSIS AND CONTROL OF STOCHASTIC DYNAMIC SYSTEMS USING POLYNOMIAL CHAOS. A Dissertation JAMES ROBERT FISHER

STABILITY ANALYSIS AND CONTROL OF STOCHASTIC DYNAMIC SYSTEMS USING POLYNOMIAL CHAOS. A Dissertation JAMES ROBERT FISHER STABILITY ANALYSIS AND CONTROL OF STOCHASTIC DYNAMIC SYSTEMS USING POLYNOMIAL CHAOS A Dissertation by JAMES ROBERT FISHER Submitted to the Office of Graduate Studies of Texas A&M University in artial fulfillment

More information

Chapter 7 Sampling and Sampling Distributions. Introduction. Selecting a Sample. Introduction. Sampling from a Finite Population

Chapter 7 Sampling and Sampling Distributions. Introduction. Selecting a Sample. Introduction. Sampling from a Finite Population Chater 7 and s Selecting a Samle Point Estimation Introduction to s of Proerties of Point Estimators Other Methods Introduction An element is the entity on which data are collected. A oulation is a collection

More information

NUMERICAL AND THEORETICAL INVESTIGATIONS ON DETONATION- INERT CONFINEMENT INTERACTIONS

NUMERICAL AND THEORETICAL INVESTIGATIONS ON DETONATION- INERT CONFINEMENT INTERACTIONS NUMERICAL AND THEORETICAL INVESTIGATIONS ON DETONATION- INERT CONFINEMENT INTERACTIONS Tariq D. Aslam and John B. Bdzil Los Alamos National Laboratory Los Alamos, NM 87545 hone: 1-55-667-1367, fax: 1-55-667-6372

More information

Uncorrelated Multilinear Discriminant Analysis with Regularization and Aggregation for Tensor Object Recognition

Uncorrelated Multilinear Discriminant Analysis with Regularization and Aggregation for Tensor Object Recognition TNN-2007-P-0332.R1 1 Uncorrelated Multilinear Discriminant Analysis with Regularization and Aggregation for Tensor Object Recognition Haiing Lu, K.N. Plataniotis and A.N. Venetsanooulos The Edward S. Rogers

More information

Session 5: Review of Classical Astrodynamics

Session 5: Review of Classical Astrodynamics Session 5: Review of Classical Astrodynamics In revious lectures we described in detail the rocess to find the otimal secific imulse for a articular situation. Among the mission requirements that serve

More information

Calculation of MTTF values with Markov Models for Safety Instrumented Systems

Calculation of MTTF values with Markov Models for Safety Instrumented Systems 7th WEA International Conference on APPLIE COMPUTE CIENCE, Venice, Italy, November -3, 7 3 Calculation of MTTF values with Markov Models for afety Instrumented ystems BÖCÖK J., UGLJEA E., MACHMU. University

More information

Understanding DPMFoam/MPPICFoam

Understanding DPMFoam/MPPICFoam Understanding DPMFoam/MPPICFoam Jeroen Hofman March 18, 2015 In this document I intend to clarify the flow solver and at a later stage, the article-fluid and article-article interaction forces as imlemented

More information

ε i (E j )=δj i = 0, if i j, form a basis for V, called the dual basis to (E i ). Therefore, dim V =dim V.

ε i (E j )=δj i = 0, if i j, form a basis for V, called the dual basis to (E i ). Therefore, dim V =dim V. Covectors Definition. Let V be a finite-dimensional vector sace. A covector on V is real-valued linear functional on V, that is, a linear ma ω : V R. The sace of all covectors on V is itself a real vector

More information

Notes on duality in second order and -order cone otimization E. D. Andersen Λ, C. Roos y, and T. Terlaky z Aril 6, 000 Abstract Recently, the so-calle

Notes on duality in second order and -order cone otimization E. D. Andersen Λ, C. Roos y, and T. Terlaky z Aril 6, 000 Abstract Recently, the so-calle McMaster University Advanced Otimization Laboratory Title: Notes on duality in second order and -order cone otimization Author: Erling D. Andersen, Cornelis Roos and Tamás Terlaky AdvOl-Reort No. 000/8

More information

A Qualitative Event-based Approach to Multiple Fault Diagnosis in Continuous Systems using Structural Model Decomposition

A Qualitative Event-based Approach to Multiple Fault Diagnosis in Continuous Systems using Structural Model Decomposition A Qualitative Event-based Aroach to Multile Fault Diagnosis in Continuous Systems using Structural Model Decomosition Matthew J. Daigle a,,, Anibal Bregon b,, Xenofon Koutsoukos c, Gautam Biswas c, Belarmino

More information

c Copyright by Helen J. Elwood December, 2011

c Copyright by Helen J. Elwood December, 2011 c Coyright by Helen J. Elwood December, 2011 CONSTRUCTING COMPLEX EQUIANGULAR PARSEVAL FRAMES A Dissertation Presented to the Faculty of the Deartment of Mathematics University of Houston In Partial Fulfillment

More information

Understanding and Using Availability

Understanding and Using Availability Understanding and Using Availability Jorge Luis Romeu, Ph.D. ASQ CQE/CRE, & Senior Member C. Stat Fellow, Royal Statistical Society Past Director, Region II (NY & PA) Director: Juarez Lincoln Marti Int

More information

Hermite subdivision on manifolds via parallel transport

Hermite subdivision on manifolds via parallel transport Adances in Comutational Mathematics manuscrit No. (will be inserted by the editor Hermite subdiision on manifolds ia arallel transort Caroline Moosmüller Receied: date / Acceted: date Abstract We roose

More information

Synthesis Method for Hierarchical Interface-based Supervisory Control

Synthesis Method for Hierarchical Interface-based Supervisory Control Synthesis Method for Hierarchical Interface-based Suervisory Control Ryan J. Leduc and Pengcheng Dai Det. of Comuting and Software, McMaster University email: leduc, dai@mcmaster.ca Abstract Hierarchical

More information

A Network-Flow Based Cell Sizing Algorithm

A Network-Flow Based Cell Sizing Algorithm A Networ-Flow Based Cell Sizing Algorithm Huan Ren and Shantanu Dutt Det. of ECE, University of Illinois-Chicago Abstract We roose a networ flow based algorithm for the area-constrained timing-driven discrete

More information

LEIBNIZ SEMINORMS IN PROBABILITY SPACES

LEIBNIZ SEMINORMS IN PROBABILITY SPACES LEIBNIZ SEMINORMS IN PROBABILITY SPACES ÁDÁM BESENYEI AND ZOLTÁN LÉKA Abstract. In this aer we study the (strong) Leibniz roerty of centered moments of bounded random variables. We shall answer a question

More information

START Selected Topics in Assurance

START Selected Topics in Assurance START Selected Toics in Assurance Related Technologies Table of Contents Introduction Statistical Models for Simle Systems (U/Down) and Interretation Markov Models for Simle Systems (U/Down) and Interretation

More information

Graph-Decomposition-Based Frameworks for Subset-Cover Broadcast Encryption and Efficient Instantiations

Graph-Decomposition-Based Frameworks for Subset-Cover Broadcast Encryption and Efficient Instantiations Grah-Decomosition-Based Frameworks for Subset-Cover Broadcast Encrytion and Efficient Instantiations Nuttaong Attraadung and Hideki Imai Imai Laboratory, Institute of Industrial Science, University of

More information

MATH 6210: SOLUTIONS TO PROBLEM SET #3

MATH 6210: SOLUTIONS TO PROBLEM SET #3 MATH 6210: SOLUTIONS TO PROBLEM SET #3 Rudin, Chater 4, Problem #3. The sace L (T) is searable since the trigonometric olynomials with comlex coefficients whose real and imaginary arts are rational form

More information

Stone Duality for Skew Boolean Algebras with Intersections

Stone Duality for Skew Boolean Algebras with Intersections Stone Duality for Skew Boolean Algebras with Intersections Andrej Bauer Faculty of Mathematics and Physics University of Ljubljana Andrej.Bauer@andrej.com Karin Cvetko-Vah Faculty of Mathematics and Physics

More information